last executing test programs: 7m3.363304172s ago: executing program 0 (id=273): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x531, &(0x7f0000000640)="$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") r0 = syz_io_uring_setup(0x1d9e, &(0x7f00000000c0)={0x0, 0xe876, 0x40, 0x0, 0x2d4}, &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000240)={[{@delalloc}, {@data_err_abort}, {@auto_da_alloc}, {@dioread_lock}, {@noblock_validity}, {@abort}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@stripe={'stripe', 0x3d, 0x8001}}, {@bh}, {@dioread_nolock}]}, 0x3, 0x563, &(0x7f00000014c0)="$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") recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0700000004000000080200000100000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000a80)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x29914}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2, {0x7}}, './file1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x19, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0xf, 0x1000, &(0x7f0000001a40)=""/4096, 0x40f00, 0x30, '\x00', 0x0, @fallback=0x1b, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x4, 0x9, 0x800, 0x800}, 0x10, 0xffffffffffffffff, r5, 0x2, &(0x7f0000000980)=[r1], &(0x7f0000000a40)=[{0x1, 0x4, 0x8, 0x7}, {0x3, 0x3, 0x2, 0xc}], 0x10, 0x1}, 0x94) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x8, 0x3, 0x458, 0xd0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x388, 0xffffffff, 0xffffffff, 0x388, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @dev={0xfe, 0x80, '\x00', 0x3f}, [0xff], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @empty}, @private2, [0x0, 0xffffff00], [0xffffffff, 0xff, 0x0, 0xffffff00], 'gre0\x00', 'veth0\x00', {0xff}, {0xff}, 0x87, 0xe, 0x6, 0x9}, 0x0, 0x258, 0x2b8, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x4, 0x0, 0x2001000, 0x6, 0x3, 0x0, 0x20}, {0x2}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@private=0xa010101, [0xffffffff, 0xffffff00], 0x4e20, 0x4e23, 0x4e20, 0x4e21, 0x41f86f8c, 0x9, 0x49, 0x7, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x4b8) r7 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000006, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x1, 0x1, 0x8, 0x20005, 0x2b, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sync() execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r8 = pidfd_getfd(0xffffffffffffffff, r7, 0x0) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000100)={0x20000000}) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x22, 0x0, 0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$SG_IO(r11, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x51, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x0, 0x8, 0x0, 0x0}) r12 = syz_open_procfs(0x0, &(0x7f0000000580)='attr/exec\x00') mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r12, @ANYBLOB=',wfdno=', @ANYRESHEX=r12]) syz_io_uring_setup(0x2e3b, &(0x7f0000000240)={0x0, 0x69e5, 0x10000, 0x0, 0x166, 0x0, r12}, &(0x7f00000003c0), &(0x7f0000001040)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}]}, 0x0) 7m2.471688343s ago: executing program 0 (id=279): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) preadv(r2, 0x0, 0x0, 0xe, 0x800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000a608000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000001080)={0x28, 0x0, 0x0, @local}, 0x10) connect$vsock_stream(r3, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0x0, 0x6}, [@IFLA_ADDRESS={0xa, 0x3, @random="99fa3a1c872f"}, @IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x44}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000005c0)={'syz_tun\x00', 0x0}) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000001000), 0xffffffffffffffff) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='rxrpc_conn\x00'}, 0x18) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r7, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x2}, 0x40000100) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 7m0.452100475s ago: executing program 0 (id=289): io_setup(0x5, &(0x7f0000000240)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r2 = socket$kcm(0x2, 0xa, 0x2) r3 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000300)={0x0, 'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="04000000000000000000ef0979b2bf3c6e182787ac837edc1a4135f44167eaa5beccca1ad71908545fe86cfa956c4775c1fc6a5157dc7cab406482c178482d0bb5ae3ddd01108aac9c0e0bfa56c243978798b6b7ed63c7a8c966195c86c0c0d7ad19bbd5663b4133d7", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000010000000200"/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x10) r6 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\xdfy[\xd9\xffR8\xf4\x1c\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\x00\x90+\xd6\x05\r\x84\x87\x1c\b\xdb\xe2\x00\x00A\x90m\xb6&\xd0\x9d\x00\x00\xc5\xb8,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\x00\x00\x00\x00\x00\x00\r\x1b\xd3\xff<\x83z\x80\x8fQ|\xf5d\x10\x10\xd7\x01M\x7fML\x18\'\x1a<\xfee7{l\x16}\xa0I\x7f\xb5)l\xbb\x02\xfa\xb7\xb6\xa0]\xda8\xe0~\x1c \x91\t\x8b\xbd\x1f\xb3834d1i\x9b\x94\xa6\\\x0e\xe2\xfa\xe5!\xd3\xcf\xfc\xce\xba\xe2\x9f\x05xgL5\x14Y+\xb3\x1axi)<\xf7\x98\xc1\xba\xf4|\xe7|\xc4\xd7\x03\x00\x00\x00\x04D\x15E^7%8\x94y\x98\xf0l\xa0\'Q%\xd4\xda\xee\x81}\xcc\xfd\xa2\xe3M~x\x96\xe3]\xd70\xa2\x17\xca\xde\x1b\xaa\xe0l\xfc\x85\x8fc\x1c{|e\x8bs\xb0\x85E\xce;p)\xf8\xa6\xaa&QC4V\x81\x04\xcf\xd2\x81\xdc\xdf\xd7<\x9f\x93\x8bX\xd4\xea\xb2\xff\b\x92\xc7\x00\xef\xff\x00\x93U\xf9%`\x038))\xe2X\xa2Q\xd3\xe2\xeb\x1f\x92\xa7dcY\x9c\x9e9O-\xfcF\xbb\xbd{:IR\xea\xd8$\xe2\xa0\xc2\x8b\x1a\xead\xb8\xe1:6\x15M\x1d\xdak\x8c\x909\xd8\xb3\x02\xe0\x04\x9c\xc2\x06|\xf0\x0f\xa6Y&r\x9b\xc7\x1d\xe7jDf\x87@\x8fg\x15RJwe\xe2\xdcunu\xff`\xa40\xce\xffB%\xe4k\xff\x8d\x06\x0e\x89\xd9DC\x9fF\x9c[M=\xe0^\xa8\xed)\xe8Z\xe8\x99&\x87\x04\xa4\t\xaa\xd8\xd6\xd5pG\xcb\xc4\x8b\xf7\xb8#\xcb\xd8|\xa5\xa6S\x8b\x8cv\xb7)\x02k\xf3L\x03\xbb\xfa\xe1\\\xf1\x8cUj\xd5\xa5\x88GL\xe7_\xfd\x17C=G\x0f\xe9u\x1d\xfeg\xfex\xcd\xaa\xad\x906\xd0sy\xc6T\x93\xae\xd5r\xc8G\xc5\xfdS\xff\x04:`\x1e\xe3Kl\xcd&\xd4\xf4\x8eum\x04\x00~\xfa\x05\xd7\xe7X\xc70\xae5\x93wwT\x13\xbd,\xd6\x16\x84\xcd\xd1\xd8\xe1P_\xbf0\xd8\x8d%Yh\xb5\xb4\"\xf5\x93\xdeh\xce\xa5\xe8\xc8\xec\x88\x89\xf07{\x95\xc9\xd0\xee\xe1\x1d\x80\xcc]F\xc2\xa1\x02ELhI\xd9\xf5\xcfk\x8a&i\xc1\xff9T\x8e\xe2rY\xa3\xd2H9\xfe\x0e\x1e\xac\x0f\xc3\xbd{\xd9\xcc\xbe\xa9\x93\xe0\xa4W\x1cn>\xc1\xf1\x9e\"\x93\x19\x19\x1a\xcc\x90y\xd2~\x05\x99\xe6\x00o\xca\xe0\xc6\xd4\xf5\xa0\xc8P\xd6;\xf3\xc6~E\xacI\xd4\xe9\xa1|>\x91.K\x81\xa9+\xcf\xff\xcb\xfa\x0f\xe7n\x83H\x12\xac\x80\x16\xf8\x87Q\x97Az\n`\xb6\xe13A\xec\x8d(\\D\xec\xa6\t1\xa0h\xfc\x1f\xdd1@-4\xb4:\xf8\xd5wP \x84m\xe2\xd9\xfcb\xa0', 0x2) write(r6, &(0x7f00000002c0)='Y0', 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="bc5dad17826a2c2de10be57c00"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xb, 0x2012, r6, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYRES16=r7, @ANYRES8=r0, @ANYRES32=r8, @ANYRES8=r4, @ANYRES64=r2, @ANYRES16=r2], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000200)={'veth0_to_team\x00', 0x0}) unshare(0x6a040000) mmap(&(0x7f00002ad000/0xc00000)=nil, 0xc00000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = gettid() sendmsg$nl_route(r10, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000005f00)=ANY=[@ANYBLOB="2800000010000100"/20, @ANYRES32=r9, @ANYBLOB="6d3082610000000008001300", @ANYRES32=r11], 0x28}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="000088f81280c2000001aaaaaaaaaaaa88a8a00081"], 0x72) 6m59.262293231s ago: executing program 0 (id=295): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) socket$nl_generic(0x10, 0x3, 0x10) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, 0x0) readv(r4, &(0x7f0000000000)=[{&(0x7f00000020c0)=""/4100, 0x1004}], 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r5}, 0x10) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") r6 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r6, 0x2007ffc) sendfile(r6, r6, 0x0, 0x800000009) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x64, 0x50a, &(0x7f0000000200)="$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") r8 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$binfmt_register(r8, &(0x7f00000000c0)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0x9, 0x3a, '+\'', 0x3a, '', 0x3a, './file2', 0x3a, [0x46]}, 0x2a) 6m58.860371633s ago: executing program 0 (id=298): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d030000000000000000130000001c000980080002"], 0x30}}, 0x0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000580)={0x78, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40}]}, @TIPC_NLA_BEARER={0xc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x45f}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4048041}, 0x40004) socket$nl_netfilter(0x10, 0x3, 0xc) socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4000810) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setitimer(0x2, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0xc000) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="2e0000001000818807b62aa73f72cc9f0ba1f8483a0000005e120602000300000e000a0010000000028000001294", 0x2e}], 0x1}, 0x20008800) syz_read_part_table(0x60d, &(0x7f0000002200)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000540)='./file1\x00', 0x105042, 0x1db) writev(r6, &(0x7f0000000140)=[{&(0x7f0000001200)="10", 0x100000}], 0x1) readv(r2, &(0x7f0000002a40)=[{&(0x7f00000007c0)=""/4096, 0x1000}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r7 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) r8 = fsmount(r7, 0x0, 0x0) fchdir(r8) open(&(0x7f00000003c0)='.\x00', 0x800, 0x0) 6m58.608791834s ago: executing program 0 (id=300): r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'system_u:object_r:udev_helper_exec_t:s0', 0x20, 'unconfined', 0x20, 0x5}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x530, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x6793, 0x13}, 0x0, 0x5, 0x800, 0x1, 0x5, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) write$UHID_CREATE(r1, &(0x7f00000006c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000280)=""/58, 0x3a, 0xd8, 0x2, 0x7fffffff, 0xc64}}, 0x120) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x23, '\x00', 0x0, 0x2}, 0x94) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001800010000000000000000000a000000000000000000000808000400", @ANYRES32=r3, @ANYBLOB="06001500070000000c00168008000100", @ANYRES64=r2], 0x38}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r5, 0x0, 0xffffffffffffffff}, 0x18) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000480)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5, 0x0, 0x0, {0x3, 0x0, 0x2}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x3c}, 0x1, 0x0, 0x0, 0x880}, 0x0) r9 = socket(0x10, 0x3, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='mm_page_alloc\x00', r10}, 0x10) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/1, 0x1, 0xffffffffffffff05) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newqdisc={0x3c, 0x24, 0x3fe3aa0262d8c583, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r11, {0x0, 0xf}, {0xffff, 0xffff}, {0x6}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0xc, 0x8002, [@TCA_FQ_PIE_ALPHA={0x8, 0x5, 0x3}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2}, 0x2000400c) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)={{0x14}, [@NFT_MSG_DELOBJ={0xb8, 0x14, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xde71cfd5121edf2b}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_USERDATA={0x67, 0x8, "528ed249b65a19407ac90fc3ccadff4c9368da33a3cd51644965a08b64acb55de034b25e59d896670146f2cc1a474150608293adb4a502a8643cb09ae20566cc0dfe841b579b4dc8c0c9cecc2512f34d14a3c69a6f2e77e64cf5bcaced56a6ed0bc64d"}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x6}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELRULE={0x138, 0x8, 0xa, 0x301, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_USERDATA={0xf3, 0x7, 0x1, 0x0, "f02df184511eb6a26c6b1607ccaa7d29d76ae022f1d6aa3eee6a1d7128af398bc930ef1d481452bbf340ef71ac020c6427c2d88f296bdd33a3ad6f01eb4f16d3970d316e19ca9046f314a7d1b581d5e5a5747b54664c3ef4e765633ba567d272989a9a60e0830f74842b8aee55a4fd1cef19feddca44507c7c037b4650c305a9cac2618aee6b74f5234258e05a1335e71396d9d5c4a6ee5b7e7e51d63b0cd5f2de62edbc313ff05a16c21f3cf7c4c8cc9baebe6872cca2128a75262d88b9bc60560d829815b993610030d4c1c498e8cec2758ec003e85db7ed6fe26cd51604993888d904ed91cd50fe39d6fe9a7ab8"}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWSET={0x14c, 0x9, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x1}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x6}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_EXPRESSIONS={0xec, 0x12, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @payload={{0xc}, @void}}, {0x34, 0x1, 0x0, 0x1, @quota={{0xa}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_QUOTA_FLAGS={0x8}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x3c, 0x1, 0x0, 0x1, @tunnel={{0xb}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_MODE={0x8}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_KEY={0x8}]}}}, {0x48, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x7}, @NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x1}, @NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x7}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x3}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0xfff}, @NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x10}]}}}, {0x10, 0x1, 0x0, 0x1, @target={{0xb}, @void}}]}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x23}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x364}}, 0x20050800) writev(r7, &(0x7f0000000540)=[{&(0x7f0000000180)="13db152793b9e5e380bba1625ac6cd1bd6babfbbfa9f56087b23d16b811d19ee7ade5e2f5f32262062f761165e23fb3c57f571870d2afc67a654ff226ccd89cb1e802698382f3b80e1e05e7ac6dd19a7ec4733fa061cefaa06fd4e8da34aae37aca99a078073988dc965163d69f8aef5a7bb0015645a8407aad9c17989de211f31665211b12de0a88ed68492e7871026a34cef6feee1e9a087", 0x99}, {&(0x7f0000000080)="6c221b6dc432a22fb696275763b0c4d3381b4ba64c8a38badd0bb9dac49485f996", 0x21}, {&(0x7f0000000340)="253c6d749d563ef0db474ca1ea1ae8c7183766851490723278c63df362498532617f6cefefc3b34a3e6ebd98945608bd705bdbecf5b319777b7d9e7acf8b3c14b5f5287661d985fc2053f504dd1d908da2b019886ef073ee27a64e046370f49bce386b08046dccf2abcf2f9c33765893cf4e2b5b7a4ce19caf09a822536d5cb27d8fe09539e5bd22deeb159f3a939ab9c6e03fafb3e507e7df8b53fb39825cf03f0c4311e0231e8db352de349130a114b77e0324c8f9c44e98de47d20d39", 0xbe}, {&(0x7f0000000400)="eb0f2445e0306ff0cc6a74ef10adaf2a9f32e0b037a0fd146580563c0c1b1c8dda579968461b9fd146785231f83ab57cd5ed9a8b71f3ed7795e0beac2398bec8f95e7229f7a2baa760a9c4ac3232e3128fd937cb0dce09af1f76d1c76fc4b45683de395ea1c96e207141", 0x6a}, {&(0x7f0000000480)="e4319a81e44bde0e685c3ab1e33b50a77c369114ef195819887f1dcd03ad72b9c10f87480e9718b512c47aab5fb5c4e295be21dfe38eed6f8a86f186f02f00208d7eb40718d889b398880c0455fb12afb58b09566b7b946373be3b93805582ef37e875df23f204b982a07f20f9acc0e62dae95dc08d36898c887a280eeaec2069e33abffc73db1372b9ab085be5f52ab1f1cf216", 0x94}], 0x5) 6m58.521179951s ago: executing program 32 (id=300): r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'system_u:object_r:udev_helper_exec_t:s0', 0x20, 'unconfined', 0x20, 0x5}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x530, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x6793, 0x13}, 0x0, 0x5, 0x800, 0x1, 0x5, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) write$UHID_CREATE(r1, &(0x7f00000006c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000280)=""/58, 0x3a, 0xd8, 0x2, 0x7fffffff, 0xc64}}, 0x120) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x23, '\x00', 0x0, 0x2}, 0x94) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001800010000000000000000000a000000000000000000000808000400", @ANYRES32=r3, @ANYBLOB="06001500070000000c00168008000100", @ANYRES64=r2], 0x38}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r5, 0x0, 0xffffffffffffffff}, 0x18) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000480)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5, 0x0, 0x0, {0x3, 0x0, 0x2}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x3c}, 0x1, 0x0, 0x0, 0x880}, 0x0) r9 = socket(0x10, 0x3, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='mm_page_alloc\x00', r10}, 0x10) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/1, 0x1, 0xffffffffffffff05) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newqdisc={0x3c, 0x24, 0x3fe3aa0262d8c583, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r11, {0x0, 0xf}, {0xffff, 0xffff}, {0x6}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0xc, 0x8002, [@TCA_FQ_PIE_ALPHA={0x8, 0x5, 0x3}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2}, 0x2000400c) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)={{0x14}, [@NFT_MSG_DELOBJ={0xb8, 0x14, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xde71cfd5121edf2b}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_USERDATA={0x67, 0x8, "528ed249b65a19407ac90fc3ccadff4c9368da33a3cd51644965a08b64acb55de034b25e59d896670146f2cc1a474150608293adb4a502a8643cb09ae20566cc0dfe841b579b4dc8c0c9cecc2512f34d14a3c69a6f2e77e64cf5bcaced56a6ed0bc64d"}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x6}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELRULE={0x138, 0x8, 0xa, 0x301, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_USERDATA={0xf3, 0x7, 0x1, 0x0, "f02df184511eb6a26c6b1607ccaa7d29d76ae022f1d6aa3eee6a1d7128af398bc930ef1d481452bbf340ef71ac020c6427c2d88f296bdd33a3ad6f01eb4f16d3970d316e19ca9046f314a7d1b581d5e5a5747b54664c3ef4e765633ba567d272989a9a60e0830f74842b8aee55a4fd1cef19feddca44507c7c037b4650c305a9cac2618aee6b74f5234258e05a1335e71396d9d5c4a6ee5b7e7e51d63b0cd5f2de62edbc313ff05a16c21f3cf7c4c8cc9baebe6872cca2128a75262d88b9bc60560d829815b993610030d4c1c498e8cec2758ec003e85db7ed6fe26cd51604993888d904ed91cd50fe39d6fe9a7ab8"}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWSET={0x14c, 0x9, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x1}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x6}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_EXPRESSIONS={0xec, 0x12, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @payload={{0xc}, @void}}, {0x34, 0x1, 0x0, 0x1, @quota={{0xa}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_QUOTA_FLAGS={0x8}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x3c, 0x1, 0x0, 0x1, @tunnel={{0xb}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_MODE={0x8}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_KEY={0x8}]}}}, {0x48, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x7}, @NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x1}, @NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x7}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x3}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0xfff}, @NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x10}]}}}, {0x10, 0x1, 0x0, 0x1, @target={{0xb}, @void}}]}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x23}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x364}}, 0x20050800) writev(r7, &(0x7f0000000540)=[{&(0x7f0000000180)="13db152793b9e5e380bba1625ac6cd1bd6babfbbfa9f56087b23d16b811d19ee7ade5e2f5f32262062f761165e23fb3c57f571870d2afc67a654ff226ccd89cb1e802698382f3b80e1e05e7ac6dd19a7ec4733fa061cefaa06fd4e8da34aae37aca99a078073988dc965163d69f8aef5a7bb0015645a8407aad9c17989de211f31665211b12de0a88ed68492e7871026a34cef6feee1e9a087", 0x99}, {&(0x7f0000000080)="6c221b6dc432a22fb696275763b0c4d3381b4ba64c8a38badd0bb9dac49485f996", 0x21}, {&(0x7f0000000340)="253c6d749d563ef0db474ca1ea1ae8c7183766851490723278c63df362498532617f6cefefc3b34a3e6ebd98945608bd705bdbecf5b319777b7d9e7acf8b3c14b5f5287661d985fc2053f504dd1d908da2b019886ef073ee27a64e046370f49bce386b08046dccf2abcf2f9c33765893cf4e2b5b7a4ce19caf09a822536d5cb27d8fe09539e5bd22deeb159f3a939ab9c6e03fafb3e507e7df8b53fb39825cf03f0c4311e0231e8db352de349130a114b77e0324c8f9c44e98de47d20d39", 0xbe}, {&(0x7f0000000400)="eb0f2445e0306ff0cc6a74ef10adaf2a9f32e0b037a0fd146580563c0c1b1c8dda579968461b9fd146785231f83ab57cd5ed9a8b71f3ed7795e0beac2398bec8f95e7229f7a2baa760a9c4ac3232e3128fd937cb0dce09af1f76d1c76fc4b45683de395ea1c96e207141", 0x6a}, {&(0x7f0000000480)="e4319a81e44bde0e685c3ab1e33b50a77c369114ef195819887f1dcd03ad72b9c10f87480e9718b512c47aab5fb5c4e295be21dfe38eed6f8a86f186f02f00208d7eb40718d889b398880c0455fb12afb58b09566b7b946373be3b93805582ef37e875df23f204b982a07f20f9acc0e62dae95dc08d36898c887a280eeaec2069e33abffc73db1372b9ab085be5f52ab1f1cf216", 0x94}], 0x5) 4m26.456859438s ago: executing program 5 (id=1509): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x201, 0x70bd2d, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) read(0xffffffffffffffff, &(0x7f00000027c0)=""/4073, 