last executing test programs: 5m40.43019575s ago: executing program 1 (id=112): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) open(&(0x7f0000000740)='./bus\x00', 0x143c62, 0x0) mount(&(0x7f0000000000), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') r1 = socket(0x10, 0x803, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x5}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=@newtfilter={0xa4, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r3, {0xf}, {}, {0xa, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x78, 0x2, [@TCA_U32_SEL={0x74, 0x5, {0x10, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1000, 0xe, 0xfffff000, 0x9f6}, {0xdeb2, 0x3, 0x6, 0x3}, {0x1, 0xfffffffb, 0x100, 0x3ff}, {0x200, 0x3ff, 0x3, 0x4}, {0x9, 0x7, 0x40, 0x80}, {0x3ff, 0xb, 0x3, 0xa6d}]}}]}}]}, 0xa4}, 0x1, 0x0, 0x0, 0xccd4ddef28b9e90e}, 0x40094) 5m40.324281491s ago: executing program 1 (id=114): bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000a40)='GPL\x00') openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000300), &(0x7f00000000c0)}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000008c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) setresuid(0x0, 0x0, 0xee00) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = mq_open(&(0x7f0000000080)='$@\x00', 0x40, 0xb4, 0x0) fcntl$setlease(r2, 0x400, 0x0) mq_open(&(0x7f0000000140)='$@\x00', 0x1, 0x13, 0x0) 5m39.336172888s ago: executing program 1 (id=124): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20040000}, 0x0) sendto$packet(r0, &(0x7f00000003c0), 0x0, 0x2404c081, &(0x7f0000000200)={0x11, 0x88a8, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x10, 0x16, 0x0, 0x0, 0x5}, 0x94) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r2 = semget$private(0x0, 0x7, 0x191) semtimedop(r2, &(0x7f0000000200)=[{0x4, 0xffff, 0x2000}, {0x4, 0x3, 0x1800}], 0x2, 0x0) semop(r2, &(0x7f0000000180)=[{0x2, 0x2, 0x800}], 0x1) semop(r2, &(0x7f0000000140)=[{0x2, 0xce97, 0x800}, {0x1, 0x5, 0x1000}], 0x2) semctl$GETZCNT(r2, 0x0, 0xf, 0x0) 5m38.455129215s ago: executing program 1 (id=141): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f00000000c0)=0xff) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000040)=0x9) ioctl$TIOCSTI(r1, 0x5412, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a28010000060a010400000000000000000200000048000480440001800a0001006d61746368000000340002800900010074696d65000000001c00030007682c020b7b37f27f5101007f51010049f4e34e86f469eb08000240000000000900010073797a30000000000900020073797a3200000000ab0007"], 0x150}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2cc, &(0x7f0000000240)={[{@errors_remount}, {@nomblk_io_submit}]}, 0xfd, 0x4c3, &(0x7f0000000d80)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x104) ioctl$BTRFS_IOC_QUOTA_RESCAN(r2, 0x4040942c, &(0x7f0000000180)={0x0, 0x3, [0x8, 0xfffffffffffffe01, 0xeee, 0x2, 0x8, 0x2]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0x8004587d, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1018488, 0x0) 5m38.191356511s ago: executing program 1 (id=144): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xfffffffffffff001}, 0x18) syz_mount_image$ext4(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x2, 0x0, &(0x7f0000000840)) mount$bind(&(0x7f0000000800)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1a9851, 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f00000003c0), 0x200044, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000880)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket(0x2, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'team_slave_1\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x40, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xe, 0x1}, {0x0, 0x3}}}, 0x24}}, 0x800) 5m36.080736148s ago: executing program 1 (id=179): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) readv(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001240)=@newlink={0x68, 0x10, 0x403, 0x300, 0x0, {}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0xffe}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6a800000, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x68}}, 0x8000) 5m36.07122138s ago: executing program 32 (id=179): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) readv(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001240)=@newlink={0x68, 0x10, 0x403, 0x300, 0x0, {}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0xffe}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6a800000, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x68}}, 0x8000) 3.56335367s ago: executing program 3 (id=4591): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000000)={[{@bsdgroups}, {@jqfmt_vfsv1}]}, 0xc1, 0x7da, &(0x7f0000000fc0)="$eJzs3c1rG80dAODfyh+ynbR2odAmJ0OhNYTIdeomLfSQ0kMpNBBoz02MrJjUshUsOcTGEOdQ6KXQlh4K7SXnfqSHQq/9uLb/ROmhJITWMW/e04tediX5U5LtxJId/Dyw2pnd2Z0Z7ezsSLtIAVxYk+lLLuJKRPw8iRhvLk8iYigLDUbcbqR7u7VRTKck6vUf/C/J0vz50u6+kub8UjPyxYj4+08iruUO5jranJdLK83QdG3p0XR1bf36w6W5hdJCafnmzOzsjVtfv3Xz8Fbv6qN/rV9+9YvvfuWPtwfjCy9+9o8kbsfl5rrtrY3ie+7+kMmYbL4nQ+lbuM93TjuzM5acdQF4J+mpOdA4y+NKjMdAFurgfU9AAOBceBoRdQDggklc/wHggml9D7C9tVFsTWf7jUR/vf52RIw06t+6v9lYM9i8ZzeS3Qcd20723RlJImLiFPKfjIjf/uVHv0+n6NF9SIB2Np9FxP2Jye2t/IH+P0n7v+Gj95DvuOar3TarN7abPLBY/wf989d0/PONw+O/qzsP9IxkrwfGPyP5Nufuuzj6/M+97LDpMfqmo6Xjv2/tebZtd/y389DaxEAz9plszDeUPHhYLqV922cjYiqG8ml8Jkva/imoqTefvOmU/97x3/9/+ePfpfmn890UuZeD+aiP79lmfq42dwpVz7x+FnF1sF39k53xb9Jh/Hu34173H5rvffOnv+mUMq1/Wt/WdLj+vVV/HvHltsd/91gmXZ9PnM6aw3SrUbTxp//8eqxT/rvHP5/N0/xbnwX6IT3+Y93rP5GGqmvri3PlcmmlevI8/vl8/G+d1u1t/+3rn7X/fdL2P5z8MAu3WtqTuVptZSZiOPn+4eU3drdtxVvp0/pPfan9+d+p/eeaz8be34l1N/hq+A/NXbWtf2azU/17K63//ImOf5dAvbnNgVUv3i4OdMr/eMd/NgtNNZccp/87oqTv0ZoBAAAAAAAAAAAAAAAAAAAAAAAA4ORyEXE5klxhJ5zLFQqN//D+fIzlypVq7dqDyuryfGT/lT0RQ7nWT12O7/k91Jnm7+G34jcOxL8WEZ+LiF/lR7N4oVgpz5915QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg6dL+//9/ms4Khca6/+bPunQAQM+MnHUBAIC+c/0HgIvnZNf/0Z6VAwDonxN//q8nvSkIANA3x77+3+9tOQCA/nH/HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgB67e+dOOtU/3toopvH5x2uri5XH1+dL1cXC0mqxUKysPCosVCoL5VKhWFnquKPNxqxcqTyajeXVJ9O1UrU2XV1bv7dUWV2u3Xu4NLdQulca6lvNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOD4qmvri3PlcmlFoEtgtDR6HopxjgKDcS6KcSiw+e+hrF13TRwTH0zjH+6SJjnNvEYPLtnbS4yeSd8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8CH4NAAA//9RvRhH") r0 = gettid() r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@ipv4_newrule={0x2c, 0x20, 0x301, 0x0, 0x25dfdbfb, {0x2, 0x20}, [@FRA_DST={0x8, 0x1, @empty}, @FRA_FLOW={0x8}]}, 0x2c}}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) socket(0x1d, 0x2, 0x6) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000), 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) r4 = getpgid(r0) ptrace$ARCH_MAP_VDSO_32(0x1e, r4, 0x7, 0x2002) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x4c02}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[], 0x10448) 3.331963123s ago: executing program 0 (id=4597): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x17, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[], 0x48}}, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='fd', 0x0, 0xffffffffffffffff) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="a80000001200080029bd7000fbdbdf25010300084e234e22010000000a000000750000000700000006000000080200000004000168ebfffff58a9f75ad3ea5c419a2f650772c24c300", @ANYRES32, @ANYBLOB="09000000f9ffffff0c000000ba0c0000580001003160cf8228b3c21869bc1e293e2b782c69836972b1b37c99054afadcd76ced199a654b84fb3eb69e2df6abc426d824caadc7441aeb057c485f95ea61816acf247da86bd365ecfc49004e6db5040001000000000000000000"], 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r4 = fsmount(r1, 0x0, 0x2) openat(r4, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000001000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) syslog(0x9, 0x0, 0x0) rseq(&(0x7f0000000300), 0x20, 0x0, 0x0) sigaltstack(0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0xff, 0x4a1, &(0x7f00000004c0)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x8) pwritev2(r6, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) 3.121836233s ago: executing program 0 (id=4600): r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) pselect6(0x0, 0x0, &(0x7f0000000000)={0x1f, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) write$tun(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xa2) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4d, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.827755032s ago: executing program 2 (id=4606): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x17, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[], 0x48}}, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='fd', 0x0, 0xffffffffffffffff) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="a80000001200080029bd7000fbdbdf25010300084e234e22010000000a000000750000000700000006000000080200000004000168ebfffff58a9f75ad3ea5c419a2f650772c24c300", @ANYRES32, @ANYBLOB="09000000f9ffffff0c000000ba0c0000580001003160cf8228b3c21869bc1e293e2b782c69836972b1b37c99054afadcd76ced199a654b84fb3eb69e2df6abc426d824caadc7441aeb057c485f95ea61816acf247da86bd365ecfc49004e6db5040001000000000000000000"], 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x40000) openat(0xffffffffffffffff, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000001000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r4}, 0x10) syslog(0x9, 0x0, 0x0) rseq(&(0x7f0000000300), 0x20, 0x0, 0x0) sigaltstack(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0xff, 0x4a1, &(0x7f00000004c0)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x8) pwritev2(r5, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) 2.665947438s ago: executing program 3 (id=4609): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x20000000, 0x8000}, 0x11112, 0x0, 0x0, 0x0, 0x10000000000000, 0xcb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='cpu==0||!') syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) io_setup(0x6, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r0, 0x0, 0x6e}, 0xd0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x400, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) pwrite64(r3, &(0x7f0000000140)='2', 0xfdef, 0xfecc) fallocate(r2, 0x0, 0xbf5, 0x2000402) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r2, 0x0, 0x0, 0x0, 0xfffffffffdffffff}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) close(0x3) setsockopt(r5, 0x84, 0x7f, &(0x7f0000000140)="0200000009800089", 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.665526748s ago: executing program 2 (id=4610): syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x81}, 0x38) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r3, &(0x7f0000000100)=""/44, 0xbb) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x72, 0x914f8, 0x0, 0x8000008, 0x3, 0x4, 0x1, 0x0, 0x2}) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0x101000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 'queue0\x00', 0x1}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x40505330, &(0x7f00000001c0)={0x800100, 0xffffffff, 0x22, 0xe1d9, 0x1101, 0xff}) syz_clone3(&(0x7f0000000640)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x22}, &(0x7f0000000580)=""/162, 0xa2, &(0x7f0000000300)=""/18, &(0x7f0000000340)=[r0, r0, r0, r0, r0, r0, r0, r0], 0x8, {r3}}, 0x58) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/rcu_normal', 0x40, 0x112) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x60242, 0x0) 2.309444383s ago: executing program 3 (id=4617): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x17, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[], 0x48}}, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='fd', 0x0, 0xffffffffffffffff) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="a80000001200080029bd7000fbdbdf25010300084e234e22010000000a000000750000000700000006000000080200000004000168ebfffff58a9f75ad3ea5c419a2f650772c24c300", @ANYRES32, @ANYBLOB="09000000f9ffffff0c000000ba0c0000580001003160cf8228b3c21869bc1e293e2b782c69836972b1b37c99054afadcd76ced199a654b84fb3eb69e2df6abc426d824caadc7441aeb057c485f95ea61816acf247da86bd365ecfc49004e6db5040001000000000000000000"], 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r4 = fsmount(r1, 0x0, 0x2) openat(r4, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000001000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) syslog(0x9, 0x0, 0x0) sigaltstack(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0xff, 0x4a1, &(0x7f00000004c0)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x8) pwritev2(r6, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) open(&(0x7f0000000100)='.\x00', 0x591002, 0x50f) 2.269253337s ago: executing program 0 (id=4618): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x6, 0x5, 0x81, 0x20008, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4, 0x9}, 0x50) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{r1}, &(0x7f0000000a40), &(0x7f0000000a80)=r2}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000640)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}], 0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x18) r8 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r8, 0x6, 0x0, 0x0, 0x0) r9 = fsmount(r8, 0x1, 0x6) fchdir(r9) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000000), 0x208e24b) preadv(r10, &(0x7f00000015c0), 0x0, 0x3f, 0x3f) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18}, './file0\x00'}) 1.541547879s ago: executing program 0 (id=4620): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000000)={[{@bsdgroups}, {@jqfmt_vfsv1}]}, 0xc1, 0x7da, &(0x7f0000000fc0)="$eJzs3c1rG80dAODfyh+ynbR2odAmJ0OhNYTIdeomLfSQ0kMpNBBoz02MrJjUshUsOcTGEOdQ6KXQlh4K7SXnfqSHQq/9uLb/ROmhJITWMW/e04tediX5U5LtxJId/Dyw2pnd2Z0Z7ezsSLtIAVxYk+lLLuJKRPw8iRhvLk8iYigLDUbcbqR7u7VRTKck6vUf/C/J0vz50u6+kub8UjPyxYj4+08iruUO5jranJdLK83QdG3p0XR1bf36w6W5hdJCafnmzOzsjVtfv3Xz8Fbv6qN/rV9+9YvvfuWPtwfjCy9+9o8kbsfl5rrtrY3ie+7+kMmYbL4nQ+lbuM93TjuzM5acdQF4J+mpOdA4y+NKjMdAFurgfU9AAOBceBoRdQDggklc/wHggml9D7C9tVFsTWf7jUR/vf52RIw06t+6v9lYM9i8ZzeS3Qcd20723RlJImLiFPKfjIjf/uVHv0+n6NF9SIB2Np9FxP2Jye2t/IH+P0n7v+Gj95DvuOar3TarN7abPLBY/wf989d0/PONw+O/qzsP9IxkrwfGPyP5Nufuuzj6/M+97LDpMfqmo6Xjv2/tebZtd/y389DaxEAz9plszDeUPHhYLqV922cjYiqG8ml8Jkva/imoqTefvOmU/97x3/9/+ePfpfmn890UuZeD+aiP79lmfq42dwpVz7x+FnF1sF39k53xb9Jh/Hu34173H5rvffOnv+mUMq1/Wt/WdLj+vVV/HvHltsd/91gmXZ9PnM6aw3SrUbTxp//8eqxT/rvHP5/N0/xbnwX6IT3+Y93rP5GGqmvri3PlcmmlevI8/vl8/G+d1u1t/+3rn7X/fdL2P5z8MAu3WtqTuVptZSZiOPn+4eU3drdtxVvp0/pPfan9+d+p/eeaz8be34l1N/hq+A/NXbWtf2azU/17K63//ImOf5dAvbnNgVUv3i4OdMr/eMd/NgtNNZccp/87oqTv0ZoBAAAAAAAAAAAAAAAAAAAAAAAA4ORyEXE5klxhJ5zLFQqN//D+fIzlypVq7dqDyuryfGT/lT0RQ7nWT12O7/k91Jnm7+G34jcOxL8WEZ+LiF/lR7N4oVgpz5915QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg6dL+//9/ms4Khca6/+bPunQAQM+MnHUBAIC+c/0HgIvnZNf/0Z6VAwDonxN//q8nvSkIANA3x77+3+9tOQCA/nH/HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgB67e+dOOtU/3toopvH5x2uri5XH1+dL1cXC0mqxUKysPCosVCoL5VKhWFnquKPNxqxcqTyajeXVJ9O1UrU2XV1bv7dUWV2u3Xu4NLdQulca6lvNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOD4qmvri3PlcmlFoEtgtDR6HopxjgKDcS6KcSiw+e+hrF13TRwTH0zjH+6SJjnNvEYPLtnbS4yeSd8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8CH4NAAA//9RvRhH") r0 = gettid() r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@ipv4_newrule={0x2c, 0x20, 0x301, 0x0, 0x25dfdbfb, {0x2, 0x20}, [@FRA_DST={0x8, 0x1, @empty}, @FRA_FLOW={0x8}]}, 0x2c}}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) socket(0x1d, 0x2, 0x6) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000), 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) r4 = getpgid(r0) ptrace$ARCH_MAP_VDSO_32(0x1e, r4, 0x7, 0x2002) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x4c02}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[], 0x10448) 1.406571262s ago: executing program 3 (id=4623): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='cpu==0||!') syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) io_setup(0x6, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r0, 0x0, 0x6e}, 0xd0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x400, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$eJzs3ctvW1UaAPDPdpMmaWb6mNGo7UjTSh2p81DjPDRqMjObWc3MotJoKrEBqYTEDSVOHMVOaaIuUth1wQKBQEIs2PMXsKErKiTEGvaIBSqCEiRAQjK613abOHGwII1p7u8n3ebch/2dU+s7Ovf4Xt8AMuts8k8uYjgiPoyIo43VrQecbfzZuH9zJllyUa9f/iKXHpestw5tve5IRKxHxEBE/P/fEc/ktsetrq7NT5fLpeXmerG2sFSsrq5duLYwPVeaKy2OTV6cmpocnRif2rO23n7puduX3vlv/9vfvHjv7svvvZtUa7i5b3M79lKj6X1xfNO2QxHxz0cRrAcKzfYM9roi/CTJ5/ebiDiX5v/RKKSfJpAF9Xq9/n39cKfd63XgwMqnY+BcfiQiGuV8fmSkMYb/bQzly5Vq7a9XKyuLs42x8rHoy1+9Vi6NNs8VjkVfLlkfS8sP18fb1ici0jHwK4XBdH1kplKe3d+uDmhzpC3/vy408h/ICKf8kF3yH7JL/kN2yX/ILvkP2SX/IbvkP2SX/Ifskv+QXfIfskv+Qyb979KlZKm37n+fvb66Ml+5fmG2VJ0fWViZGZmpLC+NzFUqc+k9Ows/9n7lSmVp7G+xcqNYK1Vrxerq2pWFyspi7Up6X/+VUt++tAroxvEzdz7ORcT63wfTJdHf3CdX4WCr13PR63uQgd4o9LoDAnrG1B9kl3N8oP0netvHBQOdXrj0cL4QeLzke10BoGfOn/L9H2SV+X/ILvP/kF3G+MAOj+jbYrf5f+DxZP4fsmu4w/O/frXp2V2jEfHriPio0He49awv4CDIf5Zrjv/PH/3jcPve/ty36VcE/RHx/BuXX7sxXastjyXbv3ywvfZ6c/v4phd2PGEAeqWVp608BgCya+P+zZnWsp9xP/9X4yKE7fEPNecmB9LvKIc2cluuVcjt0bUL67ci4uRO8XPN5503TmSGNgrb4p9o/s013iKt76H0uen7E//Upvh/2BT/9M/+X4FsuJP0P6M75V8+zel4kH9b+5/hPbp2onP/l3/Q/xU69H9nuozx7JsvfNox/q2I0zvGb8UbSGO1x0/qdr7L+PeeeuJ3nfbV32q8z07xW5JSsbawVKyurl1If0durrQ4NnlxampydGJ8qpjOURdbM9Xb/ePkB3d3a/9Qh/i7tT/Z9ucu2//d799/8uwu8f90bufP/8Qu8Qcj4i9dxv9q/JOnO+1L4s92aH9+l/jJtoku41df/c/hLg8FAPZBdXVtfrpcLi0rKCj0pHDrl1GNtkKveybgUauuJqfmSdL3uiYAAAAAAAAAAABAt/bjcuJetxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4CD4IQAA//9HcdTQ") r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) r3 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xfecc) fallocate(r1, 0x0, 0xbf5, 0x2000402) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x0, 0xfffffffffdffffff}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) close(0x3) setsockopt(r4, 0x84, 0x7f, &(0x7f0000000140)="0200000009800089", 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.356784857s ago: executing program 5 (id=4624): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000000)={[{@bsdgroups}, {@jqfmt_vfsv1}]}, 0xc1, 0x7da, &(0x7f0000000fc0)="$eJzs3c1rG80dAODfyh+ynbR2odAmJ0OhNYTIdeomLfSQ0kMpNBBoz02MrJjUshUsOcTGEOdQ6KXQlh4K7SXnfqSHQq/9uLb/ROmhJITWMW/e04tediX5U5LtxJId/Dyw2pnd2Z0Z7ezsSLtIAVxYk+lLLuJKRPw8iRhvLk8iYigLDUbcbqR7u7VRTKck6vUf/C/J0vz50u6+kub8UjPyxYj4+08iruUO5jranJdLK83QdG3p0XR1bf36w6W5hdJCafnmzOzsjVtfv3Xz8Fbv6qN/rV9+9YvvfuWPtwfjCy9+9o8kbsfl5rrtrY3ie+7+kMmYbL4nQ+lbuM93TjuzM5acdQF4J+mpOdA4y+NKjMdAFurgfU9AAOBceBoRdQDggklc/wHggml9D7C9tVFsTWf7jUR/vf52RIw06t+6v9lYM9i8ZzeS3Qcd20723RlJImLiFPKfjIjf/uVHv0+n6NF9SIB2Np9FxP2Jye2t/IH+P0n7v+Gj95DvuOar3TarN7abPLBY/wf989d0/PONw+O/qzsP9IxkrwfGPyP5Nufuuzj6/M+97LDpMfqmo6Xjv2/tebZtd/y389DaxEAz9plszDeUPHhYLqV922cjYiqG8ml8Jkva/imoqTefvOmU/97x3/9/+ePfpfmn890UuZeD+aiP79lmfq42dwpVz7x+FnF1sF39k53xb9Jh/Hu34173H5rvffOnv+mUMq1/Wt/WdLj+vVV/HvHltsd/91gmXZ9PnM6aw3SrUbTxp//8eqxT/rvHP5/N0/xbnwX6IT3+Y93rP5GGqmvri3PlcmmlevI8/vl8/G+d1u1t/+3rn7X/fdL2P5z8MAu3WtqTuVptZSZiOPn+4eU3drdtxVvp0/pPfan9+d+p/eeaz8be34l1N/hq+A/NXbWtf2azU/17K63//ImOf5dAvbnNgVUv3i4OdMr/eMd/NgtNNZccp/87oqTv0ZoBAAAAAAAAAAAAAAAAAAAAAAAA4ORyEXE5klxhJ5zLFQqN//D+fIzlypVq7dqDyuryfGT/lT0RQ7nWT12O7/k91Jnm7+G34jcOxL8WEZ+LiF/lR7N4oVgpz5915QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg6dL+//9/ms4Khca6/+bPunQAQM+MnHUBAIC+c/0HgIvnZNf/0Z6VAwDonxN//q8nvSkIANA3x77+3+9tOQCA/nH/HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgB67e+dOOtU/3toopvH5x2uri5XH1+dL1cXC0mqxUKysPCosVCoL5VKhWFnquKPNxqxcqTyajeXVJ9O1UrU2XV1bv7dUWV2u3Xu4NLdQulca6lvNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOD4qmvri3PlcmlFoEtgtDR6HopxjgKDcS6KcSiw+e+hrF13TRwTH0zjH+6SJjnNvEYPLtnbS4yeSd8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8CH4NAAA//9RvRhH") r0 = gettid() r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@ipv4_newrule={0x2c, 0x20, 0x301, 0x0, 0x25dfdbfb, {0x2, 0x20}, [@FRA_DST={0x8, 0x1, @empty}, @FRA_FLOW={0x8}]}, 0x2c}}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) socket(0x1d, 0x2, 0x6) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000), 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) r4 = getpgid(r0) ptrace$ARCH_MAP_VDSO_32(0x1e, r4, 0x7, 0x2002) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[], 0x10448) 1.260511906s ago: executing program 2 (id=4626): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0xa}}, 0x20) pipe2$9p(0x0, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='qdisc_create\x00', 0xffffffffffffffff, 0x0, 0x5bf8f9c2}, 0x4f) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="38000000031401002abd7000fedbdf250900020073017a31000000000800410072786500140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0xfffffffffffff001}, 0x18) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') r6 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r6, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x26892}], 0x1}, 0xfc) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') acct(&(0x7f00000001c0)='./file0\x00') r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PIO_CMAP(r7, 0x4b71, &(0x7f0000000240)={0x1ff, 0x2, 0x1543, 0x7fffffffffffffff, 0x2, 0x2}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000cc0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x13f, 0x8}}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.169908015s ago: executing program 2 (id=4628): r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) pselect6(0x0, 0x0, &(0x7f0000000000)={0x1f, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) write$tun(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xa2) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4d, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.168965145s ago: executing program 5 (id=4629): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x17, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[], 0x48}}, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='fd', 0x0, 0xffffffffffffffff) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="a80000001200080029bd7000fbdbdf25010300084e234e22010000000a000000750000000700000006000000080200000004000168ebfffff58a9f75ad3ea5c419a2f650772c24c300", @ANYRES32, @ANYBLOB="09000000f9ffffff0c000000ba0c0000580001003160cf8228b3c21869bc1e293e2b782c69836972b1b37c99054afadcd76ced199a654b84fb3eb69e2df6abc426d824caadc7441aeb057c485f95ea61816acf247da86bd365ecfc49004e6db5040001000000000000000000"], 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r4 = fsmount(r1, 0x0, 0x2) openat(r4, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000001000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) rseq(&(0x7f0000000300), 0x20, 0x0, 0x0) sigaltstack(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0xff, 0x4a1, &(0x7f00000004c0)="$eJzs3MtvVFUYAPDvTh+8aUVEQdAqGomPlhZUFi7UaOJCExNd4LK2BZGBGloTIY0WY3BpSNwblyb+Be7cGHVhTNxq4tKQEG1MKK5q7gum02mZlpYpnd8vmc45c1/nu+eemXPv6b0BtK2+9E8SsT0ifo+Injw7f4a+/G12Zmrk+szUSBJzc2/9nWTzXZuZGilnLZfbVmQOVSIqnyXxYrJwuxPnL5werlbHzhX5gckzHwxMnL/wzKkzwyfHTo6dHTp27OiRweefG3p2VeJM47q27+Px/Xtfe+fyGyPHL7/707dpsfYcyKfXxnFL1xsE1EBfutf+mcvUT3t8GWW/G+yoSSedLSwIy9IREWl1dWXtvyc64mbl9cSrn7a0cMCaSn+bNi0+eXoO2MCSaHUJgNYof+jT89/ydYe6HuvC1Zciuov07MzUyOyN+DujUnzetYbb74uI49P/fZW+YrnXIQAAViDr2zzdqP9XiT3Zez7WsbMYQ+mNiHsiYldE3BsRuyPivohs3vujOx7IF57raXL7fXX5hf2fypWGZV4laf/vhZq+32xN/MVbb0eR25HF35WcOFUdO1zsk0PRtSnNDy6xje9f+e2LxabV9v/SV7r9si9YFOBKZ90FutHhyeHV2glXL0bs62wUf3JjJCA9AvZGxL7lrXpnmTj15Df7F5vp1vEvYRXGmea+jngir//pqIu/lCw9PjmwOapjhwfKo2Khn3+99GaR7K6fdlvxr4K0/rfOP/6LKReL955/k3y8tiuq1bFzE8vfxqU/Pl/0nGalx3938nY2Zv3Le/lnHw1PTp4bjOhOXs/y5Y7OPh+6uWyZL+dP4z90sHH731Usk8b/YESkB/GBiHgoIh4uyv5IRDwaEQeXiP/Hlx97f4n4k0iipfU/2vD7L4nYnCV6k9rx+hUkOk7/8N1iI+bN1f/RmM6+a3PZ998tNFvA29+DAAAAsP5VImJ7JJX+PN23PSqV/v78f/h3x9ZKdXxi8qkT4x+eHc3vEeiNrkp5paun5nroYDJdrDHPDxXXisvpR4rrxl92bMny/SPj1dEWxw7tbtv89h9l+0/91dHq0gFrzv1a0L7q23+lReUA7rxmfv+dC8DG1KD9b2lFOYA7z/k/tK9G7f+Turz+P2xMC9v/nw0eWQdsRPr/0L60f2hf2j+0pWbv4i+fp7DihwDMS5Q3C6x8PZubvsN//SX61mTNZQ2tZeG3xM1PorJqa55eB5WyzhNpi1nJ4rGz+WdhzE80eFgNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAXej/AAAA//+q8eIl") r6 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x8) pwritev2(r6, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) 1.074704215s ago: executing program 5 (id=4630): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000780)={0x0, {'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000000c0)=""/21, 0x15, 0x0, 0x0, 0x0, 0x800}}, 0x120) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) r2 = syz_io_uring_setup(0x497, &(0x7f0000000300)={0x0, 0x4661, 0x800, 0x5, 0x20e}, &(0x7f0000000240)=0x0, &(0x7f0000000680)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_LINKAT={0x27, 0xa, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x400, 0x1}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = syz_io_uring_setup(0x83f, &(0x7f00000000c0)={0x0, 0x11e, 0x400, 0x3, 0x319}, &(0x7f0000000140)=0x0, &(0x7f0000000400)=0x0) r8 = socket(0x1d, 0x2, 0x6) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000340)=@IORING_OP_ACCEPT={0xd, 0x40, 0x4, r8, 0x0, 0x0, 0x0, 0x80800}) io_uring_enter(r5, 0x3516, 0x0, 0x0, 0x0, 0xfffffdcf) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdea}, 0x94) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) io_uring_enter(r2, 0x40f9, 0x217, 0xa5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sys_enter\x00', r9, 0x0, 0x400000000000000}, 0x18) setregid(0xffffffffffffffff, 0x0) r10 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r10, 0x800448d3, &(0x7f0000000100)="250f404acb09c74bb9d53ab3a0c333515bc101990cdffd2107e7a6d4a7d09e5de616bcb5d8caa0b931a059b5bb6586a17efb0c670ac59250322b6aba3ad08fe3595af1602c7208f4d68aa5dc7dba7d4e800e566fbb9222e28d0f85f6b3c4e46e90277b87a5716eb74bfc691c8d3fb67ef8fe4f6a") 1.035353568s ago: executing program 3 (id=4631): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socket$pppl2tp(0x18, 0x1, 0x1) openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xe0c81) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) getpriority(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") r2 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffc) sendfile(r2, r2, 0x0, 0x800000009) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\a\x00\x00'], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) creat(&(0x7f0000000080)='./bus\x00', 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000300)='trans=rdma,') r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x16, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="180000000000003e0000000000000000181200002bb51071cda8404a3a2fb5d3ae1ff52c0d10323f4407b536f1bfc266c3563a656cf8dbada9e532c6f9117148d2c25c7c509a343de68e980cb4d765ec0a686c76b07dbc6bfaca394f38e3d3414330012fe31dbf603aab8b276b35278fa438568cff9b253da36eaffdc02733e6f2b80eeb21d2ba0bddcffde83c4cc4719ae1c81ac01ee78835e2159ec4599dbed4b96ed7184c7f40540b2542d7f3bfa829cb4235d548000a287687c110a9d789ba632977745ff0eb0cddef3633828f6e94fedd5509b6bc8fce52d7d4cb1df2944773088059bd79fee958345e4f1cc75febd27fa7bf06abdf38ae35d77c82a4d6413e683ed35a3514", @ANYRES32=r5], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3000010, &(0x7f0000000340)={[{@errors_remount}, {@nodioread_nolock}]}, 0x1, 0x512, &(0x7f0000000380)="$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") sendto$inet(r0, 0x0, 0x0, 0x20020084, &(0x7f00000018c0)={0x2, 0x4e20}, 0x10) 1.034752798s ago: executing program 5 (id=4632): prctl$PR_SET_NAME(0xf, &(0x7f00000002c0)='+}[@\x00G5\v\x89n\xb2\x0e\xb7\xb4\x9a\xb3\xb9\xe1\xff@`\x87\xefy\xb7\xe0\xe6c\x91\x81ND\t3\xc4\xca\xf0\xd0Zp\xadbdY\xdcz\xc6lo\xd0\xc7\'CT') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x5, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x14, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) munlockall() bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x2, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mremap(&(0x7f0000000000/0x9000)=nil, 0x600a00, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000002c0)=0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0x1f, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) ioprio_get$uid(0x3, 0xee01) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 703.953911ms ago: executing program 5 (id=4635): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x17, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[], 0x48}}, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='fd', 0x0, 0xffffffffffffffff) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="a80000001200080029bd7000fbdbdf25010300084e234e22010000000a000000750000000700000006000000080200000004000168ebfffff58a9f75ad3ea5c419a2f650772c24c300", @ANYRES32, @ANYBLOB="09000000f9ffffff0c000000ba0c0000580001003160cf8228b3c21869bc1e293e2b782c69836972b1b37c99054afadcd76ced199a654b84fb3eb69e2df6abc426d824caadc7441aeb057c485f95ea61816acf247da86bd365ecfc49004e6db5040001000000000000000000"], 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r4 = fsmount(r1, 0x0, 0x2) openat(r4, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000001000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) syslog(0x9, 0x0, 0x0) sigaltstack(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0xff, 0x4a1, &(0x7f00000004c0)="$eJzs3MtvVFUYAPDvTh+8aUVEQdAqGomPlhZUFi7UaOJCExNd4LK2BZGBGloTIY0WY3BpSNwblyb+Be7cGHVhTNxq4tKQEG1MKK5q7gum02mZlpYpnd8vmc45c1/nu+eemXPv6b0BtK2+9E8SsT0ifo+Injw7f4a+/G12Zmrk+szUSBJzc2/9nWTzXZuZGilnLZfbVmQOVSIqnyXxYrJwuxPnL5werlbHzhX5gckzHwxMnL/wzKkzwyfHTo6dHTp27OiRweefG3p2VeJM47q27+Px/Xtfe+fyGyPHL7/707dpsfYcyKfXxnFL1xsE1EBfutf+mcvUT3t8GWW/G+yoSSedLSwIy9IREWl1dWXtvyc64mbl9cSrn7a0cMCaSn+bNi0+eXoO2MCSaHUJgNYof+jT89/ydYe6HuvC1Zciuov07MzUyOyN+DujUnzetYbb74uI49P/fZW+YrnXIQAAViDr2zzdqP9XiT3Zez7WsbMYQ+mNiHsiYldE3BsRuyPivohs3vujOx7IF57raXL7fXX5hf2fypWGZV4laf/vhZq+32xN/MVbb0eR25HF35WcOFUdO1zsk0PRtSnNDy6xje9f+e2LxabV9v/SV7r9si9YFOBKZ90FutHhyeHV2glXL0bs62wUf3JjJCA9AvZGxL7lrXpnmTj15Df7F5vp1vEvYRXGmea+jngir//pqIu/lCw9PjmwOapjhwfKo2Khn3+99GaR7K6fdlvxr4K0/rfOP/6LKReL955/k3y8tiuq1bFzE8vfxqU/Pl/0nGalx3938nY2Zv3Le/lnHw1PTp4bjOhOXs/y5Y7OPh+6uWyZL+dP4z90sHH731Usk8b/YESkB/GBiHgoIh4uyv5IRDwaEQeXiP/Hlx97f4n4k0iipfU/2vD7L4nYnCV6k9rx+hUkOk7/8N1iI+bN1f/RmM6+a3PZ998tNFvA29+DAAAAsP5VImJ7JJX+PN23PSqV/v78f/h3x9ZKdXxi8qkT4x+eHc3vEeiNrkp5paun5nroYDJdrDHPDxXXisvpR4rrxl92bMny/SPj1dEWxw7tbtv89h9l+0/91dHq0gFrzv1a0L7q23+lReUA7rxmfv+dC8DG1KD9b2lFOYA7z/k/tK9G7f+Turz+P2xMC9v/nw0eWQdsRPr/0L60f2hf2j+0pWbv4i+fp7DihwDMS5Q3C6x8PZubvsN//SX61mTNZQ2tZeG3xM1PorJqa55eB5WyzhNpi1nJ4rGz+WdhzE80eFgNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAXej/AAAA//+q8eIl") r6 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x8) pwritev2(r6, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) open(&(0x7f0000000100)='.\x00', 0x591002, 0x50f) 648.738997ms ago: executing program 4 (id=4636): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x17, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[], 0x48}}, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='fd', 0x0, 0xffffffffffffffff) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r1, 0x0, 0x2) openat(r4, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000001000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) syslog(0x9, 0x0, 0x0) rseq(&(0x7f0000000300), 0x20, 0x0, 0x0) sigaltstack(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0xff, 0x4a1, &(0x7f00000004c0)="$eJzs3MtvVFUYAPDvTh+8aUVEQdAqGomPlhZUFi7UaOJCExNd4LK2BZGBGloTIY0WY3BpSNwblyb+Be7cGHVhTNxq4tKQEG1MKK5q7gum02mZlpYpnd8vmc45c1/nu+eemXPv6b0BtK2+9E8SsT0ifo+Injw7f4a+/G12Zmrk+szUSBJzc2/9nWTzXZuZGilnLZfbVmQOVSIqnyXxYrJwuxPnL5werlbHzhX5gckzHwxMnL/wzKkzwyfHTo6dHTp27OiRweefG3p2VeJM47q27+Px/Xtfe+fyGyPHL7/707dpsfYcyKfXxnFL1xsE1EBfutf+mcvUT3t8GWW/G+yoSSedLSwIy9IREWl1dWXtvyc64mbl9cSrn7a0cMCaSn+bNi0+eXoO2MCSaHUJgNYof+jT89/ydYe6HuvC1Zciuov07MzUyOyN+DujUnzetYbb74uI49P/fZW+YrnXIQAAViDr2zzdqP9XiT3Zez7WsbMYQ+mNiHsiYldE3BsRuyPivohs3vujOx7IF57raXL7fXX5hf2fypWGZV4laf/vhZq+32xN/MVbb0eR25HF35WcOFUdO1zsk0PRtSnNDy6xje9f+e2LxabV9v/SV7r9si9YFOBKZ90FutHhyeHV2glXL0bs62wUf3JjJCA9AvZGxL7lrXpnmTj15Df7F5vp1vEvYRXGmea+jngir//pqIu/lCw9PjmwOapjhwfKo2Khn3+99GaR7K6fdlvxr4K0/rfOP/6LKReL955/k3y8tiuq1bFzE8vfxqU/Pl/0nGalx3938nY2Zv3Le/lnHw1PTp4bjOhOXs/y5Y7OPh+6uWyZL+dP4z90sHH731Usk8b/YESkB/GBiHgoIh4uyv5IRDwaEQeXiP/Hlx97f4n4k0iipfU/2vD7L4nYnCV6k9rx+hUkOk7/8N1iI+bN1f/RmM6+a3PZ998tNFvA29+DAAAAsP5VImJ7JJX+PN23PSqV/v78f/h3x9ZKdXxi8qkT4x+eHc3vEeiNrkp5paun5nroYDJdrDHPDxXXisvpR4rrxl92bMny/SPj1dEWxw7tbtv89h9l+0/91dHq0gFrzv1a0L7q23+lReUA7rxmfv+dC8DG1KD9b2lFOYA7z/k/tK9G7f+Turz+P2xMC9v/nw0eWQdsRPr/0L60f2hf2j+0pWbv4i+fp7DihwDMS5Q3C6x8PZubvsN//SX61mTNZQ2tZeG3xM1PorJqa55eB5WyzhNpi1nJ4rGz+WdhzE80eFgNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAXej/AAAA//+q8eIl") r6 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x8) pwritev2(r6, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) 648.200727ms ago: executing program 0 (id=4637): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syzkaller0\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffff05850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000d00)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7030000003e7400850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000180)={0x3, 0x40, 0xfa02, {{0x6000000, 0x0, 0x6, @mcast2}, {0xa, 0xce20, 0x7, @private0}, r7}}, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x19, 0x3, 0x7ffc0001}]}) mlockall(0x3) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x2, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @multicast}, 0x10) r8 = socket$packet(0x11, 0x3, 0x300) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r10 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e24, @empty}], 0x10) sendmsg$inet_sctp(r10, &(0x7f0000001640)={&(0x7f0000000080)=@in={0x2, 0x4e24, @local}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)=')', 0x1}], 0x1, &(0x7f00000007c0)=[@init={0x18, 0x84, 0x0, {0x8000, 0xf, 0x5}}, @sndinfo={0x20, 0x84, 0x2, {0x89, 0x9, 0x2, 0xd}}], 0x38, 0x4008000}, 0x28008841) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r11}, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) 600.430222ms ago: executing program 5 (id=4638): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000000}, 0x94) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x23}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424d", "bcfd56f1375461caaa2f19935e6996c7096ffeeb0300000000000064", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r1, &(0x7f0000000600)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94}, 0x40}], 0x1, 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) fcntl$lock(r4, 0x5, &(0x7f0000000300)={0x0, 0x4, 0xfff, 0xfffffffffffffff9}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) getsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x130, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x288, 0xffffffff, 0xffffffff, 0x288, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [0xffff00, 0xff000000], [], 'veth0_macvtap\x00', 'dvmrp1\x00', {}, {}, 0x88}, 0x0, 0x108, 0x130, 0x0, {}, [@common=@unspec=@statistic={{0x38}, {0x0, 0x0, 0x3096, 0x8000, 0x56e5, {0xd}}}, @common=@ipv6header={{0x28}, {0x0, 0x80}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [0x0, 0x0, 0x0, 0xff000000], 'erspan0\x00', 'gre0\x00', {}, {}, 0x0, 0x4}, 0x0, 0x128, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x18, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff, 0x40}}}, @inet=@rpfilter={{0x28}, {0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0xfffffffe, 0x1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x3b8) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="c96480e0852882bd692dcde69fbac6b1feed830ce2ac213fd0f9bd7d8a0962edc4c87873600efc03c0328a26fee11e81ce6fee935e9703", 0x37}, {&(0x7f0000000080)="0101f80e9225a57f32659a89315a9bdeb43c7e0e316bae8a576995ffedfa1eba522e10a2a7f19d4b5a8dc40bf81c8a88baa1", 0x32}, {&(0x7f00000000c0)="0bb9fc194716570d596d4ac6a2c2e0ecc60b16c615886b1f2d7d770615538f00eec67e9aa66b98ac7dcd13db0cc14bc21afcb54cd51b6febb1267033f8eff51b00e4ee219f2b85a2f0d3b694d5aefe367fd954a06ed0d133dba63fd4e54b9d14bbe375d5d348a4afe26d6a04c031ed9ae286979d0654a4e3cfc83badccc54c77421318374a25e6838fd6055a1eb0d46674d683dd6922a8a3444cc81c", 0x9c}, {&(0x7f0000000180)="7753a04756dd6eaae0184763c9eb31aa05f911e79c8a45f4e046c081ce62b77ee693d3bbd5a40a7b6b2fbe3e99051f9f5e269d9f8182918b63ba9bf79634293554679943e823a5873f4e9f24c1da397eedec156c7918d4890fcfb60956967514d435e7", 0x63}], 0x4}, 0x44) 497.982982ms ago: executing program 4 (id=4639): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000000)={[{@bsdgroups}, {@jqfmt_vfsv1}]}, 0xc1, 0x7da, &(0x7f0000000fc0)="$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") r0 = gettid() r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@ipv4_newrule={0x2c, 0x20, 0x301, 0x0, 0x25dfdbfb, {0x2, 0x20}, [@FRA_DST={0x8, 0x1, @empty}, @FRA_FLOW={0x8}]}, 0x2c}}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) socket(0x1d, 0x2, 0x6) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000), 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) r4 = getpgid(r0) ptrace$ARCH_MAP_VDSO_32(0x1e, r4, 0x7, 0x2002) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[], 0x10448) 384.625722ms ago: executing program 3 (id=4640): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x88000, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./bus\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="1900000004"], 0x48) r2 = syz_open_dev$vcsa(&(0x7f0000000000), 0xf69, 0x4040) ioctl$TUNSETOFFLOAD(r2, 0x541b, 0xf0ff1f00000002) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) mincore(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="050100"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000fcffffff00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000000010003"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00'}, 0x18) bind$vsock_stream(r3, &(0x7f0000000440), 0x10) listen(r3, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) writev(r5, &(0x7f0000000080)=[{&(0x7f00000001c0)='?', 0x1}], 0x1) r6 = accept4$unix(r3, 0x0, 0x0, 0x0) recvmsg(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)=""/68, 0x44}], 0x1}, 0x4c2103a0) r7 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x32) write(r7, &(0x7f00000001c0)="49bda8f11851b8436bebb25ac5f8202ffbcc3d0b6c01", 0x16) sendfile(r7, r0, 0x0, 0x3ffff) sendfile(r7, r0, 0x0, 0x7ffffffffffffffd) 351.289276ms ago: executing program 2 (id=4641): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x20000000, 0x8000}, 0x11112, 0x0, 0x0, 0x0, 0x10000000000000, 0xcb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='cpu==0||!') syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) io_setup(0x6, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r0, 0x0, 0x6e}, 0xd0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x400, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) pwrite64(r3, &(0x7f0000000140)='2', 0xfdef, 0xfecc) fallocate(r2, 0x0, 0xbf5, 0x2000402) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r2, 0x0, 0x0, 0x0, 0xfffffffffdffffff}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) close(0x3) setsockopt(r5, 0x84, 0x7f, &(0x7f0000000140)="0200000009800089", 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) 200.753641ms ago: executing program 4 (id=4642): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x17, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[], 0x48}}, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='fd', 0x0, 0xffffffffffffffff) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="a80000001200080029bd7000fbdbdf25010300084e234e22010000000a000000750000000700000006000000080200000004000168ebfffff58a9f75ad3ea5c419a2f650772c24c300", @ANYRES32, @ANYBLOB="09000000f9ffffff0c000000ba0c0000580001003160cf8228b3c21869bc1e293e2b782c69836972b1b37c99054afadcd76ced199a654b84fb3eb69e2df6abc426d824caadc7441aeb057c485f95ea61816acf247da86bd365ecfc49004e6db5040001000000000000000000"], 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r4 = fsmount(r1, 0x0, 0x2) openat(r4, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000001000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) rseq(&(0x7f0000000300), 0x20, 0x0, 0x0) sigaltstack(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0xff, 0x4a1, &(0x7f00000004c0)="$eJzs3MtvVFUYAPDvTh+8aUVEQdAqGomPlhZUFi7UaOJCExNd4LK2BZGBGloTIY0WY3BpSNwblyb+Be7cGHVhTNxq4tKQEG1MKK5q7gum02mZlpYpnd8vmc45c1/nu+eemXPv6b0BtK2+9E8SsT0ifo+Injw7f4a+/G12Zmrk+szUSBJzc2/9nWTzXZuZGilnLZfbVmQOVSIqnyXxYrJwuxPnL5werlbHzhX5gckzHwxMnL/wzKkzwyfHTo6dHTp27OiRweefG3p2VeJM47q27+Px/Xtfe+fyGyPHL7/707dpsfYcyKfXxnFL1xsE1EBfutf+mcvUT3t8GWW/G+yoSSedLSwIy9IREWl1dWXtvyc64mbl9cSrn7a0cMCaSn+bNi0+eXoO2MCSaHUJgNYof+jT89/ydYe6HuvC1Zciuov07MzUyOyN+DujUnzetYbb74uI49P/fZW+YrnXIQAAViDr2zzdqP9XiT3Zez7WsbMYQ+mNiHsiYldE3BsRuyPivohs3vujOx7IF57raXL7fXX5hf2fypWGZV4laf/vhZq+32xN/MVbb0eR25HF35WcOFUdO1zsk0PRtSnNDy6xje9f+e2LxabV9v/SV7r9si9YFOBKZ90FutHhyeHV2glXL0bs62wUf3JjJCA9AvZGxL7lrXpnmTj15Df7F5vp1vEvYRXGmea+jngir//pqIu/lCw9PjmwOapjhwfKo2Khn3+99GaR7K6fdlvxr4K0/rfOP/6LKReL955/k3y8tiuq1bFzE8vfxqU/Pl/0nGalx3938nY2Zv3Le/lnHw1PTp4bjOhOXs/y5Y7OPh+6uWyZL+dP4z90sHH731Usk8b/YESkB/GBiHgoIh4uyv5IRDwaEQeXiP/Hlx97f4n4k0iipfU/2vD7L4nYnCV6k9rx+hUkOk7/8N1iI+bN1f/RmM6+a3PZ998tNFvA29+DAAAAsP5VImJ7JJX+PN23PSqV/v78f/h3x9ZKdXxi8qkT4x+eHc3vEeiNrkp5paun5nroYDJdrDHPDxXXisvpR4rrxl92bMny/SPj1dEWxw7tbtv89h9l+0/91dHq0gFrzv1a0L7q23+lReUA7rxmfv+dC8DG1KD9b2lFOYA7z/k/tK9G7f+Turz+P2xMC9v/nw0eWQdsRPr/0L60f2hf2j+0pWbv4i+fp7DihwDMS5Q3C6x8PZubvsN//SX61mTNZQ2tZeG3xM1PorJqa55eB5WyzhNpi1nJ4rGz+WdhzE80eFgNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAXej/AAAA//+q8eIl") r6 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x8) pwritev2(r6, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) 129.390178ms ago: executing program 2 (id=4643): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xc) r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000140)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000200), 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="940000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000cc14000400fe8000000000000000000000000000aa0c00028005000100000000"], 0x94}}, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000000201fd"], 0x14}, 0x1, 0x0, 0x0, 0x20004884}, 0x20000080) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x7fff}, 0x18) syz_usbip_server_init(0x1) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r2) 128.782088ms ago: executing program 4 (id=4644): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) r4 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r4, 0x6, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/bus/input/handlers\x00', 0x0, 0x0) preadv2(r6, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x867, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000140000e5b7030000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) r8 = fsmount(r4, 0x0, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r8, 0x80045519, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000000100), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB='-cpu'], 0x5) connect$unix(r8, 0x0, 0x0) 48.611665ms ago: executing program 0 (id=4645): r0 = socket$inet6(0xa, 0x2, 0x3a) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x2000000000000242, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r2 = syz_io_uring_setup(0x5c6, &(0x7f0000000140)={0x0, 0x1001, 0x0, 0x4}, &(0x7f00000001c0)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r2, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) pause() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x5}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) r6 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$binfmt_register(r6, &(0x7f0000000440)={0x3a, 'syz1', 0x3a, 'M', 0x3a, 0x0, 0x3a, 'usrjquota=', 0x3a, '', 0x3a, './file2', 0x3a, [0x46]}, 0x32) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x80041) shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, 0x0, 0x20000890) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) chmod(0x0, 0x60) sendmmsg$inet6(r0, &(0x7f0000000e40)=[{{&(0x7f00000000c0)={0xa, 0xfffe, 0x6, @loopback={0xff00000000000000}, 0x101}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000000)="8000102e7577d401", 0x8}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10000000000000002900000008"], 0x18}}], 0x1, 0x4000880) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)=0x0) quotactl_fd$Q_QUOTAOFF(r0, 0xffffffff80000301, r7, 0x0) 48.028485ms ago: executing program 4 (id=4646): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x40, 0x0, 0x0, 0x41000, 0x62}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x19, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x183, 0x6}, 0x6025, 0x4005, 0xb, 0x0, 0x1, 0x1, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r7}, 0x10) close(r4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r8, 0x0, 0xd192}, 0x18) lsetxattr$security_selinux(&(0x7f0000000c00)='./cgroup.net/devices.allow\x00', &(0x7f0000000c40), &(0x7f0000000c80)='system_u:object_r:pam_console_exec_t:s0\x00', 0x28, 0x2) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r10, @ANYBLOB="0107000000000000000020"], 0x1c}, 0x1, 0x0, 0x0, 0x8041}, 0x0) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="00f728bd7000fcdbdf253d6592bc88b72920e2dc35670000000c0099000900000069"], 0x28}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000080) setsockopt(r3, 0xff, 0xfffffffd, 0x0, 0x0) write$selinux_load(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757819"], 0x65) 0s ago: executing program 4 (id=4647): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000000)={[{@bsdgroups}, {@jqfmt_vfsv1}]}, 0xc1, 0x7da, &(0x7f0000000fc0)="$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") r0 = gettid() r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@ipv4_newrule={0x2c, 0x20, 0x301, 0x0, 0x25dfdbfb, {0x2, 0x20}, [@FRA_DST={0x8, 0x1, @empty}, @FRA_FLOW={0x8}]}, 0x2c}}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) socket(0x1d, 0x2, 0x6) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000), 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) r4 = getpgid(r0) ptrace$ARCH_MAP_VDSO_32(0x1e, r4, 0x7, 0x2002) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x4c02}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[], 0x10448) kernel console output (not intermixed with test programs): 6526): avc: denied { execmem } for pid=11569 comm="syz.4.2501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 252.439392][T11568] macsec0: left allmulticast mode [ 252.444465][T11568] bridge0: left allmulticast mode [ 252.900947][T11585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32784 sclass=netlink_route_socket pid=11585 comm=syz.4.2507 [ 253.010111][T11591] __nla_validate_parse: 7 callbacks suppressed [ 253.010131][T11591] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2509'. [ 253.080039][T11602] xt_nat: multiple ranges no longer supported [ 254.049918][T11630] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2525'. [ 254.452366][T11647] netlink: 'syz.3.2533': attribute type 1 has an invalid length. [ 254.471925][T11649] xt_hashlimit: max too large, truncated to 1048576 [ 254.494833][T11647] bond4: (slave vxcan3): The slave device specified does not support setting the MAC address [ 254.526604][T11647] bond4: (slave vxcan3): Error -95 calling set_mac_address [ 254.619105][T11652] bond4: (slave bridge3): Enslaving as an active interface with a down link [ 254.632760][T11655] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2536'. [ 254.764510][T11664] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2542'. [ 254.780576][T11668] netlink: 'syz.4.2540': attribute type 39 has an invalid length. [ 254.806222][T11670] netlink: 24 bytes leftover after parsing attributes in process `syz.5.2543'. [ 254.827888][T11670] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2543'. [ 255.071864][T11689] netlink: 72 bytes leftover after parsing attributes in process `syz.4.2550'. [ 255.083235][T11689] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 255.751725][T11726] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2565'. [ 255.912931][T11743] netlink: 'syz.3.2575': attribute type 13 has an invalid length. [ 255.922206][T11743] netlink: 'syz.3.2575': attribute type 27 has an invalid length. [ 255.956563][ T4992] netdevsim netdevsim3 eth0: unset [1, 0] type 2 family 0 port 20000 - 0 [ 255.981108][ T4992] netdevsim netdevsim3 eth1: unset [1, 0] type 2 family 0 port 20000 - 0 [ 255.991682][ T4992] netdevsim netdevsim3 eth2: unset [1, 0] type 2 family 0 port 20000 - 0 [ 256.024188][ T4992] netdevsim netdevsim3 eth3: unset [1, 0] type 2 family 0 port 20000 - 0 [ 256.129702][T11752] ALSA: seq fatal error: cannot create timer (-22) [ 257.139081][ T29] kauditd_printk_skb: 1191 callbacks suppressed [ 257.139174][ T29] audit: type=1326 audit(3908588950.423:17718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11781 comm="syz.4.2589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e14eeefc9 code=0x7ffc0000 [ 257.169526][ T29] audit: type=1326 audit(3908588950.423:17719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11781 comm="syz.4.2589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e14eeefc9 code=0x7ffc0000 [ 257.193263][ T29] audit: type=1326 audit(3908588950.423:17720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11781 comm="syz.4.2589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9e14eeefc9 code=0x7ffc0000 [ 257.217255][ T29] audit: type=1400 audit(3908588950.423:17721): avc: denied { map_create } for pid=11781 comm="syz.4.2589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.236778][ T29] audit: type=1326 audit(3908588950.423:17722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11781 comm="syz.4.2589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e14eeefc9 code=0x7ffc0000 [ 257.260746][ T29] audit: type=1326 audit(3908588950.423:17723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11781 comm="syz.4.2589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9e14eeefc9 code=0x7ffc0000 [ 257.284767][ T29] audit: type=1400 audit(3908588950.423:17724): avc: denied { prog_load } for pid=11781 comm="syz.4.2589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.305237][ T29] audit: type=1326 audit(3908588950.423:17725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11781 comm="syz.4.2589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e14eeefc9 code=0x7ffc0000 [ 257.328925][ T29] audit: type=1326 audit(3908588950.423:17726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11781 comm="syz.4.2589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9e14eeefc9 code=0x7ffc0000 [ 257.353162][ T29] audit: type=1400 audit(3908588950.423:17727): avc: denied { prog_load } for pid=11781 comm="syz.4.2589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.422709][T11798] xt_TPROXY: Can be used only with -p tcp or -p udp [ 257.449373][T11802] IPv6: NLM_F_CREATE should be specified when creating new route [ 257.469424][T11796] netlink: 168 bytes leftover after parsing attributes in process `syz.3.2595'. [ 257.629974][T11811] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 257.636586][T11811] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 257.644261][T11811] vhci_hcd vhci_hcd.0: Device attached [ 257.670063][T11812] vhci_hcd: connection closed [ 257.670390][ T4989] vhci_hcd: stop threads [ 257.680511][ T4989] vhci_hcd: release socket [ 257.684956][ T4989] vhci_hcd: disconnect device [ 257.860573][T11825] x_tables: unsorted underflow at hook 2 [ 258.031484][T11836] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2611'. [ 258.041693][T11836] netlink: 'syz.2.2611': attribute type 15 has an invalid length. [ 258.096101][T11842] netlink: 'syz.3.2614': attribute type 21 has an invalid length. [ 258.104395][T11842] netlink: 100 bytes leftover after parsing attributes in process `syz.3.2614'. [ 258.232525][T11854] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 258.239100][T11854] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 258.246741][T11854] vhci_hcd vhci_hcd.0: Device attached [ 258.252920][T11855] vhci_hcd: connection closed [ 258.253051][ T4992] vhci_hcd: stop threads [ 258.263224][ T4992] vhci_hcd: release socket [ 258.267665][ T4992] vhci_hcd: disconnect device [ 258.607126][T11863] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2622'. [ 258.680528][T11866] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2624'. [ 258.753268][T11873] netlink: 'syz.4.2626': attribute type 39 has an invalid length. [ 258.840884][T11877] veth0_to_team: left promiscuous mode [ 258.861042][T11882] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2630'. [ 258.869631][T11877] bridge0: left promiscuous mode [ 258.880359][T11882] bond3: (slave ip6gretap0): Releasing backup interface [ 258.902116][T11886] $Hÿ: renamed from .` [ 258.911280][T11886] $Hÿ: entered promiscuous mode [ 258.940310][T11891] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2634'. [ 258.949861][T11891] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2634'. [ 258.984856][T11895] $Hÿ: renamed from .` (while UP) [ 258.991184][T11895] $Hÿ: entered promiscuous mode [ 259.141996][T11907] netlink: 16402 bytes leftover after parsing attributes in process `syz.5.2640'. [ 259.153024][T11904] netlink: 16402 bytes leftover after parsing attributes in process `syz.5.2640'. [ 259.686921][T11932] netlink: 'syz.4.2649': attribute type 28 has an invalid length. [ 259.695362][T11932] netlink: 'syz.4.2649': attribute type 3 has an invalid length. [ 259.703346][T11932] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2649'. [ 259.849565][T11946] veth5: left allmulticast mode [ 259.854485][T11946] veth5: left promiscuous mode [ 259.859532][T11946] bridge0: port 1(veth5) entered disabled state [ 259.866612][T11946] veth7: left allmulticast mode [ 259.872453][T11946] veth7: left promiscuous mode [ 259.877370][T11946] bridge0: port 2(veth7) entered disabled state [ 259.886268][T11946] bond0: (slave bond1): Releasing active interface [ 259.894771][T11946] bond2: (slave gretap1): Releasing active interface [ 259.904112][T11946] bond4: (slave bridge3): Releasing active interface [ 259.971597][T11953] wireguard0: entered promiscuous mode [ 259.977193][T11953] wireguard0: entered allmulticast mode [ 260.442402][T11971] netlink: 'syz.5.2664': attribute type 1 has an invalid length. [ 260.462549][T11971] 8021q: adding VLAN 0 to HW filter on device bond4 [ 260.491076][T11971] bond4 (unregistering): Released all slaves [ 261.901289][T12042] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 261.907907][T12042] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 261.915598][T12042] vhci_hcd vhci_hcd.0: Device attached [ 261.923374][T12043] vhci_hcd: connection closed [ 261.923547][ T4989] vhci_hcd: stop threads [ 261.932533][ T4989] vhci_hcd: release socket [ 261.937049][ T4989] vhci_hcd: disconnect device [ 262.000810][T12050] ipvlan0: entered promiscuous mode [ 262.160324][ T29] kauditd_printk_skb: 1718 callbacks suppressed [ 262.160343][ T29] audit: type=1400 audit(3908588955.443:19446): avc: denied { create } for pid=12056 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 262.186949][ T29] audit: type=1400 audit(3908588955.463:19447): avc: denied { create } for pid=12056 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 262.208186][ T29] audit: type=1400 audit(3908588955.463:19448): avc: denied { open } for pid=12056 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 262.227671][ T29] audit: type=1400 audit(3908588955.463:19449): avc: denied { map_create } for pid=12056 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.247162][ T29] audit: type=1400 audit(3908588955.463:19450): avc: denied { prog_load } for pid=12056 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.266519][ T29] audit: type=1400 audit(3908588955.463:19451): avc: denied { prog_load } for pid=12056 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.285789][ T29] audit: type=1400 audit(3908588955.463:19452): avc: denied { prog_load } for pid=12056 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.305075][ T29] audit: type=1400 audit(3908588955.463:19453): avc: denied { prog_load } for pid=12056 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.324525][ T29] audit: type=1400 audit(3908588955.493:19454): avc: denied { prog_load } for pid=12058 comm="syz.2.2697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.343859][ T29] audit: type=1400 audit(3908588955.563:19455): avc: denied { create } for pid=12058 comm="syz.2.2697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 263.008976][T12102] netlink: 'syz.0.2713': attribute type 4 has an invalid length. [ 263.025889][T12100] wireguard1: entered promiscuous mode [ 263.031532][T12100] wireguard1: entered allmulticast mode [ 263.650499][T12117] wireguard0: entered promiscuous mode [ 263.656026][T12117] wireguard0: entered allmulticast mode [ 264.503033][T12136] bond4: option ad_user_port_key: invalid value (1136) [ 264.510042][T12136] bond4: option ad_user_port_key: allowed values 0 - 1023 [ 264.521712][T12139] __nla_validate_parse: 12 callbacks suppressed [ 264.521747][T12139] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2722'. [ 264.550314][T12136] bond4 (unregistering): Released all slaves [ 264.578320][T12139] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2722'. [ 264.688333][T12150] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2728'. [ 264.739377][T12150] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2728'. [ 264.885606][T12165] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2737'. [ 265.089929][T12190] bridge0: port 1($Hÿ) entered blocking state [ 265.096476][T12190] bridge0: port 1($Hÿ) entered disabled state [ 265.103109][T12190] $Hÿ: entered allmulticast mode [ 265.104444][T12193] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2750'. [ 265.122916][T12191] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 265.158564][T12193] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2750'. [ 265.263050][T12205] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 265.269627][T12205] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 265.278538][T12205] vhci_hcd vhci_hcd.0: Device attached [ 265.316733][T12207] vhci_hcd: connection closed [ 265.316897][ T4983] vhci_hcd: stop threads [ 265.326010][ T4983] vhci_hcd: release socket [ 265.330529][ T4983] vhci_hcd: disconnect device [ 265.351271][T12216] bridge5: entered promiscuous mode [ 265.361975][T12218] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12218 comm=syz.0.2760 [ 265.416468][T12221] Process accounting resumed [ 265.490770][T12227] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2764'. [ 266.270952][T12273] netlink: 'syz.5.2782': attribute type 10 has an invalid length. [ 266.630647][T12278] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2783'. [ 