last executing test programs: 32m42.955438893s ago: executing program 32 (id=560): syz_mount_image$ext4(&(0x7f0000000ac0)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x3810744, &(0x7f0000001080)={[{@test_dummy_encryption_v1}, {@user_xattr}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {}, {@nodiscard}, {@sysvgroups}, {@nojournal_checksum}, {@noauto_da_alloc}, {@test_dummy_encryption}, {@jqfmt_vfsv1}, {@journal_dev={'journal_dev', 0x3d, 0x8}}, {@acl}]}, 0x1, 0x46c, &(0x7f0000000b00)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) pipe2(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x407, 0xa0018ce0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000100)='asymmetric\x00', 0x0, &(0x7f0000000140)="1081", 0x5b, r4) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfeffffff, &(0x7f0000000100)={&(0x7f0000000000)=@ipv6_newroute={0x3c, 0x18, 0x1ef, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_GATEWAY={0x14, 0x5, @loopback={0x0, 0x2}}]}, 0x3c}, 0x1, 0x11}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) r7 = socket(0x10, 0x3, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0x2000000000000111, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000040000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080004afc54ee07b8af8ff00000000bfa200750a83973d213f94a5000000000007020000f8ffffffb703000008000000b704000000000000e7ab85000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000300)=ANY=[@ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b00010062726964"], 0x44}, 0x1, 0x0, 0x0, 0x20048001}, 0x4000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)={0x18, r6, 0x1, 0x1, 0xfffffffd, {0x1a}, [@HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 32m13.089853916s ago: executing program 33 (id=686): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x30}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x75) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = dup(r6) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) write$FUSE_NOTIFY_RETRIEVE(r7, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfd', @ANYRESHEX=r7]) 31m24.482749165s ago: executing program 34 (id=962): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000080)=[0x0], &(0x7f0000000180)=[0x0], 0x0, 0x20, &(0x7f0000000280)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000340), 0x8, 0x63, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@migrate={0xa0, 0x21, 0x1, 0x70bd2a, 0xffffffff, {{@in6=@private1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@migrate={0x50, 0x11, [{@in6=@mcast1, @in=@multicast2, @in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3c, 0x3, 0x0, 0x3504, 0xa, 0xa}]}]}, 0xa0}}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000900)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {}, {}, {@discard}, {@data_err_ignore}, {@grpquota}, {@debug}, {@user_xattr}, {@bh}, {@jqfmt_vfsv1}], [{@seclabel}]}, 0x1, 0x553, &(0x7f0000001080)="$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") close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = getpid() process_vm_readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}, {&(0x7f0000001980)=""/4089, 0x1000}], 0x3, &(0x7f0000008640)=[{&(0x7f00000003c0)=""/95, 0xffffff1a}], 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x123142, 0x168) pwritev2(r6, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) 31m23.170929181s ago: executing program 35 (id=978): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000020000000000000fdffffffff000000750000009500000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) creat(&(0x7f0000000d80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x5) close(r1) inotify_init1(0x800) fcntl$setstatus(r1, 0x4, 0x2c00) gettid() prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) rmdir(&(0x7f0000000100)='./control\x00') 21m53.847839452s ago: executing program 8 (id=3733): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2241, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a50000000060a010400000000000000000a0000030900010073797a31000000002400048020000180070001006374000014000280080002400000000108000140000000090900020073797a320000000014000000110001"], 0x78}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'pimreg\x00', 0x5005}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000010024bd7000fc0ddf2500000000", @ANYRES32=0x0, @ANYBLOB="1b0b04000300000008001b"], 0x28}, 0x1, 0x0, 0x0, 0x68010}, 0x0) write$tun(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="03000800ec0639000c00650800000000000000000000000000000000000000000000ff02000000000000000000000000000188000000000000000c21880b00000002"], 0x7e) 21m53.545270866s ago: executing program 8 (id=3740): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) 21m53.453638573s ago: executing program 8 (id=3743): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000280)='./file1\x00', 0x810, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES16], 0x1, 0x256, &(0x7f0000000bc0)="$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") r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) lseek(r0, 0x2, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000840)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000380)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 21m53.340942082s ago: executing program 8 (id=3748): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x1c916, &(0x7f0000000040)={[{@nobarrier}, {@noblock_validity}, {@nombcache}, {@nouser_xattr}, {@barrier_val={'barrier', 0x3d, 0xc}}, {@noacl}, {@nodiscard}, {@noauto_da_alloc}, {@resgid, 0x32}]}, 0x9b, 0x4dc, &(0x7f0000000f40)="$eJzs3c9rm+cdAPDv+9ry8sOZHbZDFlgWlgw7bJHseEnMYNkGYzsFtmWH3TLPlo2xbBlLTmITNof9AYMRtsFOPfVS6B9QKLn1WloC7b20paW0SXvooY2KZCl1HMk/EtkK1ucDr/W8v/z9PhJ6pOd9HvQG0LVOR8SFiHhUqVTORcRAfXtaX+4djYi19eMePrg9WV2SqFSufZpEUt9WPX54w/+sn1Lzp99H/C15Om5pZXVuolDIL9XXc+X5xVxpZfX87PxEX0QsjI2NXhq/PH5xfKQt9eyPiCu//fA//3r5d1de/9nN965/PPz3alq/rO9v1KPd1queiUMbtvVGxNJeBOuAnnp9Mp1OBACAHWl8z/9xRJyLgeipfZsDAAAADpLKr/rjqySiAgAAABxYaW1ubJJm6/MA+iNNs9n1ObzfjyNpoVgq/3S6uLwwtT6HdjAy6fRsIT9Snys8GJmkuj5aK3+7fmHT+lhEHI+IuwOHa+vZyWJhqtMXPwAAAKBLHN3U//9iYL3/DwAAABwwg51OAAAAANhz+v8AAABw8DXp//+lE3kAAAAAe+IPV69Wl0rj/tdTN1aW54o3zk/lS3PZ+eXJ7GRxaTE7UyzO1H6zb367/1coFhd/HgvLt3LlfKmcK62sXp8vLi+Ur88+cQtsAAAAYB8d/9G9d5OIWPvF4dpS1dfppIB90bubgz/YuzyA/dfT6QSAjtnV5z9woGQ6nQDQcck2+1tO3nnzmUPeeeYzAQCAZzL0g+bj/8m21wbW0n1KEdgjrv9B9zL+D93L+D90r0z0hI48dLe9H/+vVHaVEAAA0Hb9tSVJsxG16wD9kabZbMSx2m0BMsn0bCE/EhHfjYh3BjLfqa6P1s5MIjF6CAAAAAAAAAAAAAAAAAAAAAAAAAA7UqkkUQEAAAAOtIj0o6R+/6+hgbP9m68P9CVfDtQeI+Lm/6/999ZEubw0Wt3+2ePt5f/Vt1/oxBUMAAAAYLNGP73RjwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAdnr44PZkY9nPuJ/8JiIGm8XvjUO1x0ORiYgjnyfRu+G8JCJ62hB/7U5EnGgWP6mmFYP1LJrFP9zB+GlEHG1DfOhm96rtz6+bvf/SOF17bP7+u1RroZ5f6/Yvfdz+9bRof47tMMbJ+6/mWsa/E3Gyt3n704iftIh/Zofx//rn1dVW+yovRQw1/fxJnoiVK88v5korq+dn5ydm8jP5hbGx0Uvjl8cvjo/kpmcL+frfJhH64t8/fO3RVvU/Endbtr9b1f/sDuv/9f1bD763Xsw0iz98pvnrf6JF/LT+2feTerm6f6hRXlsvb3TqlbdORbz9Rqv6T7V4/rd7/Yd3WP9zf/zn+zs8FADYB6WV1bmJQiG/1NWF53o2ql+LXohaKOy28I8XI40XstDZdgkAAGi/p/vAT2rHGDsAAAAAAAAAAAAAAAAAAACwtf38db2Gtc5UFQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgS98EAAD//5EF1pc=") execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000540)={[0x0, 0x0]}, 0x0) r0 = inotify_init1(0x80000) inotify_add_watch(r0, &(0x7f0000000240)='.\x00', 0x60000726) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x1088, 0x0, 0x1, 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200) r1 = syz_open_procfs(0x0, &(0x7f0000000700)='mounts\x00') read$FUSE(r1, &(0x7f0000000980)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0xff2c) setregid(r2, r2) r3 = syz_clone(0x200, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000580)={@local, @empty, @void, {@ipv4={0x800, @icmp={{0x9, 0x4, 0x2, 0xb, 0x2c, 0x66, 0x0, 0x8, 0x1, 0x0, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x31}, {[@rr={0x7, 0xf, 0xb, [@multicast1, @dev={0xac, 0x14, 0x14, 0x3e}, @local]}]}}, @echo={0x8, 0x0, 0x0, 0x2, 0x7}}}}}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@cgroup, 0xffffffffffffffff, 0x7d1, 0x0, 0x0, @void, @value=0x0}, 0x20) process_vm_readv(r3, &(0x7f000000bf40)=[{&(0x7f000000bec0)=""/128, 0x80}], 0x1, &(0x7f000000c140)=[{&(0x7f000000bf80)=""/253, 0xfd}], 0x1, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0) 21m53.026538688s ago: executing program 8 (id=3757): syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x890, &(0x7f0000000080)={[{@noload}, {@resgid}, {@discard}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f0000000140)='2', 0xff10, 0x8001000) openat(0xffffffffffffff9c, 0x0, 0x42, 0x20) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101243, 0xa0) 21m52.794872717s ago: executing program 8 (id=3767): syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbaf, &(0x7f0000002f00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40000, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='io.stat\x00', 0x275a, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000004) socket$netlink(0x10, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000040), 0x208e24b) fchown(r0, 0x0, 0xee01) 21m52.7481085s ago: executing program 36 (id=3767): syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbaf, &(0x7f0000002f00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40000, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='io.stat\x00', 0x275a, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000004) socket$netlink(0x10, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000040), 0x208e24b) fchown(r0, 0x0, 0xee01) 21m38.455204827s ago: executing program 3 (id=4192): syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="696f636861727365743d61736369692c636865636b3d7374726963742c008dc72788a4fd1d7a9e96f5af8b1e45accead19436f26d694969a11ba75120b4d62f34885979931a363c752e585ec3604e30dbe2a796fc821132b494dde1c10c9dd6e964a204d3419f8429a34ad0f9eef6d8e64551e180300000043f138d74174cf31003d8e2e285a38f0c00baa5f773735f6e6eb3d29d249635d3f5317a9cd809294ebc15b04d444ccb0c1a90e8e0587fae4eefddd7e3d5c20a076101fd7f3ee5634000000000000fda9bc4dbfe77e9b101986ec88"], 0xfb, 0x341, &(0x7f0000000bc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x133042, 0x19) read$FUSE(r0, &(0x7f0000000f40)={0x2020}, 0x2020) 21m38.362550454s ago: executing program 3 (id=4198): bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000611889000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 21m38.362412974s ago: executing program 3 (id=4199): syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000040)='./file1\x00', 0x14880, &(0x7f0000000300)=ANY=[@ANYBLOB='check=strict,dots,usefree,dmask=000000000000\x00\x00000000007,usefree,dots,errors=continue,dots,nodots,allow_utime=00000000000000000000010,nodots,dos1xfloppy,allow_utime=00000000000000000000017,nodots,\x00'], 0x1, 0x24a, &(0x7f0000002d00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) 21m38.203491377s ago: executing program 3 (id=4211): syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x22000b0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) r1 = open_tree(r0, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RVERSION(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r4, &(0x7f0000002c00)=ANY=[@ANYBLOB="b0"], 0xb0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) 21m38.101697165s ago: executing program 3 (id=4216): r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x10) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ioctl$EXT4_IOC_GETFSUUID(r0, 0x8008662c, &(0x7f0000000000)) 21m38.03968529s ago: executing program 3 (id=4221): syz_read_part_table(0x1046, &(0x7f0000000000)="$eJzsz8EJwjAABdAfK9ExHEVE3MBlPMV1nMVZBCdQWil2gpLDe4fk8H8+JPSijsftmSFpNe/yTzY5XaZ8qmQ7tz81++VCOycp2Q1Zvv11S8txvA6v3DNvXx8r/AsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuvcNAAD//w0wCJ0=") 21m38.001478934s ago: executing program 37 (id=4221): syz_read_part_table(0x1046, &(0x7f0000000000)="$eJzsz8EJwjAABdAfK9ExHEVE3MBlPMV1nMVZBCdQWil2gpLDe4fk8H8+JPSijsftmSFpNe/yTzY5XaZ8qmQ7tz81++VCOycp2Q1Zvv11S8txvA6v3DNvXx8r/AsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuvcNAAD//w0wCJ0=") 21m30.87759797s ago: executing program 0 (id=4436): timer_create(0x0, 0x0, &(0x7f0000bbdffc)) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x8) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps\x00') read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) 21m30.781071807s ago: executing program 0 (id=4444): ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0xe8, 0x1, 0x1ff, 0x4, "18afd000d4d9d6b10000f961bbefe683d4f8c03aa945dd00"}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)=0xa) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x504, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) 21m30.74926984s ago: executing program 0 (id=4447): r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x2000414, &(0x7f0000000340)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2b8, &(0x7f0000000800)="$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") r1 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x0, r0}, 0x18) ftruncate(r1, 0x2007ffc) sendfile(r1, r1, 0x0, 0x800000009) 21m30.734340931s ago: executing program 0 (id=4449): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x212d099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000500)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) 21m30.729344711s ago: executing program 0 (id=4452): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x48e80, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x200) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, 0x0) 21m30.651859218s ago: executing program 0 (id=4456): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x1, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x2}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'macvlan0\x00'}]}, 0x50}}, 0x8000) 21m30.637713709s ago: executing program 38 (id=4456): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x1, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x2}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'macvlan0\x00'}]}, 0x50}}, 0x8000) 20m35.519537938s ago: executing program 7 (id=5059): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x123142, 0x168) pwritev2(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) 20m35.506282199s ago: executing program 7 (id=5060): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) io_submit(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x12}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000001c0)='.\x00', 0x4000423) ppoll(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 20m34.576249114s ago: executing program 7 (id=5068): syz_mount_image$ext4(&(0x7f0000000ac0)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x3810744, &(0x7f0000001080)={[{@test_dummy_encryption_v1}, {@user_xattr}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {}, {@nodiscard}, {@sysvgroups}, {@nojournal_checksum}, {@noauto_da_alloc}, {@test_dummy_encryption}, {@jqfmt_vfsv1}, {@journal_dev={'journal_dev', 0x3d, 0x8}}, {@acl}]}, 0x1, 0x46c, &(0x7f0000000b00)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) pipe2(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x407, 0xa0018ce0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000100)='asymmetric\x00', 0x0, &(0x7f0000000140)="1081", 0x5b, r4) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfeffffff, &(0x7f0000000100)={&(0x7f0000000000)=@ipv6_newroute={0x3c, 0x18, 0x1ef, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_GATEWAY={0x14, 0x5, @loopback={0x0, 0x2}}]}, 0x3c}, 0x1, 0x11}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) r7 = socket(0x10, 0x3, 0x0) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0x2000000000000111, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000040000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080004afc54ee07b8af8ff00000000bfa200750a83973d213f94a5000000000007020000f8ffffffb703000008000000b704000000000000e7ab85000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000300)=ANY=[@ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b00010062726964"], 0x44}, 0x1, 0x0, 0x0, 0x20048001}, 0x4000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)={0x18, r6, 0x1, 0x1, 0xfffffffd, {0x1a}, [@HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 20m33.303046987s ago: executing program 7 (id=5074): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chroot(0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0/../file0/../file0/../file0\x00') 20m33.287702388s ago: executing program 7 (id=5077): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00'}, 0x18) add_key$fscrypt_v1(&(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x8, 0x3, 0x440, 0x320, 0xa, 0x148, 0x368, 0x60, 0x400, 0x2a8, 0x2a8, 0x400, 0x2a8, 0x7fffffe, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00'}, 0x0, 0x2a0, 0x310, 0x0, {0x200003ae, 0x7f00}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x8601, 0x6, './file0\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f2f7b9f28413d9d8ad470ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc2d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4a0) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 20m33.199925825s ago: executing program 7 (id=5079): syz_mount_image$ext4(&(0x7f0000000ac0)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x3810744, &(0x7f0000001080)={[{@test_dummy_encryption_v1}, {@user_xattr}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {}, {@nodiscard}, {@sysvgroups}, {@nojournal_checksum}, {@noauto_da_alloc}, {@test_dummy_encryption}, {@jqfmt_vfsv1}, {@journal_dev={'journal_dev', 0x3d, 0x8}}, {@acl}]}, 0x1, 0x46c, &(0x7f0000000b00)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) pipe2(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x407, 0xa0018ce0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000100)='asymmetric\x00', 0x0, 0x0, 0x0, r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfeffffff, &(0x7f0000000100)={&(0x7f0000000000)=@ipv6_newroute={0x3c, 0x18, 0x1ef, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_GATEWAY={0x14, 0x5, @loopback={0x0, 0x2}}]}, 0x3c}, 0x1, 0x11}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) r6 = socket(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000300)=ANY=[@ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006272696467650000140002800800040000000000050017"], 0x44}, 0x1, 0x0, 0x0, 0x20048001}, 0x4000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)={0x18, r5, 0x1, 0x1, 0xfffffffd, {0x1a}, [@HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 20m33.192188296s ago: executing program 39 (id=5079): syz_mount_image$ext4(&(0x7f0000000ac0)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x3810744, &(0x7f0000001080)={[{@test_dummy_encryption_v1}, {@user_xattr}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {}, {@nodiscard}, {@sysvgroups}, {@nojournal_checksum}, {@noauto_da_alloc}, {@test_dummy_encryption}, {@jqfmt_vfsv1}, {@journal_dev={'journal_dev', 0x3d, 0x8}}, {@acl}]}, 0x1, 0x46c, &(0x7f0000000b00)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) pipe2(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x407, 0xa0018ce0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000100)='asymmetric\x00', 0x0, 0x0, 0x0, r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfeffffff, &(0x7f0000000100)={&(0x7f0000000000)=@ipv6_newroute={0x3c, 0x18, 0x1ef, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_GATEWAY={0x14, 0x5, @loopback={0x0, 0x2}}]}, 0x3c}, 0x1, 0x11}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) r6 = socket(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000300)=ANY=[@ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006272696467650000140002800800040000000000050017"], 0x44}, 0x1, 0x0, 0x0, 0x20048001}, 0x4000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)={0x18, r5, 0x1, 0x1, 0xfffffffd, {0x1a}, [@HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 19m56.500109344s ago: executing program 4 (id=5283): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x100}}, {@quota}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0xfffffffb) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x408, 0x1) writev(r0, &(0x7f00000004c0), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x441, 0x20) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, 0xffffffffffffffff, 0x0) fallocate(r1, 0x8, 0x4000, 0x4000) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) 19m56.444211138s ago: executing program 4 (id=5285): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000004002307c87f95ff7331000004000000090000000000000058132b770f9be6d5f981c46bea77d03379528d2d81b273efbd438e0065b48073d0684118d2c9b8dcdb7eda066d43ba274d14fecc752c7550c006b2057648893abf26a41e0d561d00f9e91b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x7e, 0x4, 0x9, 0x20000, 0xffffffffffffffff, 0x6cc9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x9}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r4, &(0x7f0000000d40), 0x0}, 0x20) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000001900), 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x10a) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) 19m54.231252127s ago: executing program 4 (id=5295): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socket$xdp(0x2c, 0x3, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) keyctl$invalidate(0x15, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r5 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x1000) readv(r5, 0x0, 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r5, 0x0, 0x4}, 0x18) 19m52.743462177s ago: executing program 4 (id=5298): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', 0x0) 19m52.691526462s ago: executing program 4 (id=5300): setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) r0 = syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000240)=ANY=[], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000003c0)={0x2c, &(0x7f0000000100)=ANY=[@ANYBLOB="000457"], 0x0, 0x0, 0x0, 0x0}, 0x0) 19m52.579996601s ago: executing program 4 (id=5301): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bc00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000080)='./file0\x00', 0x4000cdd) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, 0x1, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_USERDATA={0x6f, 0x6, "3459b45d31a141f7cbae34f218e215f1bcb946953ea4e4e41c948a040153beb7f4107c8219a069b9af1ff9a06bdb9272c7b9674ce2497e6f734f8858c00ceb44124a0635aec2d371ca878c7e674313815be35cb683b8520d33ba3eb7ba4ed13a017fecef1681d9f6ebfb8d"}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4008840}, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3, 0x80000000}, {0x60, 0x8}, {}, {0x2}, {0x6, 0x0, 0x0, 0x10000000}]}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x4e00, @empty}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000400)="08001efbb07d5a6e", 0x8}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="30000000000000000000000007000000862000000002001a"], 0x30}, 0x48d0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f00000000c0)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 19m52.579857351s ago: executing program 40 (id=5301): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bc00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000080)='./file0\x00', 0x4000cdd) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, 0x1, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_USERDATA={0x6f, 0x6, "3459b45d31a141f7cbae34f218e215f1bcb946953ea4e4e41c948a040153beb7f4107c8219a069b9af1ff9a06bdb9272c7b9674ce2497e6f734f8858c00ceb44124a0635aec2d371ca878c7e674313815be35cb683b8520d33ba3eb7ba4ed13a017fecef1681d9f6ebfb8d"}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4008840}, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3, 0x80000000}, {0x60, 0x8}, {}, {0x2}, {0x6, 0x0, 0x0, 0x10000000}]}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x4e00, @empty}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000400)="08001efbb07d5a6e", 0x8}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="30000000000000000000000007000000862000000002001a"], 0x30}, 0x48d0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f00000000c0)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 1.129516759s ago: executing program 1 (id=12970): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x8810) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) 1.114341721s ago: executing program 1 (id=12972): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0xc000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf0667000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) socket(0x22, 0x1, 0x7) 599.662302ms ago: executing program 6 (id=13008): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 586.866473ms ago: executing program 6 (id=13009): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0x10000008ebc, 0x0) splice(r0, 0x0, r3, 0x0, 0x25a5, 0x0) read(r2, &(0x7f0000000080)=""/44, 0x7f) 544.447717ms ago: executing program 5 (id=13013): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x68001, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff7) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_type(r0, &(0x7f0000000140), 0x9) 519.530009ms ago: executing program 6 (id=13019): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 498.115831ms ago: executing program 5 (id=13021): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x20840, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r4) socket$unix(0x1, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newqdisc={0x64, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0xb}, {0xffff, 0xffff}, {0x32, 0xe}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x34, 0x2, {{0x100, 0x7, 0x6361, 0x2, 0xfffffffd, 0x6}, [@TCA_NETEM_LOSS={0x18, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x14, 0x2, {0xfffffffd, 0x80000000, 0x6ba, 0x9}}]}]}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 411.296327ms ago: executing program 9 (id=13023): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000d000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x1, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x420}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 409.691828ms ago: executing program 6 (id=13024): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000400)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303}, "335ba9a5e2863348", "16c56f016ec0e27fffc0a30ed85f9f5b", "793316b3", "ee60bef0ac98288c"}, 0x28) syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r0) 347.445053ms ago: executing program 6 (id=13028): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x18) 340.145953ms ago: executing program 6 (id=13030): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001100010100"/20, @ANYRES32=r8], 0x20}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000240), 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x714f, 0x0) 325.705434ms ago: executing program 5 (id=13031): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f00000100000012"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03076844268cb89e14f0080047e0ffff00124000633a77fbac141416e000000194029f034d2f87e589ca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x6b, 0x60000000}, 0x2c) 297.912167ms ago: executing program 9 (id=13033): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xd, 0x4, 0x4, 0x7, 0x0, r0, 0x10000}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f0000000080), 0x0}, 0x20) 297.159497ms ago: executing program 5 (id=13034): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sys_enter\x00', r1}, 0x10) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, r2) tkill(r2, 0x13) 243.841511ms ago: executing program 9 (id=13035): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 222.829573ms ago: executing program 1 (id=13038): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x7, 0x4932, 0x7f, 0x0, 0x1}, 0x50) 207.423973ms ago: executing program 5 (id=13040): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 181.257736ms ago: executing program 2 (id=13041): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 181.112756ms ago: executing program 1 (id=13042): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a80000000060a0904000000000000000002000000540004802c0001800e000100696d6d656469617465000000180002800c00028005000100c4000000080001400000000924000180090001006d6574610000000014000280080002400000000808000140f6ffff0f0900010073797a30000000000900020073797a320000000020000000080a05000000000000000000020000000900010073797a300000"], 0xc8}}, 0x0) sendmmsg$inet(r0, &(0x7f000000aa80)=[{{&(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10, 0x0}}, {{&(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x20000004) 180.931296ms ago: executing program 5 (id=13043): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="18000000240001030000000000000000010000000400ae"], 0x18}, 0x1, 0x0, 0x0, 0x8001}, 0x4000) recvmmsg(r0, &(0x7f0000002c00)=[{{0x0, 0x0, 0x0}, 0x8104}, {{0x0, 0x0, 0x0}, 0x10004}, {{0x0, 0x0, 0x0}, 0x1}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000000)=""/203, 0xcb}, {&(0x7f00000007c0)=""/257, 0x101}, {&(0x7f0000001b40)=""/4109, 0x100d}, {&(0x7f00000006c0)=""/229, 0xe5}], 0x4}, 0x80000000}, {{0x0, 0x0, 0x0}, 0xb0}], 0x5, 0x20, 0x0) 180.374126ms ago: executing program 9 (id=13044): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000d000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x1, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x420}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 163.242077ms ago: executing program 1 (id=13045): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000013"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) 162.870787ms ago: executing program 2 (id=13046): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) 154.263228ms ago: executing program 9 (id=13047): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x68001, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff7) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_type(r0, &(0x7f0000000140), 0x9) 153.511768ms ago: executing program 1 (id=13048): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0xc000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf0667000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) socket(0x22, 0x1, 0x7) 144.041149ms ago: executing program 2 (id=13049): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="001300"}) 64.022215ms ago: executing program 9 (id=13050): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sys_enter\x00', r1}, 0x10) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, r2) tkill(r2, 0x13) 60.820146ms ago: executing program 2 (id=13051): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) mincore(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b5181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$selinux_access(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a7570647077645f657865635f742073797374656d5f753a73797374656d5f723afaffffffffffffff3a73302030"], 0x56) 50.565086ms ago: executing program 2 (id=13052): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000100), 0x4) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000040)={@multicast2, @multicast1, 0x0, "4f6fb4d1af0f724e6118ecd4ac1100843af297baebb0efcdf5a284da144a011a"}, 0x3c) 0s ago: executing program 2 (id=13053): socket$nl_route(0x10, 0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x3}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020b000102"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0xb8}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc000000000000000100000000000000ac1e000100000000000000000000000000000000000000000a0060"], 0xb8}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc00"/27], 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc000000000000000000000000000000ac1e000100000000000000000000000000000000000000000a00400000", @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000a30a000000000000f8ffffffffffffff000000efffffff0000000000000000000000000000000000000000000000000000000000000000000800"/112], 0xb8}}, 0x0) kernel console output (not intermixed with test programs): 00 [ 2086.046398][ T24] audit: type=1326 audit(4263432484.330:56204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2086.071443][ T24] audit: type=1326 audit(4263432484.390:56205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2086.104212][ T24] audit: type=1326 audit(4263432484.420:56206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2086.281778][ T24] audit: type=1326 audit(4263432484.420:56207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2086.307748][T31073] netlink: 20 bytes leftover after parsing attributes in process `syz.1.9367'. [ 2086.485204][ T24] audit: type=1326 audit(4263432484.420:56208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2086.959982][ T604] usb 6-1: new high-speed USB device number 122 using dummy_hcd [ 2087.022624][ T24] audit: type=1326 audit(4263432484.570:56209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2087.610455][ T604] usb 6-1: Using ep0 maxpacket: 8 [ 2087.729938][ T604] usb 6-1: config index 0 descriptor too short (expected 5924, got 36) [ 2087.748557][ T604] usb 6-1: config 250 has an invalid descriptor of length 56, skipping remainder of the config [ 2087.769345][ T604] usb 6-1: config 250 has no interfaces? [ 2087.812715][ T24] audit: type=1326 audit(4263432484.570:56210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2087.848039][ T24] audit: type=1326 audit(4263432484.580:56211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2087.877625][ T24] audit: type=1326 audit(4263432484.580:56212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2087.903219][ T24] audit: type=1326 audit(4263432484.580:56213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2087.935991][ T24] audit: type=1326 audit(4263432484.580:56214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2087.961336][ T24] audit: type=1326 audit(4263432484.640:56215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2087.985358][ T24] audit: type=1326 audit(4263432484.650:56216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2088.010047][ T24] audit: type=1326 audit(4263432484.650:56217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31062 comm="syz.6.9366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2088.039836][ T24] audit: type=1326 audit(4263432484.650:56218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31072 comm="syz.5.9370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2088.065339][ T24] audit: type=1326 audit(4263432484.660:56219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31072 comm="syz.5.9370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2088.118953][T31095] syz.6.9375[31095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2088.119234][T31095] syz.6.9375[31095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2088.290206][ T604] usb 6-1: New USB device found, idVendor=0525, idProduct=d292, bcdDevice= 0.07 [ 2088.458667][ T604] usb 6-1: New USB device strings: Mfr=0, Product=106, SerialNumber=59 [ 2088.523501][ T604] usb 6-1: Product: syz [ 2088.574929][ T604] usb 6-1: SerialNumber: syz [ 2089.199747][ T54] usb 3-1: new high-speed USB device number 74 using dummy_hcd [ 2089.719796][ T54] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 2089.889803][ T54] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.41 [ 2089.899785][ T54] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=11 [ 2089.908141][ T54] usb 3-1: Product: syz [ 2089.912427][ T54] usb 3-1: Manufacturer: syz [ 2089.917034][ T54] usb 3-1: SerialNumber: syz [ 2090.019836][ T8774] usb 7-1: new high-speed USB device number 93 using dummy_hcd [ 2090.030906][T31116] EXT4-fs (loop9): Test dummy encryption mode enabled [ 2090.038090][T31116] EXT4-fs (loop9): Can't change test_dummy_encryption on remount [ 2090.069772][ T604] usb 2-1: new high-speed USB device number 75 using dummy_hcd [ 2090.190475][ T54] usblp 3-1:1.0: usblp0: USB Unidirectional printer dev 74 if 0 alt 0 proto 1 vid 0x0525 pid 0xA4A8 [ 2090.319665][ T604] usb 2-1: Using ep0 maxpacket: 8 [ 2090.439891][ T604] usb 2-1: config index 0 descriptor too short (expected 5924, got 36) [ 2090.449260][ T604] usb 2-1: config 250 has an invalid descriptor of length 56, skipping remainder of the config [ 2090.461910][ T604] usb 2-1: config 250 has no interfaces? [ 2090.467873][ T54] usb 3-1: USB disconnect, device number 74 [ 2090.479705][ C1] usblp0: nonzero write bulk status received: -108 [ 2090.489601][ T54] usblp0: removed [ 2090.580100][ T604] usb 2-1: New USB device found, idVendor=0525, idProduct=d292, bcdDevice= 0.07 [ 2090.589910][ T604] usb 2-1: New USB device strings: Mfr=0, Product=106, SerialNumber=59 [ 2090.598284][ T604] usb 2-1: Product: syz [ 2090.602830][ T604] usb 2-1: SerialNumber: syz [ 2090.663807][T31118] netlink: 20 bytes leftover after parsing attributes in process `syz.9.9385'. [ 2090.708302][ T604] usb 6-1: USB disconnect, device number 122 [ 2090.719824][ T8774] usb 7-1: Using ep0 maxpacket: 32 [ 2090.905926][T31128] syz.5.9388[31128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2090.906213][T31128] syz.5.9388[31128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2091.865513][ T8774] usb 7-1: config 4 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 2091.953658][T31139] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 2091.974959][T31139] EXT4-fs error (device loop9): ext4_free_branches:1026: inode #16: comm syz.9.9389: invalid indirect mapped block 4294967295 (level 0) [ 2092.035364][T31139] EXT4-fs error (device loop9): ext4_free_branches:1026: inode #16: comm syz.9.9389: invalid indirect mapped block 4294967295 (level 1) [ 2092.049971][T31139] EXT4-fs (loop9): 1 orphan inode deleted [ 2092.055891][T31139] EXT4-fs (loop9): 1 truncate cleaned up [ 2092.072756][ T8774] usb 7-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 2092.081999][T31139] EXT4-fs (loop9): mounted filesystem without journal. Opts: ,errors=continue [ 2092.091175][ T8774] usb 7-1: New USB device strings: Mfr=255, Product=255, SerialNumber=0 [ 2092.112288][ T8774] usb 7-1: Product: syz [ 2092.116532][ T8774] usb 7-1: Manufacturer: syz [ 2092.170505][ T8774] hub 7-1:4.0: bad descriptor, ignoring hub [ 2092.176510][ T8774] hub: probe of 7-1:4.0 failed with error -5 [ 2092.191873][ T8774] usbhid 7-1:4.0: couldn't find an input interrupt endpoint [ 2092.237324][T31158] device wg2 entered promiscuous mode [ 2092.840166][T31161] syz.9.9396[31161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2092.840291][T31161] syz.9.9396[31161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2094.631075][ T604] usb 2-1: USB disconnect, device number 75 [ 2095.263448][ T24] kauditd_printk_skb: 259 callbacks suppressed [ 2095.263462][ T24] audit: type=1326 audit(4263432493.580:56479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31175 comm="syz.2.9404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2095.443036][ T24] audit: type=1326 audit(4263432493.620:56480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31175 comm="syz.2.9404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2095.489316][ T24] audit: type=1326 audit(4263432493.620:56481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31175 comm="syz.2.9404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2095.516343][ T24] audit: type=1326 audit(4263432493.620:56482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31175 comm="syz.2.9404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2095.542188][ T24] audit: type=1326 audit(4263432493.620:56483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31175 comm="syz.2.9404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2095.568524][ T24] audit: type=1326 audit(4263432493.620:56484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31175 comm="syz.2.9404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2095.845525][ T604] usb 2-1: new high-speed USB device number 76 using dummy_hcd [ 2095.872781][ T24] audit: type=1326 audit(4263432493.620:56485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31175 comm="syz.2.9404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2096.034212][ T24] audit: type=1326 audit(4263432493.620:56486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31175 comm="syz.2.9404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2096.059394][ T24] audit: type=1326 audit(4263432493.620:56487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31175 comm="syz.2.9404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2097.026861][ T8774] usb 7-1: USB disconnect, device number 93 [ 2097.035101][ T24] audit: type=1326 audit(4263432493.620:56488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31175 comm="syz.2.9404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2098.149180][T31161] EXT4-fs (loop9): orphan cleanup on readonly fs [ 2098.630259][ T604] usb 2-1: Using ep0 maxpacket: 32 [ 2098.719705][T31161] EXT4-fs error (device loop9): ext4_orphan_get:1421: comm syz.9.9396: bad orphan inode 13 [ 2098.739854][T31161] ext4_test_bit(bit=12, block=18) = 1 [ 2098.745277][T31161] is_bad_inode(inode)=0 [ 2098.749457][T31161] NEXT_ORPHAN(inode)=2130706432 [ 2098.754443][T31161] max_ino=32 [ 2098.757636][T31161] i_nlink=1 [ 2098.760847][T31161] EXT4-fs (loop9): mounted filesystem without journal. Opts: ,errors=continue [ 2099.060103][ T604] usb 2-1: config 4 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 172, changing to 11 [ 2099.090408][ T604] usb 2-1: config 4 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 17439, setting to 1024 [ 2099.105719][T31198] device wg2 left promiscuous mode [ 2100.011769][T31198] device wg2 entered promiscuous mode [ 2100.259766][ T604] usb 2-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 2100.269518][ T604] usb 2-1: New USB device strings: Mfr=255, Product=255, SerialNumber=0 [ 2100.410235][ T604] usb 2-1: can't set config #4, error -71 [ 2100.585500][ T604] usb 2-1: USB disconnect, device number 76 [ 2100.677484][ T24] kauditd_printk_skb: 59 callbacks suppressed [ 2100.677498][ T24] audit: type=1326 audit(4263432498.990:56548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31219 comm="syz.5.9416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2100.737895][ T24] audit: type=1326 audit(4263432499.030:56549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31219 comm="syz.5.9416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2100.769937][ T24] audit: type=1326 audit(4263432499.030:56550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31219 comm="syz.5.9416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2100.802242][ T24] audit: type=1326 audit(4263432499.030:56551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31219 comm="syz.5.9416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2100.826318][ T24] audit: type=1326 audit(4263432499.030:56552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31219 comm="syz.5.9416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2100.850035][ T24] audit: type=1326 audit(4263432499.030:56553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31219 comm="syz.5.9416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2100.873755][ T24] audit: type=1326 audit(4263432499.030:56554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31219 comm="syz.5.9416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2100.902877][ T24] audit: type=1326 audit(4263432499.030:56555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31219 comm="syz.5.9416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2100.934246][ T24] audit: type=1326 audit(4263432499.030:56556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31219 comm="syz.5.9416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2100.965370][ T24] audit: type=1326 audit(4263432499.030:56557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31219 comm="syz.5.9416" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f25371bab69 code=0x7ffc0000 [ 2101.146844][ T604] usb 2-1: new high-speed USB device number 77 using dummy_hcd [ 2101.891691][T31256] EXT4-fs (loop9): mounted filesystem without journal. Opts: user_xattr,nodioread_nolock,,errors=continue [ 2101.908436][T31263] syz.5.9433[31263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2101.908503][T31263] syz.5.9433[31263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2101.909759][T31256] ext4 filesystem being mounted at /587/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 2101.989859][ T604] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 2102.086706][T31275] netlink: 28 bytes leftover after parsing attributes in process `syz.9.9438'. [ 2102.106369][T31275] netem: change failed [ 2102.108056][T31277] netlink: 16 bytes leftover after parsing attributes in process `syz.2.9439'. [ 2102.159859][ T604] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.41 [ 2102.178164][ T604] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=11 [ 2102.206862][ T604] usb 2-1: Product: syz [ 2102.227216][T31290] binfmt_misc: register: failed to install interpreter file ./file2 [ 2102.229860][ T604] usb 2-1: Manufacturer: syz [ 2102.258838][ T604] usb 2-1: SerialNumber: syz [ 2102.391395][T31325] SELinux: Context system_u:object_r:anacron_exec_t:s0 is not valid (left unmapped). [ 2102.405011][T31327] device bridge0 entered promiscuous mode [ 2102.411520][T31327] bridge0: port 3(macsec1) entered blocking state [ 2102.418059][T31327] bridge0: port 3(macsec1) entered disabled state [ 2102.426204][T31327] device bridge0 left promiscuous mode [ 2102.530875][ T604] usblp 2-1:1.0: usblp0: USB Unidirectional printer dev 77 if 0 alt 0 proto 1 vid 0x0525 pid 0xA4A8 [ 2102.557223][T31347] hub 9-0:1.0: USB hub found [ 2102.562143][T31347] hub 9-0:1.0: 1 port detected [ 2102.789528][ T9685] usb 2-1: USB disconnect, device number 77 [ 2102.789678][ C1] usblp0: nonzero write bulk status received: -71 [ 2102.802609][ T9685] usblp0: removed [ 2102.927540][T31400] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9498'. [ 2102.937527][T31400] netlink: 12 bytes leftover after parsing attributes in process `syz.5.9498'. [ 2102.985621][T31408] SELinux: Context system_u:object_r:wireless_device_t:s0 is not valid (left unmapped). [ 2103.114522][T31418] EXT4-fs (loop9): mounted filesystem without journal. Opts: ,errors=continue [ 2103.126537][T31418] ext4 filesystem being mounted at /593/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 2103.272208][T31433] bridge0: port 1(bridge_slave_0) entered blocking state [ 2103.279504][T31433] bridge0: port 1(bridge_slave_0) entered disabled state [ 2103.287040][T31433] device bridge_slave_0 entered promiscuous mode [ 2103.294212][T31433] bridge0: port 2(bridge_slave_1) entered blocking state [ 2103.301373][T31433] bridge0: port 2(bridge_slave_1) entered disabled state [ 2103.308929][T31433] device bridge_slave_1 entered promiscuous mode [ 2103.384280][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2103.392257][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2103.403348][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2103.411814][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2103.420799][T30035] bridge0: port 1(bridge_slave_0) entered blocking state [ 2103.427880][T30035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2103.439755][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2103.447940][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2103.449761][ T9685] usb 10-1: new high-speed USB device number 67 using dummy_hcd [ 2103.456922][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2103.473115][T30035] bridge0: port 2(bridge_slave_1) entered blocking state [ 2103.480836][T30035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2103.501593][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2103.512819][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2103.528855][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2103.552996][T31433] device veth0_vlan entered promiscuous mode [ 2103.562642][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2103.573071][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2103.585816][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2103.603618][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2103.612887][T31433] device veth1_macvtap entered promiscuous mode [ 2103.625438][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2103.642530][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2103.660112][T31464] SELinux: Context system_u:object_r:setrans_var_run_t:s0 is not valid (left unmapped). [ 2103.692370][T31466] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9528'. [ 2103.699789][ T9685] usb 10-1: Using ep0 maxpacket: 16 [ 2103.719906][T31471] device veth3 entered promiscuous mode [ 2103.742381][T31473] netlink: 'syz.5.9530': attribute type 4 has an invalid length. [ 2103.819824][ T9685] usb 10-1: New USB device found, idVendor=1e7d, idProduct=2e22, bcdDevice= 0.00 [ 2103.832922][ T9685] usb 10-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2103.859893][ T9685] usb 10-1: config 0 descriptor?? [ 2103.873181][T31497] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 2103.880821][T31499] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9543'. [ 2103.892870][T25950] device bridge_slave_1 left promiscuous mode [ 2103.903159][T25950] bridge0: port 2(bridge_slave_1) entered disabled state [ 2103.918458][T25950] device bridge_slave_0 left promiscuous mode [ 2103.925752][T25950] bridge0: port 1(bridge_slave_0) entered disabled state [ 2103.933315][T31506] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=39 sclass=netlink_xfrm_socket pid=31506 comm=syz.5.9546 [ 2103.947141][T25950] device veth1_macvtap left promiscuous mode [ 2103.953644][T25950] device veth0_vlan left promiscuous mode [ 2104.199880][ T9685] usbhid 10-1:0.0: can't add hid device: -71 [ 2104.206539][ T9685] usbhid: probe of 10-1:0.0 failed with error -71 [ 2104.228340][ T9685] usb 10-1: USB disconnect, device number 67 [ 2104.408934][T31522] netlink: 'syz.2.9554': attribute type 13 has an invalid length. [ 2104.597034][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 2104.614237][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2104.661913][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 2104.718368][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2104.760626][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2104.773640][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x1 [ 2104.790901][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2104.828587][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2104.836914][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2104.844937][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2104.859689][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2104.874198][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2104.894251][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2104.930838][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2104.959139][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x4 [ 2104.987460][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.005448][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.012980][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.029708][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x2 [ 2105.039916][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.055249][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.069308][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x4 [ 2105.084977][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.101678][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.115973][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x2 [ 2105.130188][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.146549][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.166784][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.185372][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.198757][T31573] tipc: Started in network mode [ 2105.204274][T31573] tipc: Own node identity 36bab407ce8, cluster identity 4711 [ 2105.205375][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.212454][T31573] tipc: Enabled bearer , priority 0 [ 2105.229592][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.237582][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.259683][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.267641][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.285852][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.293418][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.300916][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.308422][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.315991][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.323539][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.331334][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.338820][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.346435][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.353875][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.361264][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.368779][ T25] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 2105.376681][ T25] hid-generic 0000:0000:0000.0032: hidraw0: HID v0.00 Device [syz0] on syz1 [ 2105.399314][T31572] tipc: Resetting bearer [ 2105.412512][T31577] fido_id[31577]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2105.445372][T31572] tipc: Disabling bearer [ 2105.507199][T31574] bridge0: port 1(bridge_slave_0) entered blocking state [ 2105.515096][T31574] bridge0: port 1(bridge_slave_0) entered disabled state [ 2105.523506][T31574] device bridge_slave_0 entered promiscuous mode [ 2105.530893][T31574] bridge0: port 2(bridge_slave_1) entered blocking state [ 2105.538000][T31574] bridge0: port 2(bridge_slave_1) entered disabled state [ 2105.547276][T31574] device bridge_slave_1 entered promiscuous mode [ 2105.649422][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2105.666003][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2105.674292][T31597] syz.5.9585[31597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2105.674356][T31597] syz.5.9585[31597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2105.687098][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2105.708045][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2105.717323][ T2083] bridge0: port 1(bridge_slave_0) entered blocking state [ 2105.724413][ T2083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2105.732459][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2105.741134][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2105.749370][ T2083] bridge0: port 2(bridge_slave_1) entered blocking state [ 2105.756548][ T2083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2105.770216][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2105.782299][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2105.792720][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2105.802636][ T24] kauditd_printk_skb: 147 callbacks suppressed [ 2105.802649][ T24] audit: type=1326 audit(4263432504.120:56705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31594 comm="syz.2.9584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2105.838514][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2105.850377][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2105.858567][ T24] audit: type=1326 audit(4263432504.170:56706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31594 comm="syz.2.9584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=285 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2105.882992][ T24] audit: type=1326 audit(4263432504.170:56707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31594 comm="syz.2.9584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2105.907713][ T24] audit: type=1326 audit(4263432504.170:56708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31594 comm="syz.2.9584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2105.963478][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2105.976565][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2106.010516][T31574] device veth0_vlan entered promiscuous mode [ 2106.017937][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2106.046556][ T24] audit: type=1326 audit(4263432504.360:56709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31611 comm="syz.5.9592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2106.047149][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2106.090352][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2106.098047][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2106.108383][ T24] audit: type=1326 audit(4263432504.400:56710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31611 comm="syz.5.9592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2106.132468][T31613] netlink: 'syz.2.9591': attribute type 13 has an invalid length. [ 2106.142438][T31613] netlink: 'syz.2.9591': attribute type 17 has an invalid length. [ 2106.168919][T31613] device wg2 left promiscuous mode [ 2106.190185][ T24] audit: type=1326 audit(4263432504.400:56711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31611 comm="syz.5.9592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2106.239388][T31602] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 2106.261275][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2106.268547][ T24] audit: type=1326 audit(4263432504.400:56712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31611 comm="syz.5.9592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2106.269963][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2106.342714][ T24] audit: type=1326 audit(4263432504.400:56713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31611 comm="syz.5.9592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2106.354972][T31574] device