0xfe9) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb904}, 0x94) r4 = socket$inet6_icmp(0xa, 0x2, 0x3a) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$tipc(r5, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x8, 0x40002}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0x4092}, 0x18) modify_ldt$write(0x1, &(0x7f0000000040)={0x806, 0xffffffffffffffff}, 0x10) syz_clone(0x26801000, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000300)={0xa, 0x4e20, 0x487, @mcast1, 0x807}, 0x1c) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x3, @empty}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r6, &(0x7f0000000240), 0xfffffecc) ioctl$VT_RESIZE(r6, 0x5609, &(0x7f0000000080)={0x5, 0x7, 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) 4m25.299537281s ago: executing program 5 (id=1529): socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_int(r1, 0x29, 0x49, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x482000, 0x734c6fc4f278d9da, 0x1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="6c0000001000010400d201000072f60000020000", @ANYRES32=0x0, @ANYBLOB="0524060000000000300012800b0001006272696467650000200002800c002e00fffff6ffffffffff050007001f000000020027000000000008000a00a8"], 0x6c}}, 0x0) connect$l2tp6(0xffffffffffffffff, &(0x7f0000002a40)={0xa, 0x0, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8, 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x18) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$nci(r4, 0x0, 0xfffffeea) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r5, 0x0, 0x2, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x4) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r7, 0x113, 0x1, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$VT_RESIZEX(r6, 0x560a, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x0, 0x9}) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000280)={'ipvlan0\x00', {0x2, 0x4e24, @rand_addr=0x64010102}}) syz_open_procfs(0x0, &(0x7f00000004c0)='map_files\x00') syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f00000005c0)={[{@nolazytime}, {@jqfmt_vfsold}, {@journal_path={'journal_path', 0x3d, './file0/../file0'}}, {@noquota}, {@nodioread_nolock}, {@journal_checksum}, {@data_err_abort}], [{@seclabel}]}, 0x3, 0x473, &(0x7f0000000640)="$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") r8 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_pidfd_open(r8, 0x0) 4m25.074007399s ago: executing program 5 (id=1522): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x100002, 0x0, 0xfffffffc, 0x6, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000f6ffe6057b8af8ff00000000bfa200000000000007020000f8ffffff0000000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0xdc, &(0x7f0000000200), 0x1, 0x46f, &(0x7f00000008c0)="$eJzs3M9vFFUcAPDvbFsQEFsM/uCHUkUj0djSgsrBAxhNPGhiogc81rYQpFBDayKESDUGj4ZEozfj0cS/wJNejHoy8ap3Q0IMF5DTmNmdYbfL/ujShW3ZzyeZ9L2ZN33v25nXfW9epwH0rdGI+Cwi7o+IvyJiOCKS+gKjlS/Xr56f/u/q+ekk0vTtf5NyuWtXz08XRYvzthSZpUp+V4N6F86eOzk1Nzd7Js+PL576YHzh7LnnT5yaOj57fPb05KFDBw9MvPTi5AsriGKgbYmsTdd2fjy/e8fr7156c/ropfd++yHJw4u6OLpktNXBp7tcWa9trUkngz1sCB3Jek52uYbK/X84BqJ68YbjtU972jjgjkrTNN3Y/PBSCtzDklhxyTvbEOAuKz7os/lvsd2loceacOVIZQKUxX093ypHBqOUlxmqm992UzbbOrp049tsizvzHAIAYJmfjlS+3jr+K8XDNeUO52tDIxGxrWZxY3tEPBRRLvtIRDzaYf31iyS3jn9Klzv8lh3Jxn8v52tby8d/xegvRgby3NZy/EPJsRNzs/sj4oGI2BdDG7P8RIs6fn71zy+aHRutGf9lW1Z/MRbM23F5sO4B3czU4tRqYq515ZOInYON4k9urgQkEbEjInbuqTlxw8rrOPHs97ubHWsffwtdWGdKv4t4pnL9l6Iu/kLSen1y/L6Ym90/XtwVt/r9j4tvNau/0/i3fVOds3VDdv03N7z/b8Y/kg7UrNcudF7Hxb8/bzqnud37f0PyTjld3IYfTS0unpmI2JC8ke8/XN0/WT23yBfls/j37W3c/x+M6k9iV0RkN/FjEfF4ROzJ2/5ERDwZEXtbxP/rK0+9v2zHjerke1X3fxdk8c+0uf5J7Xr9bSQGTv7y47JKR6rJlV3/g+XUvnxP+fff163jWmkDV/8TBAAAgLWvVP7b/6Q0djNdKo2NVf5efntsLs3NLyw+d2z+w9MzlXcERmKoVDzpGq55HjqRT+uL/GRd/kD+3PjLgU3l/Nj0/NxMr4OHPrelSf/P/NP+tRpgvfO+FvQv/R/6l/4P/Uv/h77V6P3/Te3KpB4Owj2h0ef/hR60A7j7jP+hf3Xa/yuTgxb/NgxYN3z+Q//S/6Evrea9/lUmin8/2LBMsf7Qi4a1TaRpuzKDrU6/0DjkdZaI0ppoRpcSX62NZqyhRG9/LwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHTL/wEAAP//lrDxFg==") bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000180), r4) sendmsg$NFC_CMD_GET_TARGET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r5, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000300), r4) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000000), r4) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0100000000000000000003000000080001"], 0x28}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001540)={&(0x7f0000001780)=ANY=[@ANYRESOCT=r2, @ANYRES16=r6, @ANYBLOB="00012bbd7000fbdbdf250200000008000100000000000c00050002000000000000000c00060002000000000000000c00030005000000000000000c0003000500000000000000280007800c00018008000100", @ANYRES32=r0, @ANYBLOB="0c00018008000100", @ANYRES64=0x0, @ANYBLOB="0c000090b2d98de5fda4fad9b910b57f6c9ee7164f520fd558c67c00cfb853faa9361c2965df4a7b087e5d68937b65857650dd376a2b6d531f9b9e203d918b2b691ae92437f17430f315112e0b5282b270c2e77de157f0e3fdc5dc4ac9dfc2dc99c7b33d39566557795721e547c4d547a69080e96b2fb3e4471ab294ab62f2f2fc812d41240b08d3e5f77cea36647036155e2cfdab2136865ac74ad862bf2bcfb7bf24013bf6f323ea95a51276e88dde9b8b63a3ed803c9be2eaf85ab20046018547ce73bf0441550e90ec5764697ebb86671ad973", @ANYRES32=r7, @ANYBLOB="0c00020000000000000000b96e628978707200"/32], 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r8 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r9 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r10}, 0x10) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) read(r8, &(0x7f00000003c0)=""/4096, 0x1000) 4m24.163624502s ago: executing program 5 (id=1530): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x40900, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', r2}, 0x10) io_setup(0x3, &(0x7f0000000340)) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x5400, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000008"], 0x48) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000180)=@phonet, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000100)}, {&(0x7f0000000240)}, {&(0x7f00000002c0)=""/9, 0x9}, {&(0x7f0000000300)=""/84, 0x54}, {&(0x7f0000000400)=""/128, 0x80}, {&(0x7f0000000480)=""/138, 0x8a}, {&(0x7f0000000700)=""/187, 0xbb}, {&(0x7f0000000380)=""/18, 0x12}, {&(0x7f00000007c0)=""/201, 0xc9}], 0x9}, 0x4}, {{&(0x7f0000000540)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000a00)=""/163, 0xa3}, {&(0x7f0000000980)=""/14, 0xe}, {&(0x7f0000000ac0)=""/252, 0xfc}, {&(0x7f0000000bc0)=""/96, 0x60}, {&(0x7f0000000c40)=""/120, 0x78}], 0x5}}], 0x2, 0x10000, &(0x7f0000000dc0)={0x0, 0x989680}) unshare(0x8040600) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) pipe2$watch_queue(0x0, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x50) socket$phonet_pipe(0x23, 0x5, 0x2) sched_setscheduler(0x0, 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000240)=0x1e) sendmsg$NFT_BATCH(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a31000000002c0003800800014000000000180003801400010076657468315f746f5f626f6e6400000008000240000000006c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a30000000004000038008000140000000002c0003801400010067656e657665300000000000000000001400010076657468315f746f5f626f6e64000000080002"], 0x10c}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) r5 = creat(&(0x7f0000000280)='./file0\x00', 0xe5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) write$qrtrtun(r5, &(0x7f0000001880)="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", 0x45c) r7 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r6, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)=[0x45c], 0x0, 0x0, 0x1, 0x1}}, 0x40) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r7, 0x0, 0x0}, 0x10) 4m23.896092144s ago: executing program 5 (id=1534): creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_int(r2, 0x29, 0x49, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x482000, 0x734c6fc4f278d9da, 0x1}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="6c0000001000010400d201000072f60000020000", @ANYRES32=0x0, @ANYBLOB="0524060000000000300012800b0001006272696467650000200002800c002e00fffff6ffffffffff050007001f000000020027000000000008000a00a8"], 0x6c}}, 0x0) connect$l2tp6(0xffffffffffffffff, &(0x7f0000002a40)={0xa, 0x0, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8, 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x18) r5 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$nci(r5, 0x0, 0xfffffeea) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r6, 0x0, 0x2, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x4) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r8, 0x113, 0x1, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x0, 0x9}) ioctl$sock_inet_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000000280)={'ipvlan0\x00', {0x2, 0x4e24, @rand_addr=0x64010102}}) syz_open_procfs(0x0, &(0x7f00000004c0)='map_files\x00') 4m23.359172956s ago: executing program 5 (id=1538): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xc}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8982, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x13, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000008000000000000002000000186a00000c000000000000005a1b000018000000000001000000000000800000b40b080000000000851000000700000018290000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001860000009000000000000000100000095000000000000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x52, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x5, 0xc, 0x40, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000980)=[r0, r1, r1, r1, r1, r1, 0xffffffffffffffff, r1, r1], &(0x7f0000000a00)=[{0x2, 0x1, 0x4, 0x9}], 0x10, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r5, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400), &(0x7f00000005c0)=[0x0], 0x0, 0xc6, &(0x7f0000000600), 0x0, 0x10, &(0x7f0000000840), &(0x7f0000000400), 0x8, 0x6f, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000c40)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000a000000540004801300010062726f6164636173742d6c696e6b00002400078008000300000000000800030007000000080001000000000008000300050000000900010073797a30000000000900010073797a310000020019c7e870e5996b18f79b48934b9736b40c850fd937dca9f64cfaee36aab379e7095a5cc3596f7e6e1f6fb551130394cb2eb2f070e2b8b22424b0dee2bf890efe"], 0x68}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000183, &(0x7f0000000440)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9, 0x0, 0x61c9}, 0x18) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="140100002800010004000000fcdbdf250401f2800c00180008ac0f0000000000140001"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) 4m9.290951447s ago: executing program 33 (id=1538): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xc}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8982, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x13, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000008000000000000002000000186a00000c000000000000005a1b000018000000000001000000000000800000b40b080000000000851000000700000018290000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001860000009000000000000000100000095000000000000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x52, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x5, 0xc, 0x40, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000980)=[r0, r1, r1, r1, r1, r1, 0xffffffffffffffff, r1, r1], &(0x7f0000000a00)=[{0x2, 0x1, 0x4, 0x9}], 0x10, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r5, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400), &(0x7f00000005c0)=[0x0], 0x0, 0xc6, &(0x7f0000000600), 0x0, 0x10, &(0x7f0000000840), &(0x7f0000000400), 0x8, 0x6f, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000c40)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000a000000540004801300010062726f6164636173742d6c696e6b00002400078008000300000000000800030007000000080001000000000008000300050000000900010073797a30000000000900010073797a310000020019c7e870e5996b18f79b48934b9736b40c850fd937dca9f64cfaee36aab379e7095a5cc3596f7e6e1f6fb551130394cb2eb2f070e2b8b22424b0dee2bf890efe"], 0x68}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000183, &(0x7f0000000440)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9, 0x0, 0x61c9}, 0x18) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="140100002800010004000000fcdbdf250401f2800c00180008ac0f0000000000140001"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) 3m47.968328718s ago: executing program 2 (id=1752): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000020018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r1}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) prctl$PR_SET_NAME(0xf, &(0x7f0000001c80)='\xfe3\xd9+_\x16r00\x05\x98*\b\xd3T\t\xb1\xe9\xfb\tg\x05\xfa-=\x00\xb9\x19p\xeb\xd1k)=\r\xd2l\xfa\xef\xeb\xad/\x80\x06\xa9\xf0J\xce\t\x04\xa3\x8f\xbe\x8dLMK&\x11l\"\xcd4H%\xc97\x82\xce>o\xaf\xf5\xd0\xca\xceu)gE\xb8\xcf\xa9w\xd7\x1c\xc5\x9b0\xce\x7f`T\xd2\x84G\xc2\xc5-/\xa7g\x1c:\vD\x8bp\x9c\xa5\x94\xc9\x9d\x00\x87ZZ,\xef\'\x89\x1b\xf7&\xf0B\x02\x97:6\xab\xbe\x8b\x81\xb8|L\xb9\xfe\x8c\xaabwq\xb7\tv3\xcda\xd3o\x10\x15\x84\x003\xd1\xca0\x90\xb8B\xf0\xc3\xa7\xfaq@\xb2\xc9\xa9\xb3C\x95\xb0\x1c8\x16\xa5\xfc\xd1:2\x97L?\x92(z\xb0\xef,\xa2 _\xb9\xbfL-\xb7\x1f\x14\xb0p\x8f\x81\x1c\xc2?X\x80\xe1\xeb|8\xf1\xa4~\xd5\x81w\xbb\xcbH\x0ek&m\xe1\xf6\xd1\x1f\xa9D\x97n\x1f\x1b\xb2W\x14\x13\x19\xb5\x9f\xa5\x00\f\xfd\xe8\x1b\xb9\xd5\x7fk\xc40xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x6200, &(0x7f0000000500)="629be414ca395ef185b3e81a89c033ef6cb805b16b4690501a54e6d401293007b9d33af751419d52b965a49a40a2ae98352f9dca47990be709ee150786d39b3da0f6dbd06cade44a94d5da94904b1c0749ecca89ca140c5c267e9822e707ea0dc66272945640b05297be0a84604caf0703fd3b5803e531542c8c6d303e18f8373b722afbefaf1380208e5753e4fe6f77009406b2ec46341d95c12d7796fe9259618b31c2d9a5f9639af3a49539e7b23a0af684dd8af328cbdb39cc86b4358ebf", 0xc0, 0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r8, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r12, 0x0, 0xffffffffffffffff}, 0x18) sendmsg$nl_route_sched(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r11, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x48801}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file2\x00'}) mount$9p_rdma(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e23,rq=0x0000000000000001,rq=0x000000002ec12a89,timeout=0x0000000000000006,uid>', @ANYRESDEC=0xee00, @ANYBLOB="2c736d61636b6673456c6f6f723d6d73646f73002c736d61636b66736861743d252c666f776e657290", @ANYRESDEC=r9, @ANYBLOB=',uid<', @ANYRESDEC=r13, @ANYBLOB=',uid>', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,hash,\x00']) 3m43.972645706s ago: executing program 2 (id=1775): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000004000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000480)='netfs_read\x00', r1, 0x0, 0x6b4d}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x200000000000003e, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x80000}, 0x18) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000940), 0x81000, 0x0) ioctl$PTP_SYS_OFFSET(r3, 0x43403d05, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000240), 0x0) ioprio_set$pid(0x6, 0x0, 0x2004) syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e22, @remote}, 0x10) ioprio_set$pid(0x1, 0x0, 0x4007) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000380)='mr_dereg\x00', r9, 0x0, 0x6}, 0x18) sendmsg$NFT_BATCH(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f68737200000000140001"], 0xfc}}, 0x20000004) sendfile(r6, r7, 0x0, 0x20000023896) ioctl$TIOCVHANGUP(r6, 0x5437, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r12, 0x29, 0x49, &(0x7f0000000000)=0x7e, 0x4) sendmsg$tipc(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1}, 0x0) 3m43.773162313s ago: executing program 2 (id=1776): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140), 0x4000, 0x0) syz_genetlink_get_family_id$devlink(0x0, r1) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="fc00000019000100000029bec264000000000000000000000000000000000000fe800000000000000040af145d47fc73d0000000000000bb000000000000190302000000000000005831e4ec7f44e67c2f6e558cdd6700000000000000002a4295b820df84f83cefc463", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000070000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000010000000000000044000500fc020000000000000000000000000001000000022b0000000a000000fe880000000000000000000000000101000000000400"/180], 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r7, &(0x7f0000000100)={0x0, 0x2800, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac14140f00000000000000001400020002000000ffffffff00020000000000000d0001007564703a73797a3200000000fddf56572c3975aa40f8fe9c526f4186a3721c9409c78efedab21a85ee0ec34f8e9bfdee52a526e076f24b7704b6a3ea8432e1608cb0f858baf30f1dc6b679f82c648d5eff1c45"], 0x54}}, 0x0) r9 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3c*s\xa8rVid:\xc4e', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000780)='mm_page_free\x00', r3}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000540)=""/145, 0xe4, 0x91, 0x1}, 0x28) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r12 = dup2(r10, r11) keyctl$instantiate_iov(0x14, r9, &(0x7f0000003580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xffffffffffffffff, 0x2b}], 0x9, 0x0) write$P9_RSTATu(r12, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x2ea) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7000000fdffffffbfa30000000000000703000020feffff720af0fff8ffffff71a4f0ff000000000f040000000000001d4002000000000065040000000000000f030000000000001d440000000000007a0a00fe000000000f00000000000000b5000000000000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f300020000fe275daf51efd601b6bf01c8e8b1b526"], 0x0}, 0x90) write$P9_RGETLOCK(r12, &(0x7f0000000a80)=ANY=[@ANYRES16=r2], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r13, 0x0) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d00000085"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000004c0)='mm_page_free\x00', r14, 0x0, 0x178}, 0x18) 3m43.766151703s ago: executing program 34 (id=1776): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140), 0x4000, 0x0) syz_genetlink_get_family_id$devlink(0x0, r1) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="fc00000019000100000029bec264000000000000000000000000000000000000fe800000000000000040af145d47fc73d0000000000000bb000000000000190302000000000000005831e4ec7f44e67c2f6e558cdd6700000000000000002a4295b820df84f83cefc463", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000070000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000010000000000000044000500fc020000000000000000000000000001000000022b0000000a000000fe880000000000000000000000000101000000000400"/180], 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r7, &(0x7f0000000100)={0x0, 0x2800, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac14140f00000000000000001400020002000000ffffffff00020000000000000d0001007564703a73797a3200000000fddf56572c3975aa40f8fe9c526f4186a3721c9409c78efedab21a85ee0ec34f8e9bfdee52a526e076f24b7704b6a3ea8432e1608cb0f858baf30f1dc6b679f82c648d5eff1c45"], 0x54}}, 0x0) r9 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3c*s\xa8rVid:\xc4e', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000780)='mm_page_free\x00', r3}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000540)=""/145, 0xe4, 0x91, 0x1}, 0x28) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r12 = dup2(r10, r11) keyctl$instantiate_iov(0x14, r9, &(0x7f0000003580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xffffffffffffffff, 0x2b}], 0x9, 0x0) write$P9_RSTATu(r12, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x2ea) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7000000fdffffffbfa30000000000000703000020feffff720af0fff8ffffff71a4f0ff000000000f040000000000001d4002000000000065040000000000000f030000000000001d440000000000007a0a00fe000000000f00000000000000b5000000000000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f300020000fe275daf51efd601b6bf01c8e8b1b526"], 0x0}, 0x90) write$P9_RGETLOCK(r12, &(0x7f0000000a80)=ANY=[@ANYRES16=r2], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r13, 0x0) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d00000085"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000004c0)='mm_page_free\x00', r14, 0x0, 0x178}, 0x18) 2.513649477s ago: executing program 4 (id=8548): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xfffffffc, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xe}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000180)=0x1, 0x4) connect$inet(r3, &(0x7f0000000480)={0x2, 0x4e20, @dev}, 0x10) 2.425566764s ago: executing program 4 (id=8553): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f00000001c0), 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 2.302166394s ago: executing