last executing test programs: 7m1.583724628s ago: executing program 3 (id=625): socket$netlink(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 7m0.617963725s ago: executing program 3 (id=634): mkdir(&(0x7f0000000000)='./control\x00', 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0)={r2}, &(0x7f0000000300)=0x8) 7m0.572613666s ago: executing program 3 (id=637): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x52, &(0x7f0000000040)=0x2, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x44000, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) recvmmsg(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=""/144, 0x90}, 0x7}], 0x1, 0x22, 0x0) 7m0.528806616s ago: executing program 3 (id=639): r0 = socket$netlink(0x10, 0x3, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)='%pK \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000140)="9c92b02106f44f79812129554b96e62536082e9595b8c8c98aea6695", &(0x7f0000000180)=""/73}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3800480, &(0x7f0000002200), 0x45, 0x786, &(0x7f00000007c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn") creat(&(0x7f0000000100)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x94) r3 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) preadv2(r3, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) sendmsg$nl_route(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000f601000000000000180100002020702500000000002020209460f00731cb22174c5a1e650000bfa100000000000007011a87a35200fbffffffb703000000000000850000007000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000000001030101"], 0x20}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$gtp(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r7, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x14, r8, 0x1, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x40, r8, 0x114, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_I_TEI={0x8, 0x8, 0x1}, @GTPA_O_TEI={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDR6={0x14, 0xc, @private0}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x20000040) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000002200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='sys_enter\x00', r10}, 0x18) lsm_set_self_attr(0x69, 0x0, 0x42, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdb8, 0x0, 0x0, 0x10, 0x3}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r11, 0x0, 0xffffffffffffffff}, 0x13) 7m0.345937899s ago: executing program 3 (id=647): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xe0000000, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x34, r0, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) 6m59.922773636s ago: executing program 3 (id=656): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x9, 0x6a, 0x4}]}, 0x10) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x800448d2, &(0x7f0000000100)) 6m59.902728307s ago: executing program 32 (id=656): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x9, 0x6a, 0x4}]}, 0x10) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x800448d2, &(0x7f0000000100)) 6m20.031844298s ago: executing program 1 (id=1794): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000800030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0xc4}, 0x890) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="14000000100001e456b8aa00000000000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440080000000900010073797a3000000000080003400000000114000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x20000804}, 0x4004000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000020702500000000002020207b1af8ff00000000bfa100000000000007010000dbffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x34, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03000000000000000000020000000900020073797a310000000008000340000000010900010073797a30"], 0x34}}, 0x0) 6m20.007542708s ago: executing program 1 (id=1797): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'hsr0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000180)="0b0312002e0064000200475400f6a13bb1000000086086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x8100, r2}, 0x14) 6m19.932299579s ago: executing program 1 (id=1802): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={0x0, 0xcc}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r0, &(0x7f0000000780)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x4, @loopback, 0x3}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000034c0)='\x00', 0x1}], 0x1}}], 0x1, 0x3404c8d4) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x4891}, 0x8) 6m19.89813962s ago: executing program 1 (id=1805): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f00000004c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@noload}, {@acl}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x783, &(0x7f0000001000)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x4800000, 0x8005, 0x0, 0x0, 0x9, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d10a00966d61fdcf335263bd9bffbcc2542ded71038259ca0400e1a311efec32d71e14ef3dc177b5b48b00", "f2fdffffffffffffff810000000000d300e6d602000000000000000000000001", [0xca4e]}) open(&(0x7f00000001c0)='./file1\x00', 0x14927e, 0x20) 6m19.586082235s ago: executing program 1 (id=1820): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, 0x0, 0x57) 6m19.30644997s ago: executing program 2 (id=1828): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1}, 0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) 6m19.26698907s ago: executing program 2 (id=1829): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x47, &(0x7f00000001c0)={@link_local, @random="2059249b3790", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "108114", 0x11, 0x11, 0x0, @empty, @mcast2, {[], {0x0, 0xe22, 0x11, 0x0, @gue={{0x2, 0x1, 0x0, 0x9}, "e7"}}}}}}}, 0x0) 6m19.208730171s ago: executing program 2 (id=1830): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x21}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) 6m19.206247851s ago: executing program 2 (id=1831): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f00000004c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@noload}, {@acl}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x783, &(0x7f0000001000)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x4800000, 0x8005, 0x0, 0x0, 0x9, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d10a00966d61fdcf335263bd9bffbcc2542ded71038259ca0400e1a311efec32d71e14ef3dc177b5b48b00", "f2fdffffffffffffff810000000000d300e6d602000000000000000000000001", [0xca4e]}) open(&(0x7f00000001c0)='./file1\x00', 0x14927e, 0x20) 6m19.045093894s ago: executing program 1 (id=1835): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x80000}, 0x18) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x1}, 0x28) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="280100000000000001000000"], 0x128}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x88}, 0x10020) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r4}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r6 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDFONTOP_SET(r6, 0x4b72, &(0x7f0000000080)={0x0, 0x3000000, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="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"}) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x3) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000180)=@gcm_256={{0x304}, "67c3f71bb8188109", "2c9e910757c2725dd5795f705ac44b9d43498e33fe93a0c9001c5c65f7107d0d", "ddfb00", "5a3e2c1b40238e79"}, 0x38) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000004c0)={'batadv0\x00', 0x0}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', r7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r9, 0x0) 6m19.044679134s ago: executing program 33 (id=1835): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x80000}, 0x18) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x1}, 0x28) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="280100000000000001000000"], 0x128}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x88}, 0x10020) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r4}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r6 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDFONTOP_SET(r6, 0x4b72, &(0x7f0000000080)={0x0, 0x3000000, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="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"}) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x3) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000180)=@gcm_256={{0x304}, "67c3f71bb8188109", "2c9e910757c2725dd5795f705ac44b9d43498e33fe93a0c9001c5c65f7107d0d", "ddfb00", "5a3e2c1b40238e79"}, 0x38) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000004c0)={'batadv0\x00', 0x0}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', r7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r9, 0x0) 6m19.015046435s ago: executing program 2 (id=1838): r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet6(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) 6m18.783382379s ago: executing program 2 (id=1839): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = syz_open_procfs$pagemap(0x0, &(0x7f0000000280)) ioctl$PAGEMAP_SCAN(r2, 0xc0606610, &(0x7f00000004c0)={0x60, 0x0, &(0x7f000023d000/0x4000)=nil, &(0x7f00004fa000/0x4000)=nil, 0x0, 0x0, 0x0, 0x3}) 6m18.773250749s ago: executing program 34 (id=1839): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = syz_open_procfs$pagemap(0x0, &(0x7f0000000280)) ioctl$PAGEMAP_SCAN(r2, 0xc0606610, &(0x7f00000004c0)={0x60, 0x0, &(0x7f000023d000/0x4000)=nil, &(0x7f00004fa000/0x4000)=nil, 0x0, 0x0, 0x0, 0x3}) 1m55.468657213s ago: executing program 0 (id=7635): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000010bc0)='kfree\x00', r1}, 0x18) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2810, 0x0, 0x6, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x7, 0x2f, 0x0, @empty, @multicast1}}}}) 1m55.360709864s ago: executing program 0 (id=7639): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000200000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f0800034000000004640000000e0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000380003803400008028000180230001"], 0xf0}, 0x1, 0x0, 0x0, 0x80}, 0x0) 1m55.349383565s ago: executing program 0 (id=7640): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xfffffffffffff001}, 0x18) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @multicast1}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r3, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a0101"], 0x57) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000008c0)={0x1, {{0x2, 0x4e20, @multicast2}}}, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x40000, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x6, 0x9, 0x80, 0x0, 0xffffffff, 0x91b1}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000400}, 0x0) setitimer(0x1, 0x0, &(0x7f0000000280)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000500) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendto$inet(r5, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r5, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) syz_usb_connect(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="1201"], 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x101343) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000004000000000008a04ac30000000000000000001a00000000000028fd2924dae9b642cfab82ca77c1b87c36aaecf0172a71f91fe7249a83d4e25e5fe236afda8a66f15eb6e1a48aac890de569f13b53cd5d5781076b27bf0654807951bed8423ecbbc4bb219da231f289de4b681cceaa14e9e8bddc6684fbf3e92f646600cb89fc8937dcebc2f8c17d9f3ab238c56c5dc71215486b750292885592ed1e5415f06541e68358c36bd4dd592cfe4db0b753264a295cd747f637e9ffe3a9a844e817cca24"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m54.758641154s ago: executing program 0 (id=7667): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x20) unlinkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x200) 1m54.733828685s ago: executing program 0 (id=7668): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000380)={r1}, &(0x7f00000004c0)=0x8) 1m54.648688496s ago: executing program 0 (id=7669): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) syz_clone3(&(0x7f0000000880)={0x40000, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 1m54.648550236s ago: executing program 35 (id=7669): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) syz_clone3(&(0x7f0000000880)={0x40000, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 5.704363358s ago: executing program 7 (id=10981): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4d}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) add_key$fscrypt_v1(&(0x7f00000002c0), 0x0, &(0x7f0000000340)={0x0, "8c372358914cc716787a530bb3c07c0899c9c3d9296a990f21274e5f32960536e2f41bb60916ed2a6ad67b6b11bb663952eb3926acf8ba2ee529cf913da20e44", 0x22}, 0x48, 0xfffffffffffffffe) syz_open_dev$mouse(0x0, 0xfffffffffffffffa, 0x290000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f0000000080)) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD_OLD(r1, 0x40045402, &(0x7f0000000140)=0x1) fsopen(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2000000, 0x0, 0x0, &(0x7f0000000440)}, 0x50) timer_create(0xfffffffd, 0x0, &(0x7f00000011c0)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x46000}, 0x4000004) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000640)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r3}, 0x18) kexec_load(0x8, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="b0d6", 0x2, 0xc000000000, 0x80000000}], 0x0) lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000300), &(0x7f0000000280)='system_u:object_r:hwdata_t:s0\x00', 0xffd7, 0x1) 4.658343815s ago: executing program 7 (id=10991): r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) mount(0x0, &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x90\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8M$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xe1(\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xd5j*\xad\x18I\xcc\xe9\xaa{]\xef\xfb\xff\xff\xff\xff\xff\xff\xfft\xd0s\xc4\x04\xe0\xa1\xd2@\x06\xc2`H\xf7\xcc\xe3\xa0\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x00\x00\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x5, 0x8}, 0x4e58, 0x5, 0x0, 0x4, 0x87, 0x9, 0xb, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f0000000400)=[{&(0x7f0000000000)="390000001000111867090707a640400f0021ff3f31000000170a001700000000040037000900030001372564b758b9a64411f6bb744dc48f57", 0x39}], 0x1) r5 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r5, &(0x7f0000000100)={0x1d, r6, 0x2, {0x0, 0xf0, 0x3}}, 0x18) sendmmsg$inet6(r5, &(0x7f0000001d80)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="e6810f78943c39de", 0x8}], 0x1}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000003c0)="28f2", 0x2}], 0x1}}], 0x2, 0x40800) syz_usb_connect(0x0, 0x4a, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000800000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 3.968220936s ago: executing program 4 (id=10996): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x6c}}, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000440)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000380), 0xffffffffffffffff) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r7 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000009c0)="010000000037a788a11d1f000000000000006923c63a4541062101b60a2156566de77062086575a59ea9cb", 0x2b, r7) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r5, @ANYBLOB="0100000000000000000001000000060006000000000024000300a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5426c010880f4000080060005000180000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff240002001bc715ee4868b12a49f4df11bc05475489f6a27c4d6483ad2fa5e45903b0ce851400040002000000ac1414aa00000000000000008c00098028000080060001000a00000014000200ff020000000000000000000000000001050003000000000028000080060001000a000000140002000000000000000000000000000000000105000300030000001c000080060001000200da0008000200e000000105000300000000001c000080060001000200000008000200ac141400050003000000000074000080200004000a004e2200000000fc0000000000000000000000000000000400000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff080003000100000024000200cde20bc0d9b90ac13642d7b66459dd9db5e20b4b16d3d23f2cb03a8aa417dce6080007000000000014000200776730"], 0x1c8}}, 0x0) 3.967394676s ago: executing program 6 (id=10997): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x26, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000ff0f000000000000ff070000181100", @ANYRES32=0x1, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000186500000f0000000000000003000000b7080000000000007b8af8ff00000000b7080000919400007b8af0ff00000000bfa100000000000007010000f8", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91"], &(0x7f0000000100)='GPL\x00', 0x5, 0xaa, &(0x7f0000000400)=""/170, 0x41100, 0x22, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000180)=[0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x3, 0x2, 0x2}, {0x1, 0x1, 0xd, 0x3}, {0x0, 0x3, 0x3, 0x3}, {0x5, 0x1, 0x7, 0x2}, {0x4, 0x2, 0x6, 0x1}, {0x5, 0x4, 0x6, 0x1}, {0x1, 0x3, 0xe, 0x4}, {0x5, 0x1, 0x5, 0xa}], 0x10, 0xf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='napi_poll\x00', r0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0xfffd, 0x0, 0x1, 0xa, 0x20002, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578"], 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800f38c", @ANYRES16=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x20008080}, 0x814) ustat(0x3, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001400010600000200000000002b"], 0x14}}, 0x810) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e00000027f0000010000000003"], 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYRES32], 0x15) writev(r3, &(0x7f00000003c0)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 3.828140919s ago: executing program 6 (id=10999): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x8}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xcedc2ba830529be8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) dup(r2) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000040), 0x10, &(0x7f00000002c0)=ANY=[@ANYRES8=r0, @ANYRESHEX=r1, @ANYRES32=r1, @ANYRESOCT, @ANYBLOB=',k']) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200)={[{@journal_checksum}, {@i_version}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@jqfmt_vfsold}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@quota}]}, 0x5, 0x42f, &(0x7f0000000940)="$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") perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0xa, &(0x7f0000000180), 0x4) recvmsg$unix(r3, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x10001) 2.897563903s ago: executing program 7 (id=11000): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x141) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) sendfile(r0, r1, 0x0, 0x104) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=@newlink={0x4c, 0x10, 0x437, 0x1, 0x25dfdbff, {0x0, 0x0, 0x0, r3, 0x40c89}, [@IFLA_OPERSTATE={0x5, 0x10, 0x5}, @IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @gretap={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_IKEY={0x8, 0x4, 0x3}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x80}]}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44801}, 0x0) socket(0x1d, 0x2, 0x6) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) ioctl$TIOCGPTPEER(r0, 0x5441, 0x6) r4 = socket$inet(0x2, 0x2, 0x0) sendmmsg$inet(r4, &(0x7f00000017c0), 0x0, 0x4040880) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x400}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) ioperm(0x8, 0x9, 0x5a) syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8003}, &(0x7f0000000240), &(0x7f0000000200)) socket$pppl2tp(0x18, 0x1, 0x1) inotify_init1(0x800) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_DELCHAIN={0x2c, 0x5, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x80}, 0x1, 0x0, 0x0, 0x58fe7ab67a988db6}, 0x0) 2.871435744s ago: executing program 4 (id=11002): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) unshare(0x4030400) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x8c, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = socket$igmp(0x2, 0x3, 0x2) sendto$inet(r0, 0x0, 0x0, 0x40804, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x21c0, 0x103) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000000)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) socket$inet(0x2, 0x1, 0x0) syz_clone(0xc0126080, 0x0, 0x0, &(0x7f0000002100), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000380)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") 1.672545513s ago: executing program 7 (id=11003): r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000140)={0xfffffff7, 0x0, 0x0, 0xfdff, 0xe0, "6ae23ae16f51000009faeeaf000000000400", 0x10}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000240)=0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRESDEC=r0], 0x48) r1 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000010) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x50) syz_io_uring_submit(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES32=r1], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000380)='nilfs2_segment_usage_allocated\x00', r2}, 0x18) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000880)=ANY=[@ANYBLOB="85430000", @ANYRES16=0x0, @ANYBLOB="000228bd7000ffdbdf25150000002000018008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f687372000000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="4400018008000100", @ANYRES32=0x0, @ANYBLOB="140002006e657464657673696d3000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006e7230000000000000000000000000003000018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="14000200776730000000000000000000000000002400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000014000180080003000200000008000300010000001400018008000100", @ANYRES32=0x0, @ANYBLOB="0800030001000000"], 0x108}, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @loopback, 0x3, 0x0, 'lblc\x00', 0x0, 0x0, 0x37}, 0x2c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000000c0), 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000240)=0x100000001, 0x59) connect$inet6(r4, &(0x7f0000000200)={0xa, 0xffff, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000840)=@gcm_128={{0x303}, "004029a1b4950d5b", "0106d79bb1c219ef5dd08dd200", "192a95bf", "f31445eddb841aa3"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x304}, "2bd8eea5889fda5c", "5cb4608a40090a35aa66d6e1ff5ac8f5", "c6006004", "000000000000001f"}, 0x28) sendto$inet6(r4, &(0x7f0000000280)='S', 0x1, 0x8000, 0x0, 0x0) close(r4) 1.496374225s ago: executing program 7 (id=11005): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x5421, &(0x7f0000000780)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x40900, 0x0) r1 = syz_io_uring_setup(0x497, &(0x7f0000000180)={0x0, 0x79af, 0x8, 0x8000, 0x400250}, &(0x7f00000003c0)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000140)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x2007, @fd=r0, 0x6, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r1, 0x74d1, 0x4c3, 0x43, 0x0, 0xfffffffffffffd1d) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) r4 = syz_create_resource$binfmt(0x0) openat$binfmt(0xffffffffffffff9c, r4, 0x42, 0x1ff) execveat$binfmt(0xffffffffffffff9c, r4, 0x0, &(0x7f00000003c0)={[], 0xf000}, 0x1000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x22) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd27}, 0x24}, 0x1, 0x0, 0x0, 0x4000091}, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000040)='trans=rdma,') 1.19717218s ago: executing program 4 (id=11008): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x6c, 0x7f, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) fsync(0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000002c0012800c0001006d6163766c616e001c000280080001000800000006000200010000001ffe02000000000008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getchain={0x2c, 0x66, 0x1, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r2, {0xfff2}, {0x6, 0xd}, {0x6, 0x10}}, [{0x8, 0xb, 0x5}]}, 0x2c}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000002e00000095000000000000000000000c00"/32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r5, &(0x7f00000000c0)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x4c, &(0x7f0000000000), 0x4) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x1000410, &(0x7f0000000100), 0x6, 0x504, &(0x7f0000019940)="$eJzs3c9vG1kdAPDvOHGTZt1NF/YACNiyLBRU6vzobrRaDnQvILRaCbFCQuLQDYk3imLXUZwsTcghPXJHohIn+BO4cUDqiQM3bnDjUg5IBSJQg8Rh0IyniZvEdWiTeGt/PtJ45r1x/H3PznvP8xznBTC0rkTETkRciIgPI2KyyE+KLW62t+x+j3a3F/Z2txeSSNMP/pHk57O86PiZzEvFY45HxPe/E/Hj5Gjc1ubWyny9Xlsr0lPrjdWp1ubW9eVSkTM7NzM3/faNt2ZPra6vNX7z8NvL7/3gd7/9woM/7nz9p1mxKj+7lJ/rrMdpale9HJWOvNGIeO8sgvXJaPH7w4sna22fiojX8/Y/GSP5qwkADLI0nYx0sjMNAAy67Pq/EkmpWswFVKJUqlbbc3ivxkSp3mytX5tsbtxejHwO63KUSx8t12vTxVzh5SgnWXomPz5Izx5K34iIVyLi52MX83R1oVlf7OcbHwAYYi8dGv//PdYe/wGAATfe7wIAAOfO+A8Aw8f4DwDD5/8Y/307EAAGhOt/ABg+xn8AGD49x/+751MOAOBcfO/997Mt3Sv+//Xix5sb36x8fH2x1lqpNjYWqgvNtdXqUrO5VK9VF9K01+PVm83VmTf3k63NrVuN5sbt9VvLjfml2q1a+YzrAwD09spr9/+cRMTOOxfzLTrWcjBWw2ArPZE6ZqEeYGCN9LsAQN/4Pg8MrxNc45sGgAHX68q/658I3bP4K7yorn7W/D8Mq1K/CwD0zbPN/3/r1MsBnD/z/zC80jSx5j8ADBlz/MCzfP7/wyg+/wcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAhVcm3pFTN1wLfyW5L1WrEpYi4HOXko+V6bToiXo6IP42Vx7L0TL8LDQA8p9LfkmL9r6uTb1QOn72Q/Gcs30fET375wS/uzK+vr81k+f/cz1+/V+TPXuhHBQCATjePZrXH6WLfcSH/aHd74fF2nkV8+G57cdEs7l6xtc+Mxmi+H49yREz8KynSbdn7lZFTiL9zNyI+c1D/Ox0RKvkcSHvl08Pxs9iXziD+wfOfRJqm6UH80hPxS3nZsn05fy4+fQplgWFz/912P5m1u4u721kTK9pfKa7k++Pb/3jeQz2/x/3f3pH+r7Tf/40ciZ/kbf7KfvrpJXn45u+/eyQznWyfuxvxudHj4if78ZMu/e8bJ6zjXz7/xde7nUt/FXE1jo/f1si72an1xupUa3Pr+nJjfqm2VLs9Ozs3Mzf99o23ZqfyOer27R+Oi/H3d6693C1+Vv+JLvHHe9T/Kyes/6//++GPvvSU+F/78vGv/6tPiZ+NiV89Yfz5iZvHLd+9H3+xS/17vf7XThj/wV+3Fk94VwDgHLQ2t1bm6/XaWo+D7L1mr/s4eDEPYifinIN+YzziE1F3B90O+t0zAWftoNH3uyQAAAAAAAAAAAAAAEA3rc2tlbE4268T9buOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADK7/BQAA//+TAtDE") pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfecc) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0), &(0x7f00000003c0)=ANY=[@ANYRESHEX=r3, @ANYRES32=r4], 0x841, 0x0) mkdir(&(0x7f0000000040)='./file0/bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440), &(0x7f0000000540)=ANY=[@ANYBLOB="00fb9a55017edd95fd27149b7c3417377fdff99ce4f90807be62e074caf1800c78e55e087d511c47a65997b808c89c40ed9bb58adb69529d0cfee946fe6a10404561cbbc8104c5983003d5eb5cf9a6d791990698a57e2e3887864e88e48b00c9f37febd9814dd45f93a37711aa385877966aeeca19fd87494c5aecdf3f974a56ed85ec55bfea7969aa18e2f5e385c556a1b8b73c865821a33241"], 0x9a, 0x3) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGSID(r8, 0x5429, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="600000000206050000000000000000000000000014000780080013400000000008000600000000000500010006000000050005000200000005000400000000000900020073797a320000000011000300686173683a6970"], 0x60}}, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000080)=0x6) 960.182564ms ago: executing program 4 (id=11009): recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, 0x0, 0x0) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x3) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./bus\x00', 0x4010, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES16], 0x1, 0x11ee, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket$kcm(0x10, 0x400000002, 0x0) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000180)=@req3={0x410000, 0x100000001, 0x210000, 0x1, 0xa, 0x0, 0x78}, 0x1c) sendmmsg(r6, &(0x7f0000001dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20040115) recvmsg$kcm(r2, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x2) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400"], 0x48) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$system_posix_acl(r7, &(0x7f0000000000)='system.posix_acl_default\x00', 0x0, 0xfe44, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r5, {0x0, 0x1}, {0xffff, 0xffff}, {0xffff, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x4000) r8 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r8, 0x402, 0x80000024) recvfrom$l2tp6(r8, &(0x7f0000000300)=""/248, 0xf8, 0x40, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, 0x20) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@newtfilter={0x34, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r5, {0x0, 0xf}, {}, {0x7, 0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x24000014}, 0x20084084) 803.322237ms ago: executing program 6 (id=11010): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x23}]}, 0x0, 0xfffffffe, 0x4e, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x2002f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000"], 0x48) close(r2) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000100)={0x20000014}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, 0x0, &(0x7f0000000040)}, 0x20) socket$inet_mptcp(0x2, 0x1, 0x106) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r6, 0x0, &(0x7f0000000240)=""/4101}, 0x20) close_range(r1, r4, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) 721.107198ms ago: executing program 6 (id=11011): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000003800), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000280)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0xf21, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x20, r5, 0x5eae78d9c54e9d3f, 0x0, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_KEY={0x4}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f00000007c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, r3, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f00000038c0)={&(0x7f0000003840)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7000fedbdf25130000000500030002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x44080) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) bind$packet(r7, &(0x7f0000000300)={0x11, 0x1b, r8, 0x1, 0x0, 0x6, @random="0256e946884b"}, 0x14) bind$packet(r7, &(0x7f0000000000)={0x11, 0x4, 0x0, 0x1, 0x1, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) socket$nl_generic(0x10, 0x3, 0x10) r9 = socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x18, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) bind$inet(r9, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) 632.307229ms ago: executing program 6 (id=11013): r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) mount(0x0, &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x90\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8M$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xe1(\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xd5j*\xad\x18I\xcc\xe9\xaa{]\xef\xfb\xff\xff\xff\xff\xff\xff\xfft\xd0s\xc4\x04\xe0\xa1\xd2@\x06\xc2`H\xf7\xcc\xe3\xa0\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x00\x00\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x5, 0x8}, 0x4e58, 0x5, 0x0, 0x4, 0x87, 0x9, 0xb, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f0000000400)=[{&(0x7f0000000000)="390000001000111867090707a640400f0021ff3f31000000170a001700000000040037000900030001372564b758b9a64411f6bb744dc48f57", 0x39}], 0x1) r5 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r5, &(0x7f0000000100)={0x1d, r6, 0x2, {0x0, 0xf0, 0x3}}, 0x18) sendmmsg$inet6(r5, &(0x7f0000001d80)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="e6810f78943c39de", 0x8}], 0x1}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000003c0)="28f2", 0x2}], 0x1}}], 0x2, 0x40800) syz_usb_connect(0x0, 0x4a, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000800000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 614.028409ms ago: executing program 7 (id=11014): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) recvmmsg(r3, &(0x7f0000005040)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x10000, 0x0) mlock2(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x9c) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x2c0, 0x340, 0x25, 0x148, 0x0, 0x60, 0x458, 0x2a8, 0x2a8, 0x458, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0xc8, 0x110, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x8000, 'syz0\x00', {0x481c}}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x320) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000007c0), 0x13f, 0x5}}, 0x20) stat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) r5 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f0000fffffffffffffff000000000"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) 450.953362ms ago: executing program 8 (id=11016): socket$packet(0x11, 0x2, 0x300) r0 = socket(0x10, 0x803, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000006c0), 0x2000) read(r2, &(0x7f0000000200)=""/209, 0x128) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x2bd, @tick=0x5}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000740)={0xfffffffb, 0x2, 0x1, 'queue0\x00'}) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYRESHEX=r4, @ANYBLOB=',\x00']) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x0, 0x1f000000}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, 0x0, 0x0) tkill(r1, 0x7) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000040), &(0x7f0000000080)='%-5lx \x00'}, 0x20) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) syz_clone3(&(0x7f00000003c0)={0x28d308a80, 0x0, 0x0, 0x0, {0x3d}, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe09) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={0x0, 0x44}}, 0x0) r7 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x200) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r7, 0x40485404, &(0x7f0000000040)={{0xffffffffffffffff, 0x2, 0x1, 0x2, 0x6}, 0x8, 0xffffffffffffffff}) 431.211452ms ago: executing program 8 (id=11017): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) prlimit64(0x0, 0x7, &(0x7f0000000140)={0x8, 0x5a6f1af1}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge0\x00', @random="01001000"}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1, 0x0, 0x200000000000006}, 0x18) r2 = socket(0x2, 0x80805, 0x0) getsockopt$bt_hci(r2, 0x84, 0x24, &(0x7f0000000000)=""/4103, &(0x7f0000001080)=0x1007) r3 = syz_io_uring_setup(0x10b, &(0x7f0000000200)={0x0, 0x5697, 0x2000, 0x3, 0xbffffffa}, &(0x7f00000001c0)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f00000002c0)=0x9, 0x0, 0x4) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000008850000004300000095", @ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) capget(&(0x7f00000006c0)={0x20071026}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xb0, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xfffffff6}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x9}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xf}, @ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7f}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x9}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x4}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4041}, 0x4004000) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100000b, 0x2013, r5, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) madvise(&(0x7f0000000000/0x2000)=nil, 0x8000000, 0x9) syz_io_uring_submit(r4, 0x0, &(0x7f0000000180)=@IORING_OP_STATX={0x15, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x80, 0x6000}) io_uring_enter(r3, 0x1c37, 0xe176, 0x22, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000001c0)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) 399.966743ms ago: executing program 8 (id=11019): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={&(0x7f0000000340)=""/151, 0x97, 0x0, &(0x7f00000004c0)=""/72, 0x48}}, 0x10) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f0000000180)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x47, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000900)={0x41, 0x4}, 0x10) r7 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r8 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r8, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r8, &(0x7f0000000240)={&(0x7f0000000080), 0x10, 0x0}, 0x0) sendmsg$tipc(r8, &(0x7f0000000240)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44010}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='mm_page_free\x00', r4}, 0x18) r9 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) bind$can_j1939(r9, &(0x7f00000000c0)={0x1d, r10}, 0x18) connect$can_j1939(r9, &(0x7f0000000140)={0x1d, r10, 0x0, {0x1, 0xff, 0xa8fe8ad4eea2351f}, 0x2}, 0x18) setsockopt$SO_J1939_ERRQUEUE(r9, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) sendmmsg(r9, &(0x7f0000003e40), 0x3fffffffffffe3d, 0xf5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'vxcan1\x00', @remote}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 253.171266ms ago: executing program 5 (id=11021): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800229b43899051b6f40000010000", @ANYRESOCT, @ANYRESDEC=r1], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1d, 0x19, 0xbb12, 0xc, 0x70480, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x150) openat$random(0xffffffffffffff9c, 0x0, 0x202, 0x0) symlinkat(0x0, 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1c, 0x3a653eadfee7b8d9, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r3, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_ANNOUNCE(0xffffffffffffffff, 0x0, 0x40000) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x800) quotactl$Q_QUOTAON(0xffffffff80000202, &(0x7f0000000380)=@filename='./file0\x00', 0x0, &(0x7f00000003c0)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x4}, 0x1, 0x0, 0x0, 0x4004000}, 0x88041) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @multicast2, 0x0, 0x0, 'fo\x00', 0xd, 0xffc, 0x4a}, 0x2c) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac1414aa00000000000000001400020002000000e000000200000000000004000d0001007564703a73"], 0x54}}, 0x0) 213.974616ms ago: executing program 8 (id=11022): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x141) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) sendfile(r0, r1, 0x0, 0x104) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=@newlink={0x4c, 0x10, 0x437, 0x1, 0x25dfdbff, {0x0, 0x0, 0x0, r3, 0x40c89}, [@IFLA_OPERSTATE={0x5, 0x10, 0x5}, @IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @gretap={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_IKEY={0x8, 0x4, 0x3}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x80}]}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44801}, 0x0) socket(0x1d, 0x2, 0x6) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) ioctl$TIOCGPTPEER(r0, 0x5441, 0x6) r4 = socket$inet(0x2, 0x2, 0x0) sendmmsg$inet(r4, &(0x7f00000017c0), 0x0, 0x4040880) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x400}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) ioperm(0x8, 0x9, 0x5a) syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8003}, &(0x7f0000000240), &(0x7f0000000200)) socket$pppl2tp(0x18, 0x1, 0x1) inotify_init1(0x800) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_DELCHAIN={0x2c, 0x5, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x80}, 0x1, 0x0, 0x0, 0x58fe7ab67a988db6}, 0x0) 211.373636ms ago: executing program 5 (id=11023): signalfd4(0xffffffffffffffff, &(0x7f00000002c0)={[0xd]}, 0x8, 0x80000) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) close(r0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000300240248ff050005001200", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x3, &(0x7f0000006680)) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000440)=0x2, 0x4) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000003180)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7ff, 0xf84, 0x3}, 0x1c) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYRES16=r3], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4, 0x0, 0x2}, 0x18) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r5, 0x5608) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) name_to_handle_at(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) r6 = socket$unix(0x1, 0x2, 0x0) bind$unix(r6, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_int(r6, 0x1, 0x1, &(0x7f0000000040)=0x1, 0x4) listen(r6, 0x0) 155.089367ms ago: executing program 8 (id=11024): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000003800), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000280)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0xf21, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x20, r5, 0x5eae78d9c54e9d3f, 0x0, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_KEY={0x4}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f00000007c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, r3, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f00000038c0)={&(0x7f0000003840)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7000fedbdf25130000000500030002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x44080) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) bind$packet(r7, &(0x7f0000000300)={0x11, 0x1b, r8, 0x1, 0x0, 0x6, @random="0256e946884b"}, 0x14) bind$packet(r7, &(0x7f0000000000)={0x11, 0x4, 0x0, 0x1, 0x1, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) socket$nl_generic(0x10, 0x3, 0x10) r9 = socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x18, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) bind$inet(r9, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) 148.007827ms ago: executing program 5 (id=11025): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x50) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000140)='memory.pressure\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)=@o_path={0x0, r0, 0x4000, r2}, 0x18) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3fa, &(0x7f00000004c0)="$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") inotify_add_watch(0xffffffffffffffff, 0x0, 0x60000726) truncate(&(0x7f0000000900)='./file1\x00', 0xbf39) close(0x3) r5 = getpid() r6 = syz_pidfd_open(r5, 0x0) setns(r6, 0x24020000) umount2(&(0x7f0000000040)='.