veth1_macvtap entered promiscuous mode [ 2106.396378][ T24] audit: type=1326 audit(4263432504.400:56714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31611 comm="syz.5.9592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=201 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2106.432062][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2106.450781][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2106.479244][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2106.494539][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2106.504415][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2106.610690][T31645] netlink: 'syz.1.9607': attribute type 3 has an invalid length. [ 2106.618534][T31645] netlink: 'syz.1.9607': attribute type 3 has an invalid length. [ 2106.804093][T31677] syz.6.9622[31677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2106.804160][T31677] syz.6.9622[31677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2106.966405][T31699] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 2107.051692][T25950] device bridge_slave_1 left promiscuous mode [ 2107.059075][T25950] bridge0: port 2(bridge_slave_1) entered disabled state [ 2107.076726][T25950] device bridge_slave_0 left promiscuous mode [ 2107.089752][T25950] bridge0: port 1(bridge_slave_0) entered disabled state [ 2107.100871][T25950] device veth1_macvtap left promiscuous mode [ 2107.106988][T25950] device veth0_vlan left promiscuous mode [ 2107.491271][T31726] netlink: 'syz.1.9645': attribute type 2 has an invalid length. [ 2107.671799][T31764] serio: Serial port ptm0 [ 2107.689475][T31768] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9665'. [ 2107.783698][T31778] EXT4-fs (loop9): Unrecognized mount option "audit" or missing value [ 2107.798892][T31797] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9679'. [ 2107.866080][T31810] hub 9-0:1.0: USB hub found [ 2107.871986][T31810] hub 9-0:1.0: 1 port detected [ 2107.887959][T31805] EXT4-fs (loop9): Unrecognized mount option "mb_optimize_scan=0x0000000000000001" or missing value [ 2107.920192][T31820] tipc: Started in network mode [ 2107.925200][T31820] tipc: Own node identity ba42d9a0ad4f, cluster identity 4711 [ 2107.933388][T31820] tipc: Enabled bearer , priority 0 [ 2107.942167][T31820] device syzkaller0 entered promiscuous mode [ 2107.963162][T31820] tipc: Resetting bearer [ 2107.978943][T31819] tipc: Resetting bearer [ 2107.987898][T31819] tipc: Disabling bearer [ 2107.994767][T31828] tipc: Started in network mode [ 2107.999889][T31828] tipc: Own node identity ac14140f, cluster identity 4711 [ 2108.007163][T31828] tipc: New replicast peer: 255.255.255.255 [ 2108.013796][T31828] tipc: Enabled bearer , priority 10 [ 2108.060269][T31831] EXT4-fs (loop9): quotafile must be on filesystem root [ 2108.213678][T31867] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 2108.321334][T31879] EXT4-fs (loop9): Ignoring removed nobh option [ 2108.340452][T31879] EXT4-fs error (device loop9): ext4_orphan_get:1395: inode #15: comm syz.9.9718: iget: bad i_size value: 38620345925642 [ 2108.368012][T31879] EXT4-fs error (device loop9): ext4_orphan_get:1400: comm syz.9.9718: couldn't read orphan inode 15 (err -117) [ 2108.392598][T31879] EXT4-fs (loop9): mounted filesystem without journal. Opts: nobh,bsdgroups,data_err=ignore,,errors=continue [ 2109.119243][T31935] netlink: 12 bytes leftover after parsing attributes in process `syz.1.9742'. [ 2109.139881][T24204] tipc: 32-bit node address hash set to f1414ac [ 2109.403279][T31975] EXT4-fs (loop9): Unrecognized mount option "mb_optimize_scan=0x0000000000000001" or missing value [ 2109.443714][T31986] binfmt_misc: register: failed to install interpreter file ./file2 [ 2109.601716][T32004] EXT4-fs (loop9): mounted filesystem without journal. Opts: ,errors=continue [ 2109.732153][T32023] EXT4-fs error (device loop9): ext4_validate_block_bitmap:438: comm syz.9.9783: bg 0: block 248: padding at end of block bitmap is not set [ 2109.747527][T32023] EXT4-fs error (device loop9): ext4_acquire_dquot:6226: comm syz.9.9783: Failed to acquire dquot type 1 [ 2109.760447][T32023] EXT4-fs (loop9): 1 truncate cleaned up [ 2109.766137][T32023] EXT4-fs (loop9): mounted filesystem without journal. Opts: ,errors=continue [ 2109.775636][T32023] ext4 filesystem being mounted at /25/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 2109.879714][T26079] usb 7-1: new high-speed USB device number 94 using dummy_hcd [ 2110.120732][T26079] usb 7-1: Using ep0 maxpacket: 32 [ 2110.732458][T32083] syz.1.9808[32083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2110.732686][T32083] syz.1.9808[32083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2111.170629][ T24] kauditd_printk_skb: 347 callbacks suppressed [ 2111.170671][ T24] audit: type=1326 audit(4263432509.490:57060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32097 comm="syz.9.9815" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2111.228640][ T24] audit: type=1326 audit(4263432509.530:57061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32097 comm="syz.9.9815" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2111.252879][ T24] audit: type=1326 audit(4263432509.530:57062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32097 comm="syz.9.9815" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2111.277126][ T24] audit: type=1326 audit(4263432509.530:57063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32097 comm="syz.9.9815" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2111.324993][ T24] audit: type=1326 audit(4263432509.530:57064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32097 comm="syz.9.9815" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2111.362888][T32103] tipc: Enabled bearer , priority 0 [ 2111.379650][ T24] audit: type=1326 audit(4263432509.530:57065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32097 comm="syz.9.9815" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2111.409802][ T24] audit: type=1326 audit(4263432509.530:57066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32097 comm="syz.9.9815" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2111.433942][ T24] audit: type=1326 audit(4263432509.530:57067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32097 comm="syz.9.9815" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2111.461062][ T24] audit: type=1326 audit(4263432509.540:57068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32097 comm="syz.9.9815" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2111.486708][ T24] audit: type=1326 audit(4263432509.540:57069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32097 comm="syz.9.9815" exe="/root/syz-executor" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2111.855172][T32121] tipc: Started in network mode [ 2111.869415][T32121] tipc: Own node identity 0600000000000000a704, cluster identity 1 [ 2111.979860][T32097] tipc: Disabling bearer [ 2112.875855][T32147] syz.2.9834[32147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2112.875959][T32147] syz.2.9834[32147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2113.147255][T32173] device veth3 entered promiscuous mode [ 2113.165158][T26079] usb 7-1: unable to get BOS descriptor or descriptor too short [ 2113.219828][T32191] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9858'. [ 2113.229808][T26079] usb 7-1: unable to read config index 0 descriptor/start: -71 [ 2113.244146][T32193] netlink: 96 bytes leftover after parsing attributes in process `syz.1.9856'. [ 2113.247911][T26079] usb 7-1: can't read configurations, error -71 [ 2113.255627][T32191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32191 comm=syz.6.9858 [ 2113.277214][T32197] binfmt_misc: register: failed to install interpreter file ./file0/file0 [ 2113.315130][T32207] syz.9.9864[32207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2113.315190][T32207] syz.9.9864[32207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2113.359844][T32213] tipc: Enabled bearer , priority 0 [ 2113.381029][T32213] device syzkaller0 entered promiscuous mode [ 2113.394390][T32213] tipc: Resetting bearer [ 2113.409972][T32212] tipc: Resetting bearer [ 2113.419110][T32212] tipc: Disabling bearer [ 2113.473837][T32228] SELinux: failed to load policy [ 2113.495913][T32224] EXT4-fs error (device loop9): ext4_orphan_get:1395: inode #15: comm syz.9.9873: iget: bad i_size value: 38620345925642 [ 2113.513325][T32224] EXT4-fs error (device loop9): ext4_orphan_get:1400: comm syz.9.9873: couldn't read orphan inode 15 (err -117) [ 2113.528442][T32224] EXT4-fs (loop9): mounted filesystem without journal. Opts: ,errors=continue [ 2114.094991][T32247] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=118 sclass=netlink_route_socket pid=32247 comm=syz.5.9881 [ 2114.670873][T32282] EXT4-fs error (device loop9): ext4_validate_block_bitmap:429: comm syz.9.9873: bg 0: block 5: invalid block bitmap [ 2114.691441][T32282] EXT4-fs (loop9): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 2048 with error 28 [ 2114.704636][T32282] EXT4-fs (loop9): This should not happen!! Data will be lost [ 2114.704636][T32282] [ 2114.722963][T32282] EXT4-fs (loop9): Total free blocks count 0 [ 2114.730164][T32282] EXT4-fs (loop9): Free/Dirty block details [ 2114.809244][T32289] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9895'. [ 2114.818200][T32289] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9895'. [ 2114.834986][T32289] device veth1 entered promiscuous mode [ 2114.840694][T32289] device macsec1 entered promiscuous mode [ 2115.997119][T32298] serio: Serial port ptm0 [ 2116.036039][T32282] EXT4-fs (loop9): free_blocks=0 [ 2116.041134][T32282] EXT4-fs (loop9): dirty_blocks=3124 [ 2116.046471][T32282] EXT4-fs (loop9): Block reservation details [ 2116.052751][T32282] EXT4-fs (loop9): i_reserved_data_blocks=3124 [ 2116.124156][T25950] EXT4-fs (loop9): Delayed block allocation failed for inode 18 at logical offset 2052 with max blocks 1072 with error 28 [ 2116.126138][T32303] device syzkaller0 entered promiscuous mode [ 2116.140138][T32307] syz.2.9907[32307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2116.143486][T32307] syz.2.9907[32307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2116.147511][T25950] EXT4-fs (loop9): This should not happen!! Data will be lost [ 2116.147511][T25950] [ 2116.230146][ T24] kauditd_printk_skb: 149 callbacks suppressed [ 2116.230157][ T24] audit: type=1326 audit(4263432514.540:57219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.9.9908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2116.287156][ T24] audit: type=1326 audit(4263432514.580:57220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.9.9908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=440 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2116.312112][ T24] audit: type=1326 audit(4263432514.580:57221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.9.9908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2116.360323][T32323] EXT4-fs (loop9): Ignoring removed bh option [ 2116.368848][T32331] serio: Serial port ptm0 [ 2116.383876][T32323] EXT4-fs error (device loop9): ext4_map_blocks:630: inode #3: block 2: comm syz.9.9915: lblock 2 mapped to illegal pblock 2 (length 1) [ 2116.408410][T32323] Quota error (device loop9): qtree_write_dquot: dquota write failed [ 2116.434014][T32323] EXT4-fs error (device loop9): ext4_map_blocks:630: inode #3: block 48: comm syz.9.9915: lblock 0 mapped to illegal pblock 48 (length 1) [ 2116.469821][T32323] Quota error (device