program 4 (id=8554): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000080)=r1}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, r3, 0x1, 0x70bd29, 0x25dfdbfb}, 0x1c}, 0x1, 0x0, 0x0, 0x24008000}, 0x40) 1.848900661s ago: executing program 1 (id=8567): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/anycast6\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000003c0)={&(0x7f0000000180), 0x10, &(0x7f0000000380)=[{&(0x7f0000000480)="c3e972bd85a6d84136d6dd55048d3593a74f338ce6772ab9a6f64041c2f6fbbecdc08ebcd3192b6a53662dae7c8e9c665e80a5d0925f728dcac30c29793992e588952653d414cb8ccdabc38767fee819ec5af0c5ee936880fe8549b4ed347779cab4ffd4e0b62c53a1c01db28f2b3f91c34211c9353bc1dece61511917c2245fd66cb8dffeacb4d46d627c97b498bf1ff6b313bfbc9765457c831771d5eec7997ec242e4505f01c1bb3e069b2e630f42a2be86598a61", 0x64}, {&(0x7f0000000300)='V', 0x1}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000000340)="b768eb20304f2fdc5a9694a4867840d93170ca1a86406f", 0xfffffec0}], 0x4, 0x0, 0x0, 0x8010}, 0x0) r4 = dup2(r3, r2) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r4) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmmsg(r2, &(0x7f0000004b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x5, 0x200040d1) close_range(r0, 0xffffffffffffffff, 0x0) 1.802518025s ago: executing program 1 (id=8569): r0 = socket$pppoe(0x18, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0xfffe, @local, 'vcan0\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0xfffe, @random="54f8f35a1771", 'veth1_vlan\x00'}}, 0x1e) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000380), &(0x7f0000000280)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) close(r0) 1.701342023s ago: executing program 1 (id=8570): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ff"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEAUTHENTICATE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x24, r2, 0xfc5, 0x0, 0x0, {{0x11}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x8, 0x2a, [@perr={0x84, 0xffffffffffffff21}]}]}, 0x24}}, 0x0) 1.697080793s ago: executing program 1 (id=8571): bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) gettid() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x4000, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3014850, &(0x7f0000000700)={[{@quota}, {@max_batch_time={'max_batch_time', 0x3d, 0xb1}}, {@grpjquota}, {@norecovery}, {@dioread_lock}]}, 0x3, 0x4de, &(0x7f0000001080)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) pwritev2(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5412, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) chown(&(0x7f00000002c0)='./file2\x00', r1, 0x0) 1.61831761s ago: executing program 1 (id=8572): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x49, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) 1.564005584s ago: executing program 3 (id=8573): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r4, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000340)={r3, 0x400, 0x10, 0x3}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@dellink={0x20, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r4, 0x2201, 0x800}}, 0x20}}, 0x40040) 1.562872434s ago: executing program 4 (id=8575): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x4) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000640)="76e23bfc8b6e50492d1403237799f46fd8f760e9cb4522e46a8837f0fcf37c561c07f407bae92c94c05d827952e86675e83a9aa1a1acd76ed89b3dd8ba6e18bb93c0445d71ea90121ac1e1f216a7a39bbc100ef2b19b783245dc56b56beff5e34ec10af6ceb460df4efd1e4f821b6f44421e773dd9c67970940d4d0bda16d29cdbe62918b3935ae325d54e20648cbaa322bdb1219bca0be81b5aaf10b37c18c608809541e9d4e06a5c39fd7a12d3d37cdd2e3b738c2c7aea2e7a4744f6", 0xbd}, {&(0x7f0000000700)="38acbc383221b91492b8b16707ab386a4ad3597fda2543bec592946447303291bec29c21d4f2feccf223a535a241d830d972c67b43483d6ad767ca2efb9fa19d45aa883f393d5c855d78260c04272003f459be33a10d1d6cb884a4655ece01bb078a45be3c66ba15649938b6f231785ae0aa571642cd34846b51050139cfb43bfdeab133202c6338d1a599d58db98828ad42ae615799d18ec91733cac0b0ceabe65502407bc2d99ab12e99687f4c7588add46df3593ec543120e2befcdefa99bff0816ee13fc894a2ca50bad956f7b0626c2af0f", 0xd4}], 0x2, &(0x7f0000000540)}, 0x0) sendmmsg$inet(r0, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000004300)="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", 0x44c}], 0x1}}], 0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 1.505236759s ago: executing program 1 (id=8576): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e23, @loopback}}, 0x0, 0x20000000005, 0x4a}, 0xd8) bind$inet(r5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) r7 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r8, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="5400000010001ffffcffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="00000100000000002c0012800b00010067726574617000001c00028006000e000200000006000f000700000008000700ac14142808000a00", @ANYRES32=r8, @ANYBLOB="922546595b5bbaab3da305c72c5cb9e673f6cc59742ba02baa558fa24798347753ee68bd2734f142dc4299eaef3bdb9225e0a77cdd04c6c99303334928b4f588464dca891ef0320cb21bdc7e06a68e3f65a7c27dc7e4b5f453d97bbf1cf0dc4fc254940d7b3d43970fea219de09c4e8b0f813071bd4fba434cd9062afa05e683512f8bc427d8de2d663ff22cdd356c2cbc9004964aedd9ab0a8dcf93fa7002a0f2ca59697c6541338e36f3f47d2ccf"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x0) 1.377208219s ago: executing program 3 (id=8579): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="001300"}) 1.291590486s ago: executing program 3 (id=8582): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d88c19e9ace00000000000000002100000002ff02000000000000000000000000000104004e200023b0"], 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)={0xa0000004}) 1.219427491s ago: executing program 3 (id=8584): sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000016000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='mm_vmscan_write_folio\x00', r3, 0x0, 0x80000000}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 731.767121ms ago: executing program 4 (id=8590): perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x2004, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce81ea033300fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 674.538275ms ago: executing program 4 (id=8591): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0xfffffffc}, 0x1c) sendto$inet6(r0, 0x0, 0x8dff, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x18115, @rand_addr, 0x983a}, 0x1c) 323.398104ms ago: executing program 7 (id=8596): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0xa30e, 0x1, 0xfffffffa}}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd28, 0xfffff000, {0x0, 0x0, 0x0, r3, {0xf000, 0xffff}, {}, {0x7, 0xa}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_CLASSID={0x8, 0x1, {0xb, 0x1ffe3}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x20000800) 240.02225ms ago: executing program 7 (id=8599): mkdirat(0xffffffffffffff9c, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, 0x0, 0x4000004) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40), 0xffffffffffffffff) setuid(0xee00) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000000)={0x6c, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x2, 0x0, @loopback}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x38}}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x6c}}, 0x0) 226.324561ms ago: executing program 6 (id=8600): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r2 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r2, &(0x7f0000000200)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) r3 = syz_io_uring_setup(0x497, &(0x7f0000000540)={0x0, 0x4660, 0x400, 0x3, 0x285}, &(0x7f00000004c0)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}) io_uring_enter(r3, 0x40f9, 0x217, 0x48, 0x0, 0x0) dup3(r3, r1, 0x80000) 196.746034ms ago: executing program 6 (id=8601): getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) shutdown(r2, 0x1) 183.197505ms ago: executing program 7 (id=8602): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x1127057, 0x0) mount$bind(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x129c51, 0x0) 131.530359ms ago: executing program 7 (id=8603): r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000400)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}, 'lo\x00'}}, 0x1e) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340), 0xb00, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000001f00)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000040)=0x2) ioctl$PPPIOCBRIDGECHAN(r2, 0x40047435, &(0x7f0000000200)=0x1) write$bt_hci(r0, &(0x7f0000000380)=ANY=[], 0x8) 102.896631ms ago: executing program 6 (id=8604): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(0x0, r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x4c}, 0x1, 0x0, 0x0, 0x8004}, 0x4040000) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x24008000}, 0x4040000) r1 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x6) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0], 0x2, 0x6}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000280)={0x0, 0x0, 0x1}) syz_open_dev$usbfs(&(0x7f0000000000), 0x205, 0x44680) 91.052562ms ago: executing program 3 (id=8605): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'veth1_to_bond\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000100)={r3, 0x2, 0x6, @broadcast}, 0x10) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r4, 0xffffffffffffffff, 0x0) 75.063044ms ago: executing program 6 (id=8606): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3477, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7535}}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) rmdir(0x0) add_key$keyring(0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)=',\xea\x00', 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 59.514995ms ago: executing program 7 (id=8607): syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$eJzs3c1rO0UYwPEnaZImKW1yEEVBOtiLXpY2ehaDtCAELG0jtoKwbTcasiYlG6oRse3Jq3j3JHgovVnwUND+A71404sI3noRPFhBXdm3ZPPWl5g0/trvB0omM/PszmQn5dm0m718+/MPKiVLK+kNiSaVRERErkSyEpVAxH+MuuWEhB3KSzO///j8+mYx6VWolfzGyzml1Nz8dx9+kvK7nU3LRfbdy99yv148ffHs5T8b75ctVbZUtdZQutqu/dzQt01D7ZatiqbUqmnolqHKVcuoe+3f+Nsxa3t7TaVXd2fTe3XDspRebaqK0VSNmmrUm0p/Ty9XlaZpajYtuEnxeG1Nzw8ZvDPiwWBM6vW8PiUiqZ6W4vFEBgQAACaqO/+POin9MPn/lswVCstryunczv9PXjhvzLx1Oufn/2eJfvn/Kz952+rI/53TiXb+X/POD0o35/9fyh3y/96M6HEZOv/PjmEwGM58oqcq0vHMyf/T/vvXdfTOyaJbIP8HAAAAAAAAAAAAAAAAAAAAAOBJcGXbGdu2M8Fj8NO+hMB/jgdp0PGfFpGkc/Rtjv9Dtr65JUn3wj3nGJuf7Rf3i96j3+FcREwx/ra7OWsjuPJIObLyvXngxx/sF6fclnxJyk68LElGsu56CsXb9sobheUl5fHjW5cppcPxOcnIU+H4b93V6cTnOuP9/SfkxYVQvCYZ+WFHamLKrhvZ3v+nS0q9/mahKz7l9hORX+79oAAAAAAAMGKaaul7/q5pg9q9bxnJl9yPiQxZlIz81f/8frHv+Xks81xs0rMHAAAAAOBxsJofV3SJGnW3YJr9CikZ2DSCQqyjJi4ifTsnumri1215KjTD244nId4dTP7rvL4KXtW7RAX/SOEMvNXk31FFhhtPMH+3JhJrNf1513lFDsVdAIfhpqjcIjzWPfh5p0L17bwwcDtH/kRaNcHHRokBr7Os9m4nes1KiPfU2JHhFsAzX3z9x+jeIK+e+ivgo5s7H5mGfSC3OShdBWcXvU3xsf/iAQAAAHDv2kl/UPNauDl8I5HwzXL4yz0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAACM0lq/06ypMeo4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA/8W/AQAA//9/d/Qh") creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, 0x0, 0x0, 0x5, 0xb5, &(0x7f00000001c0)=""/181, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x94) r2 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0) 39.650906ms ago: executing program 3 (id=8608): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x23}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424d", "bcfd56f1375461caaa2f19935e6996c7096ffeeb0300000000000064", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r0, &(0x7f0000001480)=[{{0x0, 0x300, &(0x7f0000000280)=[{&(0x7f0000000380)=""/165, 0xa5}], 0x1}, 0x5}], 0x1, 0x10000, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) 33.815707ms ago: executing program 6 (id=8609): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000000)="89e7ee2c21fe62a3b47380c988ca", 0xe}, {&(0x7f0000000040)="8fac99b31b6cf86d62", 0x9}, {&(0x7f0000000080)="49dafdf0920cc0", 0x7}], 0x3) 10.866708ms ago: executing program 7 (id=8610): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000380)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000440)=[{{&(0x7f0000002180)={0xa, 0x4e21, 0x8, @local, 0x8}, 0x1c, 0x0}}], 0x1, 0x240880d1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0xfe, "0062ba7d82000000160000000000f738096304"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000740)={0x1, 0x8, 0x1, 0x6, 0x1a, "7ad5c067dcd88f7cee48d47ddf31195519fd33"}) r1 = syz_open_pts(r0, 0x80) r2 = dup3(r1, r0, 0x80000) read(r2, &(0x7f00000000c0)=""/226, 0xe2) read$watch_queue(r2, &(0x7f0000001d40)=""/4095, 0xfff) 0s ago: executing program 6 (id=8611): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r1, 0xfffffffc) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = accept(r0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xfffffdef}}, 0x801) recvfrom(r2, &(0x7f0000000180)=""/60, 0xfffffffffffffecb, 0x4100, 0x0, 0x0) kernel console output (not intermixed with test programs): 0:0000:0008.003F: unknown main item tag 0x0 [ 381.877585][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.885759][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.893205][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.900644][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.908839][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.917049][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.924582][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.932770][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.940874][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.948403][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.955869][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.964152][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.972380][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.979828][ T3367] hid-generic 0000:0000:0008.003F: unknown main item tag 0x0 [ 381.995878][ T3367] hid-generic 0000:0000:0008.003F: hidraw0: HID vc.87 Device [syz0] on syz1 [ 382.473226][T18118] siw: device registration error -23 [ 382.698063][T18132] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4641'. [ 382.707904][T18132] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4641'. [ 382.717676][T18132] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4641'. [ 382.760917][T18132] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4641'. [ 382.770751][T18132] netlink: 'syz.3.4641': attribute type 6 has an invalid length. [ 382.934841][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 382.934857][ T29] audit: type=1400 audit(2000000186.695:36794): avc: denied { execute } for pid=18135 comm="syz.4.4643" dev="tmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 382.976513][ T29] audit: type=1400 audit(2000000186.727:36795): avc: denied { execute_no_trans } for pid=18135 comm="syz.4.4643" path=2F6D656D66643AA39F6EB4645204693502ACCEE1889D5B4038D7CE1F2039497F151D933DB5E75C274CE6D28EBC294A7454447181CF81BAE531F520C8103EC95C85174CBFCF91DF4DF3025E847B202864656C6574656429 dev="tmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 383.292153][ T29] audit: type=1400 audit(2000000187.070:36796): avc: denied { execmod } for pid=18152 comm="syz.6.4651" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=53561 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 383.320307][ T29] audit: type=1400 audit(2000000187.070:36797): avc: denied { execute } for pid=18152 comm="syz.6.4651" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=53561 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 383.370144][T18154] siw: device registration error -23 [ 383.514056][T18168] SELinux: Context system_u:object_r:hwdata_t:s0 is not valid (left unmapped). [ 383.525717][ T29] audit: type=1400 audit(2000000187.339:36798): avc: denied { relabelto } for pid=18167 comm="syz.3.4655" name="942" dev="tmpfs" ino=4997 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:hwdata_t:s0" [ 383.553377][ T29] audit: type=1400 audit(2000000187.339:36799): avc: denied { associate } for pid=18167 comm="syz.3.4655" name="942" dev="tmpfs" ino=4997 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hwdata_t:s0" [ 383.660083][ T29] audit: type=1400 audit(2000000187.478:36800): avc: denied { audit_write } for pid=18174 comm="syz.6.4657" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 383.683061][ T29] audit: type=1107 audit(2000000187.478:36801): pid=18174 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 383.690404][T18179] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4659'. [ 383.757553][T18182] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4659'. [ 383.808878][ T29] audit: type=1326 audit(2000000187.639:36802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18187 comm="syz.6.4663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 383.888350][ T29] audit: type=1326 audit(2000000187.639:36803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18187 comm="syz.6.4663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 384.098046][T18211] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4672'. [ 384.118250][T18206] siw: device registration error -23 [ 384.142080][T18211] bridge0: port 3(batadv1) entered blocking state [ 384.148937][T18211] bridge0: port 3(batadv1) entered disabled state [ 384.183520][T18211] batadv1: entered allmulticast mode [ 384.203534][T18211] batadv1: entered promiscuous mode [ 384.209407][T18216] netlink: 'syz.3.4674': attribute type 3 has an invalid length. [ 384.218547][T18216] netlink: 'syz.3.4674': attribute type 3 has an invalid length. [ 384.615074][ T9855] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 384.625101][ T9855] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 384.644721][T18248] siw: device registration error -23 [ 384.712484][T18260] sd 0:0:1:0: device reset [ 385.319347][T18288] netlink: 'syz.3.4704': attribute type 4 has an invalid length. [ 385.328029][T18288] netlink: 17 bytes leftover after parsing attributes in process `syz.3.4704'. [ 385.651249][T18331] bridge0: port 1(batadv0) entered blocking state [ 385.657920][T18331] bridge0: port 1(batadv0) entered disabled state [ 385.664874][T18331] batadv0: entered allmulticast mode [ 385.672950][T18331] batadv0: entered promiscuous mode [ 385.904343][T18359] bridge0: port 3(batadv1) entered blocking state [ 385.911062][T18359] bridge0: port 3(batadv1) entered disabled state [ 385.917868][T18359] batadv1: entered allmulticast mode [ 385.924068][T18359] batadv1: entered promiscuous mode [ 385.952479][T18363] __nla_validate_parse: 5 callbacks suppressed [ 385.952498][T18363] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4739'. [ 385.970116][T18363] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4739'. [ 386.128952][ T1724] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 386.139200][ T1724] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 386.206898][T18383] netlink: 'syz.4.4748': attribute type 1 has an invalid length. [ 386.239894][T18383] 8021q: adding VLAN 0 to HW filter on device bond5 [ 386.325868][T18389] loop7: detected capacity change from 0 to 512 [ 386.333071][T18389] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 386.344324][T18389] EXT4-fs (loop7): orphan cleanup on readonly fs [ 386.353540][T18389] EXT4-fs error (device loop7): ext4_read_block_bitmap_nowait:517: comm syz.7.4750: Block bitmap for bg 0 marked uninitialized [ 386.369785][T18389] EXT4-fs error (device loop7) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 386.376552][ T1035] usb usb6-port1: attempt power cycle [ 386.384320][T18389] EXT4-fs (loop7): 1 orphan inode deleted [ 386.384807][ T1724] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 386.390932][T18389] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 386.400142][ T1724] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 386.427800][T18389] EXT4-fs (loop7): warning: mounting fs with errors, running e2fsck is recommended [ 386.437585][T18389] EXT4-fs (loop7): re-mounted 00000000-0000-0000-0000-000000000000 r/w. [ 386.463786][T11109] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 386.670269][T18394] loop7: detected capacity change from 0 to 1024 [ 386.679241][T18394] EXT4-fs: Ignoring removed nomblk_io_submit option [ 386.715399][T18394] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 386.766784][T11109] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 386.781346][T18399] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4763'. [ 386.791202][T18399] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4763'. [ 386.800285][T18399] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4763'. [ 386.811479][T18399] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4763'. [ 386.821365][T18399] netlink: 'syz.1.4763': attribute type 6 has an invalid length. [ 387.295875][T18430] netlink: 'syz.3.4767': attribute type 4 has an invalid length. [ 387.303956][T18430] netlink: 17 bytes leftover after parsing attributes in process `syz.3.4767'. [ 387.679822][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 387.679915][ T29] audit: type=1326 audit(2000000191.791:36925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18447 comm="syz.3.