266.902894][T12288] netlink: 'syz.5.2787': attribute type 1 has an invalid length. [ 266.920216][T12288] 8021q: adding VLAN 0 to HW filter on device bond4 [ 266.939100][T12288] bond5: option primary: mode dependency failed, not supported in mode balance-rr(0) [ 266.951421][T12288] bond5 (unregistering): Released all slaves [ 267.349708][ T29] kauditd_printk_skb: 919 callbacks suppressed [ 267.349726][ T29] audit: type=1400 audit(3908588960.633:20375): avc: denied { create } for pid=12300 comm="syz.3.2792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.389879][T12301] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2792'. [ 267.414896][ T29] audit: type=1400 audit(3908588960.663:20376): avc: denied { create } for pid=12300 comm="syz.3.2792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 267.434986][ T29] audit: type=1400 audit(3908588960.663:20377): avc: denied { module_request } for pid=12300 comm="syz.3.2792" kmod="netdev-syz_tun" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 267.457362][ T29] audit: type=1400 audit(3908588960.663:20378): avc: denied { sys_module } for pid=12300 comm="syz.3.2792" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 267.479748][ T29] audit: type=1400 audit(3908588960.663:20379): avc: denied { mounton } for pid=12300 comm="syz.3.2792" path="/544/file0" dev="tmpfs" ino=2880 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 267.504012][ T29] audit: type=1400 audit(3908588960.663:20380): avc: denied { create } for pid=12300 comm="syz.3.2792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 267.555423][ T29] audit: type=1400 audit(3908588960.813:20381): avc: denied { read write } for pid=3970 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 267.581021][ T29] audit: type=1400 audit(3908588960.823:20382): avc: denied { create } for pid=12303 comm="syz.5.2793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 267.602911][ T29] audit: type=1400 audit(3908588960.833:20383): avc: denied { open } for pid=12302 comm="syz.3.2794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 267.623555][ T29] audit: type=1400 audit(3908588960.833:20384): avc: denied { prog_load } for pid=12302 comm="syz.3.2794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.644627][T12307] netlink: 'syz.5.2793': attribute type 15 has an invalid length. [ 267.665622][T12307] vxlan0: entered promiscuous mode [ 267.672780][ T4983] netdevsim netdevsim5 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 267.682181][ T4983] netdevsim netdevsim5 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 267.706230][ T4983] netdevsim netdevsim5 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 267.719876][ T4983] netdevsim netdevsim5 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 268.419390][T12328] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 268.426056][T12328] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 268.434927][T12328] vhci_hcd vhci_hcd.0: Device attached [ 268.443745][T12329] vhci_hcd: connection closed [ 268.443894][ T4992] vhci_hcd: stop threads [ 268.454193][ T4992] vhci_hcd: release socket [ 268.459773][ T4992] vhci_hcd: disconnect device [ 269.008189][T12340] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12340 comm=syz.0.2807 [ 269.060010][T12344] sch_tbf: burst 127 is lower than device syzkaller0 mtu (1514) ! [ 269.221068][T12354] xt_hashlimit: max too large, truncated to 1048576 [ 269.633728][T12373] __nla_validate_parse: 4 callbacks suppressed [ 269.633746][T12373] netlink: 14 bytes leftover after parsing attributes in process `syz.3.2821'. [ 269.665911][ T36] Process accounting resumed [ 269.966841][T12384] netlink: 'syz.4.2824': attribute type 12 has an invalid length. [ 270.021079][T12389] netlink: 'syz.5.2826': attribute type 10 has an invalid length. [ 270.032197][T12389] netlink: 'syz.5.2826': attribute type 10 has an invalid length. [ 270.041247][T12389] bond0: option arp_interval: mode dependency failed, not supported in mode balance-alb(6) [ 270.052154][T12389] bond0: option arp_interval: mode dependency failed, not supported in mode balance-alb(6) [ 270.570232][T12377] Process accounting resumed [ 270.659832][T12424] netlink: 2 bytes leftover after parsing attributes in process `syz.5.2841'. [ 270.702995][T12424] wireguard0: left promiscuous mode [ 270.708497][T12424] wireguard0: left allmulticast mode [ 270.741670][T12424] vxlan0: left promiscuous mode [ 270.757352][ T4989] netdevsim netdevsim5 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 270.769109][ T4989] netdevsim netdevsim5 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 270.777639][ T4989] netdevsim netdevsim5 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 270.836621][ T4989] netdevsim netdevsim5 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 271.001065][T12437] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=12437 comm=syz.3.2846 [ 271.035286][T12441] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 271.041876][T12441] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 271.049706][T12441] vhci_hcd vhci_hcd.0: Device attached [ 271.056002][T12442] vhci_hcd: connection closed [ 271.056181][ T4989] vhci_hcd: stop threads [ 271.066692][ T4989] vhci_hcd: release socket [ 271.072550][ T4989] vhci_hcd: disconnect device [ 271.132106][T12451] netlink: 'syz.5.2851': attribute type 10 has an invalid length. [ 271.146946][T12451] netlink: 'syz.5.2851': attribute type 10 has an invalid length. [ 271.417763][T12467] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 271.475267][T12473] xt_hashlimit: max too large, truncated to 1048576 [ 271.554328][T12484] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12484 comm=syz.4.2866 [ 271.599844][T12490] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2869'. [ 271.650122][T12496] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1536) ! [ 271.784907][T12510] IPVS: length: 111 != 24 [ 271.849104][T12513] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 271.855801][T12513] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 271.864608][T12513] vhci_hcd vhci_hcd.0: Device attached [ 271.872864][T12514] vhci_hcd: connection closed [ 271.872939][ T4992] vhci_hcd: stop threads [ 271.883183][ T4992] vhci_hcd: release socket [ 271.887760][ T4992] vhci_hcd: disconnect device [ 272.385222][ T29] kauditd_printk_skb: 850 callbacks suppressed [ 272.385242][ T29] audit: type=1400 audit(3908588965.663:21235): avc: denied { read write } for pid=3970 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.439077][ T29] audit: type=1400 audit(3908588965.673:21236): avc: denied { execmem } for pid=12534 comm="syz.5.2886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 272.459984][ T29] audit: type=1400 audit(3908588965.673:21237): avc: denied { prog_load } for pid=12534 comm="syz.5.2886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.480641][ T29] audit: type=1400 audit(3908588965.673:21238): avc: denied { read } for pid=12534 comm="syz.5.2886" dev="nsfs" ino=4026532762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 272.503437][ T29] audit: type=1400 audit(3908588965.673:21239): avc: denied { create } for pid=12534 comm="syz.5.2886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 272.524449][ T29] audit: type=1400 audit(3908588965.673:21240): avc: denied { read write } for pid=12534 comm="syz.5.2886" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.621234][ T29] audit: type=1400 audit(3908588965.903:21241): avc: denied { read write } for pid=3970 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.679095][ T29] audit: type=1400 audit(3908588965.953:21242): avc: denied { open } for pid=12540 comm="syz.4.2888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 272.700086][ T29] audit: type=1400 audit(3908588965.983:21243): avc: denied { block_suspend } for pid=12538 comm="syz.5.2887" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 272.724229][ T29] audit: type=1400 audit(3908588965.983:21244): avc: denied { block_suspend } for pid=12538 comm="syz.5.2887" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 273.147506][T12560] netem: incorrect ge model size [ 273.256498][T12566] netlink: 'syz.4.2897': attribute type 32 has an invalid length. [ 273.326883][T12568] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2898'. [ 273.347759][T12568] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2898'. [ 273.462865][T12573] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2899'. [ 273.976605][T12591] bond4 (unregistering): Released all slaves [ 274.585874][T12603] netlink: 'syz.5.2912': attribute type 4 has an invalid length. [ 274.608528][T12603] netlink: 'syz.5.2912': attribute type 4 has an invalid length. [ 274.810981][T12614] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 274.817593][T12614] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 274.826470][T12614] vhci_hcd vhci_hcd.0: Device attached [ 274.878297][T12615] vhci_hcd: connection closed [ 274.878446][ T4983] vhci_hcd: stop threads [ 274.887442][ T4983] vhci_hcd: release socket [ 274.891928][ T4983] vhci_hcd: disconnect device [ 274.995979][T12626] Invalid option length (1040122) for dns_resolver key [ 275.023743][T12626] netlink: 14 bytes leftover after parsing attributes in process `syz.0.2920'. [ 275.031433][T12629] netlink: 'syz.3.2921': attribute type 32 has an invalid length. [ 275.324894][T12644] netlink: 'syz.0.2928': attribute type 4 has an invalid length. [ 275.980534][T12679] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 277.534410][T12727] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2961'. [ 277.544415][ T29] kauditd_printk_skb: 828 callbacks suppressed [ 277.544432][ T29] audit: type=1400 audit(3908588970.813:22073): avc: denied { map_create } for pid=12726 comm="syz.4.2961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.572024][ T29] audit: type=1400 audit(3908588970.813:22074): avc: denied { prog_load } for pid=12726 comm="syz.4.2961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.592714][ T29] audit: type=1400 audit(3908588970.813:22075): avc: denied { prog_load } for pid=12726 comm="syz.4.2961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.613893][ T29] audit: type=1400 audit(3908588970.813:22076): avc: denied { map_create } for pid=12726 comm="syz.4.2961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.633907][ T29] audit: type=1400 audit(3908588970.813:22077): avc: denied { prog_load } for pid=12726 comm="syz.4.2961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.653296][ T29] audit: type=1400 audit(3908588970.813:22078): avc: denied { create } for pid=12726 comm="syz.4.2961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 277.740374][ T29] audit: type=1400 audit(3908588970.953:22079): avc: denied { map_create } for pid=12732 comm="syz.3.2964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.759966][ T29] audit: type=1400 audit(3908588970.953:22080): avc: denied { prog_load } for pid=12732 comm="syz.3.2964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.780141][ T29] audit: type=1400 audit(3908588970.963:22081): avc: denied { prog_load } for pid=12732 comm="syz.3.2964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.799643][ T29] audit: type=1400 audit(3908588970.963:22082): avc: denied { prog_load } for pid=12732 comm="syz.3.2964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.864032][T12740] netlink: 'syz.5.2968': attribute type 30 has an invalid length. [ 278.610391][T12768] netlink: 'syz.3.2978': attribute type 10 has an invalid length. [ 280.852699][T12877] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3018'. [ 280.902149][T12881] netlink: 'syz.2.3019': attribute type 4 has an invalid length. [ 280.910563][T12881] netlink: 'syz.2.3019': attribute type 4 has an invalid length. [ 281.099610][T12890] netlink: 'syz.3.3023': attribute type 4 has an invalid length. [ 282.633363][ T29] kauditd_printk_skb: 803 callbacks suppressed [ 282.633394][ T29] audit: type=1400 audit(3908588975.913:22886): avc: denied { prog_load } for pid=12945 comm="syz.4.3044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.659361][ T29] audit: type=1400 audit(3908588975.913:22887): avc: denied { map_create } for pid=12945 comm="syz.4.3044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.678877][ T29] audit: type=1400 audit(3908588975.913:22888): avc: denied { prog_load } for pid=12945 comm="syz.4.3044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.698365][ T29] audit: type=1400 audit(3908588975.913:22889): avc: denied { prog_load } for pid=12945 comm="syz.4.3044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.717623][ T29] audit: type=1400 audit(3908588975.913:22890): avc: denied { kexec_image_load } for pid=12945 comm="syz.4.3044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=0 [ 282.737852][ T29] audit: type=1400 audit(3908588975.913:22891): avc: denied { create } for pid=12945 comm="syz.4.3044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 282.748822][T12948] netlink: '+}[@': attribute type 10 has an invalid length. [ 282.758620][ T29] audit: type=1400 audit(3908588975.923:22892): avc: denied { create } for pid=12945 comm="syz.4.3044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 282.763017][T12951] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3046'. [ 282.767229][ T29] audit: type=1400 audit(3908588976.023:22893): avc: denied { prog_load } for pid=12947 comm="syz.4.3045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.818216][ T29] audit: type=1400 audit(3908588976.023:22894): avc: denied { map_create } for pid=12947 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.838169][ T29] audit: type=1400 audit(3908588976.023:22895): avc: denied { prog_load } for pid=12947 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 283.552599][T12991] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3059'. [ 283.562708][T12991] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3059'. [ 283.582432][T12991] wireguard0: entered promiscuous mode [ 283.587942][T12991] wireguard0: entered allmulticast mode [ 283.679851][T12997] netlink: 168 bytes leftover after parsing attributes in process `syz.3.3060'. [ 284.486181][T13022] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 284.966765][T13051] wireguard1: entered promiscuous mode [ 284.972453][T13051] wireguard1: entered allmulticast mode [ 285.284296][T13080] netlink: 'syz.4.3086': attribute type 13 has an invalid length. [ 285.290130][T13081] IPv6: NLM_F_CREATE should be specified when creating new route [ 285.774347][T13095] binfmt_misc: register: failed to install interpreter file ./file2 [ 286.225395][T13131] xt_CT: You must specify a L4 protocol and not use inversions on it [ 286.257773][T13131] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3105'. [ 286.619622][T13138] ALSA: seq fatal error: cannot create timer (-19) [ 286.839721][T13143] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3109'. [ 286.850396][T13143] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3109'. [ 286.927036][T13145] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3110'. [ 287.260475][T13166] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3119'. [ 287.293257][T13166] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3119'. [ 287.647077][ T29] kauditd_printk_skb: 1178 callbacks suppressed [ 287.647091][ T29] audit: type=1326 audit(3908588980.923:24074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13178 comm="syz.0.3123" exe="/root/syz-executor" sig=0 arch=c000003e syscall=219 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 287.679272][ T29] audit: type=1326 audit(3908588980.923:24075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13178 comm="syz.0.3123" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 287.703089][ T29] audit: type=1326 audit(3908588980.923:24076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13178 comm="syz.0.3123" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 287.733286][T13189] netlink: 'syz.0.3126': attribute type 4 has an invalid length. [ 287.755096][ T29] audit: type=1400 audit(3908588980.963:24077): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=582 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 287.779062][ T29] audit: type=1400 audit(3908588981.013:24078): avc: denied { prog_load } for pid=13188 comm="syz.0.3126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.798531][ T29] audit: type=1400 audit(3908588981.013:24079): avc: denied { map_create } for pid=13188 comm="syz.0.3126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.819007][ T29] audit: type=1400 audit(3908588981.013:24080): avc: denied { map_create } for pid=13188 comm="syz.0.3126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.839396][ T29] audit: type=1400 audit(3908588981.013:24081): avc: denied { prog_load } for pid=13188 comm="syz.0.3126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.859607][ T29] audit: type=1400 audit(3908588981.013:24082): avc: denied { prog_load } for pid=13188 comm="syz.0.3126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.879729][ T29] audit: type=1400 audit(3908588981.013:24083): avc: denied { open } for pid=13188 comm="syz.0.3126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 288.179997][T13214] netlink: 'syz.0.3137': attribute type 10 has an invalid length. [ 288.498134][T13239] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3147'. [ 288.513809][T13239] 8021q: adding VLAN 0 to HW filter on device bond5 [ 288.559098][T13237] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 289.106619][T13246] netlink: 'syz.5.3148': attribute type 10 has an invalid length. [ 290.327826][T13299] serio: Serial port ttyS3 [ 290.549513][T13302] ip6gre1: entered allmulticast mode [ 290.703866][T13312] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=13312 comm=syz.5.3173 [ 290.784887][T13315] xt_CT: You must specify a L4 protocol and not use inversions on it [ 290.794531][T13315] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3174'. [ 290.829025][T13319] netlink: 168 bytes leftover after parsing attributes in process `syz.5.3177'. [ 290.839817][T13319] netlink: 'syz.5.3177': attribute type 4 has an invalid length. [ 291.033196][T13338] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3184'. [ 292.081871][T13377] binfmt_misc: register: failed to install interpreter file ./file0 [ 292.302069][T13383] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 292.308661][T13383] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 292.316226][T13383] vhci_hcd vhci_hcd.0: Device attached [ 292.322758][T13384] vhci_hcd: connection closed [ 292.323028][ T4992] vhci_hcd: stop threads [ 292.332086][ T4992] vhci_hcd: release socket [ 292.336539][ T4992] vhci_hcd: disconnect device [ 292.840380][ T29] kauditd_printk_skb: 813 callbacks suppressed [ 292.840397][ T29] audit: type=1400 audit(3908588986.123:24897): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=582 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 292.895637][ T29] audit: type=1400 audit(3908588986.153:24898): avc: denied { bpf } for pid=13389 comm="syz.0.3200" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 292.917901][ T29] audit: type=1326 audit(3908588986.153:24899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13389 comm="syz.0.3200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 292.944157][ T29] audit: type=1326 audit(3908588986.153:24900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13389 comm="syz.0.3200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 292.968948][ T29] audit: type=1326 audit(3908588986.153:24901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13389 comm="syz.0.3200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 292.994003][ T29] audit: type=1400 audit(3908588986.153:24902): avc: denied { prog_load } for pid=13389 comm="syz.0.3200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 293.014453][ T29] audit: type=1326 audit(3908588986.153:24903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13389 comm="syz.0.3200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 293.039314][ T29] audit: type=1326 audit(3908588986.153:24904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13389 comm="syz.0.3200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 293.064073][ T29] audit: type=1326 audit(3908588986.153:24905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13389 comm="syz.0.3200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 293.089022][ T29] audit: type=1326 audit(3908588986.153:24906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13389 comm="syz.0.3200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 293.227343][T13397] netlink: 14 bytes leftover after parsing attributes in process `syz.0.3202'. [ 294.668543][T13440] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 294.675152][T13440] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 294.682736][T13440] vhci_hcd vhci_hcd.0: Device attached [ 294.690085][T13442] vhci_hcd: connection closed [ 294.719405][ T4989] vhci_hcd: stop threads [ 294.729746][ T4989] vhci_hcd: release socket [ 294.734308][ T4989] vhci_hcd: disconnect device [ 294.808535][T13444] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3217'. [ 294.846495][T13455] xt_connbytes: Forcing CT accounting to be enabled [ 294.854286][T13455] set match dimension is over the limit! [ 295.061409][T13463] bond6: invalid ARP target 0.0.0.0 specified for addition [ 295.070049][T13463] bond6: option arp_ip_target: invalid value (0) [ 295.115852][T13463] bond6 (unregistering): Released all slaves [ 295.310978][T13483] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3232'. [ 295.319965][T13483] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3232'. [ 295.343657][ T4983] netdevsim netdevsim4 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 295.353139][ T4983] netdevsim netdevsim4 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 295.369302][ T4983] netdevsim netdevsim4 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 295.377604][ T4983] netdevsim netdevsim4 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 295.690073][T13494] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 296.289696][T13524] sch_fq: defrate 4294967295 ignored. [ 296.599108][T13547] netlink: 'syz.4.3255': attribute type 10 has an invalid length. [ 297.054242][T13562] macvlan0: entered promiscuous mode [ 297.059819][T13562] bridge0: entered promiscuous mode [ 297.065807][T13562] bridge0: port 1(macvlan0) entered blocking state [ 297.072460][T13562] bridge0: port 1(macvlan0) entered disabled state [ 297.079585][T13562] macvlan0: entered allmulticast mode [ 297.085162][T13562] bridge0: entered allmulticast mode [ 297.098153][T13562] macvlan0: left allmulticast mode [ 297.103376][T13562] bridge0: left allmulticast mode [ 297.113104][T13562] bridge0: left promiscuous mode [ 297.191317][T13566] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3263'. [ 297.855173][ T29] kauditd_printk_skb: 1241 callbacks suppressed [ 297.855191][ T29] audit: type=1400 audit(3908588991.133:26148): avc: denied { prog_load } for pid=13593 comm="syz.4.3273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 297.932671][ T29] audit: type=1400 audit(3908588991.163:26149): avc: denied { create } for pid=13593 comm="syz.4.3273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 297.953186][ T29] audit: type=1400 audit(3908588991.163:26150): avc: denied { prog_load } for pid=13593 comm="syz.4.3273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 297.972855][ T29] audit: type=1400 audit(3908588991.163:26151): avc: denied { create } for pid=13593 comm="syz.4.3273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 297.994380][ T29] audit: type=1400 audit(3908588991.163:26152): avc: denied { allowed } for pid=13593 comm="syz.4.3273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 298.080124][ T29] audit: type=1400 audit(3908588991.343:26153): avc: denied { read write } for pid=3970 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 298.104557][ T29] audit: type=1400 audit(3908588991.353:26154): avc: denied { map_create } for pid=13596 comm="syz.5.3274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 298.123925][ T29] audit: type=1400 audit(3908588991.353:26155): avc: denied { prog_load } for pid=13596 comm="syz.5.3274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 298.143228][ T29] audit: type=1400 audit(3908588991.353:26156): avc: denied { map_create } for pid=13596 comm="syz.5.3274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 298.163384][ T29] audit: type=1400 audit(3908588991.353:26157): avc: denied { prog_load } for pid=13596 comm="syz.5.3274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 298.271176][T13610] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3276'. [ 298.326968][T13614] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 298.333702][T13614] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 298.342521][T13614] vhci_hcd vhci_hcd.0: Device attached [ 298.359455][T13618] vhci_hcd: connection closed [ 298.362560][ T4992] vhci_hcd: stop threads [ 298.371674][ T4992] vhci_hcd: release socket [ 298.376141][ T4992] vhci_hcd: disconnect device [ 298.486924][T13629] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 298.493568][T13629] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 298.502299][T13629] vhci_hcd vhci_hcd.0: Device attached [ 298.520035][T13630] vhci_hcd: connection closed [ 298.520298][ T4992] vhci_hcd: stop threads [ 298.529360][ T4992] vhci_hcd: release socket [ 298.533853][ T4992] vhci_hcd: disconnect device [ 298.739740][T13627] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3284'. [ 299.449467][T13653] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3294'. [ 299.893766][T13671] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3298'. [ 300.260923][T13686] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3317'. [ 301.337763][T13723] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 301.344324][T13723] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 301.352819][T13723] vhci_hcd vhci_hcd.0: Device attached [ 301.360552][T13724] vhci_hcd: connection closed [ 301.360752][ T4992] vhci_hcd: stop threads [ 301.370054][ T4992] vhci_hcd: release socket [ 301.374512][ T4992] vhci_hcd: disconnect device [ 301.822202][T13737] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3325'. [ 302.236754][T13754] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3331'. [ 302.765917][T13771] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 302.772597][T13771] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 302.780762][T13771] vhci_hcd vhci_hcd.0: Device attached [ 302.797619][T13772] vhci_hcd: connection closed [ 302.797738][ T4989] vhci_hcd: stop threads [ 302.807063][ T4989] vhci_hcd: release socket [ 302.812574][ T4989] vhci_hcd: disconnect device [ 302.975836][ T29] kauditd_printk_skb: 1774 callbacks suppressed [ 302.975855][ T29] audit: type=1400 audit(302.956:27932): avc: denied { prog_load } for pid=13781 comm="syz.2.3343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 303.045212][ T29] audit: type=1400 audit(303.026:27933): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=582 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 303.074331][ T29] audit: type=1400 audit(303.056:27934): avc: denied { map_create } for pid=13787 comm="syz.0.3344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 303.093709][ T29] audit: type=1400 audit(303.056:27935): avc: denied { prog_load } for pid=13787 comm="syz.0.3344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 303.112492][ T29] audit: type=1326 audit(303.056:27936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13787 comm="syz.0.3344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 303.135562][ T29] audit: type=1326 audit(303.056:27937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13787 comm="syz.0.3344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 303.158642][ T29] audit: type=1326 audit(303.056:27938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13787 comm="syz.0.3344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 303.182292][ T29] audit: type=1400 audit(303.056:27939): avc: denied { open } for pid=13787 comm="syz.0.3344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 303.201227][ T29] audit: type=1326 audit(303.056:27940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13787 comm="syz.0.3344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 303.224421][ T29] audit: type=1326 audit(303.056:27941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13787 comm="syz.0.3344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 303.781283][T13798] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3348'. [ 303.793193][T13806] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3351'. [ 304.273012][T13825] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 304.279625][T13825] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 304.287207][T13825] vhci_hcd vhci_hcd.0: Device attached [ 304.293585][T13826] vhci_hcd: connection closed [ 304.293647][ T2933] vhci_hcd: stop threads [ 304.303838][ T2933] vhci_hcd: release socket [ 304.309394][ T2933] vhci_hcd: disconnect device [ 304.794020][T13860] netlink: 'syz.5.3371': attribute type 10 has an invalid length. [ 305.132754][T13883] netlink: 'syz.0.3381': attribute type 1 has an invalid length. [ 305.149575][T13883] 8021q: adding VLAN 0 to HW filter on device bond4 [ 305.162076][T13883] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3381'. [ 305.174091][T13883] bond4 (unregistering): Released all slaves [ 305.225288][T13883] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 305.266894][T13889] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 305.273460][T13889] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 305.281343][T13889] vhci_hcd vhci_hcd.0: Device attached [ 305.289931][T13890] vhci_hcd: connection closed [ 305.290110][ T4989] vhci_hcd: stop threads [ 305.300206][ T4989] vhci_hcd: release socket [ 305.305280][ T4989] vhci_hcd: disconnect device [ 306.023405][T13910] wireguard0: entered promiscuous mode [ 306.030197][T13910] wireguard0: entered allmulticast mode [ 306.577256][T13936] netlink: 36 bytes leftover after parsing attributes in process `syz.0.3398'. [ 306.603609][T13940] sit0: Caught tx_queue_len zero misconfig [ 307.270076][T13971] wireguard0: entered promiscuous mode [ 307.275714][T13971] wireguard0: entered allmulticast mode [ 307.720014][T14001] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3426'. [ 307.821371][T14001] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=14001 comm=syz.3.3426 [ 307.982478][ T29] kauditd_printk_skb: 1593 callbacks suppressed [ 307.982497][ T29] audit: type=1400 audit(307.966:29535): avc: denied { prog_load } for pid=14009 comm="syz.3.3428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 308.039209][ T29] audit: type=1400 audit(308.006:29536): avc: denied { create } for pid=14009 comm="syz.3.3428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 308.060496][ T29] audit: type=1400 audit(308.006:29537): avc: denied { map_create } for pid=14009 comm="syz.3.3428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 308.080836][ T29] audit: type=1400 audit(308.006:29538): avc: denied { create } for pid=14009 comm="syz.3.3428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 308.101378][ T29] audit: type=1400 audit(308.006:29539): avc: denied { prog_load } for pid=14009 comm="syz.3.3428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 308.121479][ T29] audit: type=1400 audit(308.006:29540): avc: denied { create } for pid=14009 comm="syz.3.3428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 308.142810][ T29] audit: type=1400 audit(308.006:29541): avc: denied { prog_load } for pid=14009 comm="syz.3.3428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 308.221708][ T29] audit: type=1400 audit(308.206:29542): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=582 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 308.313105][ T29] audit: type=1400 audit(308.236:29543): avc: denied { prog_load } for pid=14014 comm="syz.2.3430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 308.333154][ T29] audit: type=1400 audit(308.236:29544): avc: denied { create } for pid=14014 comm="syz.2.3430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 308.380375][T14021] netlink: 112 bytes leftover after parsing attributes in process `syz.2.3432'. [ 308.693052][T14036] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3439'. [ 308.724443][T14036] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3439'. [ 308.842334][T14045] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3441'. [ 308.851488][T14045] netlink: 'syz.0.3441': attribute type 6 has an invalid length. [ 308.917702][ T4992] netdevsim netdevsim0 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 308.926574][ T4992] netdevsim netdevsim0 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 308.936587][T14045] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3441'. [ 308.945681][T14045] netlink: 'syz.0.3441': attribute type 6 has an invalid length. [ 308.962727][ T4992] netdevsim netdevsim0 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 308.978085][ T4992] netdevsim netdevsim0 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 309.120075][T14061] netlink: 'syz.0.3445': attribute type 10 has an invalid length. [ 309.369258][T14066] sch_fq: defrate 4294967295 ignored. [ 309.729150][T14074] 8021q: adding VLAN 0 to HW filter on device bond5 [ 310.533174][T14107] sch_fq: defrate 4294967295 ignored. [ 310.645762][T14116] netlink: 'syz.4.3463': attribute type 16 has an invalid length. [ 310.692308][T14116] $Hÿ: left promiscuous mode [ 310.697879][T14116] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 310.717031][T14116] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 311.066309][T14120] bond4: option primary_reselect: invalid value (4) [ 311.075757][T14120] bond4 (unregistering): Released all slaves [ 311.186116][T14128] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3469'. [ 311.250386][T14128] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3469'. [ 311.542783][T14149] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 311.549444][T14149] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 311.558319][T14149] vhci_hcd vhci_hcd.0: Device attached [ 311.566882][T14150] vhci_hcd: connection closed [ 311.566969][ T4992] vhci_hcd: stop threads [ 311.576065][ T4992] vhci_hcd: release socket [ 311.580577][ T4992] vhci_hcd: disconnect device [ 312.103822][T14180] IPVS: length: 111 != 24 [ 312.422810][T14198] macvtap0: refused to change device tx_queue_len [ 312.566315][T14204] netlink: 'syz.2.3495': attribute type 1 has an invalid length. [ 312.580945][T14204] bond4: entered promiscuous mode [ 312.586490][T14204] 8021q: adding VLAN 0 to HW filter on device bond4 [ 312.604424][T14204] 8021q: adding VLAN 0 to HW filter on device bond5 [ 312.614200][T14204] bond4: (slave bond5): making interface the new active one [ 312.615634][T14208] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 312.621628][T14204] bond5: entered promiscuous mode [ 312.628065][T14208] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 312.629411][T14208] vhci_hcd vhci_hcd.0: Device attached [ 312.634575][T14204] bond4: (slave bond5): Enslaving as an active interface with an up link [ 312.644866][T14209] vhci_hcd: connection closed [ 312.656437][ T4989] vhci_hcd: stop threads [ 312.665529][ T4989] vhci_hcd: release socket [ 312.670001][ T4989] vhci_hcd: disconnect device [ 313.002076][ T29] kauditd_printk_skb: 802 callbacks suppressed [ 313.002095][ T29] audit: type=1400 audit(312.986:30347): avc: denied { write } for pid=14215 comm="syz.0.3499" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 313.036215][ T29] audit: type=1400 audit(312.986:30348): avc: denied { kexec_image_load } for pid=14214 comm="syz.2.3498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=0 [ 313.057702][ T29] audit: type=1400 audit(312.986:30349): avc: denied { create } for pid=14214 comm="syz.2.3498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 313.079674][ T29] audit: type=1400 audit(312.986:30350): avc: denied { create } for pid=14214 comm="syz.2.3498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 313.101031][ T29] audit: type=1400 audit(312.986:30351): avc: denied { create } for pid=14214 comm="syz.2.3498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 313.122439][ T29] audit: type=1400 audit(313.016:30352): avc: denied { prog_load } for pid=14215 comm="syz.0.3499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 313.142785][ T29] audit: type=1400 audit(313.016:30353): avc: denied { map_create } for pid=14215 comm="syz.0.3499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 313.163243][ T29] audit: type=1400 audit(313.016:30354): avc: denied { create } for pid=14215 comm="syz.0.3499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 313.184224][ T29] audit: type=1400 audit(313.016:30355): avc: denied { prog_load } for pid=14215 comm="syz.0.3499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 313.215683][ T29] audit: type=1400 audit(313.146:30356): avc: denied { map_create } for pid=14214 comm="syz.2.3498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 314.404105][T14264] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 314.859648][T14288] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3527'. [ 314.868720][T14288] netlink: 'syz.2.3527': attribute type 22 has an invalid length. [ 314.876574][T14288] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3527'. [ 314.889241][ T4992] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 314.889312][T14288] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3527'. [ 314.897859][ T4992] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 314.906485][T14288] netlink: 'syz.2.3527': attribute type 22 has an invalid length. [ 314.906500][T14288] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3527'. [ 314.936576][ T4992] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 314.945976][ T4992] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 315.431885][T14294] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3531'. [ 315.470555][T14294] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=14294 comm=syz.4.3531 [ 315.511776][T14299] netlink: 'syz.2.3530': attribute type 16 has an invalid length. [ 315.523436][T14299] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 315.533486][T14299] 0ªX¹¦À: left allmulticast mode [ 315.538507][T14299] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 315.773729][T14306] xt_connbytes: Forcing CT accounting to be enabled [ 315.799170][T14306] set match dimension is over the limit! [ 315.812849][T14306] binfmt_misc: register: failed to install interpreter file ./file0 [ 316.060273][T14322] netlink: 128 bytes leftover after parsing attributes in process `syz.5.3539'. [ 316.442147][T14334] serio: Serial port ptm0 [ 317.037749][T14365] netlink: 14 bytes leftover after