\x00', 0x2) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) poll(&(0x7f0000000040)=[{r7, 0x2124}, {r7, 0xb0c4}], 0x2, 0x11ff) shutdown(r7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 71.721098ms ago: executing program 4 (id=11026): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @initdev, @private}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) r1 = syz_io_uring_setup(0x5bdc, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r1, 0x13, &(0x7f0000000100)=[0x7fff, 0x9], 0x2) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x6, 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000003000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000001300e900"/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6}, &(0x7f0000000500), &(0x7f0000000580)}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) alarm(0x9) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r8}, 0x18) write$selinux_load(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75788aae62f769a3144826d9e4e9de6cbc9b62b7d54aa91cf6403e1ed36dc221ddcd419e4747aa5191cb4399e61a9e7af6"], 0x20) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r10 = epoll_create1(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r11, &(0x7f0000000240)={0x20000006}) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r9, 0x0) 70.381588ms ago: executing program 5 (id=11027): syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./bus\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$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") mount$nfs(0x0, 0x0, 0x0, 0x42000, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$rds(0x15, 0x5, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x210, 0x100, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1a8, 0xffffffff, 0xffffffff, 0x1a8, 0xffffffff, 0x3, 0x0, {[{{@ip={@rand_addr=0x64010102, @dev, 0x0, 0x0, 'bridge_slave_0\x00', 'macsec0\x00', {}, {}, 0x32, 0x0, 0x40}, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@local, [], 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x1000}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x4, 0x1}, {0x0, 0x0, 0x3}, {0x0, 0x6, 0x4}, 0x2000000, 0x1}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x270) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pipe2$9p(&(0x7f0000000000), 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, 0x0, 0x0, r1}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a2, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000000)) io_uring_enter(r3, 0x2217, 0xcf74, 0x16, 0x0, 0x0) 68.066188ms ago: executing program 8 (id=11036): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000080)=0x1, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000001240)='kmem_cache_free\x00', r2, 0x0, 0x7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r3, 0x2) r4 = open(&(0x7f0000000180)='.\x00', 0x10000, 0x0) r5 = syz_open_dev$usbfs(&(0x7f00000001c0), 0x800000001fe, 0x40802) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000110000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r7, &(0x7f00000000c0)={&(0x7f0000000000)={0x24, @short={0x2, 0xffff, 0xffff}}, 0x14, &(0x7f0000000080)={0x0}}, 0x0) r8 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x389b0d52417bb201) pwritev2(r8, &(0x7f0000000240)=[{}], 0x1, 0x7000, 0x0, 0x3) write$binfmt_register(r8, &(0x7f0000000400)={0x3a, 'syz0', 0x3a, 'E', 0x3a, 0x38000000000000, 0x3a, '\x00', 0x3a, '&', 0x3a, './file0', 0x3a, [0x4f, 0x4f, 0x46]}, 0x2c) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000040)={0x20, 0xc, 0x14, 0x2, 0x0, 0x0, 0x0}) flock(r4, 0x1) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a4c000000060a0b0400000000000000000200000520e9038010000180080001006f736600040002800c000180080001006e6174000900010073797a30000000000900020073797a3200000000140000001100010000000000000001000000000a"], 0x74}, 0x1, 0x0, 0x0, 0x850}, 0x10) 30.515739ms ago: executing program 5 (id=11028): socket$packet(0x11, 0x2, 0x300) r0 = socket(0x10, 0x803, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000006c0), 0x2000) read(r2, &(0x7f0000000200)=""/209, 0x128) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x2bd, @tick=0x5}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000740)={0xfffffffb, 0x2, 0x1, 'queue0\x00'}) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYRESHEX=r4, @ANYBLOB=',\x00']) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x0, 0x1f000000}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, 0x0, 0x0) tkill(r1, 0x7) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000040), &(0x7f0000000080)='%-5lx \x00'}, 0x20) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) syz_clone3(&(0x7f00000003c0)={0x28d308a80, 0x0, 0x0, 0x0, {0x3d}, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe09) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={0x0, 0x44}}, 0x0) r7 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x200) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r7, 0x40485404, &(0x7f0000000040)={{0xffffffffffffffff, 0x2, 0x1, 0x2, 0x6}, 0x8, 0xffffffffffffffff}) 29.500769ms ago: executing program 5 (id=11029): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000640)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) r3 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) fcntl$dupfd(r4, 0x0, r4) close_range(r3, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2808002, &(0x7f0000000040)={[{@nobh}]}, 0x1, 0x4b4, &(0x7f0000000440)="$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") r5 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC_PROXY(r5, 0x0, 0xd2, &(0x7f00000000c0)={@private=0xa010100, @multicast1, 0x6, "d30f388c5268b0fa00000000000000000900", 0x0, 0x0, 0x6, 0x8}, 0x3c) setsockopt$MRT_ADD_MFC(r5, 0x0, 0xcc, &(0x7f0000000280)={@broadcast, @multicast1, 0x0, "7ea97ddb2ac127ffa5b7216fe75ebaa2855a422a8bf8ec7caf003751804500", 0x0, 0x0, 0x4, 0xfffffffe}, 0x3c) setsockopt$MRT_ADD_MFC(r5, 0x0, 0xcc, &(0x7f0000000200)={@empty, @private, 0x0, "606b177019716ea6ff1f4d7ed79c31e2e0f1da00000000230000002000", 0x3e1f}, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r6 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r6, 0x2, 0x0) syz_clone(0x1000000, &(0x7f0000000e00)="3aade51b87008e1798fbbc2a2f6cf7ea32dace71a7ad72e7cace0d662b6da130ae5eff9a15175e19766150629152c327131581be6462dcfe772f0f1a85acd881dcb43fe142cdb57fbae9c1644f3b149ac76475bf5e72129a97b30471a59ae8ee88cda539cbf946579d0619a85f40c8f6c517d015721c7e9fa7f993ff3a7f75caf209aa0aaf4c0aec825738cf4ae3c7886606704ff7a6507ee1984887d1115ff250089745962236b27e226df9fd04c1ade27cff5f45e1038e41615448bb4acbe82f5a6236b387ad76dd38442327d58ff369865055e4848aaee41213368f03d1c2823e193e02a3cceb3837ef29f85aeacf5d62f1", 0xf3, &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000f00)="901d2e9bdf54782acff42a51a47658f0865f7daca6185ebaf576c2b868696ecd12808d32519f5337abdaf638df57638e5448eea32ad599d9d21e780434883346cc904c17634fcb1e308cbcbc56d3df02de0cadf8bfe7e91836ea2986956f57062b8996e3c6b3867aeb5e64b52449c62701be61e4fa9da7e2c5493d51c810959668d9efa4fca1530fe867deeb1e829d833ec8e0459b286adb71efafe19a") sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r8 = ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) 1.7457ms ago: executing program 4 (id=11030): syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./bus\x00', 0x10, &(0x7f0000000040)={[{@usrjquota}]}, 0x1, 0x3e7, &(0x7f0000000480)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r1, &(0x7f0000000740)="cc", 0x1) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCGETA(r2, 0x5405, 0xffffffffffffffff) sendfile(r1, r0, 0x0, 0x3ffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x48, 0x0, &(0x7f0000000180)='\x00', 0x0}, 0x50) sendfile(r1, r0, 0x0, 0x7fffeffd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1b, 0x10, &(0x7f0000000200)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x1, 0x7ffc0002}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kfree\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) kexec_load(0x0, 0x0, 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c000000020605000000000000000000000000000c00078005001500267d00000500010007000000050005000a000000050004"], 0x5c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r5) sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000580)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01000000040200f2c8dc1b000000180001801400020073797a5f74756e0000000000000000000c000280"], 0x38}, 0x1, 0x0, 0x0, 0x20000844}, 0x0) 0s ago: executing program 6 (id=11031): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000040340000000000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000357500007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$nfs(&(0x7f0000000280)='$\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x40, &(0x7f0000000340)={[{'\x00'}, {}, {'].)*-$,./.@'}, {'.]\xda'}, {'\x00'}, {}], [{@smackfshat={'smackfshat', 0x3d, '/dev/input/event#\x00'}}, {@dont_measure}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_user={'obj_user', 0x3d, '\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x1, 0x30, 0x35, 0x35, 0x61, 0x34, 0x66], 0x2d, [0x33, 0x38, 0x36, 0x32], 0x2d, [0x63, 0x0, 0x65, 0x36], 0x2d, [0x30, 0x5, 0x33, 0x62], 0x2d, [0x39, 0x23, 0x62, 0x65, 0x64, 0x65, 0x65, 0x61]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '*'}}, {@audit}]}) r3 = syz_open_dev$evdev(&(0x7f0000000180), 0x1, 0xa0502) r4 = socket(0x2a, 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x24}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newtfilter={0x90, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0xfffa}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0x60, 0x2, [@TCA_FLOWER_ACT={0x54, 0x3, [@m_connmark={0x50, 0x1, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffff8, 0xfff, 0x0, 0x5, 0xb}, 0x3}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}]}, @TCA_FLOWER_FLAGS={0x8, 0x16, 0x12}]}}]}, 0x90}}, 0x24000000) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = socket(0x10, 0x803, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r8, 0x4b72, &(0x7f0000000000)={0x1, 0x1, 0xc, 0xd, 0xc4, 0x0}) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r7, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x20000090, 0x0, 0x0) recvmmsg(r7, 0x0, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000080)=""/98, 0x62}, {&(0x7f0000000180)=""/228, 0xe4}, {&(0x7f0000000b00)=""/4107, 0x100b}, {&(0x7f0000000440)=""/233, 0xe9}, {&(0x7f0000000940)=""/37, 0x25}, {&(0x7f0000000700)=""/165, 0xa5}, {&(0x7f0000000600)=""/79, 0x4f}, {&(0x7f0000000380)=""/163, 0xa3}], 0x8}, 0x1}], 0x400010d, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x10, 0xc}, 0x50) syz_usb_disconnect(r3) sendmsg$nl_route_sched(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001040)=@newtaction={0xf8, 0x30, 0xffff, 0x70bd25, 0x0, {}, [{0xe4, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x5, 0x0, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0x6}}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}, @m_bpf={0x2c, 0x3, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0xf8}}, 0x0) kernel console output (not intermixed with test programs): ORWARD/OUTPUT [ 371.987466][T30418] netlink: 'syz.4.8004': attribute type 1 has an invalid length. [ 371.995323][T30418] netlink: 224 bytes leftover after parsing attributes in process `syz.4.8004'. [ 372.143294][T30450] openvswitch: netlink: Message has 6 unknown bytes. [ 372.196069][T30461] syzkaller1: entered promiscuous mode [ 372.201580][T30461] syzkaller1: entered allmulticast mode [ 372.244102][T30446] lo speed is unknown, defaulting to 1000 [ 372.274042][T30446] lo speed is unknown, defaulting to 1000 [ 372.376706][ T996] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 372.404794][ T996] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz1] on syz0 [ 372.605933][T30538] netem: change failed [ 372.615593][T30539] hid-generic 0000:0000:0000.000B: pid 30539 passed too short report [ 373.227099][T30600] lo speed is unknown, defaulting to 1000 [ 373.233174][T30600] lo speed is unknown, defaulting to 1000 [ 373.560891][ T996] kernel read not supported for file /vcs (pid: 996 comm: kworker/1:2) [ 373.698095][T30633] SELinux: Context system_u:object_r:hald_sonypic_exec_t:s0 is not valid (left unmapped). [ 373.973460][T30661] netlink: 16 bytes leftover after parsing attributes in process `syz.7.8085'. [ 374.077334][T30683] SELinux: Context system_u:object is not valid (left unmapped). [ 374.229464][T30705] netlink: 28 bytes leftover after parsing attributes in process `syz.5.8104'. [ 374.280596][T30711] xt_check_target: 4 callbacks suppressed [ 374.280614][T30711] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 374.370359][T30719] veth0: entered promiscuous mode [ 374.376558][T30718] veth0: left promiscuous mode [ 374.631093][T30753] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8124'. [ 374.657096][ T29] kauditd_printk_skb: 443 callbacks suppressed [ 374.657109][ T29] audit: type=1326 audit(2000000053.730:31248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30754 comm="syz.8.8125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 374.703452][ T29] audit: type=1326 audit(2000000053.760:31249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30754 comm="syz.8.8125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 374.727041][ T29] audit: type=1326 audit(2000000053.760:31250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30754 comm="syz.8.8125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 374.750932][ T29] audit: type=1326 audit(2000000053.760:31251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30754 comm="syz.8.8125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 374.792204][T30759] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8127'. [ 374.802489][T30759] veth1_macvtap: left promiscuous mode [ 374.843509][T30765] netlink: 'syz.6.8129': attribute type 1 has an invalid length. [ 374.979569][ T29] audit: type=1400 audit(2000000054.050:31252): avc: denied { write } for pid=30783 comm="syz.8.8138" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 375.258621][T30831] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 375.341342][T30842] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8161'. [ 375.351299][T30842] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8161'. [ 375.365285][T30842] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8161'. [ 375.375213][T30842] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8161'. [ 375.388547][T30842] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8161'. [ 375.557264][T30865] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 375.589506][T30849] lo speed is unknown, defaulting to 1000 [ 375.600406][T30849] lo speed is unknown, defaulting to 1000 [ 375.774990][ T29] audit: type=1400 audit(2000000054.840:31253): avc: denied { relabelfrom } for pid=30904 comm="syz.8.8181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 375.795657][ T29] audit: type=1400 audit(2000000054.840:31254): avc: denied { relabelto } for pid=30904 comm="syz.8.8181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 375.859875][ T29] audit: type=1326 audit(2000000054.930:31255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30921 comm="syz.6.8185" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f88e048e9a9 code=0x0 [ 375.904205][ T29] audit: type=1400 audit(2000000054.970:31256): avc: denied { ioctl } for pid=30931 comm="syz.4.8188" path="/dev/input/event2" dev="devtmpfs" ino=249 ioctlcmd=0x4590 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 375.930123][ T29] audit: type=1400 audit(2000000054.970:31257): avc: denied { prog_load } for pid=30931 comm="syz.4.8188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 375.988370][T30941] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 376.084254][T30956] syzkaller1: entered promiscuous mode [ 376.090009][T30956] syzkaller1: entered allmulticast mode [ 376.220177][T30996] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 376.265750][T31001] 9pnet: Could not find request transport: f [ 376.318084][T31015] SELinux: failed to load policy [ 376.831477][T31092] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 376.953336][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 376.960930][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 376.968418][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 376.975830][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 376.983220][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 376.990633][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 376.998174][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.005748][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.013284][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.020714][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.028135][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.035637][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.043045][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.050484][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.057994][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.065474][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.072973][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.080632][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.088209][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.095673][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.103314][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.105280][T31119] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 377.110894][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.129254][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.136814][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.144415][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.151901][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.159332][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.167093][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.174568][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.181947][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.189353][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.196862][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.204239][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.210135][T31124] __nla_validate_parse: 