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 387.711944][ T29] audit: type=1326 audit(2000000191.791:36926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18447 comm="syz.3.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 387.735629][ T29] audit: type=1326 audit(2000000191.791:36927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18447 comm="syz.3.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 387.760714][ T29] audit: type=1326 audit(2000000191.791:36928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18447 comm="syz.3.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 387.785699][ T29] audit: type=1326 audit(2000000191.791:36929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18447 comm="syz.3.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 387.927342][T18459] loop7: detected capacity change from 0 to 512 [ 387.945449][T18459] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 387.977308][ T29] audit: type=1326 audit(2000000191.791:36930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18447 comm="syz.3.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 388.002519][ T29] audit: type=1326 audit(2000000191.791:36931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18447 comm="syz.3.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 388.027745][ T29] audit: type=1326 audit(2000000191.791:36932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18447 comm="syz.3.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 388.051504][ T29] audit: type=1326 audit(2000000191.802:36933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18447 comm="syz.3.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 388.076595][ T29] audit: type=1326 audit(2000000191.802:36934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18447 comm="syz.3.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=235 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 388.157662][ T1035] usb usb6-port1: unable to enumerate USB device [ 388.164378][T18251] vhci_hcd: invalid port number 96 [ 388.170291][T18251] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 388.204107][T18459] EXT4-fs (loop7): 1 truncate cleaned up [ 388.210407][T18459] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 388.234100][T18470] 9pnet_fd: Insufficient options for proto=fd [ 388.311662][T11109] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 388.396178][T18481] netlink: 'syz.1.4790': attribute type 4 has an invalid length. [ 388.404075][T18481] netlink: 17 bytes leftover after parsing attributes in process `syz.1.4790'. [ 388.454157][T18489] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4795'. [ 388.860883][T18510] netlink: 36 bytes leftover after parsing attributes in process `syz.6.4804'. [ 389.004447][T18520] netlink: 'syz.1.4808': attribute type 4 has an invalid length. [ 389.170364][T18533] macvtap0: refused to change device tx_queue_len [ 389.266346][T18534] netlink: 'syz.1.4811': attribute type 1 has an invalid length. [ 389.332370][T18534] 8021q: adding VLAN 0 to HW filter on device bond8 [ 390.136196][T18540] syzkaller1: entered promiscuous mode [ 390.136222][T18540] syzkaller1: entered allmulticast mode [ 390.536428][T18557] serio: Serial port ttyS3 [ 390.636713][T18567] 9p: Unknown uid 00000000004294967295 [ 391.271257][T18602] SELinux: security_context_str_to_sid (_) failed with errno=-22 [ 391.354594][T18612] IPv6: Can't replace route, no match found [ 391.660651][T18639] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 391.670405][T18639] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 391.902927][T18674] __nla_validate_parse: 1 callbacks suppressed [ 391.902947][T18674] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4877'. [ 391.915888][T18655] lo speed is unknown, defaulting to 1000 [ 391.918275][T18674] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4877'. [ 391.926131][T18655] lo speed is unknown, defaulting to 1000 [ 391.933864][T18674] netlink: 50 bytes leftover after parsing attributes in process `syz.3.4877'. [ 392.011964][T18655] lo speed is unknown, defaulting to 1000 [ 392.020327][T18655] lo speed is unknown, defaulting to 1000 [ 392.208787][T18705] netlink: 84 bytes leftover after parsing attributes in process `syz.7.4891'. [ 392.286846][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.295131][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.302568][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.310138][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.318376][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.326451][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.334148][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.342521][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.349956][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.358180][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.365717][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.373936][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.382139][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.389609][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.397967][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.405494][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.413758][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.421760][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.430069][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.434189][T18725] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 392.438280][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.448873][T18725] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 392.454164][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.469210][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.470192][T18726] netlink: 'syz.6.4897': attribute type 4 has an invalid length. [ 392.476718][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.476750][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.476778][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.476802][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.476826][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.476851][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.476934][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.476958][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.476985][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477013][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477053][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477079][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477107][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477134][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477168][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477254][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477281][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477306][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477334][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.477361][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.485142][T18726] netlink: 17 bytes leftover after parsing attributes in process `syz.6.4897'. [ 392.485273][ T29] kauditd_printk_skb: 143 callbacks suppressed [ 392.485334][ T29] audit: type=1400 audit(2000000196.920:37078): avc: denied { read } for pid=18713 comm="syz.6.4897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 392.485396][ T29] audit: type=1326 audit(2000000196.920:37079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18713 comm="syz.6.4897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 392.485443][ T29] audit: type=1326 audit(2000000196.920:37080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18713 comm="syz.6.4897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 392.485608][ T29] audit: type=1326 audit(2000000196.920:37081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18713 comm="syz.6.4897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=238 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 392.485652][ T29] audit: type=1326 audit(2000000196.920:37082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18713 comm="syz.6.4897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 392.485696][ T29] audit: type=1326 audit(2000000196.920:37083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18713 comm="syz.6.4897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 392.485814][ T29] audit: type=1326 audit(2000000196.920:37084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18713 comm="syz.6.4897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 392.494099][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.501573][ T29] audit: type=1326 audit(2000000196.920:37085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18713 comm="syz.6.4897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 392.508146][ T3367] hid-generic 0000:0000:0008.0040: unknown main item tag 0x0 [ 392.515563][ T29] audit: type=1326 audit(2000000196.920:37086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18713 comm="syz.6.4897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 392.515609][ T29] audit: type=1326 audit(2000000196.920:37087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18713 comm="syz.6.4897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13d75ceb69 code=0x7ffc0000 [ 392.914834][T18717] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4896'. [ 392.924357][ T3367] hid-generic 0000:0000:0008.0040: hidraw0: HID vc.87 Device [syz0] on syz1 [ 392.964434][T18740] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4906'. [ 393.117711][T18754] serio: Serial port ttyS3 [ 393.143333][T18757] 9pnet_fd: Insufficient options for proto=fd [ 393.286608][T18768] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=18768 comm=syz.4.4919 [ 393.621400][T18801] netlink: 'syz.7.4934': attribute type 142 has an invalid length. [ 393.711532][T18812] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4939'. [ 393.721246][T18812] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4939'. [ 393.837342][T18818] serio: Serial port ttyS3 [ 393.931940][T18828] siw: device registration error -23 [ 394.324479][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.332169][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.339952][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.348200][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.355721][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.363500][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.370910][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.379374][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.387020][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.389479][T18889] netlink: 'syz.6.4971': attribute type 4 has an invalid length. [ 394.394522][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394552][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394641][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394665][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394693][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394719][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394748][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394811][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394847][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394873][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394901][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394926][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394951][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.394978][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.395072][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.395099][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.395126][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.395153][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.395180][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.403055][T18889] netlink: 17 bytes leftover after parsing attributes in process `syz.6.4971'. [ 394.411159][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.411192][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.411296][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.427986][T18886] siw: device registration error -23 [ 394.433597][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.433628][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.601023][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.609318][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.616722][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.624111][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.631549][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.639559][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.647129][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.654549][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.662700][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.670126][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.677614][ T1035] hid-generic 0000:0000:0008.0041: unknown main item tag 0x0 [ 394.687340][ T1035] hid-generic 0000:0000:0008.0041: hidraw0: HID vc.87 Device [syz0] on syz1 [ 394.820403][T18902] SELinux: failed to load policy [ 394.855502][T18908] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 394.855502][T18908] program syz.7.4980 not setting count and/or reply_len properly [ 394.970019][T18924] netlink: 'syz.3.4987': attribute type 4 has an invalid length. [ 395.133586][T18945] siw: device registration error -23 [ 395.326475][T18968] lo speed is unknown, defaulting to 1000 [ 395.343427][T18968] lo speed is unknown, defaulting to 1000 [ 395.433546][T18968] lo speed is unknown, defaulting to 1000 [ 395.447785][T18968] lo speed is unknown, defaulting to 1000 [ 395.556548][T18995] netlink: 'syz.1.5002': attribute type 4 has an invalid length. [ 395.936197][T19036] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=19036 comm=syz.3.5005 [ 396.043925][T19051] rdma_op ffff888102361580 conn xmit_rdma 0000000000000000 [ 396.276842][T19065] siw: device registration error -23 [ 396.284197][T19076] siw: device registration error -23 [ 396.397486][T19101] netlink: 'syz.4.5021': attribute type 1 has an invalid length. [ 396.694508][T19142] siw: device registration error -23 [ 396.729234][T19153] netlink: 'syz.1.5043': attribute type 4 has an invalid length. [ 396.738021][T19153] __nla_validate_parse: 5 callbacks suppressed [ 396.738038][T19153] netlink: 17 bytes leftover after parsing attributes in process `syz.1.5043'. [ 396.739888][T19156] openvswitch: netlink: Message has 6 unknown bytes. [ 396.817150][T19162] openvswitch: netlink: Message has 6 unknown bytes. [ 396.991891][T19182] netlink: 'syz.4.5057': attribute type 4 has an invalid length. [ 396.999898][T19182] netlink: 17 bytes leftover after parsing attributes in process `syz.4.5057'. [ 397.156891][ T29] kauditd_printk_skb: 403 callbacks suppressed [ 397.156911][ T29] audit: type=1400 audit(2000000201.951:37491): avc: denied { map_create } for pid=19211 comm="syz.1.5071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.197313][T19212] netlink: 'syz.1.5071': attribute type 4 has an invalid length. [ 397.205148][T19212] netlink: 17 bytes leftover after parsing attributes in process `syz.1.5071'. [ 397.216031][ T29] audit: type=1400 audit(2000000201.994:37492): avc: denied { read write } for pid=19213 comm="syz.4.5072" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 397.240634][ T29] audit: type=1400 audit(2000000201.994:37493): avc: denied { prog_load } for pid=19211 comm="syz.1.5071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.261826][ T29] audit: type=1400 audit(2000000201.994:37494): avc: denied { map_create } for pid=19211 comm="syz.1.5071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.282039][ T29] audit: type=1400 audit(2000000201.994:37495): avc: denied { prog_load } for pid=19211 comm="syz.1.5071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.302189][ T29] audit: type=1400 audit(2000000201.994:37496): avc: denied { create } for pid=19211 comm="syz.1.5071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 397.322550][ T29] audit: type=1400 audit(2000000201.994:37497): avc: denied { map_create } for pid=19215 comm="syz.3.5078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.329185][T19223] netlink: 10 bytes leftover after parsing attributes in process `syz.1.5075'. [ 397.342749][ T29] audit: type=1400 audit(2000000201.994:37498): avc: denied { map_create } for pid=19211 comm="syz.1.5071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.372601][ T29] audit: type=1400 audit(2000000201.994:37499): avc: denied { prog_load } for pid=19211 comm="syz.1.5071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.393529][ T29] audit: type=1400 audit(2000000201.994:37500): avc: denied { prog_load } for pid=19215 comm="syz.3.5078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.472015][T19235] netlink: 'syz.3.5073': attribute type 1 has an invalid length. [ 397.503503][T19235] 8021q: adding VLAN 0 to HW filter on device bond7 [ 397.572616][T19248] netlink: 'syz.4.5086': attribute type 4 has an invalid length. [ 397.580480][T19248] netlink: 17 bytes leftover after parsing attributes in process `syz.4.5086'. [ 397.834558][T19274] serio: Serial port ttyS3 [ 397.848333][T19276] netlink: 'syz.7.5098': attribute type 4 has an invalid length. [ 397.856235][T19276] netlink: 17 bytes leftover after parsing attributes in process `syz.7.5098'. [ 398.109783][T19304] serio: Serial port ttyS3 [ 398.297038][ T1035] usb usb6-port1: attempt power cycle [ 398.377252][T19330] serio: Serial port ttyS3 [ 399.145898][T19332] serio: Serial port ttyS3 [ 399.228367][T19343] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2566 sclass=netlink_route_socket pid=19343 comm=syz.7.5127 [ 399.312278][T19348] netlink: 'syz.7.5130': attribute type 4 has an invalid length. [ 399.320339][T19348] netlink: 17 bytes leftover after parsing attributes in process `syz.7.5130'. [ 399.431316][T19361] serio: Serial port ttyS3 [ 399.902032][T19382] netlink: 'syz.3.5144': attribute type 4 has an invalid length. [ 399.911386][T19382] netlink: 17 bytes leftover after parsing attributes in process `syz.3.5144'. [ 400.002302][ T1035] usb usb6-port1: unable to enumerate USB device [ 400.020865][T19137] hub 6-0:1.0: USB hub found [ 400.030086][T19137] hub 6-0:1.0: 8 ports detected [ 400.099407][T19411] netlink: 20 bytes leftover after parsing attributes in process `syz.1.5159'. [ 400.519654][T19476] netlink: 132 bytes leftover after parsing attributes in process `syz.4.5190'. [ 400.774558][T19508] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 400.782291][T19508] IPv6: NLM_F_CREATE should be set when creating new route [ 400.789554][T19508] IPv6: NLM_F_CREATE should be set when creating new route [ 401.170844][T19562] netlink: 'syz.1.5232': attribute type 4 has an invalid length. [ 401.361698][T19581] netlink: 'syz.3.5242': attribute type 4 has an invalid length. [ 401.425360][ T3919] IPVS: starting estimator thread 0... [ 401.478319][T19599] __nla_validate_parse: 3 callbacks suppressed [ 401.478339][T19599] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5249'. [ 401.521439][T19591] IPVS: using max 1680 ests per chain, 84000 per kthread [ 401.764228][ T1035] usb usb6-port1: attempt power cycle [ 401.820323][ T29] kauditd_printk_skb: 926 callbacks suppressed [ 401.820344][ T29] audit: type=1400 audit(2000000206.962:38427): avc: denied { map_create } for pid=19653 comm="syz.3.5273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.882873][ T29] audit: type=1400 audit(2000000206.962:38428): avc: denied { prog_load } for pid=19653 comm="syz.3.5273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.902990][ T29] audit: type=1400 audit(2000000206.962:38429): avc: denied { map_create } for pid=19653 comm="syz.3.5273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.923913][ T29] audit: type=1400 audit(2000000206.962:38430): avc: denied { map_create } for pid=19657 comm="syz.3.5276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.937516][T19669] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5280'. [ 401.943470][ T29] audit: type=1400 audit(2000000206.962:38431): avc: denied { prog_load } for pid=19657 comm="syz.3.5276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.973300][ T29] audit: type=1400 