parsing attributes in process `syz.3.3555'. [ 317.435764][T14382] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3561'. [ 317.444893][T14382] netlink: 'syz.5.3561': attribute type 22 has an invalid length. [ 317.452775][T14382] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3561'. [ 317.465571][T14382] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3561'. [ 317.465575][ T2933] netdevsim netdevsim5 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 317.475966][T14382] netlink: 'syz.5.3561': attribute type 22 has an invalid length. [ 317.483229][ T2933] netdevsim netdevsim5 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 317.483334][ T2933] netdevsim netdevsim5 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 317.483405][ T2933] netdevsim netdevsim5 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 318.039231][ T29] kauditd_printk_skb: 748 callbacks suppressed [ 318.039251][ T29] audit: type=1400 audit(318.026:31105): avc: denied { prog_load } for pid=14402 comm="syz.3.3569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 318.065009][ T29] audit: type=1400 audit(318.046:31106): avc: denied { create } for pid=14402 comm="syz.3.3569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 318.084903][ T29] audit: type=1400 audit(318.046:31107): avc: denied { create } for pid=14402 comm="syz.3.3569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 318.104148][ T29] audit: type=1400 audit(318.046:31108): avc: denied { prog_load } for pid=14402 comm="syz.3.3569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 318.123191][ T29] audit: type=1400 audit(318.046:31109): avc: denied { create } for pid=14402 comm="syz.3.3569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 318.153912][ T29] audit: type=1400 audit(318.126:31110): avc: denied { prog_load } for pid=14410 comm="syz.4.3571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 318.172993][ T29] audit: type=1400 audit(318.126:31111): avc: denied { map_create } for pid=14410 comm="syz.4.3571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 318.191920][ T29] audit: type=1400 audit(318.126:31112): avc: denied { prog_load } for pid=14410 comm="syz.4.3571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 318.210666][ T29] audit: type=1400 audit(318.126:31113): avc: denied { prog_load } for pid=14410 comm="syz.4.3571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 318.229635][ T29] audit: type=1400 audit(318.126:31114): avc: denied { create } for pid=14410 comm="syz.4.3571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 318.778394][T14436] set match dimension is over the limit! [ 318.936723][T14450] sch_fq: defrate 4294967295 ignored. [ 318.975101][T14447] netlink: 'syz.5.3586': attribute type 7 has an invalid length. [ 319.124382][T14462] netlink: 'syz.3.3589': attribute type 13 has an invalid length. [ 319.364135][T14478] binfmt_misc: register: failed to install interpreter file ./file0 [ 319.786163][T14491] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 319.792833][T14491] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 319.800560][T14491] vhci_hcd vhci_hcd.0: Device attached [ 319.829610][T14487] bond4: (slave macvlan0): Releasing backup interface [ 319.831566][T14492] vhci_hcd: connection closed [ 319.839746][ T2933] vhci_hcd: stop threads [ 319.850182][ T2933] vhci_hcd: release socket [ 319.854707][ T2933] vhci_hcd: disconnect device [ 319.865537][T14487] wireguard0: left promiscuous mode [ 319.891401][ T4992] netdevsim netdevsim4 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 319.909834][ T4992] netdevsim netdevsim4 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 319.994000][ T4992] netdevsim netdevsim4 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 320.014561][ T4992] netdevsim netdevsim4 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 320.240247][T14517] xt_hashlimit: max too large, truncated to 1048576 [ 320.897066][T14529] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 321.005293][T14535] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 321.030920][T14536] __nla_validate_parse: 8 callbacks suppressed [ 321.030945][T14536] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3618'. [ 321.074993][T14542] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 321.618892][T14572] netlink: 'syz.4.3631': attribute type 10 has an invalid length. [ 321.810899][T14580] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3636'. [ 321.829394][T14580] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3636'. [ 321.842582][T14580] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3636'. [ 321.868348][T14580] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3636'. [ 321.895029][T14580] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3636'. [ 322.026033][T14586] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3637'. [ 322.035090][T14586] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3637'. [ 322.044067][T14586] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3637'. [ 322.340077][T14603] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 322.346637][T14603] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 322.355263][T14603] vhci_hcd vhci_hcd.0: Device attached [ 322.397537][T14604] vhci_hcd: connection closed [ 322.397816][ T2933] vhci_hcd: stop threads [ 322.407017][ T2933] vhci_hcd: release socket [ 322.411493][ T2933] vhci_hcd: disconnect device [ 322.967785][T14628] sch_fq: defrate 4294967295 ignored. [ 323.050722][ T29] kauditd_printk_skb: 1074 callbacks suppressed [ 323.050741][ T29] audit: type=1400 audit(323.036:32189): avc: denied { prog_load } for pid=14633 comm="syz.4.3653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 323.096191][ T29] audit: type=1400 audit(323.056:32190): avc: denied { prog_load } for pid=14633 comm="syz.4.3653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 323.115186][ T29] audit: type=1400 audit(323.076:32191): avc: denied { create } for pid=14633 comm="syz.4.3653" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 323.135477][ T29] audit: type=1400 audit(323.076:32192): avc: denied { prog_load } for pid=14633 comm="syz.4.3653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 323.182532][ T29] audit: type=1400 audit(323.166:32193): avc: denied { create } for pid=14616 comm="syz.5.3647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 323.221843][ T29] audit: type=1400 audit(323.166:32194): avc: denied { prog_load } for pid=14616 comm="syz.5.3647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 323.240641][ T29] audit: type=1400 audit(323.166:32195): avc: denied { name_bind } for pid=14637 comm="syz.3.3654" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 323.262111][ T29] audit: type=1400 audit(323.176:32196): avc: denied { map_create } for pid=14637 comm="syz.3.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 323.281033][ T29] audit: type=1400 audit(323.176:32197): avc: denied { prog_load } for pid=14637 comm="syz.3.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 323.299793][ T29] audit: type=1400 audit(323.176:32198): avc: denied { prog_load } for pid=14637 comm="syz.3.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 323.580282][T14651] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 323.586862][T14651] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 323.594443][T14651] vhci_hcd vhci_hcd.0: Device attached [ 323.651510][T14652] vhci_hcd: connection closed [ 323.651635][ T2933] vhci_hcd: stop threads [ 323.660729][ T2933] vhci_hcd: release socket [ 323.665188][ T2933] vhci_hcd: disconnect device [ 323.779789][T14659] bridge0: entered promiscuous mode [ 323.785235][T14659] macvlan2: entered promiscuous mode [ 323.794035][T14661] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 323.800593][T14661] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 323.808266][T14661] vhci_hcd vhci_hcd.0: Device attached [ 323.820541][T14659] bridge0: port 2(macvlan2) entered blocking state [ 323.827199][T14659] bridge0: port 2(macvlan2) entered disabled state [ 323.834174][T14659] macvlan2: entered allmulticast mode [ 323.839627][T14659] bridge0: entered allmulticast mode [ 323.851316][T14659] macvlan2: left allmulticast mode [ 323.856486][T14659] bridge0: left allmulticast mode [ 323.862576][T14659] bridge0: left promiscuous mode [ 323.877207][T14662] vhci_hcd: connection closed [ 323.878485][ T4992] vhci_hcd: stop threads [ 323.887487][ T4992] vhci_hcd: release socket [ 323.891968][ T4992] vhci_hcd: disconnect device [ 324.592307][T14686] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 324.863027][T14689] $Hÿ: left allmulticast mode [ 324.869349][T14689] $Hÿ: left promiscuous mode [ 324.874366][T14689] bridge0: port 1($Hÿ) entered disabled state [ 324.912348][T14689] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 325.666083][T14712] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 325.672680][T14712] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 325.681302][T14712] vhci_hcd vhci_hcd.0: Device attached [ 325.706155][T14713] vhci_hcd: connection closed [ 325.706347][ T4992] vhci_hcd: stop threads [ 325.715509][ T4992] vhci_hcd: release socket [ 325.720098][ T4992] vhci_hcd: disconnect device [ 325.995318][T14727] netlink: 'syz.4.3687': attribute type 10 has an invalid length. [ 326.003694][T14727] netlink: 'syz.4.3687': attribute type 10 has an invalid length. [ 326.535593][T14764] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3697'. [ 326.544647][T14764] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3697'. [ 326.650924][T14764] erspan0: entered promiscuous mode [ 326.664768][T14764] gretap0: entered promiscuous mode [ 326.688171][T14764] hsr0: Slave A (erspan0) is not up; please bring it up to get a fully working HSR network [ 326.698369][T14764] hsr0: Slave B (gretap0) is not up; please bring it up to get a fully working HSR network [ 326.851366][T14770] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3702'. [ 326.986095][T14776] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 326.992690][T14776] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 327.000355][T14776] vhci_hcd vhci_hcd.0: Device attached [ 327.008884][T14777] vhci_hcd: connection closed [ 327.009094][ T4989] vhci_hcd: stop threads [ 327.018145][ T4989] vhci_hcd: release socket [ 327.022598][ T4989] vhci_hcd: disconnect device [ 327.285208][T14789] netlink: 'syz.3.3710': attribute type 4 has an invalid length. [ 327.295456][T14793] netlink: 'syz.4.3711': attribute type 31 has an invalid length. [ 327.589965][T14807] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 327.674307][T14810] macvlan1: entered promiscuous mode [ 327.680816][T14810] bridge0: entered promiscuous mode [ 327.702247][T14810] bridge0: port 1(macvlan1) entered blocking state [ 327.710071][T14810] bridge0: port 1(macvlan1) entered disabled state [ 327.724185][T14810] macvlan1: entered allmulticast mode [ 327.729720][T14810] bridge0: entered allmulticast mode [ 327.740988][T14810] macvlan1: left allmulticast mode [ 327.746207][T14810] bridge0: left allmulticast mode [ 327.756042][T14810] bridge0: left promiscuous mode [ 328.070143][ T29] kauditd_printk_skb: 690 callbacks suppressed [ 328.070162][ T29] audit: type=1400 audit(328.056:32889): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=582 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 328.131245][ T29] audit: type=1400 audit(328.066:32890): avc: denied { prog_load } for pid=14836 comm="syz.0.3728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 328.240073][ T29] audit: type=1326 audit(328.226:32891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14840 comm="syz.3.3730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4243dfefc9 code=0x7ffc0000 [ 328.264216][ T29] audit: type=1326 audit(328.226:32892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14840 comm="syz.3.3730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4243dfefc9 code=0x7ffc0000 [ 328.320292][T14843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 328.327084][T14843] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 328.334868][T14843] audit: backlog limit exceeded [ 328.339261][ T29] audit: type=1326 audit(328.226:32893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14840 comm="syz.3.3730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f4243dfefc9 code=0x7ffc0000 [ 328.340738][T14843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 328.364069][ T29] audit: type=1400 audit(328.226:32894): avc: denied { create } for pid=14840 comm="syz.3.3730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 328.485899][T14850] netlink: 'syz.2.3733': attribute type 30 has an invalid length. [ 328.490782][T14848] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3732'. [ 328.504000][T14848] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3732'. [ 328.573186][T14855] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 329.035442][T14876] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 329.042002][T14876] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 329.050534][T14876] vhci_hcd vhci_hcd.0: Device attached [ 329.057082][T14877] vhci_hcd: connection closed [ 329.057355][ T4992] vhci_hcd: stop threads [ 329.066517][ T4992] vhci_hcd: release socket [ 329.071062][ T4992] vhci_hcd: disconnect device [ 330.359671][T14919] netlink: 'syz.4.3761': attribute type 10 has an invalid length. [ 330.372612][T14924] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 330.379327][T14924] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 330.388178][T14924] vhci_hcd vhci_hcd.0: Device attached [ 330.409797][T14925] vhci_hcd: connection closed [ 330.412268][ T4992] vhci_hcd: stop threads [ 330.421321][ T4992] vhci_hcd: release socket [ 330.425747][ T4992] vhci_hcd: disconnect device [ 331.663279][T14996] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 331.669858][T14996] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 331.677442][T14996] vhci_hcd vhci_hcd.0: Device attached [ 331.698356][T14997] vhci_hcd: connection closed [ 331.698655][ T4992] vhci_hcd: stop threads [ 331.707724][ T4992] vhci_hcd: release socket [ 331.712346][ T4992] vhci_hcd: disconnect device [ 333.083344][ T29] kauditd_printk_skb: 1054 callbacks suppressed [ 333.083367][ T29] audit: type=1400 audit(333.066:33947): avc: denied { read write } for pid=3970 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 333.115518][ T29] audit: type=1400 audit(333.096:33948): avc: denied { create } for pid=15041 comm="syz.2.3804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 333.135084][ T29] audit: type=1400 audit(333.096:33949): avc: denied { create } for pid=15041 comm="syz.2.3804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 333.154204][ T29] audit: type=1400 audit(333.096:33950): avc: denied { open } for pid=15041 comm="syz.2.3804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 333.192826][ T29] audit: type=1400 audit(333.166:33951): avc: denied { open } for pid=15044 comm="syz.4.3800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 333.212062][ T29] audit: type=1400 audit(333.166:33952): avc: denied { create } for pid=15044 comm="syz.4.3800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 333.234946][ T29] audit: type=1400 audit(333.216:33953): avc: denied { prog_load } for pid=15041 comm="syz.2.3804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 333.253935][ T29] audit: type=1400 audit(333.216:33954): avc: denied { map_create } for pid=15041 comm="syz.2.3804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 333.272748][ T29] audit: type=1400 audit(333.216:33955): avc: denied { prog_load } for pid=15041 comm="syz.2.3804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 333.291511][ T29] audit: type=1326 audit(333.216:33956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15046 comm="syz.3.3805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4243dfefc9 code=0x7ffc0000 [ 333.402602][T15056] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 333.409175][T15056] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 333.417872][T15056] vhci_hcd vhci_hcd.0: Device attached [ 333.449876][T15059] vhci_hcd: connection closed [ 333.450144][ T4992] vhci_hcd: stop threads [ 333.460507][ T4992] vhci_hcd: release socket [ 333.464966][ T4992] vhci_hcd: disconnect device [ 334.410480][T15096] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 334.417044][T15096] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 334.424628][T15096] vhci_hcd vhci_hcd.0: Device attached [ 334.436984][T15099] vhci_hcd: connection closed [ 334.437259][ T2933] vhci_hcd: stop threads [ 334.446250][ T2933] vhci_hcd: release socket [ 334.450781][ T2933] vhci_hcd: disconnect device [ 335.071702][T15136] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3833'. [ 335.110466][T15136] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3833'. [ 335.162070][T15139] netlink: 'syz.2.3833': attribute type 4 has an invalid length. [ 335.711615][T15160] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3841'. [ 335.744725][T15160] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3841'. [ 335.754367][T15162] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 335.760923][T15162] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 335.768629][T15162] vhci_hcd vhci_hcd.0: Device attached [ 335.792089][T15166] vhci_hcd: connection closed [ 335.792481][ T2933] vhci_hcd: stop threads [ 335.802060][ T2933] vhci_hcd: release socket [ 335.806500][ T2933] vhci_hcd: disconnect device [ 336.974092][T15222] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 336.981264][T15222] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 336.988889][T15222] vhci_hcd vhci_hcd.0: Device attached [ 337.002302][T15223] vhci_hcd: connection closed [ 337.002538][ T2933] vhci_hcd: stop threads [ 337.011619][ T2933] vhci_hcd: release socket [ 337.016061][ T2933] vhci_hcd: disconnect device [ 337.357045][T15244] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3869'. [ 337.697799][T15248] $Hÿ: entered promiscuous mode [ 338.153944][ T29] kauditd_printk_skb: 1297 callbacks suppressed [ 338.153959][ T29] audit: type=1400 audit(338.136:35212): avc: denied { create } for pid=15273 comm="syz.0.3879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 338.181593][ T29] audit: type=1400 audit(338.166:35213): avc: denied { module_request } for pid=15273 comm="syz.0.3879" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 338.203661][ T29] audit: type=1400 audit(338.166:35214): avc: denied { sys_module } for pid=15273 comm="syz.0.3879" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 338.297256][ T29] audit: type=1400 audit(338.276:35215): avc: denied { map_create } for pid=15277 comm="syz.3.3881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 338.323698][ T29] audit: type=1400 audit(338.306:35216): avc: denied { prog_load } for pid=15277 comm="syz.3.3881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 338.343329][ T29] audit: type=1400 audit(338.306:35217): avc: denied { execmem } for pid=15277 comm="syz.3.3881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 338.362230][ T29] audit: type=1400 audit(338.316:35218): avc: denied { create } for pid=15277 comm="syz.3.3881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 338.381333][ T29] audit: type=1400 audit(338.316:35219): avc: denied { create } for pid=15277 comm="syz.3.3881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 338.412955][ T29] audit: type=1400 audit(338.396:35220): avc: denied { read write } for pid=3970 