4 callbacks suppressed [ 377.210150][T31124] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8262'. [ 377.211642][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.229899][T31124] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8262'. [ 377.234200][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.250508][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.257923][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.265356][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.272760][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.280166][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.287607][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.294993][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.302365][ T10] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 377.310853][ T10] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz0] on syz1 [ 377.402621][T31145] binfmt_misc: register: failed to install interpreter file ./file2 [ 377.438725][T31148] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 377.485756][T31160] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=none:owns=io+mem [ 377.517747][T31166] netlink: 368 bytes leftover after parsing attributes in process `syz.8.8279'. [ 377.550591][T31173] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 377.559775][T31173] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 377.575257][T31179] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8284'. [ 377.584792][T31179] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8284'. [ 377.609602][T31183] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 377.696843][T31204] netlink: 160 bytes leftover after parsing attributes in process `syz.6.8294'. [ 377.773480][T31225] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 377.835825][T31239] netlink: 28 bytes leftover after parsing attributes in process `syz.6.8301'. [ 378.090788][T31296] syzkaller1: entered promiscuous mode [ 378.096401][T31296] syzkaller1: entered allmulticast mode [ 378.161300][T31306] lo speed is unknown, defaulting to 1000 [ 378.174550][T31306] lo speed is unknown, defaulting to 1000 [ 378.297757][T31356] IPv6: Can't replace route, no match found [ 378.406738][T31384] IPv6: Can't replace route, no match found [ 378.647600][T31437] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 378.657403][T31446] sch_tbf: burst 3298 is lower than device lo mtu (11337746) ! [ 378.931626][T31510] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 378.958913][T31516] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. [ 379.191693][T31554] x_tables: duplicate underflow at hook 1 [ 379.198365][T31556] random: crng reseeded on system resumption [ 379.283714][T31570] netlink: 16 bytes leftover after parsing attributes in process `syz.6.8394'. [ 379.338724][T31576] netlink: 12 bytes leftover after parsing attributes in process `syz.7.8397'. [ 379.374761][T31580] netlink: 256 bytes leftover after parsing attributes in process `syz.4.8399'. [ 379.596689][T31634] xt_check_target: 2 callbacks suppressed [ 379.596718][T31634] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 379.698865][ T29] kauditd_printk_skb: 381 callbacks suppressed [ 379.698879][ T29] audit: type=1404 audit(2000000058.770:31639): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 379.725785][ T29] audit: type=1404 audit(2000000058.800:31640): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 379.749565][ T29] audit: type=1400 audit(2000000058.800:31641): avc: denied { map_create } for pid=31656 comm="syz.6.8432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 379.769698][ T29] audit: type=1400 audit(2000000058.800:31642): avc: denied { perfmon } for pid=31656 comm="syz.6.8432" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 379.790946][ T29] audit: type=1400 audit(2000000058.810:31643): avc: denied { map_read map_write } for pid=31656 comm="syz.6.8432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 379.811070][ T29] audit: type=1400 audit(2000000058.810:31644): avc: denied { prog_load } for pid=31656 comm="syz.6.8432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 379.830297][ T29] audit: type=1400 audit(2000000058.810:31645): avc: denied { bpf } for pid=31656 comm="syz.6.8432" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 379.851189][ T29] audit: type=1400 audit(2000000058.810:31646): avc: denied { prog_run } for pid=31656 comm="syz.6.8432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 379.871043][ T29] audit: type=1326 audit(2000000058.910:31647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31658 comm="syz.5.8433" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 379.894764][ T29] audit: type=1326 audit(2000000058.910:31648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31658 comm="syz.5.8433" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 380.117199][T31682] x_tables: duplicate underflow at hook 1 [ 380.156360][T31692] SELinux: +}[@ (31692) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 380.252527][T31711] netlink: 'syz.6.8456': attribute type 1 has an invalid length. [ 380.333028][T31723] sch_tbf: burst 3298 is lower than device lo mtu (11337746) ! [ 380.389847][T31729] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 380.545491][T31749] bridge0: port 1(batadv0) entered blocking state [ 380.552252][T31749] bridge0: port 1(batadv0) entered disabled state [ 380.562821][T31749] batadv0: entered allmulticast mode [ 380.568969][T31749] batadv0: entered promiscuous mode [ 381.044754][ T51] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 381.054015][ T51] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 381.255538][T31855] SELinux: +}[@ (31855) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 381.278914][T31857] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 381.734191][T31962] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 381.743301][T31962] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 382.203558][T32005] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 382.282765][T32020] __nla_validate_parse: 1 callbacks suppressed [ 382.282818][T32020] netlink: 14593 bytes leftover after parsing attributes in process `syz.4.8588'. [ 382.400864][T32044] netlink: 14593 bytes leftover after parsing attributes in process `syz.6.8600'. [ 382.426418][T32046] syzkaller1: entered promiscuous mode [ 382.432039][T32046] syzkaller1: entered allmulticast mode [ 382.676044][T32115] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 382.684673][T32115] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 382.768716][T32136] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 382.853693][T32157] bio_check_eod: 19249 callbacks suppressed [ 382.853727][T32157] syz.7.8647: attempt to access beyond end of device [ 382.853727][T32157] loop15: rw=0, sector=0, nr_sectors = 1 limit=0 [ 382.872731][T32157] FAT-fs (loop15): unable to read boot sector [ 383.122207][T32188] netlink: 'syz.7.8659': attribute type 1 has an invalid length. [ 383.242334][T32200] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 383.393907][T32234] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 383.498583][T32264] program syz.5.8687 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 383.706961][T32293] syzkaller1: entered promiscuous mode [ 383.708935][T32292] Cannot find add_set index 0 as target [ 383.712447][T32293] syzkaller1: entered allmulticast mode [ 383.765752][T32307] netlink: 132 bytes leftover after parsing attributes in process `syz.8.8705'. [ 383.779278][T32309] netlink: 48 bytes leftover after parsing attributes in process `syz.4.8707'. [ 383.887336][T32332] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 383.969240][T32352] netlink: 9 bytes leftover after parsing attributes in process `syz.7.8726'. [ 384.129333][T32392] netem: change failed [ 384.749140][ T29] kauditd_printk_skb: 795 callbacks suppressed [ 384.749160][ T29] audit: type=1400 audit(2000000319.813:32444): avc: denied { remount } for pid=32523 comm="syz.7.8798" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 384.792730][ T29] audit: type=1400 audit(2000000319.853:32445): avc: denied { create } for pid=32527 comm="syz.7.8800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 384.812376][ T29] audit: type=1400 audit(2000000319.853:32446): avc: denied { write } for pid=32527 comm="syz.7.8800" path="socket:[73066]" dev="sockfs" ino=73066 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 384.842477][ T29] audit: type=1326 audit(2000000319.903:32447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32530 comm="syz.7.8801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 384.866209][ T29] audit: type=1326 audit(2000000319.903:32448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32530 comm="syz.7.8801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=79 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 384.889839][ T29] audit: type=1326 audit(2000000319.903:32449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32530 comm="syz.7.8801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 384.913550][ T29] audit: type=1326 audit(2000000319.943:32450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32514 comm="syz.5.8792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 385.029688][ T29] audit: type=1326 audit(2000000320.093:32451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32548 comm="syz.7.8810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 385.053385][ T29] audit: type=1326 audit(2000000320.093:32452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32548 comm="syz.7.8810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 385.076987][ T29] audit: type=1326 audit(2000000320.093:32453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32548 comm="syz.7.8810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 385.233453][T32558] tipc: Enabling of bearer rejected, failed to enable media [ 385.423358][T32578] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 385.470971][T32586] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 385.616847][T32607] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 385.673188][T32615] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 386.008637][T32642] lo speed is unknown, defaulting to 1000 [ 386.015299][T32642] lo speed is unknown, defaulting to 1000 [ 386.032915][T32664] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 386.034427][ T996] Process accounting resumed [ 386.563551][T32750] SELinux: syz.8.8891 (32750) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 386.646527][T32756] 9pnet_fd: Insufficient options for proto=fd [ 386.750661][ T309] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 386.763520][ T313] sch_tbf: burst 0 is lower than device lo mtu (11337746) ! [ 386.963813][ T344] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 387.084766][ T365] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8926'. [ 387.111610][ T369] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 387.305175][ T399] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 387.479859][ T419] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8950'. [ 387.540819][ T429] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 387.569110][ T433] netlink: 'syz.4.8956': attribute type 1 has an invalid length. [ 387.655034][ T452] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 388.055919][ T505] lo speed is unknown, defaulting to 1000 [ 388.062191][ T505] lo speed is unknown, defaulting to 1000 [ 388.924829][ T605] lo speed is unknown, defaulting to 1000 [ 388.930854][ T605] lo speed is unknown, defaulting to 1000 [ 389.248188][ T637] lo speed is unknown, defaulting to 1000 [ 389.254803][ T637] lo speed is unknown, defaulting to 1000 [ 389.439414][ T687] atomic_op ffff888116397d28 conn xmit_atomic 0000000000000000 [ 389.726791][ T748] netlink: 28 bytes leftover after parsing attributes in process `syz.7.9062'. [ 389.759910][ T754] xt_CT: You must specify a L4 protocol and not use inversions on it [ 389.771134][ T29] kauditd_printk_skb: 316 callbacks suppressed [ 389.771150][ T29] audit: type=1400 audit(2000000324.843:32770): avc: denied { create } for pid=757 comm="syz.6.9067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 389.807119][ T29] audit: type=1400 audit(2000000324.863:32771): avc: denied { setopt } for pid=757 comm="syz.6.9067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 389.865122][ T768] netlink: 5 bytes leftover after parsing attributes in process `syz.8.9072'. [ 389.874190][ T768] 0XD: renamed from gretap0 (while UP) [ 389.886697][ T768] 0XD: entered allmulticast mode [ 389.902445][ T29] audit: type=1326 audit(2000000324.953:32772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=769 comm="syz.6.9073" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 389.925985][ T29] audit: type=1326 audit(2000000324.953:32773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=769 comm="syz.6.9073" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 389.942830][ T768] A link change request failed with some changes committed already. Interface 30XD may have been left with an inconsistent configuration, please check. [ 389.949638][ T29] audit: type=1326 audit(2000000324.953:32774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=769 comm="syz.6.9073" exe="/root/syz-executor" sig=0 arch=c000003e syscall=97 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 389.988661][ T29] audit: type=1326 audit(2000000324.953:32775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=769 comm="syz.6.9073" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 390.012485][ T29] audit: type=1326 audit(2000000324.963:32776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=769 comm="syz.6.9073" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 390.119498][ T788] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9080'. [ 390.145622][ T29] audit: type=1400 audit(2000000325.203:32777): avc: denied { create } for pid=790 comm="syz.4.9082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 390.187478][ T29] audit: type=1400 audit(2000000325.213:32778): avc: denied { setopt } for pid=790 comm="syz.4.9082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 390.207161][ T29] audit: type=1400 audit(2000000325.213:32779): avc: denied { connect } for pid=790 comm="syz.4.9082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 390.603062][ T854] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 390.786234][ T888] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 390.886142][ T900] netlink: 128 bytes leftover after parsing attributes in process `syz.8.9129'. [ 390.985945][ T913] netem: change failed [ 391.093640][ T931] netlink: 8 bytes leftover after parsing attributes in process `syz.8.9144'. [ 391.184058][ T946] xt_check_target: 8 callbacks suppressed [ 391.184085][ T946] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 391.222349][ T948] netlink: 152 bytes leftover after parsing attributes in process `syz.4.9152'. [ 391.250518][ T950] macsec0: entered promiscuous mode [ 391.411392][ T972] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9164'. [ 391.543566][ T989] binfmt_misc: register: failed to install interpreter file ./file2 [ 391.655266][ T1006] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 391.703455][ T1018] netlink: 'syz.6.9185': attribute type 3 has an invalid length. [ 391.849877][ T1047] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9200'. [ 391.893916][ T1047] team0: entered promiscuous mode [ 391.903148][ T1047] team0: entered allmulticast mode [ 391.909626][ T1043] lo speed is unknown, defaulting to 1000 [ 391.919645][ T1043] lo speed is unknown, defaulting to 1000 [ 391.996930][ T1121] xt_hashlimit: max too large, truncated to 1048576 [ 392.050587][ T1128] atomic_op ffff888142467528 conn xmit_atomic 0000000000000000 [ 392.092466][ T1130] netlink: 40 bytes leftover after parsing attributes in process `syz.6.9213'. [ 392.500164][ T1196] IPv6: Can't replace route, no match found [ 392.590120][ T1204] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9243'. [ 392.605708][ T1204] team1: entered promiscuous mode [ 392.610902][ T1204] team1: entered allmulticast mode [ 393.456462][ T1328] netlink: 360 bytes leftover after parsing attributes in process `syz.7.9278'. [ 393.567001][ T1336] lo speed is unknown, defaulting to 1000 [ 393.573674][ T1336] lo speed is unknown, defaulting to 1000 [ 393.702615][ T1376] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 393.735874][ T1383] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 393.767035][ T1389] atomic_op ffff888142464528 conn xmit_atomic 0000000000000000 [ 393.897596][ T1409] loop9: detected capacity change from 0 to 7 [ 393.914857][ T1409] Buffer I/O error on dev loop9, logical block 0, async page read [ 393.928530][ T1409] Buffer I/O error on dev loop9, logical block 0, async page read [ 393.936516][ T1409] loop9: unable to read partition table [ 393.950556][ T1409] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 393.950556][ T1409] ) failed (rc=-5) [ 394.145672][ T1428] netlink: 'syz.5.9312': attribute type 1 has an invalid length. [ 394.738202][ T1460] lo speed is unknown, defaulting to 1000 [ 394.744231][ T1460] lo speed is unknown, defaulting to 1000 [ 394.790139][ T29] kauditd_printk_skb: 223 callbacks suppressed [ 394.790155][ T29] audit: type=1400 audit(394.875:33003): avc: denied { bind } for pid=1481 comm="syz.7.9326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 394.841576][ T29] audit: type=1400 audit(394.875:33004): avc: denied { write } for pid=1481 comm="syz.7.9326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 394.895486][ T29] audit: type=1400 audit(394.975:33005): avc: denied { listen } for pid=1459 comm="syz.8.9322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 395.033651][ T1517] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 395.088324][ T1530] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.096664][ T1530] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.098888][ T29] audit: type=1326 audit(395.185:33006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1533 comm="syz.8.9343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 395.104938][ T1530] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.127993][ T29] audit: type=1326 audit(395.185:33007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1533 comm="syz.8.9343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 395.136248][ T1530] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.160920][ T1530] geneve2: entered promiscuous mode [ 395.173011][ T1530] geneve2: entered allmulticast mode [ 395.179879][ T29] audit: type=1326 audit(395.265:33008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1533 comm="syz.8.9343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 395.213974][ T1530] netdevsim netdevsim7 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 395.222423][ T1530] netdevsim netdevsim7 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 395.230817][ T1530] netdevsim netdevsim7 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 395.239210][ T1530] netdevsim netdevsim7 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 395.300262][ T29] audit: type=1326 audit(395.385:33009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1550 comm="syz.4.9347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 395.324256][ T29] audit: type=1326 audit(395.385:33010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1550 comm="syz.4.9347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 395.347322][ T29] audit: type=1326 audit(395.415:33011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1550 comm="syz.4.9347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 395.370237][ T29] audit: type=1326 audit(395.415:33012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1550 comm="syz.4.9347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 395.470556][ T1571] xt_hashlimit: max too large, truncated to 1048576 [ 395.500234][ T1580] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9357'. [ 395.510157][ T1580] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9357'. [ 395.726107][ T1595] SELinux: failed to load policy [ 395.820711][ T1606] lo speed is unknown, defaulting to 1000 [ 395.826801][ T1606] lo speed is unknown, defaulting to 1000 [ 395.891213][ T1634] netlink: 28 bytes leftover after parsing attributes in process `syz.6.9371'. [ 395.900269][ T1634] netlink: 'syz.6.9371': attribute type 7 has an invalid length. [ 395.908034][ T1634] netlink: 'syz.6.9371': attribute type 8 has an invalid length. [ 395.916008][ T1634] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9371'. [ 396.345545][ T1665] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 396.845282][ T1699] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 396.847160][ T1693] lo speed is unknown, defaulting to 1000 [ 396.872783][ T1693] lo speed is unknown, defaulting to 1000 [ 397.205283][ T1739] SELinux: unknown common  [ 397.210228][ T1739] SELinux: failed to load policy [ 397.431496][ T1756] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 397.458891][ T1758] netlink: 14 bytes leftover after parsing attributes in process `syz.4.9411'. [ 397.484716][ T1760] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 397.695791][ T1798] netlink: 8 bytes leftover after parsing attributes in process `syz.6.9429'. [ 397.711905][ T1800] netlink: 24 bytes leftover after parsing attributes in process `syz.5.9430'. [ 398.048887][ T1862] netlink: 24 bytes leftover after parsing attributes in process `syz.8.9455'. [ 398.084060][ T1882] netlink: 12 bytes leftover after parsing attributes in process `syz.6.9459'. [ 398.117146][ T1890] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 398.487036][ T1924] netlink: 'syz.4.9479': attribute type 10 has an invalid length. [ 399.095178][ T1960] Falling back ldisc for ttyS3. [ 399.892676][ T29] kauditd_printk_skb: 138 callbacks suppressed [ 399.892697][ T29] audit: type=1400 audit(399.975:33151): avc: denied { bind } for pid=2006 comm="syz.8.9504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 399.957731][ T2018] netlink: 24 bytes leftover after parsing attributes in process `syz.7.9508'. [ 399.966957][ T2018] bond0: invalid ARP target 0.0.0.0 specified for addition [ 399.974171][ T2018] bond0: option arp_ip_target: invalid value (0) [ 399.984849][ T2020] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 400.007865][ T29] audit: type=1400 audit(400.095:33152): avc: denied { bind } for pid=2023 comm="syz.6.9511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 400.090918][ T29] audit: type=1326 audit(400.175:33153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2041 comm="syz.7.9517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 400.114490][ T29] audit: type=1326 audit(400.175:33154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2041 comm="syz.7.9517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 400.138004][ T29] audit: type=1400 audit(400.205:33155): avc: denied { ioctl } for pid=2025 comm="syz.4.9514" path="socket:[77300]" dev="sockfs" ino=77300 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 400.162242][ T29] audit: type=1326 audit(400.225:33156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2041 comm="syz.7.9517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 400.185180][ T29] audit: type=1326 audit(400.225:33157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2041 comm="syz.7.9517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 400.208203][ T29] audit: type=1326 audit(400.225:33158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2041 comm="syz.7.9517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 400.237637][ T29] audit: type=1326 audit(400.255:33159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2041 comm="syz.7.9517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=282 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 400.260649][ T29] audit: type=1326 audit(400.255:33160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2041 comm="syz.7.9517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 400.393950][ T2061] lo speed is unknown, defaulting to 1000 [ 400.402784][ T2061] lo speed is unknown, defaulting to 1000 [ 400.449900][ T2095] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9532'. [ 400.472782][ T2095] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9532'. [ 400.482565][ T2102] vhci_hcd: invalid port number 96 [ 400.487852][ T2102] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 400.642504][ T2129] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 400.726555][ T2142] netlink: 5 bytes leftover after parsing attributes in process `syz.6.9548'. [ 400.737675][ T2142] 0{X: renamed from gretap0 (while UP) [ 400.745767][ T2142] 0{X: entered allmulticast mode [ 400.754973][ T2142] A link change request failed with some changes committed already. Interface 30{X may have been left with an inconsistent configuration, please check. [ 400.781317][ T2152] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9553'. [ 401.067740][ T2177] 9p: Unknown access argument : -22 [ 401.386250][ T2227] netlink: 28 bytes leftover after parsing attributes in process `syz.6.9584'. [ 401.708092][ T2277] syzkaller0: entered promiscuous mode [ 401.713669][ T2277] syzkaller0: entered allmulticast mode [ 401.732154][ T2283] IPv4: Oversized IP packet from 127.202.26.0 [ 401.840203][ T2287] lo speed is unknown, defaulting to 1000 [ 401.856849][ T2287] lo speed is unknown, defaulting to 1000 [ 401.944418][ T2342] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 402.093199][ T2364] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 402.121750][ T2368] netlink: 'syz.5.9630': attribute type 1 has an invalid length. [ 402.152353][ T2370] atomic_op ffff888153c03928 conn xmit_atomic 0000000000000000 [ 402.249733][ T2384] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 402.276052][ T2376] lo speed is unknown, defaulting to 1000 [ 402.282491][ T2376] lo speed is unknown, defaulting to 1000 [ 402.456286][ T996] Process accounting resumed [ 402.594835][ T2434] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 402.702855][ T2448] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 402.735388][ T2450] bridge: RTM_NEWNEIGH with invalid ether address [ 402.834955][ T2474] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 403.109354][T18698] bridge_slave_1: left allmulticast mode [ 403.115166][T18698] bridge_slave_1: left promiscuous mode [ 403.120937][T18698] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.128805][T18698] bridge_slave_0: left allmulticast mode [ 403.134692][T18698] bridge_slave_0: left promiscuous mode [ 403.140403][T18698] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.187989][T18698] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 403.197405][T18698] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 403.206868][T18698] bond0 (unregistering): Released all slaves [ 403.232538][ T2531] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 403.266223][T18698] hsr_slave_0: left promiscuous mode [ 403.272054][T18698] hsr_slave_1: left promiscuous mode [ 403.278248][T18698] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 403.286507][T18698] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 403.294067][ T2535] __nla_validate_parse: 1 callbacks suppressed [ 403.294081][ T2535] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9677'. [ 403.343462][T18698] team0 (unregistering): Port device team_slave_1 removed [ 403.356276][T18698] team0 (unregistering): Port device team_slave_0 removed [ 403.363902][T18655] smc: removing ib device syz! [ 403.971352][ T2609] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 404.084109][ T2621] netlink: 'syz.4.9710': attribute type 3 has an invalid length. [ 404.222643][ T2639] SELinux: ebitmap: truncated map [ 404.229752][ T2639] SELinux: failed to load policy [ 404.320056][ T2662] netlink: 'syz.6.9727': attribute type 13 has an invalid length. [ 404.338697][ T2662] tipc: Resetting bearer [ 404.349888][T19487] lo speed is unknown, defaulting to 1000 [ 404.355724][T19487] syz2: Port: 1 Link DOWN [ 404.460308][ T2680] atomic_op ffff8881197dfd28 conn xmit_atomic 0000000000000000 [ 404.575922][ T2692] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9739'. [ 404.597928][ T2696] netlink: 'syz.6.9740': attribute type 21 has an invalid length. [ 404.605852][ T2696] netlink: 156 bytes leftover after parsing attributes in process `syz.6.9740'. [ 404.936925][ T2743] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9759'. [ 405.533357][ T29] kauditd_printk_skb: 150 callbacks suppressed [ 405.533372][ T29] audit: type=1326 audit(405.612:33311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2762 comm="syz.6.9768" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 405.563005][ T29] audit: type=1326 audit(405.612:33312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2762 comm="syz.6.9768" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 405.585823][ T29] audit: type=1326 audit(405.612:33313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2762 comm="syz.6.9768" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 405.608942][ T29] audit: type=1326 audit(405.612:33314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2762 comm="syz.6.9768" exe="/root/syz-executor" sig=0 arch=c000003e syscall=47 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 405.631900][ T29] audit: type=1326 audit(405.612:33315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2762 comm="syz.6.9768" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 405.655416][ T29] audit: type=1326 audit(405.612:33316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2762 comm="syz.6.9768" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 405.678366][ T29] audit: type=1326 audit(405.612:33317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2762 comm="syz.6.9768" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 405.701537][ T29] audit: type=1326 audit(405.612:33318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2762 comm="syz.6.9768" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 405.753524][ T2766] netlink: 'syz.8.9769': attribute type 13 has an invalid length. [ 405.872885][ T2766] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.880199][ T2766] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.979813][ T2799] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 406.035364][ T29] audit: type=1400 audit(406.112:33319): avc: denied { read write } for pid=2795 comm="+}[@" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 406.057938][ T29] audit: type=1400 audit(406.112:33320): avc: denied { open } for pid=2795 comm="+}[@" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 406.128676][ T2766] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 406.155302][ T2766] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 406.190710][ T2766] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 406.200024][ T2766] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 406.209087][ T2766] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 406.218099][ T2766] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 406.501626][ T2835] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 406.530810][ T2837] netlink: 28 bytes leftover after parsing attributes in process `syz.6.9795'. [ 406.540142][ T2837] netem: change failed [ 406.619850][ T2845] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.628169][ T2845] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.636423][ T2845] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.644620][ T2845] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.653256][ T2845] geneve2: entered promiscuous mode [ 406.658532][ T2845] geneve2: entered allmulticast mode [ 406.664647][ T2845] netdevsim netdevsim6 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 406.673069][ T2845] netdevsim netdevsim6 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 406.681768][ T2845] netdevsim netdevsim6 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 406.690385][ T2845] netdevsim netdevsim6 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 407.198620][ T2896] netlink: 48 bytes leftover after parsing attributes in process `syz.7.9818'. [ 407.268823][ T3412] IPVS: starting estimator thread 0... [ 407.358017][ T2914] hub 9-0:1.0: USB hub found [ 407.362765][ T2914] hub 9-0:1.0: 8 ports detected [ 407.374600][ T2905] IPVS: using max 3120 ests per chain, 156000 per kthread [ 407.553562][ T2939] binfmt_misc: register: failed to install interpreter file ./file2 [ 407.775909][ T2966] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9838'. [ 407.860267][ T2994] SELinux: Context system_u:object_r:sysfs_t:s0 is not valid (left unmapped). [ 407.980673][ T3023] netlink: 96 bytes leftover after parsing attributes in process `syz.8.9855'. [ 408.096676][ T3046] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 408.105531][ T3046] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 408.114222][ T3046] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 408.123004][ T3046] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 408.132274][ T3046] geneve2: entered promiscuous mode [ 408.137877][ T3046] geneve2: entered allmulticast mode [ 408.146866][ T3046] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 408.155824][ T3046] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 408.164897][ T3046] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 408.173827][ T3046] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 408.866034][ T3085] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9877'. [ 408.934790][ T3102] netlink: 9 bytes leftover after parsing attributes in process `syz.6.9880'. [ 409.052078][ T3120] xt_check_target: 2 callbacks suppressed [ 409.052146][ T3120] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 409.254529][ T3159] serio: Serial port ttyS3 [ 409.610517][ T3189] netlink: 'syz.6.9914': attribute type 4 has an invalid length. [ 409.793990][ T3209] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 409.933847][ T3218] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9927'. [ 409.951399][ T3218] smc: net device bond0 applied user defined pnetid S [ 409.977554][ T3218] smc: net device bond0 erased user defined pnetid S [ 410.258908][ T3234] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 410.510587][ T3257] futex_wake_op: syz.6.9942 tries to shift op by -1; fix this program [ 410.664617][ T29] kauditd_printk_skb: 384 callbacks suppressed [ 410.664633][ T29] audit: type=1326 audit(410.722:33705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3266 comm="syz.8.9947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 410.693870][ T29] audit: type=1326 audit(410.722:33706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3266 comm="syz.8.9947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 410.716778][ T29] audit: type=1326 audit(410.722:33707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3266 comm="syz.8.9947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 410.739747][ T29] audit: type=1326 audit(410.722:33708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3266 comm="syz.8.9947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 410.762719][ T29] audit: type=1326 audit(410.722:33709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3266 comm="syz.8.9947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 410.785759][ T29] audit: type=1326 audit(410.722:33710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3266 comm="syz.8.9947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 410.808737][ T29] audit: type=1326 audit(410.722:33711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3266 comm="syz.8.9947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 410.813268][ T3264] lo speed is unknown, defaulting to 1000 [ 410.831702][ T29] audit: type=1326 audit(410.722:33712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3266 comm="syz.8.9947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 410.837704][ T3264] lo speed is unknown, defaulting to 1000 [ 410.860317][ T29] audit: type=1326 audit(410.722:33713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3266 comm="syz.8.9947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f9e7306d45f code=0x7ffc0000 [ 410.889001][ T29] audit: type=1326 audit(410.732:33714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3266 comm="syz.8.9947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e7306e9a9 code=0x7ffc0000 [ 410.959216][ T3272] netlink: 'syz.8.9948': attribute type 10 has an invalid length. [ 410.978686][ T3272] team0: Port device dummy0 added [ 411.421653][ T3359] lo speed is unknown, defaulting to 1000 [ 411.435842][ T3359] lo speed is unknown, defaulting to 1000 [ 411.959770][ T3429] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 412.551181][ T3511] netlink: 96 bytes leftover after parsing attributes in process `syz.6.10009'. [ 412.584495][ T3517] netlink: 96 bytes leftover after parsing attributes in process `syz.6.10011'. [ 412.695511][ T3530] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 412.925550][ T3584] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 413.161620][ T3611] xt_hashlimit: max too large, truncated to 1048576 [ 413.209771][ T3616] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 413.958401][ T3648] 9p: Unknown access argument : -22 [ 414.535829][ T3693] 9p: Unknown access argument : -22 [ 414.908814][ T3703] macsec0: left promiscuous mode [ 414.913810][ T3703] macsec0: entered allmulticast mode [ 415.035055][ T3708] netlink: 4 bytes leftover after parsing attributes in process `syz.4.10079'. [ 415.139501][ T3719] pim6reg1: entered promiscuous mode [ 415.145128][ T3719] pim6reg1: entered allmulticast mode [ 415.419429][ T3738] netlink: 'syz.6.10081': attribute type 13 has an invalid length. [ 415.591498][ T3759] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 415.674602][ T29] kauditd_printk_skb: 209 callbacks suppressed [ 415.674615][ T29] audit: type=1326 audit(415.762:33924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3770 comm="syz.7.10096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 415.704141][ T29] audit: type=1326 audit(415.762:33925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3770 comm="syz.7.10096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 415.727256][ T29] audit: type=1326 audit(415.762:33926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3770 comm="syz.7.10096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 415.750357][ T29] audit: type=1326 audit(415.762:33927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3770 comm="syz.7.10096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 415.773626][ T29] audit: type=1326 audit(415.762:33928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3770 comm="syz.7.10096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 415.796629][ T29] audit: type=1326 audit(415.762:33929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3770 comm="syz.7.10096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 415.819769][ T29] audit: type=1326 audit(415.762:33930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3770 comm="syz.7.10096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 415.842914][ T29] audit: type=1326 audit(415.762:33931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3770 comm="syz.7.10096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 415.865924][ T29] audit: type=1326 audit(415.762:33932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3770 comm="syz.7.10096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 415.889018][ T29] audit: type=1326 audit(415.762:33933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3770 comm="syz.7.10096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 415.932810][ T3779] netlink: 'syz.5.10099': attribute type 10 has an invalid length. [ 415.940851][ T3779] netlink: 40 bytes leftover after parsing attributes in process `syz.5.10099'. [ 416.023982][ T3791] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10105'. [ 