audit(2000000206.962:38432): avc: denied { create } for pid=19657 comm="syz.3.5276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 401.994317][ T29] audit: type=1400 audit(2000000207.016:38433): avc: denied { create } for pid=19659 comm="syz.7.5275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 402.014335][ T29] audit: type=1400 audit(2000000207.026:38434): avc: denied { prog_load } for pid=19661 comm="syz.4.5277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 402.086479][ T29] audit: type=1400 audit(2000000207.080:38435): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 402.112530][ T29] audit: type=1400 audit(2000000207.080:38436): avc: denied { create } for pid=19667 comm="syz.7.5280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 402.222501][T19685] netlink: 'syz.1.5286': attribute type 4 has an invalid length. [ 402.230337][T19685] netlink: 17 bytes leftover after parsing attributes in process `syz.1.5286'. [ 402.924222][T19712] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5299'. [ 403.126129][T19729] geneve2: entered promiscuous mode [ 403.131425][T19729] geneve2: entered allmulticast mode [ 403.150574][ T1663] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 20000 - 0 [ 403.206443][ T1663] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 20000 - 0 [ 403.231467][ T1663] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 20000 - 0 [ 403.249750][ T1663] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 20000 - 0 [ 403.324281][T19746] netlink: 'syz.1.5314': attribute type 4 has an invalid length. [ 403.332189][T19746] netlink: 17 bytes leftover after parsing attributes in process `syz.1.5314'. [ 403.507736][ T1035] usb usb6-port1: unable to enumerate USB device [ 403.658008][T19786] netlink: 'syz.6.5333': attribute type 4 has an invalid length. [ 403.665821][T19786] netlink: 17 bytes leftover after parsing attributes in process `syz.6.5333'. [ 403.840968][T19803] netlink: 'syz.3.5341': attribute type 4 has an invalid length. [ 403.849566][T19803] netlink: 17 bytes leftover after parsing attributes in process `syz.3.5341'. [ 404.157695][T19840] netlink: '+}[@': attribute type 10 has an invalid length. [ 404.187586][T19840] team0: Device hsr_slave_0 failed to register rx_handler [ 404.547129][T19877] serio: Serial port ttyS3 [ 404.586657][T19886] netlink: 'syz.4.5381': attribute type 4 has an invalid length. [ 404.590070][T19887] netlink: 'syz.1.5382': attribute type 4 has an invalid length. [ 404.594491][T19886] netlink: 17 bytes leftover after parsing attributes in process `syz.4.5381'. [ 404.603831][T19887] netlink: 17 bytes leftover after parsing attributes in process `syz.1.5382'. [ 404.729987][T19896] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5385'. [ 405.223336][T19968] netlink: 'syz.6.5419': attribute type 4 has an invalid length. [ 405.261441][T19970] netlink: 'syz.7.5421': attribute type 4 has an invalid length. [ 405.532678][T19996] netlink: 'syz.4.5434': attribute type 4 has an invalid length. [ 405.572923][T20005] geneve2: entered promiscuous mode [ 405.578297][T20005] geneve2: entered allmulticast mode [ 405.973363][T20050] serio: Serial port ttyS3 [ 406.105653][T20069] serio: Serial port ttyS3 [ 406.352426][T20092] serio: Serial port ttyS3 [ 406.398929][T20097] 8021q: adding VLAN 0 to HW filter on device bond6 [ 406.522371][ T29] kauditd_printk_skb: 1074 callbacks suppressed [ 406.522390][ T29] audit: type=1400 audit(2000000212.005:39511): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 406.618419][ T29] audit: type=1400 audit(2000000212.058:39512): avc: denied { prog_load } for pid=20108 comm="syz.3.5487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.639286][ T29] audit: type=1400 audit(2000000212.058:39513): avc: denied { prog_load } for pid=20108 comm="syz.3.5487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.658770][ T29] audit: type=1400 audit(2000000212.069:39514): avc: denied { create } for pid=20108 comm="syz.3.5487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 406.680105][ T29] audit: type=1400 audit(2000000212.069:39515): avc: denied { map_create } for pid=20110 comm="syz.6.5488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.699751][ T29] audit: type=1400 audit(2000000212.069:39516): avc: denied { prog_load } for pid=20110 comm="syz.6.5488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.720599][ T29] audit: type=1400 audit(2000000212.080:39517): avc: denied { create } for pid=20110 comm="syz.6.5488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 406.740430][ T29] audit: type=1400 audit(2000000212.090:39518): avc: denied { map_create } for pid=20111 comm="syz.7.5486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.761309][ T29] audit: type=1400 audit(2000000212.090:39519): avc: denied { prog_load } for pid=20111 comm="syz.7.5486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.780620][ T29] audit: type=1400 audit(2000000212.101:39520): avc: denied { prog_load } for pid=20111 comm="syz.7.5486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.870539][T20124] __nla_validate_parse: 10 callbacks suppressed [ 406.870602][T20124] netlink: 17 bytes leftover after parsing attributes in process `syz.7.5492'. [ 406.956633][T20130] serio: Serial port ttyS3 [ 407.212860][T20155] dummy0: entered promiscuous mode [ 407.241537][T20155] dummy0: left promiscuous mode [ 407.954776][T20223] validate_nla: 5 callbacks suppressed [ 407.954790][T20223] netlink: 'syz.1.5538': attribute type 4 has an invalid length. [ 407.968156][T20223] netlink: 17 bytes leftover after parsing attributes in process `syz.1.5538'. [ 408.577489][T20307] netlink: 'syz.6.5578': attribute type 4 has an invalid length. [ 408.585317][T20307] netlink: 17 bytes leftover after parsing attributes in process `syz.6.5578'. [ 408.861883][T20341] netlink: 'syz.3.5593': attribute type 1 has an invalid length. [ 408.902298][T20341] 8021q: adding VLAN 0 to HW filter on device bond8 [ 409.080991][T20358] netlink: 'syz.7.5600': attribute type 4 has an invalid length. [ 409.081013][T20358] netlink: 17 bytes leftover after parsing attributes in process `syz.7.5600'. [ 409.224387][T20374] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5608'. [ 409.234332][T20376] netlink: 'syz.7.5609': attribute type 1 has an invalid length. [ 409.273339][T20376] 8021q: adding VLAN 0 to HW filter on device bond4 [ 409.731018][T20422] netlink: 'syz.7.5631': attribute type 4 has an invalid length. [ 409.739543][T20422] netlink: 17 bytes leftover after parsing attributes in process `syz.7.5631'. [ 409.989963][T20452] netlink: 8 bytes leftover after parsing attributes in process `syz.7.5644'. [ 410.194423][T20475] serio: Serial port ttyS3 [ 410.452681][T20506] serio: Serial port ttyS3 [ 410.847270][T20556] netem: change failed [ 411.077146][T20577] netlink: 'syz.1.5704': attribute type 4 has an invalid length. [ 411.085029][T20577] netlink: 17 bytes leftover after parsing attributes in process `syz.1.5704'. [ 411.182890][T20589] netlink: 'syz.3.5709': attribute type 4 has an invalid length. [ 411.192285][T20589] netlink: 17 bytes leftover after parsing attributes in process `syz.3.5709'. [ 411.202986][T20588] netem: change failed [ 411.203009][ T29] kauditd_printk_skb: 967 callbacks suppressed [ 411.203023][ T29] audit: type=1400 audit(2000000217.004:40488): avc: denied { prog_load } for pid=20587 comm="syz.1.5708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.267285][ T29] audit: type=1326 audit(2000000217.069:40489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20586 comm="syz.3.5709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 411.292371][ T29] audit: type=1326 audit(2000000217.069:40490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20586 comm="syz.3.5709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 411.316221][ T29] audit: type=1326 audit(2000000217.069:40491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20586 comm="syz.3.5709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 411.341259][ T29] audit: type=1326 audit(2000000217.069:40492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20586 comm="syz.3.5709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 411.365101][ T29] audit: type=1326 audit(2000000217.069:40493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20586 comm="syz.3.5709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 411.390457][ T29] audit: type=1400 audit(2000000217.069:40494): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 411.416274][ T29] audit: type=1326 audit(2000000217.069:40495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20586 comm="syz.3.5709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 411.441292][ T29] audit: type=1326 audit(2000000217.079:40496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20586 comm="syz.3.5709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 411.465092][ T29] audit: type=1326 audit(2000000217.079:40497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20586 comm="syz.3.5709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248e4ceb69 code=0x7ffc0000 [ 411.710980][T20631] netdevsim netdevsim6: Direct firmware load for ./file0 failed with error -2 [ 411.910867][T20657] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5739'. [ 411.928857][T20655] netlink: 'syz.1.5738': attribute type 4 has an invalid length. [ 411.936822][T20655] netlink: 17 bytes leftover after parsing attributes in process `syz.1.5738'. [ 412.093523][T20676] netlink: 'syz.6.5747': attribute type 4 has an invalid length. [ 412.102856][T20676] netlink: 17 bytes leftover after parsing attributes in process `syz.6.5747'. [ 412.164744][T20683] 8021q: adding VLAN 0 to HW filter on device bond9 [ 412.513935][T20714] netlink: 17 bytes leftover after parsing attributes in process `syz.3.5763'. [ 412.651441][T20726] validate_nla: 2 callbacks suppressed [ 412.651459][T20726] netlink: 'syz.7.5767': attribute type 1 has an invalid length. [ 412.677110][T20726] 8021q: adding VLAN 0 to HW filter on device bond5 [ 413.658648][T20828] netlink: 'syz.6.5816': attribute type 1 has an invalid length. [ 413.685837][T20828] 8021q: adding VLAN 0 to HW filter on device bond2 [ 413.905725][T20844] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5825'. [ 414.042622][T20853] netlink: 'syz.4.5830': attribute type 4 has an invalid length. [ 414.051214][T20853] netlink: 17 bytes leftover after parsing attributes in process `syz.4.5830'. [ 414.495994][T20894] netlink: 'syz.7.5849': attribute type 4 has an invalid length. [ 414.503852][T20894] netlink: 17 bytes leftover after parsing attributes in process `syz.7.5849'. [ 414.577989][T20905] serio: Serial port ttyS3 [ 414.832216][T20938] netlink: 'syz.6.5869': attribute type 4 has an invalid length. [ 414.841652][T20938] netlink: 17 bytes leftover after parsing attributes in process `syz.6.5869'. [ 415.805721][T21073] netlink: 'syz.4.5935': attribute type 4 has an invalid length. [ 415.813822][T21073] netlink: 17 bytes leftover after parsing attributes in process `syz.4.5935'. [ 415.871437][ T29] kauditd_printk_skb: 1029 callbacks suppressed [ 415.871456][ T29] audit: type=1400 audit(432.374:41527): avc: denied { prog_load } for pid=21079 comm="syz.4.5939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.921891][ T29] audit: type=1400 audit(432.384:41528): avc: denied { map_create } for pid=21080 comm="syz.7.5938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.942161][ T29] audit: type=1400 audit(432.384:41529): avc: denied { prog_load } for pid=21080 comm="syz.7.5938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.960938][ T29] audit: type=1400 audit(432.384:41530): avc: denied { read write } for pid=21080 comm="syz.7.5938" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=0 [ 415.986948][ T29] audit: type=1400 audit(432.406:41531): avc: denied { read write } for pid=21079 comm="syz.4.5939" name="ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 416.010990][ T29] audit: type=1400 audit(432.417:41532): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 416.052231][ T29] audit: type=1400 audit(432.481:41533): avc: denied { read } for pid=21083 comm="syz.6.5940" name="usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=0 [ 416.076816][ T29] audit: type=1400 audit(432.481:41534): avc: denied { write } for pid=21086 comm="syz.7.5941" name="ip6_flowlabel" dev="proc" ino=4026533559 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 416.101315][ T29] audit: type=1400 audit(432.502:41535): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 416.125250][ T29] audit: type=1400 audit(432.556:41536): avc: denied { append } for pid=21083 comm="syz.6.5940" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 416.262194][T21109] serio: Serial port ttyS3 [ 416.562179][T21148] netlink: 'syz.6.5969': attribute type 4 has an invalid length. [ 416.571571][T21148] netlink: 17 bytes leftover after parsing attributes in process `syz.6.5969'. [ 416.766154][T21175] netlink: 'syz.6.5982': attribute type 1 has an invalid length. [ 416.811481][T21179] netlink: 'syz.7.5984': attribute type 4 has an invalid length. [ 416.820007][T21179] netlink: 17 bytes leftover after parsing attributes in process `syz.7.5984'. [ 416.832086][T21175] 8021q: adding VLAN 0 to HW filter on device bond3 [ 417.254032][T21233] netlink: 'syz.6.6007': attribute type 1 has an invalid length. [ 417.287962][T21233] 8021q: adding VLAN 0 to HW filter on device bond4 [ 417.871942][T21282] netlink: 'syz.4.6030': attribute type 4 has an invalid length. [ 417.879981][T21282] netlink: 17 bytes leftover after parsing attributes in process `syz.4.6030'. [ 418.165947][T21322] netlink: 'syz.4.6050': attribute type 4 has an invalid length. [ 418.173948][T21322] netlink: 17 bytes leftover after parsing attributes in process `syz.4.6050'. [ 420.536511][ T29] kauditd_printk_skb: 725 callbacks suppressed [ 420.536527][ T29] audit: type=1400 audit(437.384:42262): avc: denied { map_create } for pid=21517 comm="syz.1.6145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 420.596748][ T29] audit: type=1400 audit(437.416:42263): avc: denied { prog_load } for pid=21519 comm="syz.7.6146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 420.615456][ T29] audit: type=1400 audit(437.416:42264): avc: denied { create } for pid=21519 comm="syz.7.6146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 420.635911][ T29] audit: type=1400 audit(437.427:42265): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 420.661081][ T29] audit: type=1400 audit(437.438:42266): avc: denied { name_bind } for pid=21521 comm="syz.7.6147" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 420.864773][ T29] audit: type=1400 audit(437.577:42267): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 420.890216][ T29] audit: type=1400 audit(437.588:42268): avc: denied { map_create } for pid=21523 comm="syz.1.6148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 420.909089][ T29] audit: type=1400 audit(437.588:42269): avc: denied { prog_load } for pid=21523 comm="syz.1.6148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 420.929335][ T29] audit: type=1400 audit(437.599:42270): avc: denied { map_create } for pid=21523 comm="syz.1.6148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 420.948122][ T29] audit: type=1400 audit(437.599:42271): avc: denied { map_create } for pid=21523 comm="syz.1.6148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 421.129152][T21551] serio: Serial port ttyS3 [ 421.290782][T21565] serio: Serial port ttyS3 [ 421.322057][T21572] ipvlan0: entered promiscuous mode [ 421.338154][T21572] bridge0: port 1(ipvlan0) entered blocking state [ 421.344669][T21572] bridge0: port 1(ipvlan0) entered disabled state [ 421.395607][T21572] ipvlan0: entered allmulticast mode [ 421.401011][T21572] bridge0: entered allmulticast mode [ 421.425268][T21572] ipvlan0: left allmulticast mode [ 421.430449][T21572] bridge0: left allmulticast mode [ 421.542441][T21586] serio: Serial port ttyS3 [ 421.787447][T21610] netlink: 'syz.7.6181': attribute type 1 has an invalid length. [ 421.827834][T21610] 8021q: adding VLAN 0 to HW filter on device bond6 [ 422.866639][T21675] sctp: [Deprecated]: syz.1.6208 (pid 21675) Use of int in max_burst socket option. [ 422.866639][T21675] Use struct sctp_assoc_value instead [ 423.002920][T21683] netlink: 'syz.4.6211': attribute type 4 has an invalid length. [ 423.012215][T21683] netlink: 17 bytes leftover after parsing attributes in process `syz.4.6211'. [ 423.107409][T21692] binfmt_misc: register: failed to install interpreter file ./file2 [ 424.513172][T21804] netlink: 'syz.3.6264': attribute type 4 has an invalid length. [ 424.522712][T21804] netlink: 17 bytes leftover after parsing attributes in process `syz.3.6264'. [ 424.703808][T21824] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6274'. [ 424.807369][T21834] netlink: 'syz.4.6279': attribute type 4 has an invalid length. [ 424.815374][T21834] netlink: 17 bytes leftover after parsing attributes in process `syz.4.6279'. [ 424.886879][T21790] lo speed is unknown, defaulting to 1000 [ 424.910089][T21790] lo speed is unknown, defaulting to 1000 [ 424.973649][T21790] lo speed is unknown, defaulting to 1000 [ 424.992500][T21790] lo speed is unknown, defaulting to 1000 [ 425.205397][ T29] kauditd_printk_skb: 609 callbacks suppressed [ 425.205415][ T29] audit: type=1400 audit(442.395:42881): avc: denied { read write } for pid=21869 comm="syz.6.6293" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 425.257719][T21870] netlink: 'syz.6.6293': attribute type 4 has an invalid length. [ 425.259872][ T29] audit: type=1400 audit(442.438:42882): avc: denied { map_create } for pid=21869 comm="syz.6.6293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.265556][T21870] netlink: 17 bytes leftover after parsing attributes in process `syz.6.6293'. [ 425.296345][ T29] audit: type=1400 audit(442.438:42883): avc: denied { prog_load } for pid=21862 comm="syz.4.6290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.315034][ T29] audit: type=1400 audit(442.438:42884): avc: denied { create } for pid=21862 comm="syz.4.6290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 425.336656][ T29] audit: type=1400 audit(442.438:42885): avc: denied { prog_load } for pid=21869 comm="syz.6.6293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.355355][ T29] audit: type=1400 audit(442.448:42886): avc: denied { create } for pid=21869 comm="syz.6.6293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 425.375898][ T29] audit: type=1400 audit(442.448:42887): avc: denied { map_create } for pid=21869 comm="syz.6.6293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.394663][ T29] audit: type=1400 audit(442.448:42888): avc: denied { prog_load } for pid=21869 comm="syz.6.6293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.414739][ T29] audit: type=1400 audit(442.448:42889): avc: denied { map_create } for pid=21869 comm="syz.6.6293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.433590][ T29] audit: type=1400 audit(442.448:42890): avc: denied { prog_load } for pid=21869 comm="syz.6.6293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 426.493675][T21993] netlink: 'syz.4.6353': attribute type 1 has an invalid length. [ 426.535191][T21993] 8021q: adding VLAN 0 to HW filter on device bond7 [ 426.557474][T21991] lo speed is unknown, defaulting to 1000 [ 426.571249][T21991] lo speed is unknown, defaulting to 1000 [ 426.618769][T21991] lo speed is unknown, defaulting to 1000 [ 426.625206][T21991] lo speed is unknown, defaulting to 1000 [ 426.793995][T22033] netlink: 'syz.4.6370': attribute type 1 has an invalid length. [ 426.817525][T22033] 8021q: adding VLAN 0 to HW filter on device bond8 [ 427.224979][T22086] netlink: 'syz.7.6394': attribute type 4 has an invalid length. [ 427.232972][T22086] netlink: 17 bytes leftover after parsing attributes in process `syz.7.6394'. [ 427.393530][T22110] serio: Serial port ttyS3 [ 427.639675][T22132] netlink: 'syz.1.6413': attribute type 1 has an invalid length. [ 427.681738][T22132] 8021q: adding VLAN 0 to HW filter on device bond10 [ 427.840515][T22144] serio: Serial port ttyS3 [ 428.018503][T22163] dummy0: entered promiscuous mode [ 428.028112][T22163] macsec1: entered promiscuous mode [ 428.047939][T22163] macsec1: entered allmulticast mode [ 428.053671][T22163] dummy0: entered allmulticast mode [ 428.078206][T22163] dummy0: left allmulticast mode [ 428.089791][T22163] dummy0: left promiscuous mode [ 428.248254][T22184] netlink: 'syz.6.6436': attribute type 4 has an invalid length. [ 428.256905][T22184] netlink: 17 bytes leftover after parsing attributes in process `syz.6.6436'. [ 428.426178][T22204] syzkaller0: entered promiscuous mode [ 428.431878][T22204] syzkaller0: entered allmulticast mode [ 428.462127][T22210] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6448'. [ 