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 338.492895][ T29] audit: type=1400 audit(338.426:35221): avc: denied { prog_load } for pid=15281 comm="syz.5.3882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 339.035229][T15304] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3890'. [ 339.082128][T15304] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3890'. [ 339.220612][T15321] xt_NFQUEUE: number of total queues is 0 [ 339.369485][T15335] bridge3: entered promiscuous mode [ 339.374742][T15335] bridge3: entered allmulticast mode [ 339.416042][T15342] netlink: 'syz.2.3906': attribute type 4 has an invalid length. [ 339.417241][T15344] netlink: 'syz.0.3907': attribute type 5 has an invalid length. [ 339.431717][T15344] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.3907'. [ 340.217202][T15359] xt_CT: You must specify a L4 protocol and not use inversions on it [ 340.523440][T15367] netlink: 3 bytes leftover after parsing attributes in process `syz.2.3915'. [ 340.533588][T15367] !60ªX¹¦À: renamed from 60ªX¹¦À [ 340.549233][T15367] !60ªX¹¦À: entered allmulticast mode [ 340.554686][T15367] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 341.539391][T15399] x_tables: ip_tables: ah match: only valid for protocol 51 [ 341.582241][T15399] Cannot find del_set index 16384 as target [ 341.736256][T15410] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 341.743044][T15410] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 341.751715][T15410] vhci_hcd vhci_hcd.0: Device attached [ 341.773131][T15411] vhci_hcd: connection closed [ 341.773286][ T4989] vhci_hcd: stop threads [ 341.782444][ T4989] vhci_hcd: release socket [ 341.787080][ T4989] vhci_hcd: disconnect device [ 342.279659][T15439] x_tables: ip_tables: ah match: only valid for protocol 51 [ 342.294055][T15439] Cannot find add_set index 0 as target [ 342.689659][T15456] lo: Caught tx_queue_len zero misconfig [ 343.160628][ T29] kauditd_printk_skb: 1394 callbacks suppressed [ 343.160646][ T29] audit: type=1326 audit(343.146:36613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.5.3948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f11fe225e67 code=0x7ffc0000 [ 343.190529][ T29] audit: type=1326 audit(343.146:36614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.5.3948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f11fe1cb099 code=0x7ffc0000 [ 343.213546][ T29] audit: type=1326 audit(343.146:36615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.5.3948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11fe22efc9 code=0x7ffc0000 [ 343.236669][ T29] audit: type=1326 audit(343.156:36616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.5.3948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f11fe225e67 code=0x7ffc0000 [ 343.259586][ T29] audit: type=1326 audit(343.156:36617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.5.3948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f11fe1cb099 code=0x7ffc0000 [ 343.282583][ T29] audit: type=1326 audit(343.156:36618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.5.3948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11fe22efc9 code=0x7ffc0000 [ 343.305731][ T29] audit: type=1326 audit(343.166:36619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.5.3948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f11fe225e67 code=0x7ffc0000 [ 343.328903][ T29] audit: type=1326 audit(343.166:36620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.5.3948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f11fe1cb099 code=0x7ffc0000 [ 343.351943][ T29] audit: type=1326 audit(343.166:36621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.5.3948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11fe22efc9 code=0x7ffc0000 [ 343.375282][ T29] audit: type=1326 audit(343.176:36622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.5.3948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f11fe225e67 code=0x7ffc0000 [ 343.414965][T15475] x_tables: ip_tables: ah match: only valid for protocol 51 [ 343.453105][T15475] Cannot find del_set index 16384 as target [ 343.557693][T15480] netlink: 'syz.5.3956': attribute type 5 has an invalid length. [ 343.565563][T15480] netlink: 3657 bytes leftover after parsing attributes in process `syz.5.3956'. [ 343.934636][ T36] IPVS: starting estimator thread 0... [ 344.036819][T15502] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=15502 comm=syz.0.3963 [ 344.058091][T15499] IPVS: using max 2400 ests per chain, 120000 per kthread [ 344.262525][T15511] netlink: 32 bytes leftover after parsing attributes in process `syz.4.3967'. [ 344.283133][T15511] xt_hashlimit: max too large, truncated to 1048576 [ 344.426398][T15523] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3972'. [ 345.101767][T15546] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3979'. [ 346.056615][T15570] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3985'. [ 346.803695][T15614] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4005'. [ 346.957577][T15627] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=15627 comm=syz.3.4007 [ 347.310335][T15642] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4011'. [ 347.953225][T15680] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4027'. [ 347.982160][T15683] netlink: 32 bytes leftover after parsing attributes in process `syz.0.4028'. [ 348.009971][T15683] xt_hashlimit: max too large, truncated to 1048576 [ 348.201509][ T29] kauditd_printk_skb: 1704 callbacks suppressed [ 348.201527][ T29] audit: type=1326 audit(348.186:38303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15687 comm="syz.0.4029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 348.232163][ T29] audit: type=1326 audit(348.186:38304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15685 comm="syz.0.4029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 348.256380][ T29] audit: type=1326 audit(348.186:38305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15685 comm="syz.0.4029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 348.280748][ T29] audit: type=1326 audit(348.186:38306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15685 comm="syz.0.4029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 348.304897][ T29] audit: type=1326 audit(348.186:38307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15685 comm="syz.0.4029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 348.328565][ T29] audit: type=1326 audit(348.186:38308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15685 comm="syz.0.4029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 348.351877][ T29] audit: type=1326 audit(348.186:38309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15685 comm="syz.0.4029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=10 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 348.374977][ T29] audit: type=1326 audit(348.186:38310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15685 comm="syz.0.4029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 348.399232][ T29] audit: type=1326 audit(348.186:38311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15685 comm="syz.0.4029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 348.423584][ T29] audit: type=1326 audit(348.186:38312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15685 comm="syz.0.4029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3582dd5e67 code=0x7ffc0000 [ 348.454422][T15695] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4032'. [ 348.463766][T15695] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4032'. [ 348.730219][T15709] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 348.736807][T15709] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 348.745435][T15709] vhci_hcd vhci_hcd.0: Device attached [ 348.826495][T15722] xt_connbytes: Forcing CT accounting to be enabled [ 348.869708][T15710] vhci_hcd: connection closed [ 348.871937][ T4989] vhci_hcd: stop threads [ 348.881580][ T4989] vhci_hcd: release socket [ 348.886271][ T4989] vhci_hcd: disconnect device [ 348.929392][ T4293] vhci_hcd: vhci_device speed not set [ 350.551054][T15766] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 350.590928][T15769] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4059'. [ 350.661894][T15772] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 350.668693][T15772] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 350.677557][T15772] vhci_hcd vhci_hcd.0: Device attached [ 350.737625][T15774] vhci_hcd: connection closed [ 350.737892][ T4989] vhci_hcd: stop threads [ 350.749209][ T4989] vhci_hcd: release socket [ 350.753701][ T4989] vhci_hcd: disconnect device [ 351.947222][T15833] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4083'. [ 351.984410][T15830] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 353.247732][ T29] kauditd_printk_skb: 8687 callbacks suppressed [ 353.247745][ T29] audit: type=1326 audit(353.226:46913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15895 comm="syz.4.4106" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e14eeefc9 code=0x7ffc0000 [ 353.292333][ T29] audit: type=1400 audit(353.226:46914): avc: denied { create } for pid=15893 comm="syz.2.4105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 353.313184][ T29] audit: type=1400 audit(353.236:46915): avc: denied { map_create } for pid=15889 comm="syz.5.4101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 353.333514][ T29] audit: type=1400 audit(353.236:46916): avc: denied { prog_load } for pid=15889 comm="syz.5.4101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 353.353252][ T29] audit: type=1400 audit(353.236:46917): avc: denied { prog_load } for pid=15889 comm="syz.5.4101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 353.373102][ T29] audit: type=1326 audit(353.236:46918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15889 comm="syz.5.4101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11fe22efc9 code=0x7ffc0000 [ 353.397632][ T29] audit: type=1326 audit(353.236:46919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15889 comm="syz.5.4101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f11fe22d810 code=0x7ffc0000 [ 353.422171][ T29] audit: type=1400 audit(353.236:46920): avc: denied { read write } for pid=15889 comm="syz.5.4101" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 353.446200][ T29] audit: type=1326 audit(353.236:46921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15889 comm="syz.5.4101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11fe22efc9 code=0x7ffc0000 [ 353.470550][ T29] audit: type=1326 audit(353.236:46922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15889 comm="syz.5.4101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f11fe22efc9 code=0x7ffc0000 [ 353.508432][T15907] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4110'. [ 353.710540][T15921] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4115'. [ 353.720747][T15921] netlink: 36 bytes leftover after parsing attributes in process `syz.3.4115'. [ 354.043412][T15943] netlink: 'syz.5.4125': attribute type 10 has an invalid length. [ 354.051380][T15943] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4125'. [ 354.975243][T15988] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4141'. [ 355.816576][T16048] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 356.032600][T16063] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 356.039395][T16063] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 356.048035][T16063] vhci_hcd vhci_hcd.0: Device attached [ 356.055674][T16064] vhci_hcd: connection closed [ 356.055920][ T2933] vhci_hcd: stop threads [ 356.065423][ T2933] vhci_hcd: release socket [ 356.070053][ T2933] vhci_hcd: disconnect device [ 356.130159][T16071] netlink: 15231 bytes leftover after parsing attributes in process `syz.4.4170'. [ 356.915698][T16096] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 356.918509][T16094] team0: Refused to change device type [ 356.984581][T16099] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=16099 comm=syz.0.4184 [ 357.411257][T16122] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4191'. [ 357.519432][T16136] netlink: 'gtp': attribute type 12 has an invalid length. [ 357.755816][T16158] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16158 comm=syz.3.4206 [ 358.054329][T16168] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4209'. [ 358.165407][T16171] netlink: 60 bytes leftover after parsing attributes in process `syz.2.4210'. [ 358.175951][T16170] netlink: 60 bytes leftover after parsing attributes in process `syz.2.4210'. [ 358.259558][ T29] kauditd_printk_skb: 2725 callbacks suppressed [ 358.259577][ T29] audit: type=1400 audit(359.249:49648): avc: denied { create } for pid=16179 comm="syz.0.4214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 358.320774][ T29] audit: type=1400 audit(359.249:49649): avc: denied { map_create } for pid=16179 comm="syz.0.4214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 358.341010][ T29] audit: type=1400 audit(359.249:49650): avc: denied { prog_load } for pid=16179 comm="syz.0.4214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 358.360901][ T29] audit: type=1400 audit(359.249:49651): avc: denied { open } for pid=16179 comm="syz.0.4214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 358.380870][ T29] audit: type=1400 audit(359.249:49652): avc: denied { map_create } for pid=16179 comm="syz.0.4214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 358.400762][ T29] audit: type=1400 audit(359.249:49653): avc: denied { prog_load } for pid=16179 comm="syz.0.4214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 358.420676][ T29] audit: type=1400 audit(359.249:49654): avc: denied { prog_load } for pid=16179 comm="syz.0.4214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 358.440572][ T29] audit: type=1400 audit(359.249:49655): avc: denied { prog_load } for pid=16179 comm="syz.0.4214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 358.459865][ T29] audit: type=1326 audit(359.249:49656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16179 comm="syz.0.4214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 358.483127][ T29] audit: type=1326 audit(359.249:49657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16179 comm="syz.0.4214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 359.890170][T16245] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 360.350230][T16256] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 360.356985][T16256] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 360.365784][T16256] vhci_hcd vhci_hcd.0: Device attached [ 360.390075][T16257] vhci_hcd: connection closed [ 360.390363][ T4983] vhci_hcd: stop threads [ 360.400685][ T4983] vhci_hcd: release socket [ 360.405124][ T4983] vhci_hcd: disconnect device [ 361.101927][T16278] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 362.131176][T16318] netlink: 24 bytes leftover after parsing attributes in process `syz.2.4262'. [ 362.595337][T16335] netlink: 288 bytes leftover after parsing attributes in process `syz.3.4270'. [ 363.101072][T16348] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4273'. [ 363.273054][ T29] kauditd_printk_skb: 10373 callbacks suppressed [ 363.273072][ T29] audit: type=1400 audit(364.259:59998): avc: denied { prog_load } for pid=16355 comm="syz.4.4276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 363.298581][ T29] audit: type=1400 audit(364.259:59999): avc: denied { create } for pid=16355 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 363.318754][ T29] audit: type=1400 audit(364.259:60000): avc: denied { execmem } for pid=16355 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 363.338621][ T29] audit: type=1400 audit(364.259:60001): avc: denied { map_create } for pid=16355 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 363.357142][ T29] audit: type=1400 audit(364.259:60002): avc: denied { prog_load } for pid=16355 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 363.359507][T16358] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 363.375516][ T29] audit: type=1400 audit(364.259:60003): avc: denied { map_create } for pid=16355 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 363.375549][ T29] audit: type=1400 audit(364.259:60004): avc: denied { prog_load } for pid=16355 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 363.375590][ T29] audit: type=1400 audit(364.259:60005): avc: denied { prog_load } for pid=16355 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 363.408100][ T29] audit: type=1400 audit(364.389:60006): avc: denied { map_create } for pid=16359 comm="syz.4.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 363.482189][ T29] audit: type=1400 audit(364.419:60007): avc: denied { prog_load } for pid=16359 comm="syz.4.