416.467364][ T3828] netlink: 'syz.4.10119': attribute type 10 has an invalid length. [ 416.476177][ T3828] netlink: 'syz.4.10119': attribute type 10 has an invalid length. [ 416.727344][ T3847] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 417.215396][ T3868] netlink: 'syz.8.10131': attribute type 10 has an invalid length. [ 417.232284][ T3868] netlink: 'syz.8.10131': attribute type 10 has an invalid length. [ 417.241035][ T3868] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 417.250094][ T3868] team0: Port device dummy0 removed [ 417.406962][ T3876] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 417.625378][ T3897] netlink: 8 bytes leftover after parsing attributes in process `syz.7.10143'. [ 417.638476][ T3897] netlink: 4 bytes leftover after parsing attributes in process `syz.7.10143'. [ 417.718902][ T3907] lo speed is unknown, defaulting to 1000 [ 417.726757][ T3907] lo speed is unknown, defaulting to 1000 [ 418.785845][ T3965] vcan0: tx drop: invalid sa for name 0x0000000000000003 [ 418.825710][ T3967] netlink: 24 bytes leftover after parsing attributes in process `syz.8.10159'. [ 418.908837][ T3973] infiniband syz!: set down [ 418.913536][ T3973] infiniband syz!: added team_slave_0 [ 418.943619][ T3973] RDS/IB: syz!: added [ 418.952197][ T3973] smc: adding ib device syz! with port count 1 [ 418.966362][ T3973] smc: ib device syz! port 1 has pnetid [ 419.000286][ T4000] netlink: 76 bytes leftover after parsing attributes in process `syz.4.10165'. [ 419.142199][ T4013] netlink: 4 bytes leftover after parsing attributes in process `syz.4.10170'. [ 419.204781][ T4019] netlink: 3 bytes leftover after parsing attributes in process `syz.4.10172'. [ 419.224679][ T4019] 0X: renamed from caif0 [ 419.233482][ T4024] sd 0:0:1:0: device reset [ 419.238376][ T4019] 0X: entered allmulticast mode [ 419.243612][ T4019] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 419.343367][ T4039] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 419.547156][ T4071] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 419.585696][ T4073] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 420.436048][ T4100] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 420.556207][ T4110] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 420.712827][ T4126] netlink: 4 bytes leftover after parsing attributes in process `syz.4.10212'. [ 420.843311][ T29] kauditd_printk_skb: 110 callbacks suppressed [ 420.843333][ T29] audit: type=1326 audit(420.922:34044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4147 comm="syz.4.10219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 420.843975][ T4148] sd 0:0:1:0: device reset [ 420.849578][ T29] audit: type=1326 audit(420.922:34045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4147 comm="syz.4.10219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 420.900679][ T29] audit: type=1326 audit(420.922:34046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4147 comm="syz.4.10219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f54ab74d310 code=0x7ffc0000 [ 420.923775][ T29] audit: type=1326 audit(420.922:34047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4147 comm="syz.4.10219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 420.946978][ T29] audit: type=1326 audit(420.922:34048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4147 comm="syz.4.10219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 420.969949][ T29] audit: type=1326 audit(420.922:34049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4147 comm="syz.4.10219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 421.061013][ T4161] netlink: 4 bytes leftover after parsing attributes in process `syz.7.10223'. [ 421.072584][ T4163] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 421.084483][ T29] audit: type=1326 audit(420.992:34050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4147 comm="syz.4.10219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 421.107767][ T29] audit: type=1326 audit(420.992:34051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4147 comm="syz.4.10219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 421.118173][ T4162] lo speed is unknown, defaulting to 1000 [ 421.148205][ T4169] netlink: 4 bytes leftover after parsing attributes in process `syz.7.10223'. [ 421.155011][ T4162] lo speed is unknown, defaulting to 1000 [ 421.173101][ T4175] netlink: 8 bytes leftover after parsing attributes in process `syz.8.10225'. [ 421.222759][ T4184] netlink: 12 bytes leftover after parsing attributes in process `syz.8.10228'. [ 421.239363][ T4180] lo speed is unknown, defaulting to 1000 [ 421.264025][ T4180] lo speed is unknown, defaulting to 1000 [ 421.458926][ T4248] $H: renamed from bond0 [ 421.471759][ T29] audit: type=1326 audit(421.542:34052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.7.10233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 421.473088][ T4248] $H: entered promiscuous mode [ 421.494872][ T29] audit: type=1326 audit(421.542:34053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.7.10233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 421.499787][ T4248] bond_slave_0: entered promiscuous mode [ 421.528625][ T4248] bond_slave_1: entered promiscuous mode [ 421.866074][ T4265] lo speed is unknown, defaulting to 1000 [ 421.882015][ T4265] lo speed is unknown, defaulting to 1000 [ 422.233085][ T4324] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 422.339872][ T4335] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10256'. [ 422.378770][ T4335] team1: entered promiscuous mode [ 422.396776][ T4335] team1: entered allmulticast mode [ 422.511506][ T4377] lo speed is unknown, defaulting to 1000 [ 422.532061][ T4377] lo speed is unknown, defaulting to 1000 [ 422.743706][ T4435] netlink: 8 bytes leftover after parsing attributes in process `syz.7.10265'. [ 422.755865][ T4437] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 423.123309][ T4445] lo speed is unknown, defaulting to 1000 [ 423.176450][ T4445] lo speed is unknown, defaulting to 1000 [ 423.305790][ T4486] syzkaller0: entered promiscuous mode [ 423.311303][ T4486] syzkaller0: entered allmulticast mode [ 423.506407][ T4496] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10271'. [ 423.602369][ T4505] veth0_vlan: entered allmulticast mode [ 423.639042][ T4505] veth0_vlan: left promiscuous mode [ 423.648516][ T4505] veth0_vlan: entered promiscuous mode [ 423.695452][ T4515] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 423.876910][ T4554] futex_wake_op: syz.4.10287 tries to shift op by -1; fix this program [ 423.902198][ T4563] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10290'. [ 423.924946][ T4561] netlink: 4 bytes leftover after parsing attributes in process `syz.7.10288'. [ 423.975344][ T4571] bridge: RTM_NEWNEIGH with invalid ether address [ 424.807867][ T4641] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 425.138138][ T4662] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 425.164527][ T4662] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 425.230290][ T4677] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 425.243622][ T4679] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 426.067423][ T29] kauditd_printk_skb: 103 callbacks suppressed [ 426.067438][ T29] audit: type=1326 audit(426.152:34157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4710 comm="syz.5.10335" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f2ae87fe9a9 code=0x0 [ 426.139633][ T4713] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 426.189088][ T29] audit: type=1326 audit(426.272:34158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4710 comm="syz.5.10335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 426.212182][ T29] audit: type=1326 audit(426.272:34159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4710 comm="syz.5.10335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 426.235770][ T29] audit: type=1326 audit(426.272:34160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4710 comm="syz.5.10335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 426.245476][ T4721] vhci_hcd: invalid port number 0 [ 426.259009][ T29] audit: type=1326 audit(426.272:34161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4710 comm="syz.5.10335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 426.287050][ T29] audit: type=1326 audit(426.272:34162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4710 comm="syz.5.10335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 426.310121][ T29] audit: type=1326 audit(426.272:34163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4710 comm="syz.5.10335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 426.333257][ T29] audit: type=1326 audit(426.272:34164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4710 comm="syz.5.10335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 426.356245][ T29] audit: type=1326 audit(426.272:34165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4710 comm="syz.5.10335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 426.379400][ T29] audit: type=1326 audit(426.272:34166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4710 comm="syz.5.10335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 426.445505][ T4728] 9pnet: p9_errstr2errno: server reported unknown error [ 426.553978][ T4736] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 426.953354][ T4770] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 427.104543][ T4781] __nla_validate_parse: 4 callbacks suppressed [ 427.104599][ T4781] netlink: 12 bytes leftover after parsing attributes in process `syz.6.10355'. [ 427.106038][ T4783] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 427.110796][ T4781] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10355'. [ 427.139916][ T4781] netlink: 12 bytes leftover after parsing attributes in process `syz.6.10355'. [ 427.301104][ T4794] tipc: Enabled bearer , priority 0 [ 427.320196][ T4793] tipc: Resetting bearer [ 427.335271][ T4793] tipc: Disabling bearer [ 427.424206][ T4811] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 427.442294][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.449855][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.457311][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.470560][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.478095][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.485573][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.493006][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.500772][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.508299][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.516003][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.523526][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.531011][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.538449][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.550354][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.557896][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.565447][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.573000][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.580565][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.588056][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.595497][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.603059][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.610463][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.617876][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.625379][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.632851][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.640271][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.647740][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.655162][ T2793] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 427.694573][ T2793] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz0] on syz1 [ 427.761969][ T4842] netlink: 28 bytes leftover after parsing attributes in process `syz.7.10375'. [ 428.547537][ T4888] netlink: 'syz.4.10391': attribute type 1 has an invalid length. [ 428.567144][ T4888] 8021q: adding VLAN 0 to HW filter on device bond2 [ 428.810998][ T4888] bond2: (slave veth5): Enslaving as an active interface with a down link [ 428.837906][ T4897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 428.851024][ T4897] bond2: (slave batadv0): dev_set_mac_address on slave failed! ALB mode requires that the base driver support setting the hw address also when the network device's interface is open [ 428.885107][ T4894] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10393'. [ 428.962911][ T4948] lo speed is unknown, defaulting to 1000 [ 428.979813][ T4948] lo speed is unknown, defaulting to 1000 [ 429.109612][ T4980] 9pnet: p9_errstr2errno: server reported unknown error [ 429.181168][ T4987] netlink: 4 bytes leftover after parsing attributes in process `syz.7.10401'. [ 429.435555][ T5009] netlink: 52 bytes leftover after parsing attributes in process `syz.5.10409'. [ 429.599407][ T5011] batman_adv: batadv0: Adding interface: ipvlan2 [ 429.606367][ T5011] batman_adv: batadv0: The MTU of interface ipvlan2 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 429.631787][ T5011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 429.642910][ T5011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 429.653927][ T5011] batman_adv: batadv0: Interface activated: ipvlan2 [ 429.740009][ T5039] netlink: zone id is out of range [ 429.745212][ T5039] netlink: zone id is out of range [ 429.750422][ T5039] netlink: zone id is out of range [ 429.756109][ T5039] netlink: zone id is out of range [ 429.761234][ T5039] netlink: zone id is out of range [ 429.766482][ T5039] netlink: zone id is out of range [ 429.771629][ T5039] netlink: zone id is out of range [ 429.776834][ T5039] netlink: zone id is out of range [ 429.918482][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 429.925950][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 429.933372][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 429.941244][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 429.948764][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 429.956242][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 429.963637][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 429.971044][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 429.978459][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 429.986037][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 429.993473][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.000991][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.008563][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.017966][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.025520][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.032936][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.040389][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.047823][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.055238][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.062762][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.070248][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.077825][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.085230][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.092710][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.100244][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.107646][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.115048][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.122425][ T2793] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 430.194942][ T2793] hid-generic 0000:0000:0000.000E: hidraw0: HID v0.00 Device [syz0] on syz1 [ 430.426553][ T5087] lo speed is unknown, defaulting to 1000 [ 430.432891][ T5087] lo speed is unknown, defaulting to 1000 [ 430.587914][ T5121] lo speed is unknown, defaulting to 1000 [ 430.593942][ T5121] lo speed is unknown, defaulting to 1000 [ 430.764820][ T5139] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 431.003946][ T5168] netlink: 'syz.5.10439': attribute type 1 has an invalid length. [ 431.046350][ T5168] 8021q: adding VLAN 0 to HW filter on device bond0 [ 431.098771][ T5206] bond0: (slave veth5): Enslaving as an active interface with a down link [ 431.240217][ T5168] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 431.267683][ T5168] bond0: (slave batadv0): dev_set_mac_address on slave failed! ALB mode requires that the base driver support setting the hw address also when the network device's interface is open [ 431.597669][ T5232] netlink: 'syz.8.10443': attribute type 4 has an invalid length. [ 431.625782][ T5232] netlink: 'syz.8.10443': attribute type 4 has an invalid length. [ 431.764302][ T5236] netlink: 60 bytes leftover after parsing attributes in process `syz.7.10446'. [ 431.819624][ T29] kauditd_printk_skb: 218 callbacks suppressed [ 431.819638][ T29] audit: type=1400 audit(431.902:34385): avc: denied { append } for pid=5238 comm="syz.5.10447" name="ptp0" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 432.159596][ T29] audit: type=1400 audit(432.232:34386): avc: denied { connect } for pid=5254 comm="syz.6.10453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 432.179014][ T29] audit: type=1400 audit(432.242:34387): avc: denied { ioctl } for pid=5254 comm="syz.6.10453" path="socket:[84503]" dev="sockfs" ino=84503 ioctlcmd=0x89ed scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 432.245407][ T5257] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 432.550736][ T5273] lo speed is unknown, defaulting to 1000 [ 432.565368][ T5273] lo speed is unknown, defaulting to 1000 [ 432.566327][ T29] audit: type=1400 audit(432.652:34388): avc: denied { write } for pid=5278 comm="syz.4.10461" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 432.756990][ T5289] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 432.835193][ T29] audit: type=1326 audit(432.922:34389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.6.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 432.858718][ T29] audit: type=1326 audit(432.922:34390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.6.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 432.881801][ T29] audit: type=1326 audit(432.922:34391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.6.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 432.904791][ T29] audit: type=1326 audit(432.922:34392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.6.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 432.927775][ T29] audit: type=1326 audit(432.922:34393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.6.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 432.950847][ T29] audit: type=1326 audit(432.922:34394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.6.