428.980300][T22264] netlink: 'syz.3.6472': attribute type 4 has an invalid length. [ 428.988086][T22264] netlink: 17 bytes leftover after parsing attributes in process `syz.3.6472'. [ 429.289735][T22296] netlink: 'syz.4.6487': attribute type 4 has an invalid length. [ 429.297754][T22296] netlink: 17 bytes leftover after parsing attributes in process `syz.4.6487'. [ 429.472448][T22319] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6497'. [ 429.491309][T22319] bridge0: entered promiscuous mode [ 429.498741][T22319] bridge0: port 4(macvlan2) entered blocking state [ 429.506907][T22319] bridge0: port 4(macvlan2) entered disabled state [ 429.514343][T22319] macvlan2: entered allmulticast mode [ 429.519739][T22319] bridge0: entered allmulticast mode [ 429.526060][T22319] macvlan2: left allmulticast mode [ 429.532688][T22319] bridge0: left allmulticast mode [ 429.540431][T22319] bridge0: left promiscuous mode [ 429.652850][T22333] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 429.873991][ T29] kauditd_printk_skb: 767 callbacks suppressed [ 429.874009][ T29] audit: type=1400 audit(447.394:43658): avc: denied { map_create } for pid=22359 comm="syz.7.6515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 429.935554][ T29] audit: type=1400 audit(447.448:43659): avc: denied { prog_load } for pid=22359 comm="syz.7.6515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 429.954454][ T29] audit: type=1400 audit(447.448:43660): avc: denied { prog_load } for pid=22359 comm="syz.7.6515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 429.973969][ T29] audit: type=1400 audit(447.459:43661): avc: denied { create } for pid=22363 comm="syz.3.6518" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 429.994284][ T29] audit: type=1400 audit(447.459:43662): avc: denied { create } for pid=22364 comm="syz.6.6519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 430.121448][ T29] audit: type=1400 audit(447.480:43663): avc: denied { create } for pid=22364 comm="syz.6.6519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 430.141599][ T29] audit: type=1400 audit(447.523:43664): avc: denied { map_create } for pid=22367 comm="syz.3.6520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 430.160591][ T29] audit: type=1400 audit(447.534:43665): avc: denied { prog_load } for pid=22367 comm="syz.3.6520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 430.180097][ T29] audit: type=1400 audit(447.534:43666): avc: denied { prog_load } for pid=22367 comm="syz.3.6520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 430.199002][ T29] audit: type=1400 audit(447.534:43667): avc: denied { create } for pid=22367 comm="syz.3.6520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 430.241448][T22390] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6531'. [ 430.250576][T22390] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6531'. [ 430.260960][T22390] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6531'. [ 430.270998][T22390] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6531'. [ 430.280256][T22390] netlink: 'syz.6.6531': attribute type 6 has an invalid length. [ 431.085206][T22461] netlink: 'syz.6.6563': attribute type 4 has an invalid length. [ 431.093125][T22461] netlink: 17 bytes leftover after parsing attributes in process `syz.6.6563'. [ 431.175271][T22466] vxcan1: entered allmulticast mode [ 431.450458][T22488] netlink: 'syz.7.6575': attribute type 4 has an invalid length. [ 431.723393][T22524] netlink: 'syz.4.6590': attribute type 4 has an invalid length. [ 431.993414][T22556] serio: Serial port ttyS3 [ 432.124729][T22561] netlink: 'syz.3.6608': attribute type 4 has an invalid length. [ 432.434086][T22589] vxcan1: entered allmulticast mode [ 432.553877][T22603] netlink: 'syz.7.6623': attribute type 1 has an invalid length. [ 432.570233][T22603] 8021q: adding VLAN 0 to HW filter on device bond7 [ 433.247702][T22674] serio: Serial port ttyS3 [ 433.421039][T22693] netlink: 'syz.4.6665': attribute type 1 has an invalid length. [ 433.475899][T22693] 8021q: adding VLAN 0 to HW filter on device bond9 [ 434.044757][T22727] __nla_validate_parse: 3 callbacks suppressed [ 434.044780][T22727] netlink: 80 bytes leftover after parsing attributes in process `syz.1.6680'. [ 434.080031][T22727] netlink: 80 bytes leftover after parsing attributes in process `syz.1.6680'. [ 434.176130][T22737] netlink: 'syz.6.6684': attribute type 4 has an invalid length. [ 434.183938][T22737] netlink: 17 bytes leftover after parsing attributes in process `syz.6.6684'. [ 434.515403][T22771] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6699'. [ 434.544523][ T29] kauditd_printk_skb: 843 callbacks suppressed [ 434.544542][ T29] audit: type=1326 audit(452.415:44511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22773 comm="syz.1.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f608b53eb69 code=0x7ffc0000 [ 434.579778][T22774] netlink: 'syz.1.6701': attribute type 4 has an invalid length. [ 434.587752][T22774] netlink: 17 bytes leftover after parsing attributes in process `syz.1.6701'. [ 434.608077][ T29] audit: type=1326 audit(452.448:44512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22773 comm="syz.1.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f608b53eb69 code=0x7ffc0000 [ 434.632695][ T29] audit: type=1400 audit(452.448:44513): avc: denied { prog_load } for pid=22773 comm="syz.1.6701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 434.651793][ T29] audit: type=1326 audit(452.448:44514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22773 comm="syz.1.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f608b53eb69 code=0x7ffc0000 [ 434.676463][ T29] audit: type=1326 audit(452.448:44515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22773 comm="syz.1.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f608b53eb69 code=0x7ffc0000 [ 434.699504][ T29] audit: type=1326 audit(452.448:44516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22773 comm="syz.1.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f608b53eb69 code=0x7ffc0000 [ 434.723965][ T29] audit: type=1326 audit(452.448:44517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22773 comm="syz.1.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f608b53eb69 code=0x7ffc0000 [ 434.747282][ T29] audit: type=1326 audit(452.448:44518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22773 comm="syz.1.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f608b53eb69 code=0x7ffc0000 [ 434.771746][ T29] audit: type=1326 audit(452.448:44519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22773 comm="syz.1.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f608b53eb69 code=0x7ffc0000 [ 434.794833][ T29] audit: type=1400 audit(452.448:44520): avc: denied { create } for pid=22773 comm="syz.1.6701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 435.440138][T22796] netlink: 'syz.3.6709': attribute type 4 has an invalid length. [ 435.449537][T22796] netlink: 17 bytes leftover after parsing attributes in process `syz.3.6709'. [ 436.106499][T22858] netlink: 'syz.3.6739': attribute type 4 has an invalid length. [ 436.114415][T22858] netlink: 17 bytes leftover after parsing attributes in process `syz.3.6739'. [ 436.544619][T22882] netlink: 'syz.6.6750': attribute type 4 has an invalid length. [ 436.552643][T22882] netlink: 17 bytes leftover after parsing attributes in process `syz.6.6750'. [ 436.718643][T22898] netlink: 'syz.6.6757': attribute type 4 has an invalid length. [ 436.727897][T22898] netlink: 17 bytes leftover after parsing attributes in process `syz.6.6757'. [ 437.192525][T22912] netlink: 'syz.6.6763': attribute type 13 has an invalid length. [ 437.203710][T22912] gretap0: refused to change device tx_queue_len [ 437.210203][T22912] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 437.590502][T22950] netlink: 'syz.3.6780': attribute type 13 has an invalid length. [ 437.615686][T22950] erspan0: refused to change device tx_queue_len [ 437.623659][T22950] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 437.650427][T22951] netlink: 'syz.1.6778': attribute type 1 has an invalid length. [ 437.696866][T22951] 8021q: adding VLAN 0 to HW filter on device bond11 [ 439.020408][T23019] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.225488][ T29] kauditd_printk_skb: 500 callbacks suppressed [ 439.225504][ T29] audit: type=1400 audit(457.437:45021): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 439.319370][T23036] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(3) [ 439.320507][ T29] audit: type=1400 audit(457.469:45022): avc: denied { create } for pid=23033 comm="syz.7.6818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 439.325945][T23036] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 439.327849][T23036] vhci_hcd vhci_hcd.0: Device attached [ 439.346853][ T29] audit: type=1400 audit(457.469:45023): avc: denied { create } for pid=23033 comm="syz.7.6818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 439.380415][ T29] audit: type=1400 audit(457.469:45024): avc: denied { create } for pid=23033 comm="syz.7.6818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 439.392409][T23037] vhci_hcd: connection closed [ 439.401423][ T29] audit: type=1400 audit(457.501:45025): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 439.401472][ T29] audit: type=1400 audit(457.522:45026): avc: denied { map_create } for pid=23035 comm="syz.7.6819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 439.401525][ T29] audit: type=1400 audit(457.522:45027): avc: denied { prog_load } for pid=23035 comm="syz.7.6819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 439.401582][ T29] audit: type=1400 audit(457.533:45028): avc: denied { prog_load } for pid=23035 comm="syz.7.6819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 439.401694][ T29] audit: type=1400 audit(457.533:45029): avc: denied { prog_load } for pid=23035 comm="syz.7.6819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 439.544728][ T37] vhci_hcd: stop threads [ 439.549407][ T37] vhci_hcd: release socket [ 439.553836][ T37] vhci_hcd: disconnect device [ 439.594061][ T29] audit: type=1400 audit(457.812:45030): avc: denied { map_create } for pid=23041 comm="syz.4.6822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 439.615946][ T3367] vhci_hcd: vhci_device speed not set [ 439.951090][T23067] serio: Serial port ttyS3 [ 440.300922][T23100] serio: Serial port ttyS3 [ 440.691687][T23135] serio: Serial port ttyS3 [ 441.089019][T23165] serio: Serial port ttyS3 [ 441.246983][T23175] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 441.253620][T23175] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 441.261606][T23175] vhci_hcd vhci_hcd.0: Device attached [ 441.325378][T23176] vhci_hcd: connection closed [ 441.326142][ T31] vhci_hcd: stop threads [ 441.335635][ T31] vhci_hcd: release socket [ 441.341015][ T31] vhci_hcd: disconnect device [ 441.425958][T23189] serio: Serial port ttyS3 [ 441.738007][T23221] serio: Serial port ttyS3 [ 441.928128][T23249] serio: Serial port ttyS3 [ 442.141710][T23263] serio: Serial port ttyS3 [ 442.703943][T23278] netlink: 'syz.6.6924': attribute type 4 has an invalid length. [ 442.713247][T23278] netlink: 17 bytes leftover after parsing attributes in process `syz.6.6924'. [ 442.849069][T23284] serio: Serial port ttyS3 [ 443.428913][T23312] netlink: 'syz.4.6938': attribute type 1 has an invalid length. [ 443.474484][T23312] 8021q: adding VLAN 0 to HW filter on device bond10 [ 443.862361][T23339] netlink: 'syz.3.6949': attribute type 1 has an invalid length. [ 443.912493][ T29] kauditd_printk_skb: 579 callbacks suppressed [ 443.912513][ T29] audit: type=1400 audit(462.469:45610): avc: denied { map_create } for pid=23341 comm="syz.1.6952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 443.941732][T23339] 8021q: adding VLAN 0 to HW filter on device bond9 [ 443.950210][ T29] audit: type=1400 audit(462.469:45611): avc: denied { prog_load } for pid=23341 comm="syz.1.6952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 443.986046][ T29] audit: type=1400 audit(462.533:45612): avc: denied { prog_load } for pid=23344 comm="syz.1.6953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 444.024007][ T29] audit: type=1400 audit(462.565:45613): avc: denied { mounton } for pid=23344 comm="syz.1.6953" path="/1371/file0" dev="tmpfs" ino=7206 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 444.047894][ T29] audit: type=1400 audit(462.565:45614): avc: denied { mounton } for pid=23344 comm="syz.1.6953" path="/1371/control" dev="tmpfs" ino=7207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 444.071951][ T29] audit: type=1400 audit(462.576:45615): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 444.101896][ T29] audit: type=1400 audit(462.662:45616): avc: denied { read write } for pid=23346 comm="syz.7.6951" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 444.130181][ T29] audit: type=1400 audit(462.694:45617): avc: denied { create } for pid=23348 comm="syz.1.6954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 444.207751][ T29] audit: type=1400 audit(462.726:45618): avc: denied { map_create } for pid=23348 comm="syz.1.6954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 444.228130][ T29] audit: type=1400 audit(462.726:45619): avc: denied { prog_load } for pid=23348 comm="syz.1.6954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 444.344585][T23363] netlink: 'syz.7.6960': attribute type 4 has an invalid length. [ 444.352830][T23363] netlink: 17 bytes leftover after parsing attributes in process `syz.7.6960'. [ 444.706734][T23400] netlink: 'syz.7.6977': attribute type 4 has an invalid length. [ 444.716171][T23400] netlink: 17 bytes leftover after parsing attributes in process `syz.7.6977'. [ 444.765489][T23404] pim6reg1: entered promiscuous mode [ 444.771164][T23404] pim6reg1: entered allmulticast mode [ 445.503940][T23437] netlink: 132 bytes leftover after parsing attributes in process `syz.6.6995'. [ 445.548769][T23442] bridge0: entered promiscuous mode [ 445.566063][T23442] bridge0: port 4(macsec1) entered blocking state [ 445.574375][T23442] bridge0: port 4(macsec1) entered disabled state [ 445.589868][T23442] macsec1: entered allmulticast mode [ 445.595274][T23442] bridge0: entered allmulticast mode [ 445.607529][T23442] macsec1: left allmulticast mode [ 445.612732][T23442] bridge0: left allmulticast mode [ 445.639563][T23442] bridge0: left promiscuous mode [ 445.923451][T23468] netlink: 132 bytes leftover after parsing attributes in process `syz.6.7009'. [ 445.978825][T23460] lo speed is unknown, defaulting to 1000 [ 446.033562][T23460] lo speed is unknown, defaulting to 1000 [ 446.056696][ T1663] batadv1: left allmulticast mode [ 446.061832][ T1663] batadv1: left promiscuous mode [ 446.067889][ T1663] bridge0: port 4(batadv1) entered disabled state [ 446.122355][ T1663] bridge_slave_1: left allmulticast mode [ 446.128144][ T1663] bridge_slave_1: left promiscuous mode [ 446.134141][ T1663] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.196367][ T1663] bridge_slave_0: left promiscuous mode [ 446.202183][ T1663] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.324874][ T1663] bond1 (unregistering): (slave gretap1): Releasing active interface [ 446.420770][ T1663] $Hÿ (unregistering): (slave 30): Releasing backup interface [ 446.448066][ T1663] : left promiscuous mode [ 446.458039][ T1663] $Hÿ (unregistering): (slave bond_slave_1): Releasing backup interface [ 446.486173][ T1663] bond_slave_1: left promiscuous mode [ 446.492046][ T1663] $Hÿ (unregistering): Released all slaves [ 446.524213][ T1663] bond1 (unregistering): Released all slaves [ 446.668987][T23460] lo speed is unknown, defaulting to 1000 [ 446.717500][T23460] lo speed is unknown, defaulting to 1000 [ 447.200548][ T1663] hsr_slave_0: left promiscuous mode [ 447.228358][ T1663] hsr_slave_1: left promiscuous mode [ 447.262488][ T1663] veth1_macvtap: left allmulticast mode [ 447.413901][ T1663] team0 (unregistering): Port device team_slave_1 removed [ 447.441474][ T1663] team0 (unregistering): Port device team_slave_0 removed [ 447.586631][ T3367] lo speed is unknown, defaulting to 1000 [ 447.594078][ T3367] syz2: Port: 1 Link DOWN [ 448.584750][ T29] kauditd_printk_skb: 423 callbacks suppressed [ 448.584771][ T29] audit: type=1400 audit(467.479:46043): avc: denied { map_create } for pid=23576 comm="syz.6.7057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 448.627678][T23579] bridge0: port 1(macsec0) entered blocking state [ 448.634232][T23579] bridge0: port 1(macsec0) entered disabled state [ 448.660505][ T29] audit: type=1400 audit(467.511:46044): avc: denied { map_create } for pid=23578 comm="syz.1.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 448.674423][T23579] macsec0: entered allmulticast mode [ 448.680816][ T29] audit: type=1400 audit(467.511:46045): avc: denied { prog_load } for pid=23578 comm="syz.1.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 448.686906][T23579] bridge0: entered allmulticast mode [ 448.704696][ T29] audit: type=1400 audit(467.511:46046): avc: denied { prog_load } for pid=23576 comm="syz.6.7057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 448.727972][ T29] audit: type=1400 audit(467.511:46047): avc: denied { map_create } for pid=23576 comm="syz.6.7057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 448.747668][ T29] audit: type=1400 audit(467.533:46048): avc: denied { map_create } for pid=23576 comm="syz.6.7057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 448.832732][T23579] macsec0: left allmulticast mode [ 448.837822][T23579] bridge0: left allmulticast mode [ 448.853197][ T29] audit: type=1400 audit(467.715:46049): avc: denied { prog_load } for pid=23580 comm="syz.6.7059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 448.873632][ T29] audit: type=1400 audit(467.737:46050): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 448.899053][ T29] audit: type=1400 audit(467.758:46051): avc: denied { prog_load } for pid=23580 comm="syz.6.7059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 448.917893][ T29] audit: type=1400 audit(467.769:46052): avc: denied { create } for pid=23582 comm="syz.7.7060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 449.128011][T23595] serio: Serial port ttyS3 [ 449.174321][T23603] pim6reg1: entered promiscuous mode [ 449.181425][T23603] pim6reg1: entered allmulticast mode [ 449.639782][T23643] serio: Serial port ttyS3 [ 449.692023][T23647] netlink: 96 bytes leftover after parsing attributes in process `syz.1.7088'. [ 449.911025][T23659] lo speed is unknown, defaulting to 1000 [ 450.037027][T23659] lo speed is unknown, defaulting to 1000 [ 450.064530][T23678] serio: Serial port ttyS3 [ 450.071983][T23659] lo speed is unknown, defaulting to 1000 [ 450.509377][T23707] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7113'. [ 450.527234][T23707] batadv0: left allmulticast mode [ 450.532393][T23707] batadv0: left promiscuous mode [ 450.537529][T23707] bridge0: port 1(batadv0) entered disabled state [ 450.666563][T23712] netlink: 'syz.4.7117': attribute type 4 has an invalid length. [ 450.675852][T23712] netlink: 17 bytes leftover after parsing attributes in process `syz.4.7117'. [ 450.866949][T23733] netlink: 'syz.1.7123': attribute type 1 has an invalid length. [ 450.919386][T23733] 8021q: adding VLAN 0 to HW filter on device bond12 [ 450.951549][T23735] serio: Serial port ttyS3 [ 451.010037][T23748] netlink: 'syz.6.7132': attribute type 4 has an invalid length. [ 451.018808][T23748] netlink: 17 bytes leftover after parsing attributes in process `syz.6.7132'. [ 451.156503][T23769] ªªªªª: renamed from vlan1 (while UP) [ 451.271194][T23780] serio: Serial port ttyS3 [ 452.055353][T23834] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7169'. [ 453.052315][T23908] geneve2: entered promiscuous mode [ 453.058643][T23908] geneve2: entered allmulticast mode [ 453.251049][ T29] kauditd_printk_skb: 660 callbacks suppressed [ 453.251068][ T29] audit: type=1400 audit(472.479:46713): avc: denied { prog_load } for pid=23923 comm="syz.3.7213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 453.336087][ T29] audit: type=1400 audit(472.511:46714): avc: denied { map_create } for pid=23926 comm="syz.7.7214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 453.355025][ T29] audit: type=1400 audit(472.511:46715): avc: denied { map_create } for pid=23926 comm="syz.7.7214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 453.374702][ T29] audit: type=1400 audit(472.522:46716): avc: denied { prog_load } for pid=23926 comm="syz.7.7214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 453.393543][ T29] audit: type=1400 audit(472.522:46717): avc: denied { prog_load } for pid=23926 comm="syz.7.7214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 