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 363.514794][T16367] xt_hashlimit: max too large, truncated to 1048576 [ 363.761382][T16378] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4283'. [ 364.178646][T16386] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 364.185277][T16386] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 364.192962][T16386] vhci_hcd vhci_hcd.0: Device attached [ 364.210132][T16389] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 364.218401][T16389] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.227488][T16387] vhci_hcd: connection closed [ 364.238313][ T4983] vhci_hcd: stop threads [ 364.247402][ T4983] vhci_hcd: release socket [ 364.251873][ T4983] vhci_hcd: disconnect device [ 364.257697][T16389] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 364.474751][T16400] netlink: 'syz.3.4290': attribute type 27 has an invalid length. [ 364.515125][T16400] gretap1: left promiscuous mode [ 364.520264][T16400] ip6gre1: left allmulticast mode [ 364.528920][T16403] xt_hashlimit: max too large, truncated to 1048576 [ 364.556255][T16400] geneve2: left promiscuous mode [ 364.561301][T16400] geneve2: left allmulticast mode [ 364.566953][T16400] ipvlan0: left promiscuous mode [ 364.572173][T16400] bridge5: left promiscuous mode [ 364.577440][T16400] wireguard0: left promiscuous mode [ 364.582726][T16400] wireguard0: left allmulticast mode [ 364.589144][T16403] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 364.708843][T16400] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4290'. [ 365.849986][T16444] wireguard1: left promiscuous mode [ 365.855354][T16444] wireguard1: left allmulticast mode [ 365.866566][ T4983] netdevsim netdevsim5 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 365.885122][ T4983] netdevsim netdevsim5 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 365.897387][ T4983] netdevsim netdevsim5 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 365.916074][ T4983] netdevsim netdevsim5 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 366.126061][T16467] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 366.190784][T16471] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4318'. [ 366.316067][T16481] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 366.322720][T16481] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 366.331536][T16481] vhci_hcd vhci_hcd.0: Device attached [ 366.345641][T16482] vhci_hcd: connection closed [ 366.345752][ T4989] vhci_hcd: stop threads [ 366.354886][ T4989] vhci_hcd: release socket [ 366.359351][ T4989] vhci_hcd: disconnect device [ 366.943367][T16496] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 366.950017][T16496] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 366.957654][T16496] vhci_hcd vhci_hcd.0: Device attached [ 367.002799][T16497] vhci_hcd: connection closed [ 367.006823][ T5018] vhci_hcd: stop threads [ 367.017368][ T5018] vhci_hcd: release socket [ 367.022895][ T5018] vhci_hcd: disconnect device [ 367.062053][T16506] team0: Refused to change device type [ 367.202491][T16510] bond6: option primary_reselect: invalid value (4) [ 367.211168][T16510] bond6 (unregistering): Released all slaves [ 367.276337][T16516] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 367.333719][T16519] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4334'. [ 367.618229][T16530] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 368.527340][ T29] kauditd_printk_skb: 1373 callbacks suppressed [ 368.527428][ T29] audit: type=1400 audit(369.509:61381): avc: denied { prog_load } for pid=16544 comm="syz.3.4343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 368.595748][ T29] audit: type=1400 audit(369.539:61382): avc: denied { prog_load } for pid=16544 comm="syz.3.4343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 368.614527][ T29] audit: type=1400 audit(369.539:61383): avc: denied { map_create } for pid=16544 comm="syz.3.4343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 368.633272][ T29] audit: type=1400 audit(369.539:61384): avc: denied { prog_load } for pid=16544 comm="syz.3.4343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 368.703033][T16545] netlink: 'syz.3.4343': attribute type 4 has an invalid length. [ 368.779444][ T29] audit: type=1400 audit(369.659:61385): avc: denied { read write } for pid=3970 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 368.803269][ T29] audit: type=1400 audit(369.679:61386): avc: denied { read write } for pid=16547 comm="syz.5.4344" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 368.826856][ T29] audit: type=1400 audit(369.679:61387): avc: denied { create } for pid=16547 comm="syz.5.4344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 368.847257][ T29] audit: type=1400 audit(369.709:61388): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=582 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 368.870156][ T29] audit: type=1400 audit(369.739:61389): avc: denied { read write } for pid=16549 comm="syz.0.4345" name="loop0" dev="devtmpfs" ino=582 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 368.954804][T16554] audit: audit_backlog=65 > audit_backlog_limit=64 [ 369.350150][T16563] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 369.390900][T16561] erspan0: entered promiscuous mode [ 369.413563][T16561] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 369.424152][T16561] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 369.580692][ T3882] Process accounting resumed [ 369.587920][T16574] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4354'. [ 369.599827][T16569] netlink: 32 bytes leftover after parsing attributes in process `syz.5.4352'. [ 369.651277][T16574] Process accounting resumed [ 370.002358][T16598] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 370.067141][T16604] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16604 comm=syz.3.4365 [ 370.198615][T16617] netlink: 'syz.2.4369': attribute type 10 has an invalid length. [ 370.671364][T16627] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 370.677957][T16627] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 370.685597][T16627] vhci_hcd vhci_hcd.0: Device attached [ 370.693008][T16628] vhci_hcd: connection closed [ 370.693158][ T5018] vhci_hcd: stop threads [ 370.702388][ T5018] vhci_hcd: release socket [ 370.706814][ T5018] vhci_hcd: disconnect device [ 370.982663][T16637] netlink: 144 bytes leftover after parsing attributes in process `GPL'. [ 370.993658][T16639] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 371.665441][T16672] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4385'. [ 371.702608][T16674] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 372.049151][T16688] netlink: 36 bytes leftover after parsing attributes in process `syz.0.4393'. [ 372.360474][T16695] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 372.367100][T16695] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 372.374800][T16695] vhci_hcd vhci_hcd.0: Device attached [ 372.381331][T16696] vhci_hcd: connection closed [ 372.381506][ T5018] vhci_hcd: stop threads [ 372.390777][ T5018] vhci_hcd: release socket [ 372.395206][ T5018] vhci_hcd: disconnect device [ 372.472188][T16699] netlink: 'syz.5.4397': attribute type 10 has an invalid length. [ 372.481144][T16699] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4397'. [ 372.492252][T16699] dummy0: entered promiscuous mode [ 372.497726][T16699] bridge0: port 1(dummy0) entered blocking state [ 372.505340][T16699] bridge0: port 1(dummy0) entered disabled state [ 372.514373][T16699] bridge0: port 1(dummy0) entered blocking state [ 372.520805][T16699] bridge0: port 1(dummy0) entered forwarding state [ 372.811978][T16709] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 373.405892][T16734] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4410'. [ 373.442496][T16737] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 373.480021][T16741] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 373.486589][T16741] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 373.494264][T16741] vhci_hcd vhci_hcd.0: Device attached [ 373.510044][T16742] vhci_hcd: connection closed [ 373.510309][ T4983] vhci_hcd: stop threads [ 373.519414][ T4983] vhci_hcd: release socket [ 373.523854][ T4983] vhci_hcd: disconnect device [ 373.532313][ T29] kauditd_printk_skb: 1441 callbacks suppressed [ 373.532329][ T29] audit: type=1400 audit(376.516:62829): avc: denied { create } for pid=16746 comm="syz.2.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 373.533984][T16747] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4415'. [ 373.539999][ T29] audit: type=1400 audit(376.516:62830): avc: denied { module_request } for pid=16746 comm="syz.2.4415" kmod="netdev-vxcan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 373.591736][ T29] audit: type=1400 audit(376.516:62831): avc: denied { sys_module } for pid=16746 comm="syz.2.4415" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 373.613533][ T29] audit: type=1400 audit(376.516:62832): avc: denied { prog_load } for pid=16746 comm="syz.2.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 373.633493][ T29] audit: type=1400 audit(376.516:62833): avc: denied { prog_load } for pid=16746 comm="syz.2.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 373.652476][ T29] audit: type=1400 audit(376.516:62834): avc: denied { prog_load } for pid=16746 comm="syz.2.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 373.671451][ T29] audit: type=1400 audit(376.516:62835): avc: denied { create } for pid=16746 comm="syz.2.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 373.711968][ T29] audit: type=1326 audit(376.616:62836): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16744 comm="syz.5.4414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11fe22efc9 code=0x7ffc0000 [ 373.736513][ T29] audit: type=1326 audit(376.616:62837): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16744 comm="syz.5.4414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11fe22efc9 code=0x7ffc0000 [ 373.760180][ T29] audit: type=1326 audit(376.656:62838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16749 comm="syz.2.4416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efcefe2efc9 code=0x7ffc0000 [ 373.962740][T16770] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 374.331648][T16791] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4431'. [ 374.360850][T16791] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4431'. [ 374.822762][T16800] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4435'. [ 374.834004][T16800] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4435'. [ 375.151874][T16814] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 375.158610][T16814] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 375.166457][T16814] vhci_hcd vhci_hcd.0: Device attached [ 375.234467][T16815] vhci_hcd: connection closed [ 375.234753][ T4989] vhci_hcd: stop threads [ 375.244851][ T4989] vhci_hcd: release socket [ 375.250380][ T4989] vhci_hcd: disconnect device [ 375.870671][T16841] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=16841 comm=syz.2.4448 [ 375.902973][T16843] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 376.207201][T16860] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 376.382306][T16880] IPv6: Can't replace route, no match found [ 376.707777][T16899] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 377.051040][T16905] netlink: 96 bytes leftover after parsing attributes in process `syz.5.4473'. [ 377.175384][T16921] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 377.182114][T16921] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 377.189773][T16921] vhci_hcd vhci_hcd.0: Device attached [ 377.196208][T16922] vhci_hcd: connection closed [ 377.196368][ T4983] vhci_hcd: stop threads [ 377.205413][ T4983] vhci_hcd: release socket [ 377.209957][ T4983] vhci_hcd: disconnect device [ 377.279320][T16925] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 378.227089][T16951] netlink: 176 bytes leftover after parsing attributes in process `syz.2.4491'. [ 378.237573][T16953] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 378.542585][ T29] kauditd_printk_skb: 2296 callbacks suppressed [ 378.542602][ T29] audit: type=1326 audit(381.526:65120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16944 comm="syz.0.4487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3582dd5e67 code=0x7ffc0000 [ 378.575252][ T29] audit: type=1326 audit(381.526:65121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16944 comm="syz.0.4487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3582d7b099 code=0x7ffc0000 [ 378.611435][ T29] audit: type=1326 audit(381.526:65122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16944 comm="syz.0.4487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 378.635615][ T29] audit: type=1326 audit(381.536:65123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16944 comm="syz.0.4487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3582dd5e67 code=0x7ffc0000 [ 378.660418][ T29] audit: type=1326 audit(381.536:65124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16944 comm="syz.0.4487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3582d7b099 code=0x7ffc0000 [ 378.684674][ T29] audit: type=1326 audit(381.536:65125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16944 comm="syz.0.4487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 378.708852][ T29] audit: type=1326 audit(381.556:65126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16944 comm="syz.0.4487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3582dd5e67 code=0x7ffc0000 [ 378.732998][ T29] audit: type=1326 audit(381.556:65127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16944 comm="syz.0.4487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3582d7b099 code=0x7ffc0000 [ 378.757288][ T29] audit: type=1326 audit(381.556:65128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16944 comm="syz.0.4487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f3582ddefc9 code=0x7ffc0000 [ 378.781566][ T29] audit: type=1326 audit(381.556:65129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16944 comm="syz.0.4487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3582dd5e67 code=0x7ffc0000 [ 379.187803][T16992] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 379.194411][T16992] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 379.202027][T16992] vhci_hcd vhci_hcd.0: Device attached [ 379.208998][T16993] vhci_hcd: connection closed [ 379.230721][ T4989] vhci_hcd: stop threads [ 379.240854][ T4989] vhci_hcd: release socket [ 379.245297][ T4989] vhci_hcd: disconnect device [ 379.462322][T17005] netlink: 'syz.3.4509': attribute type 4 has an invalid length. [ 379.470286][T17005] netlink: 17 bytes leftover after parsing attributes in process `syz.3.4509'. [ 379.495945][T17005] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 379.604728][T17010] sch_tbf: burst 3298 is lower than device lo mtu (11337746) ! [ 380.159468][T17036] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 380.166048][T17036] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 380.174055][T17036] vhci_hcd vhci_hcd.0: Device attached [ 380.198896][T17037] vhci_hcd: connection closed [ 380.199553][ T2933] vhci_hcd: stop threads [ 380.209735][ T2933] vhci_hcd: release socket [ 380.214217][ T2933] vhci_hcd: disconnect device [ 380.242805][T17040] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 380.473667][T17054] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 380.480280][T17054] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 380.489036][T17054] vhci_hcd vhci_hcd.0: Device attached [ 380.511768][T17055] vhci_hcd: connection closed [ 380.512054][ T4983] vhci_hcd: stop threads [ 380.522294][ T4983] vhci_hcd: release socket [ 380.527431][ T4983] vhci_hcd: disconnect device [ 380.994045][T17066] bridge0: port 1(dummy0) entered disabled state [ 381.009909][T17066] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 381.630589][T17092] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 381.638842][T17092] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 381.648019][T17092] vhci_hcd vhci_hcd.0: Device attached [ 381.683539][T17093] vhci_hcd: connection closed [ 381.683691][ T4983] vhci_hcd: stop threads [ 381.693811][ T4983] vhci_hcd: release socket [ 381.699342][ T4983] vhci_hcd: disconnect device [ 382.902333][T17139] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 382.909072][T17139] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 382.916689][T17139] vhci_hcd vhci_hcd.0: Device attached [ 382.924314][T17141] vhci_hcd: connection closed [ 382.924582][ T4989] vhci_hcd: stop threads [ 382.934855][ T4989] vhci_hcd: release socket [ 382.940370][ T4989] vhci_hcd: disconnect device [ 382.956987][T17147] bridge0: entered promiscuous mode [ 382.962486][T17147] macvtap0: entered allmulticast mode [ 382.968056][T17147] bridge0: entered allmulticast mode [ 382.974236][T17147] bridge0: port 1(macvtap0) entered blocking state [ 382.980932][T17147] bridge0: port 1(macvtap0) entered disabled state [ 382.989883][T17147] bridge0: left allmulticast mode [ 382.994977][T17147] bridge0: left promiscuous mode [ 383.550934][ T29] kauditd_printk_skb: 2073 callbacks suppressed [ 383.550954][ T29] audit: type=1400 audit(386.536:67203): avc: denied { execmem } for pid=17171 comm="syz.0.4573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 383.597359][ T29] audit: type=1400 audit(386.566:67204): avc: denied { create } for pid=17173 comm="syz.4.4574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 383.618676][ T29] audit: type=1400 audit(386.566:67205): avc: denied { prog_load } for pid=17173 comm="syz.4.4574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 383.637721][T17172] bond4: invalid ARP target 0.0.0.0 specified for addition [ 383.637746][T17172] bond4: option arp_ip_target: invalid value (0) [ 383.653270][ T29] audit: type=1400 audit(386.566:67206): avc: denied { open } for pid=17173 comm="syz.4.4574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 383.673490][ T29] audit: type=1400 audit(386.566:67207): avc: denied { prog_load } for pid=17173 comm="syz.4.4574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 383.693347][ T29] audit: type=1400 audit(386.566:67208): avc: denied { open } for pid=17171 comm="syz.0.4573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 383.713432][ T29] audit: type=1400 audit(386.576:67209): avc: denied { open } for pid=17171 comm="syz.0.4573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 383.733788][ T29] audit: type=1400 audit(386.576:67210): avc: denied { map_create } for pid=17171 comm="syz.0.4573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 383.753608][ T29] audit: type=1400 audit(386.576:67211): avc: denied { prog_load } for pid=17171 comm="syz.0.4573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 383.773354][ T29] audit: type=1400 audit(386.576:67212): avc: denied { prog_load } for pid=17171 comm="syz.0.4573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 383.797408][T17172] bond4 (unregistering): Released all slaves [ 383.878807][T17180] netlink: 'syz.4.4576': attribute type 11 has an invalid length. [ 383.901683][T17184] netlink: 'syz.2.4578': attribute type 21 has an invalid length. [ 384.101718][T17194] netlink: 'syz.5.4582': attribute type 12 has an invalid length. [ 384.362421][T17205] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4587'. [ 384.371715][T17205] netlink: 52 bytes leftover after parsing attributes in process `syz.3.4587'. [ 384.395208][T17205] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4587'. [ 384.699249][T17228] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.4595'. [ 384.709930][T17223] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.4595'. [ 385.035298][T17245] netlink: 'syz.2.4601': attribute type 10 has an invalid length. [ 385.328532][T17259] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 385.559029][T17274] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.4613'. [ 386.094873][T17294] netlink: 'syz.0.4618': attribute type 10 has an invalid length. [ 387.269018][T17335] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4633'. [ 388.049982][T17367] binfmt_misc: register: failed to install interpreter file ./file2 [ 388.157152][T17356] ================================================================== [ 388.165482][T17356] BUG: KCSAN: data-race in shmem_file_splice_read / shmem_file_splice_read [ 388.174160][T17356] [ 388.176525][T17356] write to 0xffff88811b41bee8 of 8 bytes by task 17360 on cpu 0: [ 388.184463][T17356] shmem_file_splice_read+0x470/0x600 [ 388.189888][T17356] splice_direct_to_actor+0x26f/0x680 [ 388.195297][T17356] do_splice_direct+0xda/0x150 [ 388.200094][T17356] do_sendfile+0x380/0x650 [ 388.204536][T17356] __x64_sys_sendfile64+0x105/0x150 [ 388.209753][T17356] x64_sys_call+0x2bb4/0x3000 [ 388.214466][T17356] do_syscall_64+0xd2/0x200 [ 388.219018][T17356] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 388.225024][T17356] [ 388.227397][T17356] write to 0xffff88811b41bee8 of 8 bytes by task 17356 on cpu 1: [ 388.235240][T17356] shmem_file_splice_read+0x470/0x600 [ 388.240666][T17356] splice_direct_to_actor+0x26f/0x680 [ 388.246073][T17356] do_splice_direct+0xda/0x150 [ 388.250885][T17356] do_sendfile+0x380/0x650 [ 388.255332][T17356] __x64_sys_sendfile64+0x105/0x150 [ 388.260560][T17356] x64_sys_call+0x2bb4/0x3000 [ 388.265271][T17356] do_syscall_64+0xd2/0x200 [ 388.269832][T17356] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 388.275746][T17356] [ 388.278079][T17356] value changed: 0x000000000003e50e -> 0x000000000003e5a8 [ 388.285196][T17356] [ 388.287531][T17356] Reported by Kernel Concurrency Sanitizer on: [ 388.293844][T17356] CPU: 1 UID: 0 PID: 17356 Comm: syz.3.4640 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 388.305535][T17356] Tainted: [W]=WARN [ 388.309362][T17356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 388.319527][T17356] ================================================================== [ 388.839076][ T29] kauditd_printk_skb: 2053 callbacks suppressed [ 388.839094][ T29] audit: type=1400 audit(391.826:69254): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=582 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0