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 432.989637][ T5317] net_ratelimit: 65 callbacks suppressed [ 432.989647][ T5317] A link change request failed with some changes committed already. Interface batadv_slave_1 may have been left with an inconsistent configuration, please check. [ 433.108655][ T5337] xt_hashlimit: size too large, truncated to 1048576 [ 433.503109][ T5366] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10479'. [ 433.534927][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x4 [ 433.542628][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x2 [ 433.565658][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.573376][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.581112][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.589305][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.597062][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.604762][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.612459][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.620805][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.628492][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.636274][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.644003][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.652293][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.660091][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.667760][T19486] hid-generic 0000:3000000:0000.000F: unknown main item tag 0x0 [ 433.677577][T19486] hid-generic 0000:3000000:0000.000F: hidraw0: HID v0.00 Device [sy] on syz0 [ 433.760048][ T5387] netlink: 52 bytes leftover after parsing attributes in process `syz.8.10484'. [ 434.149989][ T5414] netlink: 60 bytes leftover after parsing attributes in process `syz.4.10491'. [ 434.254458][ T2793] IPVS: starting estimator thread 0... [ 434.280375][ T5435] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10496'. [ 434.307834][ T5435] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10496'. [ 434.354425][ T5431] IPVS: using max 2976 ests per chain, 148800 per kthread [ 434.627427][ T5458] hub 6-0:1.0: USB hub found [ 434.632256][ T5458] hub 6-0:1.0: 8 ports detected [ 434.715156][ T5469] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 435.366474][ T5496] lo speed is unknown, defaulting to 1000 [ 435.375512][ T5503] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10517'. [ 435.377518][ T5496] lo speed is unknown, defaulting to 1000 [ 435.390227][ T5503] netlink: 4 bytes leftover after parsing attributes in process `syz.4.10517'. [ 435.452022][ T5516] netlink: 1 bytes leftover after parsing attributes in process `syz.6.10519'. [ 435.461212][ T5516] netlink: 1 bytes leftover after parsing attributes in process `syz.6.10519'. [ 435.715612][ T5559] netlink: 14593 bytes leftover after parsing attributes in process `syz.8.10531'. [ 435.879564][ T5557] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 436.060419][ T5574] pim6reg1: entered promiscuous mode [ 436.066269][ T5574] pim6reg1: entered allmulticast mode [ 436.227005][ T5582] lo speed is unknown, defaulting to 1000 [ 436.233155][ T5582] lo speed is unknown, defaulting to 1000 [ 436.973777][ T5660] tipc: Enabling of bearer rejected, failed to enable media [ 436.998079][ T29] kauditd_printk_skb: 364 callbacks suppressed [ 436.998094][ T29] audit: type=1400 audit(437.082:34759): avc: denied { create } for pid=5664 comm="syz.6.10561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 437.023628][ T29] audit: type=1400 audit(437.082:34760): avc: denied { ioctl } for pid=5664 comm="syz.6.10561" path="socket:[86087]" dev="sockfs" ino=86087 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 437.050215][ T29] audit: type=1400 audit(437.092:34761): avc: denied { sys_module } for pid=5664 comm="syz.6.10561" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 437.070919][ T29] audit: type=1400 audit(437.092:34762): avc: denied { bind } for pid=5664 comm="syz.6.10561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 437.090445][ T29] audit: type=1400 audit(437.102:34763): avc: denied { read } for pid=5664 comm="syz.6.10561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 437.115263][ T29] audit: type=1400 audit(437.202:34764): avc: denied { create } for pid=5664 comm="syz.6.10561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 437.134710][ T29] audit: type=1400 audit(437.202:34765): avc: denied { connect } for pid=5664 comm="syz.6.10561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 437.153853][ T29] audit: type=1400 audit(437.202:34766): avc: denied { setopt } for pid=5664 comm="syz.6.10561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 437.172883][ T29] audit: type=1400 audit(437.202:34767): avc: denied { bind } for pid=5664 comm="syz.6.10561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 437.191680][ T29] audit: type=1400 audit(437.202:34768): avc: denied { write } for pid=5664 comm="syz.6.10561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 438.858639][ T5784] __nla_validate_parse: 1 callbacks suppressed [ 438.858657][ T5784] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10588'. [ 438.875091][ T5784] batadv0 (unregistering): left allmulticast mode [ 438.881535][ T5784] batadv0 (unregistering): left promiscuous mode [ 438.888271][ T5784] bridge0: port 1(batadv0) entered disabled state [ 438.976586][ T5793] syzkaller0: entered promiscuous mode [ 438.982130][ T5793] syzkaller0: entered allmulticast mode [ 439.193134][ T5807] netlink: 52 bytes leftover after parsing attributes in process `syz.7.10594'. [ 439.202371][ T5807] netlink: 52 bytes leftover after parsing attributes in process `syz.7.10594'. [ 439.230403][ T5812] netlink: 14 bytes leftover after parsing attributes in process `syz.8.10595'. [ 439.245257][ T5812] $H (unregistering): (slave bond_slave_0): Releasing backup interface [ 439.254174][ T5812] bond_slave_0: left promiscuous mode [ 439.266708][ T5812] $H (unregistering): (slave bond_slave_1): Releasing backup interface [ 439.275931][ T5812] bond_slave_1: left promiscuous mode [ 439.281568][ T5807] netlink: 52 bytes leftover after parsing attributes in process `syz.7.10594'. [ 439.290678][ T5807] netlink: 52 bytes leftover after parsing attributes in process `syz.7.10594'. [ 439.300482][ T5812] $H (unregistering): Released all slaves [ 439.328134][ T5807] netlink: 52 bytes leftover after parsing attributes in process `syz.7.10594'. [ 439.337236][ T5807] netlink: 52 bytes leftover after parsing attributes in process `syz.7.10594'. [ 439.404796][ T5849] lo speed is unknown, defaulting to 1000 [ 439.411185][ T5849] lo speed is unknown, defaulting to 1000 [ 439.732624][ T5892] lo speed is unknown, defaulting to 1000 [ 439.739160][ T5892] lo speed is unknown, defaulting to 1000 [ 439.936366][ T5927] netlink: 96 bytes leftover after parsing attributes in process `syz.7.10606'. [ 441.135219][ T5964] netlink: 16 bytes leftover after parsing attributes in process `syz.5.10617'. [ 441.152835][ T5960] lo speed is unknown, defaulting to 1000 [ 441.179161][ T5960] lo speed is unknown, defaulting to 1000 [ 441.323563][ T5976] lo speed is unknown, defaulting to 1000 [ 441.343234][ T5976] lo speed is unknown, defaulting to 1000 [ 441.768573][ T6028] lo speed is unknown, defaulting to 1000 [ 441.775227][ T6028] lo speed is unknown, defaulting to 1000 [ 442.254540][ T29] kauditd_printk_skb: 706 callbacks suppressed [ 442.254630][ T29] audit: type=1326 audit(442.342:35475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.6.10624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 442.583029][ T29] audit: type=1326 audit(442.372:35476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.6.10624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 442.606125][ T29] audit: type=1326 audit(442.372:35477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.6.10624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 442.629100][ T29] audit: type=1326 audit(442.372:35478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.6.10624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 442.652366][ T29] audit: type=1326 audit(442.372:35479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.6.10624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 442.675454][ T29] audit: type=1326 audit(442.382:35480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.6.10624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 442.698316][ T29] audit: type=1326 audit(442.382:35481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.6.10624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 442.721371][ T29] audit: type=1326 audit(442.382:35482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.6.10624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 442.744434][ T29] audit: type=1326 audit(442.382:35483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.6.10624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 442.767439][ T29] audit: type=1326 audit(442.382:35484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.6.10624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x7ffc0000 [ 443.499233][ T6071] netlink: zone id is out of range [ 443.504470][ T6071] netlink: zone id is out of range [ 443.509745][ T6071] netlink: zone id is out of range [ 443.515002][ T6071] netlink: zone id is out of range [ 443.520148][ T6071] netlink: zone id is out of range [ 443.525322][ T6071] netlink: zone id is out of range [ 443.530431][ T6071] netlink: zone id is out of range [ 443.535694][ T6071] netlink: zone id is out of range [ 443.540923][ T6071] netlink: zone id is out of range [ 443.546092][ T6071] netlink: zone id is out of range [ 443.629544][ T6089] netlink: 'syz.4.10635': attribute type 4 has an invalid length. [ 443.642100][ T6088] lo speed is unknown, defaulting to 1000 [ 443.648809][ T2793] lo speed is unknown, defaulting to 1000 [ 443.654706][ T2793] syz0: Port: 1 Link DOWN [ 443.659545][ T6088] lo speed is unknown, defaulting to 1000 [ 443.666659][ T6089] netlink: 'syz.4.10635': attribute type 4 has an invalid length. [ 443.686191][ T2793] lo speed is unknown, defaulting to 1000 [ 443.692054][ T2793] syz0: Port: 1 Link ACTIVE [ 443.901924][ T6120] pim6reg: entered allmulticast mode [ 443.939156][ T6120] pim6reg: left allmulticast mode [ 444.417665][ T6136] syzkaller0: entered promiscuous mode [ 444.423175][ T6136] syzkaller0: entered allmulticast mode [ 444.726075][ T6162] tipc: Enabled bearer , priority 0 [ 444.785469][ T6162] syzkaller0: entered promiscuous mode [ 444.790964][ T6162] syzkaller0: entered allmulticast mode [ 444.814858][ T6162] tipc: Resetting bearer [ 444.835369][ T6161] tipc: Resetting bearer [ 444.845386][ T6161] tipc: Disabling bearer [ 445.353144][ T6192] pim6reg: entered allmulticast mode [ 445.361643][ T6192] pim6reg: left allmulticast mode [ 446.370002][ T6232] tipc: Enabling of bearer rejected, already enabled [ 446.480686][ T6241] tipc: Enabled bearer , priority 0 [ 446.488317][ T6241] syzkaller0: entered promiscuous mode [ 446.493804][ T6241] syzkaller0: entered allmulticast mode [ 446.517457][ T6241] tipc: Resetting bearer [ 446.534319][ T6239] tipc: Resetting bearer [ 446.566304][ T6239] tipc: Disabling bearer [ 446.811491][ T6258] tipc: Enabling of bearer rejected, failed to enable media [ 446.927917][ T6266] syz!: rxe_newlink: already configured on team_slave_0 [ 447.187649][ T6277] bridge0: port 1(batadv0) entered blocking state [ 447.194191][ T6277] bridge0: port 1(batadv0) entered disabled state [ 447.201457][ T6277] batadv0: entered allmulticast mode [ 447.207584][ T6277] batadv0: entered promiscuous mode [ 447.216127][ T6272] lo speed is unknown, defaulting to 1000 [ 447.217523][ T6277] __nla_validate_parse: 8 callbacks suppressed [ 447.217536][ T6277] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10682'. [ 447.222194][ T6272] lo speed is unknown, defaulting to 1000 [ 447.243899][ T6277] batadv0 (unregistering): left allmulticast mode [ 447.250451][ T6277] batadv0 (unregistering): left promiscuous mode [ 447.253771][ T6285] blktrace: Concurrent blktraces are not allowed on loop9 [ 447.257465][ T6277] bridge0: port 1(batadv0) entered disabled state [ 447.270950][ T29] kauditd_printk_skb: 153 callbacks suppressed [ 447.270999][ T29] audit: type=1400 audit(447.362:35638): avc: denied { getopt } for pid=6271 comm="syz.7.10681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 447.318028][ T6287] tipc: Started in network mode [ 447.323018][ T6287] tipc: Node identity be97898bc0a, cluster identity 4711 [ 447.330256][ T6287] tipc: Enabled bearer , priority 0 [ 447.337987][ T6287] syzkaller0: entered promiscuous mode [ 447.343478][ T6287] syzkaller0: entered allmulticast mode [ 447.356951][ T6285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=6285 comm=syz.4.10684 [ 447.391132][ T6287] tipc: Resetting bearer [ 447.423934][ T6286] tipc: Resetting bearer [ 447.430479][ T29] audit: type=1400 audit(447.512:35639): avc: denied { unlink } for pid=3304 comm="syz-executor" name="file0" dev="tmpfs" ino=10791 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 447.473434][ T29] audit: type=1400 audit(447.552:35640): avc: denied { setopt } for pid=6310 comm="syz.4.10686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 447.493897][ T6286] tipc: Disabling bearer [ 447.585164][ T29] audit: type=1326 audit(447.672:35641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6325 comm="syz.6.10691" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f88e048e9a9 code=0x0 [ 447.609439][ T6328] tipc: Enabling of bearer rejected, failed to enable media [ 447.772204][ T29] audit: type=1400 audit(447.852:35642): avc: denied { read write } for pid=6336 comm="syz.5.10695" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 447.796368][ T29] audit: type=1400 audit(447.852:35643): avc: denied { open } for pid=6336 comm="syz.5.10695" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 447.871704][ T29] audit: type=1400 audit(447.922:35644): avc: denied { firmware_load } for pid=6330 comm="syz.8.10693" path="/lib/firmware/regulatory.db" dev="sda1" ino=448 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 447.897843][ T6337] loop9: detected capacity change from 0 to 7 [ 447.912105][ T6337] Buffer I/O error on dev loop9, logical block 0, async page read [ 447.933041][ T6344] lo speed is unknown, defaulting to 1000 [ 447.959014][ T6337] Buffer I/O error on dev loop9, logical block 0, async page read [ 447.966976][ T6337] loop9: unable to read partition table [ 447.994957][ T6344] lo speed is unknown, defaulting to 1000 [ 448.015741][ T29] audit: type=1400 audit(447.982:35645): avc: denied { ioctl } for pid=6336 comm="syz.5.10695" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c0a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 448.041007][ T29] audit: type=1400 audit(448.062:35646): avc: denied { write } for pid=6336 comm="syz.5.10695" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 448.065255][ T6337] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 448.065255][ T6337] ) failed (rc=-5) [ 448.199441][ T29] audit: type=1400 audit(448.182:35647): avc: denied { map } for pid=6352 comm="syz.4.10697" path="socket:[86486]" dev="sockfs" ino=86486 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 448.223337][ T6356] tipc: Enabling of bearer rejected, already enabled [ 448.264407][ T6377] netlink: 'syz.7.10708': attribute type 39 has an invalid length. [ 448.288958][ T6382] netlink: 64 bytes leftover after parsing attributes in process `syz.7.10700'. [ 448.339077][ T6388] tipc: Enabled bearer , priority 0 [ 448.346263][ T6388] syzkaller0: entered promiscuous mode [ 448.351745][ T6388] syzkaller0: entered allmulticast mode [ 448.364101][ T6388] tipc: Resetting bearer [ 448.370419][ T6387] tipc: Resetting bearer [ 448.377264][ T6387] tipc: Disabling bearer [ 448.440980][ T6398] tipc: Enabled bearer , priority 0 [ 448.462238][ T6398] syzkaller0: entered promiscuous mode [ 448.467885][ T6398] syzkaller0: entered allmulticast mode [ 448.477223][ T6398] sch_tbf: burst 12 is lower than device syzkaller0 mtu (1514) ! [ 448.491763][ T6398] tipc: Resetting bearer [ 448.499335][ T6396] tipc: Resetting bearer [ 448.511765][ T6396] tipc: Disabling bearer [ 448.539396][ T6406] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10706'. [ 449.794315][ T6453] xt_hashlimit: size too large, truncated to 1048576 [ 450.166593][ T6461] net_ratelimit: 3337 callbacks suppressed [ 450.166611][ T6461] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 450.175351][ T6463] tipc: Enabling of bearer rejected, failed to enable media [ 450.179238][ T6461] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 450.194733][ T6461] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 450.201550][ T6461] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 450.208460][ T6461] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 450.215258][ T6461] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 450.222030][ T6461] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 450.228770][ T6461] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 450.235534][ T6461] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 450.242283][ T6461] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 450.282299][ T6469] tipc: Enabling of bearer rejected, failed to enable media [ 450.326269][ T6475] tipc: Enabled bearer , priority 0 [ 450.348363][ T6475] syzkaller0: entered promiscuous mode [ 450.353915][ T6475] syzkaller0: entered allmulticast mode [ 450.380883][ T6475] tipc: Resetting bearer [ 450.393446][ T6474] tipc: Resetting bearer [ 450.425087][ T6474] tipc: Disabling bearer [ 450.573864][ T6491] netlink: 16 bytes leftover after parsing attributes in process `syz.5.10729'. [ 450.746420][ T6511] tc_dump_action: action bad kind [ 451.237863][ T6524] tipc: Enabled bearer , priority 0 [ 451.286089][ T6524] syzkaller0: entered promiscuous mode [ 451.291676][ T6524] syzkaller0: entered allmulticast mode [ 451.368633][ T6527] tipc: Resetting bearer [ 451.422439][ T6523] tipc: Resetting bearer [ 451.482918][ T6523] tipc: Disabling bearer [ 452.303218][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 452.303233][ T29] audit: type=1326 audit(524740.380:35754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.7.10746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 452.332822][ T29] audit: type=1326 audit(524740.380:35755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.7.10746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 452.387276][ T29] audit: type=1326 audit(524740.440:35756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.7.10746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 452.410626][ T29] audit: type=1326 audit(524740.440:35757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.7.10746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 452.433884][ T29] audit: type=1326 audit(524740.440:35758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.7.10746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 452.457263][ T29] audit: type=1326 audit(524740.440:35759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.7.10746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 452.480607][ T29] audit: type=1326 audit(524740.440:35760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.7.10746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 452.504094][ T29] audit: type=1326 audit(524740.440:35761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.7.10746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 452.527350][ T29] audit: type=1326 audit(524740.440:35762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.7.10746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=133 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 452.550658][ T29] audit: type=1326 audit(524740.440:35763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.7.10746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 453.294606][ T6575] netlink: 24 bytes leftover after parsing attributes in process `syz.7.10753'. [ 453.366953][ T6577] lo speed is unknown, defaulting to 1000 [ 453.390365][ T6577] lo speed is unknown, defaulting to 1000 [ 453.449348][ T6583] lo speed is unknown, defaulting to 1000 [ 453.479476][ T6583] lo speed is unknown, defaulting to 1000 [ 453.604174][ T6608] tipc: Enabled bearer , priority 0 [ 453.644917][ T6608] syzkaller0: entered promiscuous mode [ 453.650437][ T6608] syzkaller0: entered allmulticast mode [ 453.684013][ T6608] tipc: Resetting bearer [ 453.702996][ T6565] tipc: Resetting bearer [ 453.726120][ T6565] tipc: Disabling bearer [ 454.039595][ T6657] x_tables: ip6_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 454.135224][ T6643] Falling back ldisc for ttyS3. [ 454.233804][ T6673] lo speed is unknown, defaulting to 1000 [ 454.240953][ T6673] lo speed is unknown, defaulting to 1000 [ 454.411676][ T6695] netlink: 'syz.4.10767': attribute type 10 has an invalid length. [ 455.766414][ T6724] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 455.842103][ T6739] netlink: 4 bytes leftover after parsing attributes in process `syz.4.10781'. [ 456.165554][ T6752] netlink: 'syz.8.10783': attribute type 10 has an invalid length. [ 456.533179][ T6766] lo speed is unknown, defaulting to 1000 [ 456.541284][ T6766] lo speed is unknown, defaulting to 1000 [ 457.622410][ T29] kauditd_printk_skb: 103 callbacks suppressed [ 457.622426][ T29] audit: type=1400 audit(524745.700:35867): avc: denied { write } for pid=6812 comm="syz.5.10795" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 457.651931][ T29] audit: type=1400 audit(524745.700:35868): avc: denied { open } for pid=6812 comm="syz.5.10795" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 457.796420][ T6846] lo speed is unknown, defaulting to 1000 [ 457.823477][ T6846] lo speed is unknown, defaulting to 1000 [ 457.877996][ T6853] netlink: 'syz.7.10800': attribute type 39 has an invalid length. [ 457.887390][ T29] audit: type=1400 audit(524745.950:35869): avc: denied { create } for pid=6851 comm="syz.7.10800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 458.082480][ T29] audit: type=1400 audit(524746.160:35870): avc: denied { create } for pid=6861 comm="syz.7.10802" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 458.106230][ T29] audit: type=1400 audit(524746.180:35871): avc: denied { mounton } for pid=6861 comm="syz.7.10802" path="/1819/file0" dev="tmpfs" ino=9510 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 458.138194][ T29] audit: type=1400 audit(524746.220:35872): avc: denied { unlink } for pid=8048 comm="syz-executor" name="file0" dev="tmpfs" ino=9510 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 458.214550][ T29] audit: type=1400 audit(524746.270:35873): avc: denied { write } for pid=6879 comm="syz.8.10803" name="001" dev="devtmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 458.237992][ T29] audit: type=1326 audit(524746.290:35874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6880 comm="syz.7.10804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 458.261786][ T29] audit: type=1326 audit(524746.290:35875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6880 comm="syz.7.10804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 458.285131][ T29] audit: type=1326 audit(524746.290:35876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6880 comm="syz.7.10804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ff8fe9a9 code=0x7ffc0000 [ 458.390706][ T6893] netlink: 4 bytes leftover after parsing attributes in process `syz.7.10808'. [ 458.787938][ T6943] netlink: 20 bytes leftover after parsing attributes in process `syz.8.10818'. [ 459.224142][ T6949] netlink: 'syz.5.10820': attribute type 39 has an invalid length. [ 459.620364][ T6959] netlink: 12 bytes leftover after parsing attributes in process `syz.4.10823'. [ 459.661956][ T6959] 8021q: adding VLAN 0 to HW filter on device bond3 [ 459.671810][ T6994] netlink: 28 bytes leftover after parsing attributes in process `syz.4.10823'. [ 459.884210][ T7005] lo speed is unknown, defaulting to 1000 [ 459.890808][ T7005] lo speed is unknown, defaulting to 1000 [ 460.479301][ T7062] netlink: 8 bytes leftover after parsing attributes in process `syz.7.10833'. [ 460.525975][ T7055] netlink: 72 bytes leftover after parsing attributes in process `syz.7.10833'. [ 460.535240][ T7055] netlink: 36 bytes leftover after parsing attributes in process `syz.7.10833'. [ 460.622246][ T7070] lo speed is unknown, defaulting to 1000 [ 460.635635][ T7070] lo speed is unknown, defaulting to 1000 [ 460.694866][ T7081] netlink: 60 bytes leftover after parsing attributes in process `syz.5.10835'. [ 460.724119][ T7081] netlink: 14 bytes leftover after parsing attributes in process `syz.5.10835'. [ 460.973353][ T7111] syzkaller1: entered promiscuous mode [ 460.979223][ T7111] syzkaller1: entered allmulticast mode [ 461.266734][ T7120] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10840'. [ 461.365133][ T7145] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 461.372726][ T7147] xt_hashlimit: max too large, truncated to 1048576 [ 461.380272][ T7145] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 461.381652][ T7147] netlink: 'syz.4.10848': attribute type 1 has an invalid length. [ 461.396400][ T7145] batman_adv: batadv0: Interface deactivated: ipvlan2 [ 461.403308][ T7145] batman_adv: batadv0: Removing interface: ipvlan2 [ 461.619096][ T7158] lo speed is unknown, defaulting to 1000 [ 461.625466][ T7158] lo speed is unknown, defaulting to 1000 [ 462.488874][ T7203] hsr_slave_0: left promiscuous mode [ 462.496010][ T7203] hsr_slave_1: left promiscuous mode [ 462.514368][ T7209] netlink: 'syz.6.10861': attribute type 39 has an invalid length. [ 462.543843][ T7211] lo speed is unknown, defaulting to 1000 [ 462.563976][ T7211] lo speed is unknown, defaulting to 1000 [ 462.887125][ T29] kauditd_printk_skb: 337 callbacks suppressed [ 462.887140][ T29] audit: type=1400 audit(524750.979:36214): avc: denied { ioctl } for pid=7258 comm="syz.5.10868" path="socket:[88640]" dev="sockfs" ino=88640 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 462.968311][ T29] audit: type=1400 audit(524751.049:36215): avc: denied { create } for pid=7260 comm="syz.5.10869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 462.988290][ T29] audit: type=1400 audit(524751.049:36216): avc: denied { bind } for pid=7260 comm="syz.5.10869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 463.007460][ T29] audit: type=1326 audit(524751.059:36217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7260 comm="syz.5.10869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 463.030883][ T29] audit: type=1326 audit(524751.059:36218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7260 comm="syz.5.10869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 463.054929][ T29] audit: type=1326 audit(524751.059:36219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7260 comm="syz.5.10869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 463.078857][ T29] audit: type=1326 audit(524751.059:36220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7260 comm="syz.5.10869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 463.102358][ T29] audit: type=1326 audit(524751.059:36221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7260 comm="syz.5.10869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 463.126419][ T29] audit: type=1326 audit(524751.059:36222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7260 comm="syz.5.10869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 463.149699][ T29] audit: type=1326 audit(524751.059:36223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7260 comm="syz.5.10869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ae87fe9a9 code=0x7ffc0000 [ 463.193037][ T7265] x_tables: duplicate underflow at hook 3 [ 463.368099][ T7285] lo speed is unknown, defaulting to 1000 [ 463.387478][ T7285] lo speed is unknown, defaulting to 1000 [ 463.582169][ T7332] lo speed is unknown, defaulting to 1000 [ 463.589131][ T7332] lo speed is unknown, defaulting to 1000 [ 463.686706][ T7355] netlink: 'syz.8.10882': attribute type 1 has an invalid length. [ 463.694627][ T7355] __nla_validate_parse: 8 callbacks suppressed [ 463.694639][ T7355] netlink: 224 bytes leftover after parsing attributes in process `syz.8.10882'. [ 463.738176][ T7331] netlink: 'syz.8.10882': attribute type 21 has an invalid length. [ 463.746149][ T7331] netlink: 156 bytes leftover after parsing attributes in process `syz.8.10882'. [ 463.959685][ T7362] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10884'. [ 463.979170][ T7368] netlink: 60 bytes leftover after parsing attributes in process `syz.8.10895'. [ 463.990509][ T7368] netlink: 14 bytes leftover after parsing attributes in process `syz.8.10895'. [ 464.061960][ T7372] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10886'. [ 464.071697][ T7372] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10886'. [ 464.112022][ T7375] lo speed is unknown, defaulting to 1000 [ 464.118807][ T7375] lo speed is unknown, defaulting to 1000 [ 464.361466][ T7415] netlink: 12 bytes leftover after parsing attributes in process `syz.6.10890'. [ 464.946043][ T7428] netlink: 32 bytes leftover after parsing attributes in process `syz.4.10894'. [ 465.066791][ T7438] vhci_hcd: invalid port number 224 [ 465.119050][ T7443] netlink: 60 bytes leftover after parsing attributes in process `syz.4.10899'. [ 465.136363][ T7443] hsr_slave_0: left promiscuous mode [ 465.639534][ T7498] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 466.234573][ T7508] lo speed is unknown, defaulting to 1000 [ 466.240775][ T7508] lo speed is unknown, defaulting to 1000 [ 467.146179][ T7553] lo speed is unknown, defaulting to 1000 [ 467.152399][ T7553] lo speed is unknown, defaulting to 1000 [ 467.901271][ T29] kauditd_printk_skb: 387 callbacks suppressed [ 467.901285][ T29] audit: type=1400 audit(524755.989:36611): avc: denied { read write } for pid=7607 comm="syz.8.10927" name="uhid" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 467.931306][ T29] audit: type=1400 audit(524755.989:36612): avc: denied { open } for pid=7607 comm="syz.8.10927" path="/dev/uhid" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 467.958188][ T29] audit: type=1400 audit(524756.049:36613): avc: denied { setopt } for pid=7607 comm="syz.8.10927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 467.978304][ T29] audit: type=1400 audit(524756.049:36614): avc: denied { setattr } for pid=7607 comm="syz.8.10927" name="file0" dev="tmpfs" ino=3471 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 468.000902][ T29] audit: type=1400 audit(524756.049:36615): avc: denied { write } for pid=7607 comm="syz.8.10927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 468.082982][ T29] audit: type=1400 audit(524756.168:36616): avc: denied { ioctl } for pid=7609 comm="syz.8.10929" path="socket:[88971]" dev="sockfs" ino=88971 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 468.083594][ T7610] can-isotp: isotp_sendmsg: can_send_ret -ENETDOWN [ 468.270121][ T29] audit: type=1400 audit(524756.358:36617): avc: denied { create } for pid=7615 comm="syz.6.10932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 468.307416][ T7619] netlink: 'syz.6.10933': attribute type 10 has an invalid length. [ 468.904135][ T7638] __nla_validate_parse: 7 callbacks suppressed [ 468.904150][ T7638] netlink: 60 bytes leftover after parsing attributes in process `syz.7.10939'. [ 468.948537][ T7638] netlink: 14 bytes leftover after parsing attributes in process `syz.7.10939'. [ 469.138739][ T7647] netlink: 'syz.5.10940': attribute type 1 has an invalid length. [ 469.146799][ T7647] netlink: 224 bytes leftover after parsing attributes in process `syz.5.10940'. [ 469.209631][ T7643] netlink: 'syz.5.10940': attribute type 21 has an invalid length. [ 469.218236][ T7643] netlink: 156 bytes leftover after parsing attributes in process `syz.5.10940'. [ 470.188182][ T7660] vhci_hcd: invalid port number 236 [ 470.499436][ T29] audit: type=1400 audit(524758.588:36618): avc: denied { load_policy } for pid=7659 comm="syz.8.10944" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 470.520749][ T7660] SELinux: ebitmap: truncated map [ 470.542450][ T7660] SELinux: failed to load policy [ 471.246107][ T29] audit: type=1400 audit(524759.328:36619): avc: denied { name_bind } for pid=7671 comm="syz.8.10947" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 471.329929][ T29] audit: type=1400 audit(524759.418:36620): avc: denied { create } for pid=7671 comm="syz.8.10947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 471.351327][ T7673] siw: device registration error -23 [ 472.338806][ T7711] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10960'. [ 473.113908][ T7745] xt_hashlimit: overflow, try lower: 2/0 [ 473.358218][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 473.358232][ T29] audit: type=1326 audit(524761.448:36689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7747 comm="syz.4.10967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 473.387614][ T29] audit: type=1326 audit(524761.448:36690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7747 comm="syz.4.10967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 473.432208][ T7756] netlink: 80 bytes leftover after parsing attributes in process `syz.4.10969'. [ 473.441525][ T29] audit: type=1326 audit(524761.488:36691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7747 comm="syz.4.10967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 473.464842][ T29] audit: type=1326 audit(524761.488:36692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7747 comm="syz.4.10967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 473.488108][ T29] audit: type=1326 audit(524761.488:36693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7747 comm="syz.4.10967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 473.534424][ T29] audit: type=1326 audit(524761.618:36694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7758 comm="syz.4.10970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 473.557839][ T29] audit: type=1326 audit(524761.618:36695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7758 comm="syz.4.10970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 473.597383][ T29] audit: type=1326 audit(524761.668:36696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7758 comm="syz.4.10970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 473.620762][ T29] audit: type=1326 audit(524761.668:36697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7758 comm="syz.4.10970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 473.644051][ T29] audit: type=1326 audit(524761.668:36698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7758 comm="syz.4.10970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54ab74e9a9 code=0x7ffc0000 [ 473.685274][ T7761] lo speed is unknown, defaulting to 1000 [ 473.691847][ T7761] lo speed is unknown, defaulting to 1000 [ 474.152978][ T7806] lo speed is unknown, defaulting to 1000 [ 474.159235][ T7806] lo speed is unknown, defaulting to 1000 [ 474.848329][ T7846] xt_hashlimit: size too large, truncated to 1048576 [ 475.672743][ T7866] netlink: 9 bytes leftover after parsing attributes in process `syz.7.10991'. [ 475.864819][ T7873] netlink: 32 bytes leftover after parsing attributes in process `syz.8.10989'. [ 475.926006][ T7876] netlink: 'syz.4.10992': attribute type 1 has an invalid length. [ 476.370092][ T7910] netlink: 'syz.6.10997': attribute type 4 has an invalid length. [ 476.860427][ T7918] lo speed is unknown, defaulting to 1000 [ 476.866779][ T7918] lo speed is unknown, defaulting to 1000 [ 477.703667][ T7957] lo speed is unknown, defaulting to 1000 [ 477.709962][ T7957] lo speed is unknown, defaulting to 1000 [ 478.598262][ T29] kauditd_printk_skb: 1549 callbacks suppressed [ 478.598279][ T29] audit: type=1326 audit(524766.357:38248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7914 comm="syz.6.10999" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f88e0485967 code=0x7ffc0000 [ 478.656456][ T29] audit: type=1326 audit(524766.717:38249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7914 comm="syz.6.10999" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f88e042ab89 code=0x7ffc0000 [ 478.679643][ T29] audit: type=1326 audit(524766.727:38250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7914 comm="syz.6.10999" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f88e0485967 code=0x7ffc0000 [ 478.702876][ T29] audit: type=1326 audit(524766.727:38251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7914 comm="syz.6.10999" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f88e042ab89 code=0x7ffc0000 [ 478.726130][ T29] audit: type=1326 audit(524766.727:38252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7914 comm="syz.6.10999" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f88e0485967 code=0x7ffc0000 [ 478.749334][ T29] audit: type=1326 audit(524766.727:38253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7914 comm="syz.6.10999" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f88e042ab89 code=0x7ffc0000 [ 478.772562][ T29] audit: type=1326 audit(524766.727:38254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7914 comm="syz.6.10999" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f88e0485967 code=0x7ffc0000 [ 478.795892][ T29] audit: type=1326 audit(524766.727:38255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7914 comm="syz.6.10999" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f88e042ab89 code=0x7ffc0000 [ 478.819312][ T29] audit: type=1326 audit(524766.727:38256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7914 comm="syz.6.10999" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f88e0485967 code=0x7ffc0000 [ 478.842938][ T29] audit: type=1326 audit(524766.727:38257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7914 comm="syz.6.10999" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f88e042ab89 code=0x7ffc0000 [ 478.870028][ T7977] lo speed is unknown, defaulting to 1000 [ 478.888205][ T7977] lo speed is unknown, defaulting to 1000 [ 479.012754][ T7998] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11005'. [ 479.131931][ T8018] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11008'. [ 479.161404][ T8018] bridge0: port 1(macvlan2) entered blocking state [ 479.168747][ T8018] bridge0: port 1(macvlan2) entered disabled state [ 479.187927][ T8018] macvlan2: entered allmulticast mode [ 479.193385][ T8018] bridge0: entered allmulticast mode [ 479.214929][ T8018] macvlan2: left allmulticast mode [ 479.220182][ T8018] bridge0: left allmulticast mode [ 479.246455][ T8024] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11007'. [ 479.711835][ T8051] netlink: 9 bytes leftover after parsing attributes in process `syz.6.11013'. [ 479.872050][ T8063] 9pnet_fd: Insufficient options for proto=fd [ 479.925653][ T8069] vxcan1: entered allmulticast mode [ 480.072354][ T8074] tipc: Bearer : already 2 bearers with priority 10 [ 480.079765][ T8074] tipc: Bearer : trying with adjusted priority [ 480.086544][ T8074] tipc: Enabling of bearer rejected, failed to enable media [ 480.116027][ T8078] $H: entered promiscuous mode [ 480.182410][ T8118] netlink: 'syz.5.11025': attribute type 10 has an invalid length. [ 480.193495][ T8118] team0: Device dummy0 failed to register rx_handler [ 480.269596][ T8125] 9pnet_fd: Insufficient options for proto=fd [ 480.358262][ T8139] netlink: 56 bytes leftover after parsing attributes in process `syz.8.11036'. [ 480.388101][ T8140] ================================================================== [ 480.396205][ T8140] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 480.403495][ T8140] [ 480.405823][ T8140] write to 0xffff88811a355e00 of 4 bytes by task 8135 on cpu 0: [ 480.413456][ T8140] touch_atime+0x1e8/0x340 [ 480.417892][ T8140] shmem_file_splice_read+0x5b1/0x600 [ 480.423271][ T8140] splice_direct_to_actor+0x26f/0x680 [ 480.428656][ T8140] do_splice_direct+0xda/0x150 [ 480.433431][ T8140] do_sendfile+0x380/0x650 [ 480.437851][ T8140] __x64_sys_sendfile64+0x105/0x150 [ 480.443054][ T8140] x64_sys_call+0xb39/0x2fb0 [ 480.447644][ T8140] do_syscall_64+0xd2/0x200 [ 480.452151][ T8140] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 480.458059][ T8140] [ 480.460378][ T8140] read to 0xffff88811a355e00 of 4 bytes by task 8140 on cpu 1: [ 480.467925][ T8140] atime_needs_update+0x25f/0x3e0 [ 480.473134][ T8140] touch_atime+0x4a/0x340 [ 480.477481][ T8140] shmem_file_splice_read+0x5b1/0x600 [ 480.482862][ T8140] splice_direct_to_actor+0x26f/0x680 [ 480.488246][ T8140] do_splice_direct+0xda/0x150 [ 480.493125][ T8140] do_sendfile+0x380/0x650 [ 480.497556][ T8140] __x64_sys_sendfile64+0x105/0x150 [ 480.502761][ T8140] x64_sys_call+0xb39/0x2fb0 [ 480.507405][ T8140] do_syscall_64+0xd2/0x200 [ 480.511925][ T8140] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 480.518285][ T8140] [ 480.520611][ T8140] value changed: 0x1bcfa353 -> 0x1c683473 [ 480.526329][ T8140] [ 480.528645][ T8140] Reported by Kernel Concurrency Sanitizer on: [ 480.534787][ T8140] CPU: 1 UID: 0 PID: 8140 Comm: syz.4.11030 Not tainted 6.16.0-rc7-syzkaller-00105-g2942242dde89 #0 PREEMPT(voluntary) [ 480.547301][ T8140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 480.557381][ T8140] ==================================================================