453.412230][ T29] audit: type=1400 audit(472.522:46718): avc: denied { prog_load } for pid=23928 comm="syz.3.7215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 453.431698][ T29] audit: type=1400 audit(472.543:46719): avc: denied { map_create } for pid=23930 comm="syz.4.7216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 453.450538][ T29] audit: type=1400 audit(472.543:46720): avc: denied { prog_load } for pid=23930 comm="syz.4.7216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 453.470084][ T29] audit: type=1400 audit(472.543:46721): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 453.494644][ T29] audit: type=1400 audit(472.543:46722): avc: denied { prog_load } for pid=23928 comm="syz.3.7215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 453.809202][T23972] netlink: 'syz.3.7234': attribute type 21 has an invalid length. [ 453.817395][T23972] netlink: 132 bytes leftover after parsing attributes in process `syz.3.7234'. [ 455.073621][T24065] netlink: 16 bytes leftover after parsing attributes in process `wÞ£ÿ'. [ 455.107136][T24065] bridge0: port 1(macvlan0) entered blocking state [ 455.113717][T24065] bridge0: port 1(macvlan0) entered disabled state [ 455.136842][T24065] macvlan0: entered allmulticast mode [ 455.142467][T24065] bridge0: entered allmulticast mode [ 455.161895][T24065] macvlan0: left allmulticast mode [ 455.167114][T24065] bridge0: left allmulticast mode [ 455.340700][T24090] netlink: 4 bytes leftover after parsing attributes in process `syz.6.7288'. [ 455.369607][T24090] batadv1: left allmulticast mode [ 455.374757][T24090] batadv1: left promiscuous mode [ 455.380021][T24090] bridge0: port 3(batadv1) entered disabled state [ 455.408797][T24090] bridge_slave_1: left allmulticast mode [ 455.414674][T24090] bridge_slave_1: left promiscuous mode [ 455.420636][T24090] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.451574][T24090] bridge_slave_0: left allmulticast mode [ 455.457275][T24090] bridge_slave_0: left promiscuous mode [ 455.463214][T24090] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.549974][T24099] bond10: entered promiscuous mode [ 455.555449][T24099] bond10: entered allmulticast mode [ 455.569547][T24099] 8021q: adding VLAN 0 to HW filter on device bond10 [ 455.618798][T24099] bond10 (unregistering): Released all slaves [ 456.017461][T24157] netlink: '+}[@': attribute type 8 has an invalid length. [ 456.151828][T24173] netlink: 'syz.3.7324': attribute type 1 has an invalid length. [ 456.187025][T24173] 8021q: adding VLAN 0 to HW filter on device bond10 [ 456.221778][T24182] veth1_to_team: entered promiscuous mode [ 456.228523][T24182] bond_slave_0: entered promiscuous mode [ 456.236203][T24182] debugfs: 'hsr0' already exists in 'hsr' [ 456.242156][T24182] Cannot create hsr debugfs directory [ 456.248203][T24182] hsr0: Slave A (veth1_to_team) is not up; please bring it up to get a fully working HSR network [ 456.258819][T24182] hsr0: Slave B (bond_slave_0) is not up; please bring it up to get a fully working HSR network [ 456.271567][T24182] hsr0: entered promiscuous mode [ 456.355816][T24185] netlink: 'syz.1.7331': attribute type 1 has an invalid length. [ 456.374152][T24185] 8021q: adding VLAN 0 to HW filter on device bond13 [ 456.640378][T24198] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7337'. [ 456.982180][T24232] netlink: 'syz.6.7353': attribute type 29 has an invalid length. [ 457.007926][T24232] netlink: 'syz.6.7353': attribute type 29 has an invalid length. [ 457.027460][T24232] netlink: 'syz.6.7353': attribute type 29 has an invalid length. [ 457.046776][T24232] netlink: 'syz.6.7353': attribute type 29 has an invalid length. [ 457.976206][ T29] kauditd_printk_skb: 522 callbacks suppressed [ 457.976221][ T29] audit: type=1400 audit(477.543:47245): avc: denied { prog_load } for pid=24294 comm="syz.6.7383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 458.029249][ T29] audit: type=1400 audit(477.586:47246): avc: denied { mounton } for pid=24294 comm="syz.6.7383" path="/1149/file0" dev="tmpfs" ino=5913 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 458.053130][ T29] audit: type=1400 audit(477.586:47247): avc: denied { read } for pid=24294 comm="syz.6.7383" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=0 [ 458.076013][ T29] audit: type=1400 audit(477.596:47248): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 458.107200][ T29] audit: type=1400 audit(477.607:47249): avc: denied { map_create } for pid=24297 comm="syz.7.7385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 458.127631][ T29] audit: type=1400 audit(477.661:47250): avc: denied { map_create } for pid=24296 comm="syz.6.7384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 458.146547][ T29] audit: type=1400 audit(477.661:47251): avc: denied { prog_load } for pid=24297 comm="syz.7.7385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 458.166779][ T29] audit: type=1400 audit(477.682:47252): avc: denied { prog_load } for pid=24296 comm="syz.6.7384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 458.186405][ T29] audit: type=1400 audit(477.693:47253): avc: denied { prog_load } for pid=24296 comm="syz.6.7384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 458.206631][ T29] audit: type=1400 audit(477.704:47254): avc: denied { create } for pid=24296 comm="syz.6.7384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 458.252729][T24305] netlink: 24 bytes leftover after parsing attributes in process `syz.6.7386'. [ 458.572220][T24331] netlink: 'syz.6.7398': attribute type 4 has an invalid length. [ 458.752819][T24341] netlink: 'syz.7.7403': attribute type 4 has an invalid length. [ 458.762223][T24341] netlink: 17 bytes leftover after parsing attributes in process `syz.7.7403'. [ 459.687435][T24407] veth3: entered promiscuous mode [ 459.833756][T24423] netlink: 12 bytes leftover after parsing attributes in process `syz.7.7438'. [ 459.844524][T24423] netlink: 'syz.7.7438': attribute type 15 has an invalid length. [ 459.858550][ T31] netdevsim netdevsim7 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 459.868031][ T31] netdevsim netdevsim7 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 459.883811][T24423] netlink: 12 bytes leftover after parsing attributes in process `syz.7.7438'. [ 459.903024][ T31] netdevsim netdevsim7 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 459.915021][ T31] netdevsim netdevsim7 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 459.963175][T24427] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7440'. [ 461.896566][T24584] validate_nla: 1 callbacks suppressed [ 461.896582][T24584] netlink: 'syz.4.7505': attribute type 1 has an invalid length. [ 461.965968][T24593] netlink: 'syz.1.7512': attribute type 4 has an invalid length. [ 461.973776][T24593] netlink: 152 bytes leftover after parsing attributes in process `syz.1.7512'. [ 461.996116][T24584] 8021q: adding VLAN 0 to HW filter on device bond11 [ 462.064025][T24593] : renamed from bond0 [ 462.570982][T24642] netlink: 12 bytes leftover after parsing attributes in process `syz.3.7536'. [ 462.622930][T24644] netlink: 96 bytes leftover after parsing attributes in process `syz.1.7538'. [ 462.637283][T24646] macsec0: entered promiscuous mode [ 462.651630][ T29] kauditd_printk_skb: 515 callbacks suppressed [ 462.651649][ T29] audit: type=1400 audit(482.564:47770): avc: denied { prog_load } for pid=24647 comm="syz.3.7539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 462.726121][ T29] audit: type=1400 audit(482.564:47771): avc: denied { prog_load } for pid=24647 comm="syz.3.7539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 462.745660][ T29] audit: type=1400 audit(482.639:47772): avc: denied { map_create } for pid=24649 comm="syz.1.7540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 462.756549][T24654] geneve2: entered promiscuous mode [ 462.764652][ T29] audit: type=1400 audit(482.639:47773): avc: denied { create } for pid=24650 comm="syz.3.7541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 462.789863][ T29] audit: type=1400 audit(482.639:47774): avc: denied { prog_load } for pid=24649 comm="syz.1.7540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 462.808608][ T29] audit: type=1400 audit(482.639:47775): avc: denied { create } for pid=24650 comm="syz.3.7541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 462.828676][ T29] audit: type=1400 audit(482.639:47776): avc: denied { create } for pid=24649 comm="syz.1.7540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 462.848807][ T29] audit: type=1400 audit(482.639:47777): avc: denied { create } for pid=24650 comm="syz.3.7541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 462.869048][ T29] audit: type=1400 audit(482.639:47778): avc: denied { create } for pid=24649 comm="syz.1.7540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 462.889239][ T29] audit: type=1400 audit(482.639:47779): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 463.773048][T24739] netlink: 'syz.6.7581': attribute type 4 has an invalid length. [ 463.780931][T24739] netlink: 17 bytes leftover after parsing attributes in process `syz.6.7581'. [ 464.309650][T24804] netlink: 'syz.7.7611': attribute type 4 has an invalid length. [ 464.318831][T24804] netlink: 17 bytes leftover after parsing attributes in process `syz.7.7611'. [ 464.609421][T24832] netlink: 'syz.3.7625': attribute type 4 has an invalid length. [ 464.617307][T24832] netlink: 17 bytes leftover after parsing attributes in process `syz.3.7625'. [ 464.775855][T24840] netlink: 'syz.6.7629': attribute type 4 has an invalid length. [ 464.783903][T24840] netlink: 17 bytes leftover after parsing attributes in process `syz.6.7629'. [ 464.961789][T24856] serio: Serial port ttyS3 [ 465.058739][T24865] netlink: 'syz.3.7641': attribute type 4 has an invalid length. [ 465.066648][T24865] netlink: 17 bytes leftover after parsing attributes in process `syz.3.7641'. [ 466.044463][T24939] netlink: 'syz.6.7675': attribute type 13 has an invalid length. [ 466.053173][T24939] netlink: 'syz.6.7675': attribute type 17 has an invalid length. [ 466.185592][T24939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 466.211560][T24939] 8021q: adding VLAN 0 to HW filter on device team0 [ 466.237510][T24939] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 466.708811][T25006] netlink: 'syz.3.7704': attribute type 1 has an invalid length. [ 466.771043][T25006] 8021q: adding VLAN 0 to HW filter on device bond11 [ 467.338067][ T29] kauditd_printk_skb: 827 callbacks suppressed [ 467.338089][ T29] audit: type=1400 audit(487.596:48607): avc: denied { prog_load } for pid=25043 comm="syz.1.7724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 467.420830][ T29] audit: type=1400 audit(487.671:48608): avc: denied { name_bind } for pid=25045 comm="syz.4.7725" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 467.495929][ T29] audit: type=1400 audit(487.768:48609): avc: denied { map_create } for pid=25047 comm="syz.4.7726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 467.546120][ T29] audit: type=1400 audit(487.768:48610): avc: denied { prog_load } for pid=25047 comm="syz.4.7726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 467.565117][ T29] audit: type=1400 audit(487.789:48611): avc: denied { prog_load } for pid=25047 comm="syz.4.7726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 467.633411][ T29] audit: type=1400 audit(487.896:48612): avc: denied { map_create } for pid=25049 comm="syz.4.7728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 467.652382][ T29] audit: type=1400 audit(487.907:48613): avc: denied { prog_load } for pid=25049 comm="syz.4.7728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 467.672366][ T29] audit: type=1400 audit(487.907:48614): avc: denied { name_bind } for pid=25049 comm="syz.4.7728" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 467.762949][ T29] audit: type=1400 audit(487.961:48615): avc: denied { create } for pid=25051 comm="syz.6.7727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 467.783617][ T29] audit: type=1400 audit(487.961:48616): avc: denied { prog_load } for pid=25052 comm="syz.4.7729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 467.803150][T25060] netlink: 'syz.6.7732': attribute type 4 has an invalid length. [ 467.859049][T25060] netlink: 'syz.6.7732': attribute type 4 has an invalid length. [ 468.170632][T25084] netlink: 'syz.7.7742': attribute type 4 has an invalid length. [ 468.178712][T25084] netlink: 17 bytes leftover after parsing attributes in process `syz.7.7742'. [ 468.415041][T25110] netlink: 'syz.7.7752': attribute type 1 has an invalid length. [ 468.475972][T25110] 8021q: adding VLAN 0 to HW filter on device bond8 [ 468.526661][T25116] netlink: 'syz.4.7757': attribute type 4 has an invalid length. [ 468.534453][T25116] netlink: 17 bytes leftover after parsing attributes in process `syz.4.7757'. [ 468.649793][T25119] netlink: 'syz.4.7758': attribute type 13 has an invalid length. [ 468.657769][T25119] netlink: 'syz.4.7758': attribute type 17 has an invalid length. [ 468.685591][T25119] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 468.718513][T25121] netlink: 'syz.6.7768': attribute type 4 has an invalid length. [ 468.727828][T25121] netlink: 17 bytes leftover after parsing attributes in process `syz.6.7768'. [ 469.195136][T25150] netlink: 'syz.4.7771': attribute type 4 has an invalid length. [ 469.204417][T25150] netlink: 17 bytes leftover after parsing attributes in process `syz.4.7771'. [ 469.866433][T25210] serio: Serial port ttyS3 [ 470.178824][T25243] serio: Serial port ttyS3 [ 470.735603][T25275] netlink: 17 bytes leftover after parsing attributes in process `syz.6.7830'. [ 471.240555][T25291] 8021q: adding VLAN 0 to HW filter on device bond5 [ 471.304648][T25295] bond5: (slave veth7): Enslaving as an active interface with a down link [ 471.333902][T25291] bond0: (slave dummy0): Releasing backup interface [ 471.374405][T25291] bond5: (slave dummy0): making interface the new active one [ 471.403113][T25291] dummy0: entered promiscuous mode [ 471.420594][T25291] bond5: (slave dummy0): Enslaving as an active interface with an up link [ 471.534224][T25303] pim6reg1: entered promiscuous mode [ 471.541334][T25303] pim6reg1: entered allmulticast mode [ 471.626236][T25309] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7845'. [ 471.887888][T25334] validate_nla: 2 callbacks suppressed [ 471.887908][T25334] netlink: 'syz.6.7856': attribute type 4 has an invalid length. [ 471.903026][T25334] netlink: 17 bytes leftover after parsing attributes in process `syz.6.7856'. [ 472.006753][ T29] kauditd_printk_skb: 682 callbacks suppressed [ 472.006771][ T29] audit: type=1400 audit(492.606:49299): avc: denied { allowed } for pid=25344 comm="syz.4.7863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 472.048817][ T29] audit: type=1400 audit(492.628:49300): avc: denied { map_create } for pid=25346 comm="syz.1.7865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 472.065051][T25349] netlink: 96 bytes leftover after parsing attributes in process `syz.6.7864'. [ 472.069529][ T29] audit: type=1400 audit(492.628:49301): avc: denied { prog_load } for pid=25346 comm="syz.1.7865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 472.096713][ T29] audit: type=1400 audit(492.628:49302): avc: denied { prog_load } for pid=25346 comm="syz.1.7865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 472.116207][ T29] audit: type=1400 audit(492.628:49303): avc: denied { allowed } for pid=25346 comm="syz.1.7865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 472.145868][ T29] audit: type=1400 audit(492.660:49304): avc: denied { map_create } for pid=25348 comm="syz.6.7864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 472.165937][ T29] audit: type=1400 audit(492.660:49305): avc: denied { prog_load } for pid=25348 comm="syz.6.7864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 472.185418][ T29] audit: type=1400 audit(492.660:49306): avc: denied { prog_load } for pid=25348 comm="syz.6.7864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 472.205491][ T29] audit: type=1400 audit(492.660:49307): avc: denied { prog_load } for pid=25348 comm="syz.6.7864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 472.234566][ T29] audit: type=1400 audit(492.821:49308): avc: denied { prog_load } for pid=25352 comm="syz.4.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 473.363046][T25405] netlink: 'syz.6.7891': attribute type 13 has an invalid length. [ 473.371883][T25405] netlink: 152 bytes leftover after parsing attributes in process `syz.6.7891'. [ 473.406755][T25405] erspan0: refused to change device tx_queue_len [ 473.423005][T25405] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 473.937355][T25464] netlink: 'syz.4.7915': attribute type 1 has an invalid length. [ 473.975480][T25464] 8021q: adding VLAN 0 to HW filter on device bond12 [ 474.113698][T25476] lo speed is unknown, defaulting to 1000 [ 474.158049][T25476] lo speed is unknown, defaulting to 1000 [ 474.164462][T25476] lo speed is unknown, defaulting to 1000 [ 474.851753][T25521] netlink: 'syz.3.7944': attribute type 4 has an invalid length. [ 474.859678][T25521] netlink: 17 bytes leftover after parsing attributes in process `syz.3.7944'. [ 475.004759][T25532] netlink: 'syz.3.7949': attribute type 4 has an invalid length. [ 475.012566][T25532] netlink: 17 bytes leftover after parsing attributes in process `syz.3.7949'. [ 475.282017][T25547] futex_wake_op: syz.6.7956 tries to shift op by -1; fix this program [ 475.575721][T25574] netlink: 8 bytes leftover after parsing attributes in process `syz.6.7969'. [ 475.916004][T25598] netlink: 'syz.7.7979': attribute type 4 has an invalid length. [ 475.923947][T25598] netlink: 17 bytes leftover after parsing attributes in process `syz.7.7979'. [ 476.314794][T25635] netlink: 'syz.7.7996': attribute type 3 has an invalid length. [ 476.415566][T25648] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(3) [ 476.422129][T25648] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 476.431362][T25648] vhci_hcd vhci_hcd.0: Device attached [ 476.454637][T25648] vhci_hcd vhci_hcd.0: pdev(7) rhport(1) sockfd(5) [ 476.461303][T25648] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 476.469656][T25648] vhci_hcd vhci_hcd.0: Device attached [ 476.477000][T25648] vhci_hcd vhci_hcd.0: pdev(7) rhport(2) sockfd(7) [ 476.483558][T25648] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 476.492231][T25648] vhci_hcd vhci_hcd.0: Device attached [ 476.499792][T25648] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 476.510616][T25648] vhci_hcd vhci_hcd.0: pdev(7) rhport(4) sockfd(11) [ 476.517320][T25648] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 476.526537][T25648] vhci_hcd vhci_hcd.0: Device attached [ 476.545734][T25648] vhci_hcd vhci_hcd.0: pdev(7) rhport(5) sockfd(13) [ 476.552397][T25648] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 476.561829][T25648] vhci_hcd vhci_hcd.0: Device attached [ 476.573320][T25648] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 476.582815][T25648] vhci_hcd vhci_hcd.0: pdev(7) rhport(7) sockfd(17) [ 476.589574][T25648] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 476.598651][T25648] vhci_hcd vhci_hcd.0: Device attached [ 476.605492][T25663] vhci_hcd: connection closed [ 476.606058][T25661] vhci_hcd: connection closed [ 476.606090][T25659] vhci_hcd: connection closed [ 476.615809][T25655] vhci_hcd: connection closed [ 476.621583][ T7551] vhci_hcd: stop threads [ 476.626352][T25649] vhci_hcd: connection closed [ 476.630740][ T7551] vhci_hcd: release socket [ 476.640903][ T7551] vhci_hcd: disconnect device [ 476.645146][T25653] vhci_hcd: connection closed [ 476.655692][ T3919] usb 15-1: new low-speed USB device number 3 using vhci_hcd [ 476.677714][ T29] kauditd_printk_skb: 638 callbacks suppressed [ 476.677822][ T29] audit: type=1400 audit(497.617:49947): avc: denied { prog_load } for pid=25667 comm="syz.6.8005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 476.704530][ T7551] vhci_hcd: stop threads [ 476.708836][ T7551] vhci_hcd: release socket [ 476.713512][ T7551] vhci_hcd: disconnect device [ 476.718664][T25650] vhci_hcd: sendmsg failed!, ret=-32 for 48 [ 476.740288][ T7551] vhci_hcd: stop threads [ 476.744619][ T7551] vhci_hcd: release socket [ 476.750103][ T7551] vhci_hcd: disconnect device [ 476.768141][ T29] audit: type=1400 audit(497.713:49948): avc: denied { prog_load } for pid=25669 comm="syz.6.8006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 476.787592][ T7551] vhci_hcd: stop threads [ 476.791933][ T7551] vhci_hcd: release socket [ 476.796517][ T7551] vhci_hcd: disconnect device [ 476.811737][ T7551] vhci_hcd: stop threads [ 476.816097][ T7551] vhci_hcd: release socket [ 476.820551][ T7551] vhci_hcd: disconnect device [ 476.839485][ T7551] vhci_hcd: stop threads [ 476.840099][ T29] audit: type=1400 audit(497.788:49949): avc: denied { map_create } for pid=25671 comm="syz.6.8007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 476.843889][ T7551] vhci_hcd: release socket [ 476.868017][ T7551] vhci_hcd: disconnect device [ 476.909832][ T29] audit: type=1400 audit(497.831:49950): avc: denied { prog_load } for pid=25671 comm="syz.6.8007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 476.929908][ T29] audit: type=1400 audit(497.831:49951): avc: denied { prog_load } for pid=25671 comm="syz.6.8007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 476.948747][ T29] audit: type=1400 audit(497.831:49952): avc: denied { read write } for pid=25671 comm="syz.6.8007" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 477.044638][ T29] audit: type=1400 audit(497.949:49953): avc: denied { create } for pid=25673 comm="syz.6.8008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 477.065175][ T29] audit: type=1400 audit(497.960:49954): avc: denied { map_create } for pid=25673 comm="syz.6.8008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 477.084053][ T29] audit: type=1400 audit(497.960:49955): avc: denied { prog_load } for pid=25673 comm="syz.6.8008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 477.104115][ T29] audit: type=1400 audit(497.960:49956): avc: denied { prog_load } for pid=25673 comm="syz.6.8008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 477.383677][T25697] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8018'. [ 477.395403][T25695] syzkaller0: entered promiscuous mode [ 477.401104][T25695] syzkaller0: entered allmulticast mode [ 477.515675][T25704] netlink: 24 bytes leftover after parsing attributes in process `syz.7.8021'. [ 477.740447][T25718] ALSA: seq fatal error: cannot create timer (-22) [ 477.761622][T25720] pim6reg1: entered promiscuous mode [ 477.767187][T25720] pim6reg1: entered allmulticast mode [ 478.392995][T25759] netlink: 'syz.1.8048': attribute type 4 has an invalid length. [ 478.401636][T25759] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8048'. [ 478.479662][T25766] netlink: 24 bytes leftover after parsing attributes in process `syz.3.8052'. [ 478.656697][T25783] netlink: 'syz.1.8059': attribute type 4 has an invalid length. [ 478.665992][T25783] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8059'. [ 478.705337][T25786] netlink: 'syz.3.8058': attribute type 1 has an invalid length. [ 478.794724][T25786] 8021q: adding VLAN 0 to HW filter on device bond12 [ 478.905155][T25803] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8067'. [ 479.131701][T25833] netlink: 'syz.1.8082': attribute type 4 has an invalid length. [ 479.139679][T25833] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8082'. [ 479.465920][T25849] netlink: 28 bytes leftover after parsing attributes in process `syz.1.8086'. [ 479.480860][T25849] netem: change failed [ 480.051811][T25897] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 480.081450][T25899] pim6reg1: entered promiscuous mode [ 480.088506][T25899] pim6reg1: entered allmulticast mode [ 480.107993][T25901] pim6reg1: entered promiscuous mode [ 480.114992][T25901] pim6reg1: entered allmulticast mode [ 480.817407][T25933] netlink: 'syz.4.8123': attribute type 1 has an invalid length. [ 480.873336][T25933] 8021q: adding VLAN 0 to HW filter on device bond13 [ 481.022654][T25950] netlink: 'syz.1.8131': attribute type 4 has an invalid length. [ 481.030481][T25950] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8131'. [ 481.087090][T25956] netlink: 'syz.6.8133': attribute type 10 has an invalid length. [ 481.095189][T25956] netlink: 40 bytes leftover after parsing attributes in process `syz.6.8133'. [ 481.109851][T25956] bond5: (slave dummy0): Releasing active interface [ 481.138949][T25956] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 481.366401][ T29] kauditd_printk_skb: 627 callbacks suppressed [ 481.366420][ T29] audit: type=1400 audit(502.649:50584): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 481.409772][ T3919] usb 15-1: enqueue for inactive port 0 [ 481.419681][ T3919] usb 15-1: enqueue for inactive port 0 [ 481.446977][ T29] audit: type=1400 audit(502.692:50585): avc: denied { open } for pid=25974 comm="syz.1.8151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 481.467378][ T29] audit: type=1400 audit(502.692:50586): avc: denied { read write } for pid=25977 comm="syz.6.8142" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 481.491208][ T29] audit: type=1400 audit(502.713:50588): avc: denied { map_create } for pid=25974 comm="syz.1.8151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 481.511448][ T29] audit: type=1400 audit(502.713:50589): avc: denied { map_create } for pid=25975 comm="syz.7.8143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 481.530396][ T29] audit: type=1400 audit(502.713:50590): avc: denied { prog_load } for pid=25974 comm="syz.1.8151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 481.550479][ T29] audit: type=1400 audit(502.713:50591): avc: denied { prog_load } for pid=25974 comm="syz.1.8151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 481.569196][ T29] audit: type=1400 audit(502.702:50587): avc: denied { read write } for pid=25977 comm="syz.6.8142" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 481.594573][ T29] audit: type=1400 audit(502.713:50592): avc: denied { prog_load } for pid=25975 comm="syz.7.8143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 481.613300][ T29] audit: type=1400 audit(502.713:50593): avc: denied { prog_load } for pid=25975 comm="syz.7.8143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 481.639511][ T3919] vhci_hcd: vhci_device speed not set [ 482.067369][T26023] netlink: 'syz.1.8163': attribute type 6 has an invalid length. [ 482.565530][T26078] netlink: 'syz.6.8185': attribute type 1 has an invalid length. [ 482.620669][T26078] 8021q: adding VLAN 0 to HW filter on device bond6 [ 483.288513][T26116] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8202'. [ 486.122932][ T29] kauditd_printk_skb: 405 callbacks suppressed [ 486.122947][ T29] audit: type=1400 audit(507.745:50999): avc: denied { read write } for pid=11109 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 486.208704][ T29] audit: type=1400 audit(507.788:51000): avc: denied { create } for pid=26196 comm="syz.3.8237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 486.227985][ T29] audit: type=1400 audit(507.788:51001): avc: denied { create } for pid=26196 comm="syz.3.8237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 486.248267][ T29] audit: type=1400 audit(507.799:51002): avc: denied { map_create } for pid=26195 comm="syz.7.8236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 486.266223][T26205] netlink: 'syz.1.8241': attribute type 4 has an invalid length. [ 486.267165][ T29] audit: type=1400 audit(507.799:51003): avc: denied { prog_load } for pid=26195 comm="syz.7.8236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 486.276347][T26205] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8241'. [ 486.294186][ T29] audit: type=1400 audit(507.799:51004): avc: denied { prog_load } for pid=26195 comm="syz.7.8236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 486.294228][ T29] audit: type=1400 audit(507.820:51005): avc: denied { prog_load } for pid=26199 comm="syz.1.8238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 486.294262][ T29] audit: type=1400 audit(507.831:51006): avc: denied { prog_load } for pid=26199 comm="syz.1.8238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 486.294299][ T29] audit: type=1400 audit(507.831:51007): avc: denied { create } for pid=26201 comm="syz.3.8239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 486.381575][ T29] audit: type=1400 audit(507.831:51008): avc: denied { create } for pid=26199 comm="syz.1.8238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 487.206168][T26261] netlink: 'syz.7.8267': attribute type 4 has an invalid length. [ 487.214133][T26261] netlink: 17 bytes leftover after parsing attributes in process `syz.7.8267'. [ 487.363431][T26275] netlink: 10 bytes leftover after parsing attributes in process `syz.7.8274'. [ 487.609492][T26310] sctp: [Deprecated]: syz.4.8290 (pid 26310) Use of int in max_burst socket option. [ 487.609492][T26310] Use struct sctp_assoc_value instead [ 488.111403][T26386] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8323'. [ 488.128966][T26386] vxlan0: entered promiscuous mode [ 488.135101][ T7551] netdevsim netdevsim6 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 488.146018][ T7551] netdevsim netdevsim6 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 488.155796][ T37] netdevsim netdevsim6 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 488.165768][ T37] netdevsim netdevsim6 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 488.858444][T26432] pim6reg1: entered promiscuous mode [ 488.864037][T26432] pim6reg1: entered allmulticast mode [ 489.142563][T26445] lo speed is unknown, defaulting to 1000 [ 489.179250][T26445] lo speed is unknown, defaulting to 1000 [ 489.187045][T26445] lo speed is unknown, defaulting to 1000 [ 489.901934][T26515] netlink: 'syz.7.8381': attribute type 1 has an invalid length. [ 489.939713][T26515] 8021q: adding VLAN 0 to HW filter on device bond9 [ 490.149034][ T3919] IPVS: starting estimator thread 0... [ 490.155104][T26544] IPVS: nq: UDP 224.0.0.2:0 - no destination available [ 490.252489][T26549] IPVS: using max 2160 ests per chain, 108000 per kthread [ 490.263566][T26555] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=26555 comm=syz.6.8399 [ 490.577731][T26575] lo speed is unknown, defaulting to 1000 [ 490.661423][T26575] lo speed is unknown, defaulting to 1000 [ 490.676912][T26575] lo speed is unknown, defaulting to 1000 [ 490.808595][ T29] kauditd_printk_skb: 826 callbacks suppressed [ 490.808649][ T29] audit: type=1400 audit(512.777:51835): avc: denied { map_create } for pid=26583 comm="syz.1.8413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 490.883261][ T29] audit: type=1400 audit(512.809:51836): avc: denied { prog_load } for pid=26583 comm="syz.1.8413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 490.914675][ T29] audit: type=1400 audit(512.884:51837): avc: denied { mounton } for pid=26586 comm="syz.1.8414" path="/1716" dev="tmpfs" ino=8976 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 490.993206][ T29] audit: type=1400 audit(512.959:51838): avc: denied { create } for pid=26589 comm="syz.1.8415" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 491.013680][ T29] audit: type=1400 audit(512.959:51839): avc: denied { map_create } for pid=26589 comm="syz.1.8415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 491.033960][ T29] audit: type=1400 audit(512.959:51840): avc: denied { prog_load } for pid=26589 comm="syz.1.8415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 491.124804][T26599] netlink: 'syz.1.8420': attribute type 4 has an invalid length. [ 491.132786][T26599] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8420'. [ 491.144410][ T29] audit: type=1400 audit(513.056:51841): avc: denied { prog_load } for pid=26591 comm="syz.4.8416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 491.163523][ T29] audit: type=1400 audit(513.056:51842): avc: denied { map_create } for pid=26591 comm="syz.4.8416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 491.183748][ T29] audit: type=1400 audit(513.056:51843): avc: denied { prog_load } for pid=26591 comm="syz.4.8416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 491.202549][ T29] audit: type=1400 audit(513.056:51844): avc: denied { prog_load } for pid=26591 comm="syz.4.8416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 491.293084][T26609] netlink: 'syz.3.8424': attribute type 10 has an invalid length. [ 491.320067][T26610] netlink: 'syz.1.8423': attribute type 4 has an invalid length. [ 491.328654][T26610] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8423'. [ 491.721638][T26633] netlink: 'syz.1.8433': attribute type 4 has an invalid length. [ 491.729540][T26633] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8433'. [ 492.027610][T26646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26646 comm=syz.6.8439 [ 492.282386][T26656] netlink: 'syz.6.8444': attribute type 4 has an invalid length. [ 492.290945][T26656] netlink: 17 bytes leftover after parsing attributes in process `syz.6.8444'. [ 492.450777][T26661] IPv6: Can't replace route, no match found [ 492.847412][T26688] pim6reg1: entered promiscuous mode [ 492.852961][T26688] pim6reg1: entered allmulticast mode [ 493.810165][T26738] netlink: 'syz.6.8480': attribute type 10 has an invalid length. [ 493.821122][T26738] dummy0: left promiscuous mode [ 493.827906][T26738] team0: Port device dummy0 added [ 493.838422][T26738] netlink: 'syz.6.8480': attribute type 10 has an invalid length. [ 493.854765][T26738] team0: Port device dummy0 removed [ 493.866807][T26738] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 493.924345][T26748] lo: entered allmulticast mode [ 493.931282][T26748] tunl0: entered allmulticast mode [ 493.937338][T26748] gre0: entered allmulticast mode [ 493.942791][T26748] gretap0: entered allmulticast mode [ 493.948552][T26748] erspan0: entered allmulticast mode [ 493.955732][T26748] ip_vti0: entered allmulticast mode [ 493.961511][T26748] ip6_vti0: entered allmulticast mode [ 493.967571][T26748] sit0: entered allmulticast mode [ 493.973364][T26748] ip6tnl0: entered allmulticast mode [ 493.979415][T26748] ip6gre0: entered allmulticast mode [ 493.986482][T26748] syz_tun: entered allmulticast mode [ 493.992571][T26748] ip6gretap0: entered allmulticast mode [ 493.998565][T26748] vcan0: entered allmulticast mode [ 494.004258][T26748] : entered allmulticast mode [ 494.010424][T26748] dummy0: entered allmulticast mode [ 494.018222][T26748] nlmon0: entered allmulticast mode [ 494.024168][T26748] caif0: entered allmulticast mode [ 494.029381][T26748] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 494.048133][T26750] netlink: 28 bytes leftover after parsing attributes in process `syz.6.8486'. [ 494.057175][T26750] netlink: 108 bytes leftover after parsing attributes in process `syz.6.8486'. [ 494.067903][T26750] netlink: 28 bytes leftover after parsing attributes in process `syz.6.8486'. [ 494.078283][T26750] netlink: 108 bytes leftover after parsing attributes in process `syz.6.8486'. [ 494.087482][T26750] netlink: 84 bytes leftover after parsing attributes in process `syz.6.8486'. [ 494.113673][T26753] pim6reg1: entered promiscuous mode [ 494.119264][T26753] pim6reg1: entered allmulticast mode [ 494.205284][T26765] bond0: (slave dummy0): Releasing backup interface [ 494.396270][T26787] netlink: 'syz.1.8504': attribute type 4 has an invalid length. [ 494.405081][T26787] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8504'. [ 494.469506][T26795] netlink: 'syz.1.8508': attribute type 10 has an invalid length. [ 494.616030][T26811] netlink: 'syz.1.8516': attribute type 4 has an invalid length. [ 494.669306][T26809] lo speed is unknown, defaulting to 1000 [ 494.755675][T26821] bond13: entered promiscuous mode [ 494.760855][T26821] bond13: entered allmulticast mode [ 494.767327][T26821] 8021q: adding VLAN 0 to HW filter on device bond13 [ 494.778013][T26821] bond13 (unregistering): Released all slaves [ 494.790098][T26809] lo speed is unknown, defaulting to 1000 [ 494.804720][T26809] lo speed is unknown, defaulting to 1000 [ 495.207117][T26859] lo speed is unknown, defaulting to 1000 [ 495.264177][T26859] lo speed is unknown, defaulting to 1000 [ 495.271980][T26859] lo speed is unknown, defaulting to 1000 [ 495.499497][ T29] kauditd_printk_skb: 820 callbacks suppressed [ 495.499593][ T29] audit: type=1400 audit(517.809:52665): avc: denied { mount } for pid=26889 comm="syz.1.8552" name="/" dev="ramfs" ino=76950 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=0 [ 495.558368][ T29] audit: type=1400 audit(517.809:52666): avc: denied { name_bind } for pid=26890 comm="syz.6.8551" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 495.579872][ T29] audit: type=1400 audit(517.809:52667): avc: denied { mounton } for pid=26893 comm="syz.4.8553" path="/1650/file0" dev="tmpfs" ino=8672 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 495.602434][ T29] audit: type=1400 audit(517.809:52668): avc: denied { mounton } for pid=26893 comm="syz.4.8553" path="/1650/file0" dev="tmpfs" ino=8672 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 495.625717][ T29] audit: type=1400 audit(517.809:52669): avc: denied { mounton } for pid=26893 comm="syz.4.8553" path="/1650/file0" dev="tmpfs" ino=8672 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 495.648234][ T29] audit: type=1400 audit(517.809:52670): avc: denied { map_create } for pid=26893 comm="syz.4.8553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 495.668144][ T29] audit: type=1400 audit(517.809:52671): avc: denied { prog_load } for pid=26893 comm="syz.4.8553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 495.686999][ T29] audit: type=1400 audit(517.809:52672): avc: denied { prog_load } for pid=26893 comm="syz.4.8553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 495.706496][ T29] audit: type=1400 audit(517.809:52673): avc: denied { mounton } for pid=26893 comm="syz.4.8553" path="/1650/file0" dev="tmpfs" ino=8672 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 495.729203][ T29] audit: type=1400 audit(517.841:52674): avc: denied { map_create } for pid=26889 comm="syz.1.8552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 495.858269][T26896] lo speed is unknown, defaulting to 1000 [ 495.869256][T26916] validate_nla: 1 callbacks suppressed [ 495.869272][T26916] netlink: 'syz.1.8562': attribute type 4 has an invalid length. [ 495.882814][T26916] __nla_validate_parse: 2 callbacks suppressed [ 495.882833][T26916] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8562'. [ 495.952968][T26896] lo speed is unknown, defaulting to 1000 [ 495.959411][T26896] lo speed is unknown, defaulting to 1000 [ 496.361504][T26941] netlink: 'syz.6.8574': attribute type 4 has an invalid length. [ 496.370182][T26941] netlink: 17 bytes leftover after parsing attributes in process `syz.6.8574'. [ 496.381147][T26945] netlink: 'syz.3.8573': attribute type 1 has an invalid length. [ 496.398810][T26945] 8021q: adding VLAN 0 to HW filter on device bond13 [ 496.426129][T26945] bond13 (unregistering): Released all slaves [ 496.450148][T26952] netlink: 'syz.1.8576': attribute type 1 has an invalid length. [ 496.528443][T26952] 8021q: adding VLAN 0 to HW filter on device bond0 [ 496.812875][T26976] netlink: 'syz.7.8587': attribute type 4 has an invalid length. [ 496.820703][T26976] netlink: 17 bytes leftover after parsing attributes in process `syz.7.8587'. [ 497.980225][T19023] ================================================================== [ 497.988361][T19023] BUG: KCSAN: data-race in n_tty_receive_char_flow_ctrl / tty_set_termios [ 497.996908][T19023] [ 497.999247][T19023] write to 0xffff888118d7a108 of 44 bytes by task 27031 on cpu 0: [ 498.007162][T19023] tty_set_termios+0xc0/0x8c0 [ 498.011873][T19023] set_termios+0x35b/0x4e0 [ 498.016297][T19023] tty_mode_ioctl+0x379/0x5c0 [ 498.021019][T19023] n_tty_ioctl_helper+0x91/0x210 [ 498.025995][T19023] n_tty_ioctl+0x101/0x200 [ 498.030529][T19023] tty_ioctl+0x842/0xb80 [ 498.034790][T19023] __se_sys_ioctl+0xce/0x140 [ 498.039419][T19023] __x64_sys_ioctl+0x43/0x50 [ 498.044032][T19023] x64_sys_call+0x1816/0x2ff0 [ 498.048721][T19023] do_syscall_64+0xd2/0x200 [ 498.053236][T19023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 498.059141][T19023] [ 498.061473][T19023] read to 0xffff888118d7a122 of 1 bytes by task 19023 on cpu 1: [ 498.069112][T19023] n_tty_receive_char_flow_ctrl+0x59/0x1a0 [ 498.074934][T19023] n_tty_lookahead_flow_ctrl+0xed/0x130 [ 498.080493][T19023] tty_port_default_lookahead_buf+0x8e/0xc0 [ 498.086495][T19023] flush_to_ldisc+0x288/0x340 [ 498.091192][T19023] process_scheduled_works+0x4cb/0x9d0 [ 498.096671][T19023] worker_thread+0x582/0x770 [ 498.101284][T19023] kthread+0x486/0x510 [ 498.105381][T19023] ret_from_fork+0xdd/0x150 [ 498.109894][T19023] ret_from_fork_asm+0x1a/0x30 [ 498.114673][T19023] [ 498.116996][T19023] value changed: 0x13 -> 0x48 [ 498.121686][T19023] [ 498.124029][T19023] Reported by Kernel Concurrency Sanitizer on: [ 498.130199][T19023] CPU: 1 UID: 0 PID: 19023 Comm: kworker/u8:12 Not tainted 6.16.0-syzkaller-10355-gf2d282e1dfb3 #0 PREEMPT(voluntary) [ 498.142619][T19023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 498.152686][T19023] Workqueue: events_unbound flush_to_ldisc [ 498.158518][T19023] ==================================================================