loop9): v2_write_file_info: Can't write info structure [ 2116.498849][T32323] EXT4-fs error (device loop9): ext4_acquire_dquot:6226: comm syz.9.9915: Failed to acquire dquot type 0 [ 2116.523323][T32323] EXT4-fs error (device loop9) in ext4_reserve_inode_write:5933: Corrupt filesystem [ 2116.559933][T32323] EXT4-fs error (device loop9): ext4_evict_inode:283: inode #11: comm syz.9.9915: mark_inode_dirty error [ 2116.589807][T32323] EXT4-fs warning (device loop9): ext4_evict_inode:286: couldn't mark inode dirty (err -117) [ 2116.616414][T32323] EXT4-fs (loop9): 1 orphan inode deleted [ 2116.629744][T25950] EXT4-fs error (device loop9): ext4_map_blocks:630: inode #3: block 1: comm kworker/u4:0: lblock 1 mapped to illegal pblock 1 (length 1) [ 2116.649955][T32323] EXT4-fs (loop9): mounted filesystem without journal. Opts: resuid=0x0000000000000000,noblock_validity,bh,max_batch_time=0x00000000000008c9,grpquota,inlinecrypt,,errors=continue [ 2116.671204][T25950] Quota error (device loop9): remove_tree: Can't read quota data block 1 [ 2116.691871][T25950] EXT4-fs error (device loop9): ext4_release_dquot:6262: comm kworker/u4:0: Failed to release dquot type 0 [ 2116.708692][T32323] EXT4-fs error (device loop9): ext4_map_blocks:630: inode #2: block 16: comm syz.9.9915: lblock 0 mapped to illegal pblock 16 (length 1) [ 2116.723512][T32323] EXT4-fs error (device loop9): __ext4_get_inode_loc:4438: comm syz.9.9915: Invalid inode table block 1 in block_group 0 [ 2116.736466][T32323] EXT4-fs error (device loop9) in ext4_reserve_inode_write:5933: Corrupt filesystem [ 2116.746297][T32323] EXT4-fs error (device loop9): ext4_dirty_inode:6143: inode #2: comm syz.9.9915: mark_inode_dirty error [ 2116.766581][T25950] EXT4-fs error (device loop9): __ext4_get_inode_loc:4438: comm kworker/u4:0: Invalid inode table block 1 in block_group 0 [ 2116.790094][T32345] netlink: '+}[@': attribute type 3 has an invalid length. [ 2116.798298][T31574] EXT4-fs error (device loop9): __ext4_get_inode_loc:4438: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 2116.820104][T31574] EXT4-fs error (device loop9) in ext4_reserve_inode_write:5933: Corrupt filesystem [ 2116.839082][T31574] EXT4-fs error (device loop9): ext4_quota_off:6545: inode #3: comm syz-executor: mark_inode_dirty error [ 2116.900005][T26079] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 2116.907566][T26079] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 2116.924838][T26079] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 2116.933001][T26079] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 2116.941551][ T24] audit: type=1326 audit(4263432515.260:57222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32300 comm="syz.1.9904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6a6933b69 code=0x7ffc0000 [ 2116.965439][ T24] audit: type=1326 audit(4263432515.260:57223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32300 comm="syz.1.9904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6a6933b69 code=0x7ffc0000 [ 2116.978472][T26079] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 2117.006038][T26079] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 2117.013711][T26079] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 2117.021149][T26079] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 2117.028558][T26079] hid-generic 0000:0000:0000.0033: item fetching failed at offset 8/43 [ 2117.037149][T26079] hid-generic: probe of 0000:0000:0000.0033 failed with error -22 [ 2117.109433][ T24] audit: type=1400 audit(4263432515.420:57224): avc: denied { create } for pid=32362 comm="syz.5.9931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 2117.366316][T32368] EXT4-fs (loop9): Ignoring removed orlov option [ 2117.372794][T32368] EXT4-fs (loop9): Ignoring removed nomblk_io_submit option [ 2117.439809][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x4 [ 2117.449122][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x2 [ 2117.457522][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.458642][T32368] EXT4-fs (loop9): mounted filesystem without journal. Opts: noblock_validity,bsddf,sysvgroups,norecovery,debug_want_extra_isize=0x0000000000000080,orlov,nogrpid,noauto_da_alloc,nomblk_io_submit,,errors=continue [ 2117.465715][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.494935][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.503465][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.519890][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.527789][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.535817][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.543868][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.551806][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.564662][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.572708][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.580549][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.588351][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.596328][ T54] hid-generic 0000:3000000:0000.0034: unknown main item tag 0x0 [ 2117.604817][ T54] hid-generic 0000:3000000:0000.0034: hidraw0: HID v0.00 Device [sy] on syz0 [ 2117.630340][T32384] bridge0: port 2(bridge_slave_1) entered disabled state [ 2117.637694][T32384] bridge0: port 1(bridge_slave_0) entered disabled state [ 2117.706557][ T24] audit: type=1326 audit(4263432516.020:57225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32397 comm="syz.9.9944" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2117.854194][T32412] netlink: 60 bytes leftover after parsing attributes in process `syz.9.9950'. [ 2117.873557][T32408] usb usb1: check_ctrlrecip: process 32408 (+}[@) requesting ep 01 but needs 81 [ 2117.993436][T32433] binfmt_misc: register: failed to install interpreter file ./file2 [ 2118.107576][T32447] 9pnet: Insufficient options for proto=fd [ 2118.132568][T32438] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a803c02c, mo2=0002] [ 2118.143666][T32438] System zones: 1-12 [ 2118.151666][T32438] EXT4-fs error (device loop9): ext4_xattr_inode_iget:409: comm syz.9.9963: error while reading EA inode 32 err=-116 [ 2118.164498][T32438] EXT4-fs (loop9): Remounting filesystem read-only [ 2118.195279][T32438] EXT4-fs error (device loop9): ext4_evict_inode:294: comm syz.9.9963: couldn't truncate inode 15 (err -30) [ 2118.238881][T32438] EXT4-fs (loop9): 1 orphan inode deleted [ 2118.252094][T32438] EXT4-fs (loop9): mounted filesystem without journal. Opts: errors=remount-ro,debug,debug_want_extra_isize=0x000000000000005e,noauto_da_alloc,bsdgroups,jqfmt=vfsv1,abort,data_err=ignore, [ 2118.346384][T32475] serio: Serial port ptm0 [ 2118.810709][T32544] EXT4-fs (loop9): Ignoring removed orlov option [ 2118.986114][T32544] EXT4-fs (loop9): mounted filesystem without journal. Opts: orlov,min_batch_time=0x0000000000000004,,errors=continue [ 2119.214544][T32569] serio: Serial port ptm0 [ 2119.220995][T32572] syz.9.10024[32572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2119.221062][T32572] syz.9.10024[32572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2119.308037][T32581] tipc: New replicast peer: 255.255.255.255 [ 2119.326574][T32581] tipc: Enabled bearer , priority 10 [ 2119.492899][T32609] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 2119.546411][T32618] netlink: 'syz.5.10045': attribute type 13 has an invalid length. [ 2119.582632][T32618] bridge0: port 2(bridge_slave_1) entered disabled state [ 2119.589991][T32618] bridge0: port 1(bridge_slave_0) entered disabled state [ 2119.672934][T32634] hub 6-0:1.0: USB hub found [ 2119.677948][T32634] hub 6-0:1.0: 1 port detected [ 2119.795783][T32650] syz.6.10058[32650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2119.795849][T32650] syz.6.10058[32650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2119.832935][T32660] syz.6.10063[32660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2119.844644][T32660] syz.6.10063[32660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2119.947883][T32667] tipc: Enabling of bearer rejected, failed to enable media [ 2119.990803][T32669] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10067'. [ 2120.000187][T32669] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10067'. [ 2120.034531][T32679] binfmt_misc: register: failed to install interpreter file ./file2 [ 2120.049063][T32681] 9pnet: Could not find request transport: ra_arbiter [ 2120.068219][T32683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32683 comm=syz.1.10074 [ 2120.142575][T32697] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=118 sclass=netlink_route_socket pid=32697 comm=syz.9.10081 [ 2120.434618][T32746] netlink: 12 bytes leftover after parsing attributes in process `syz.5.10103'. [ 2120.483083][T32744] netlink: 12 bytes leftover after parsing attributes in process `syz.6.10104'. [ 2121.158325][T32740] netlink: 8 bytes leftover after parsing attributes in process `syz.9.10096'. [ 2121.167779][T32740] netlink: 4 bytes leftover after parsing attributes in process `syz.9.10096'. [ 2121.178760][T32740] device veth1 entered promiscuous mode [ 2121.184580][T32740] device macsec1 entered promiscuous mode [ 2121.192373][ T8774] tipc: 32-bit node address hash set to 4a1 [ 2121.203821][ T304] tipc: New replicast peer: 255.255.255.83 [ 2121.203919][ T304] tipc: Enabled bearer , priority 10 [ 2121.352053][ T24] kauditd_printk_skb: 158 callbacks suppressed [ 2121.352067][ T24] audit: type=1326 audit(4263432519.670:57384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=317 comm="syz.1.10121" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6a6933b69 code=0x7ffc0000 [ 2121.352089][ T24] audit: type=1326 audit(4263432519.670:57385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=317 comm="syz.1.10121" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6a6933b69 code=0x7ffc0000 [ 2121.352104][ T24] audit: type=1326 audit(4263432519.670:57386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=317 comm="syz.1.10121" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7fb6a6933b69 code=0x7ffc0000 [ 2121.352120][ T24] audit: type=1326 audit(4263432519.670:57387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=317 comm="syz.1.10121" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6a6933b69 code=0x7ffc0000 [ 2121.352136][ T24] audit: type=1326 audit(4263432519.670:57388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=317 comm="syz.1.10121" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6a6933b69 code=0x7ffc0000 [ 2121.589333][ T24] audit: type=1400 audit(4263432519.900:57389): avc: denied { create } for pid=331 comm="syz.9.10126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 2121.612898][ T24] audit: type=1400 audit(4263432519.930:57390): avc: denied { write } for pid=331 comm="syz.9.10126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 2121.625331][ T24] audit: type=1400 audit(4263432519.940:57391): avc: denied { create } for pid=333 comm="syz.9.10127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2121.626419][ T24] audit: type=1400 audit(4263432519.940:57392): avc: denied { bind } for pid=333 comm="syz.9.10127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2121.626584][ T24] audit: type=1400 audit(4263432519.940:57393): avc: denied { name_bind } for pid=333 comm="syz.9.10127" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 2121.770704][ T338] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 2121.774238][ T338] EXT4-fs (loop9): 1 truncate cleaned up [ 2121.774254][ T338] EXT4-fs (loop9): mounted filesystem without journal. Opts: barrier=0x0000000000000101,errors=remount-ro, [ 2122.422301][ T379] netlink: 2056 bytes leftover after parsing attributes in process `syz.1.10147'. [ 2122.942767][ T401] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10156'. [ 2122.951998][ T401] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10156'. [ 2122.962847][ T401] device veth1 entered promiscuous mode [ 2122.968531][ T401] device macsec1 entered promiscuous mode [ 2123.021025][ T413] binfmt_misc: register: failed to install interpreter file ./file0/file0 [ 2125.072868][ T467] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10183'. [ 2125.092994][ T467] device bridge_slave_1 left promiscuous mode [ 2125.102250][ T467] bridge0: port 2(bridge_slave_1) entered disabled state [ 2125.120946][ T467] device bridge_slave_0 left promiscuous mode [ 2125.136216][ T467] bridge0: port 1(bridge_slave_0) entered disabled state [ 2125.256840][ T480] netlink: 28 bytes leftover after parsing attributes in process `syz.1.10189'. [ 2126.297804][ T563] tipc: Enabling of bearer rejected, failed to enable media [ 2126.336587][ T571] syz.2.10230[571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2126.336645][ T571] syz.2.10230[571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2126.361030][ T24] kauditd_printk_skb: 171 callbacks suppressed [ 2126.361043][ T24] audit: type=1326 audit(4263432524.680:57565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=575 comm="syz.6.10232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2126.413162][ T24] audit: type=1326 audit(4263432524.720:57566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=575 comm="syz.6.10232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2126.437152][ T24] audit: type=1326 audit(4263432524.720:57567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=575 comm="syz.6.10232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2126.547408][ T24] audit: type=1400 audit(4263432524.860:57568): avc: denied { create } for pid=587 comm="syz.2.10237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2126.586957][ T24] audit: type=1400 audit(4263432524.880:57569): avc: denied { bind } for pid=587 comm="syz.2.10237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2126.621876][ T596] tipc: Enabled bearer , priority 0 [ 2126.629017][ T596] device syzkaller0 entered promiscuous mode [ 2126.635430][ T24] audit: type=1400 audit(4263432524.880:57570): avc: denied { name_bind } for pid=587 comm="syz.2.10237" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 2126.656850][ T24] audit: type=1400 audit(4263432524.880:57571): avc: denied { node_bind } for pid=587 comm="syz.2.10237" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 2126.680047][ T595] tipc: Resetting bearer [ 2126.686140][ T24] audit: type=1400 audit(4263432524.880:57572): avc: denied { setopt } for pid=587 comm="syz.2.10237" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2126.708691][ T24] audit: type=1400 audit(4263432524.910:57573): avc: denied { name_bind } for pid=573 comm="syz.9.10231" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2126.708857][ T595] tipc: Disabling bearer [ 2126.730856][ T24] audit: type=1400 audit(4263432524.940:57574): avc: denied { ioctl } for pid=595 comm="syz.6.10240" path="socket:[127814]" dev="sockfs" ino=127814 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2126.792535][ T600] 9pnet: Could not find request transport: rdma [ 2126.869785][ T611] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10247'. [ 2126.880954][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): gre1: link becomes ready [ 2126.916965][ T619] netlink: '+}[@': attribute type 3 has an invalid length. [ 2126.961286][ T624] tipc: Enabled bearer , priority 0 [ 2126.968438][ T624] device syzkaller0 entered promiscuous mode [ 2126.982246][ T622] tipc: Resetting bearer [ 2126.989346][ T622] tipc: Disabling bearer [ 2127.131197][ T638] syz.5.10259[638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2127.132511][ T638] syz.5.10259[638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2127.344269][ T645] netlink: 4 bytes leftover after parsing attributes in process `syz.9.10262'. [ 2129.535616][ T650] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=650 comm=syz.9.10264 [ 2129.548466][ T650] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=650 comm=syz.9.10264 [ 2130.065233][ T702] SELinux: failed to load policy [ 2130.106889][ T709] syz.9.10287[709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2130.106956][ T709] syz.9.10287[709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2130.341164][ T747] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 2130.423637][ T758] syz.5.10309[758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2130.423691][ T758] syz.5.10309[758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2130.467219][ T766] netlink: 28 bytes leftover after parsing attributes in process `syz.5.10313'. [ 2130.522189][ T774] device veth3 left promiscuous mode [ 2130.545515][ T778] device syzkaller0 entered promiscuous mode [ 2131.708812][ T819] netlink: 8 bytes leftover after parsing attributes in process `syz.9.10336'. [ 2131.735150][ T24] kauditd_printk_skb: 168 callbacks suppressed [ 2131.735163][ T24] audit: type=1400 audit(4263432530.050:57743): avc: denied { create } for pid=821 comm="syz.2.10338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2131.771539][ T819] netlink: 12 bytes leftover after parsing attributes in process `syz.9.10336'. [ 2131.849275][ T24] audit: type=1400 audit(4263432530.120:57744): avc: denied { ioctl } for pid=824 comm="syz.2.10340" path="socket:[129008]" dev="sockfs" ino=129008 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2132.040905][ T847] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10350'. [ 2132.060359][ T24] audit: type=1400 audit(4263432530.120:57745): avc: denied { bind } for pid=824 comm="syz.2.10340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2132.080940][ T24] audit: type=1400 audit(4263432530.280:57746): avc: denied { read } for pid=842 comm="syz.6.10348" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2132.103932][ T24] audit: type=1400 audit(4263432530.280:57747): avc: denied { open } for pid=842 comm="syz.6.10348" path="/dev/binderfs/binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2133.036538][ T850] netlink: '+}[@': attribute type 3 has an invalid length. [ 2133.215178][ T24] audit: type=1400 audit(4263432531.530:57748): avc: denied { ioctl } for pid=877 comm="syz.2.10361" path="socket:[129149]" dev="sockfs" ino=129149 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2133.301261][ T24] audit: type=1400 audit(4263432531.560:57749): avc: denied { create } for pid=878 comm="syz.5.10362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2133.374481][ T24] audit: type=1400 audit(4263432531.570:57750): avc: denied { write } for pid=878 comm="syz.5.10362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2133.451869][ T24] audit: type=1400 audit(4263432531.750:57751): avc: denied { connect } for pid=894 comm="syz.2.10368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2133.502009][ T900] tipc: Enabled bearer , priority 0 [ 2133.536662][ T900] device syzkaller0 entered promiscuous mode [ 2133.558922][ T24] audit: type=1400 audit(4263432531.750:57752): avc: denied { write } for pid=894 comm="syz.2.10368" path="socket:[129189]" dev="sockfs" ino=129189 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2133.584171][ T900] tipc: Resetting bearer [ 2133.608163][ T898] tipc: Resetting bearer [ 2133.704994][ T898] tipc: Disabling bearer [ 2133.739560][ T914] netlink: 8 bytes leftover after parsing attributes in process `syz.9.10371'. [ 2133.748598][ T914] netlink: 4 bytes leftover after parsing attributes in process `syz.9.10371'. [ 2134.014699][ T937] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10387'. [ 2134.108299][ T947] syz.1.10391[947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2134.108572][ T947] syz.1.10391[947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2134.717171][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2134.735970][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2134.823748][ T984] device veth3 left promiscuous mode [ 2134.829846][ T984] device macsec1 left promiscuous mode [ 2134.860918][ T987] syz.2.10409[987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2134.860995][ T987] syz.2.10409[987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2135.100439][ T1003] serio: Serial port ptm0 [ 2135.477959][ T1014] SELinux: Context system_u:object_r:var_lib_t:s0 is not valid (left unmapped). [ 2138.078506][ T24] kauditd_printk_skb: 38 callbacks suppressed [ 2138.078520][ T24] audit: type=1400 audit(4263432536.390:57791): avc: denied { bind } for pid=1081 comm="syz.9.10448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2138.117822][ T24] audit: type=1326 audit(4263432536.430:57792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1085 comm="syz.2.10453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2138.142735][ T24] audit: type=1326 audit(4263432536.430:57793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1085 comm="syz.2.10453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2138.180806][ T24] audit: type=1326 audit(4263432536.460:57794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1085 comm="syz.2.10453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2138.231241][ T1098] netlink: '+}[@': attribute type 3 has an invalid length. [ 2138.261584][ T24] audit: type=1326 audit(4263432536.460:57795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1085 comm="syz.2.10453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2138.321373][ T24] audit: type=1326 audit(4263432536.460:57796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1085 comm="syz.2.10453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2138.347598][ T24] audit: type=1326 audit(4263432536.460:57797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1085 comm="syz.2.10453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2138.380024][ T24] audit: type=1326 audit(4263432536.460:57798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1085 comm="syz.2.10453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2138.416142][ T24] audit: type=1326 audit(4263432536.460:57799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1085 comm="syz.2.10453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2138.559821][ T24] audit: type=1326 audit(4263432536.460:57800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1085 comm="syz.2.10453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2140.858712][ T1167] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10489'. [ 2141.932029][ T1211] netlink: 'syz.6.10508': attribute type 6 has an invalid length. [ 2142.185447][ T1223] tipc: Enabling of bearer rejected, failed to enable media [ 2142.296856][ T1246] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10525'. [ 2142.359967][ T1246] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10525'. [ 2142.377132][ T1248] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10526'. [ 2142.386807][ T1248] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10526'. [ 2142.449527][ T1258] netlink: 'syz.6.10531': attribute type 3 has an invalid length. [ 2143.542420][ T24] kauditd_printk_skb: 96 callbacks suppressed [ 2143.542433][ T24] audit: type=1326 audit(4263432541.860:57897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1283 comm="syz.2.10541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2143.596325][ T24] audit: type=1400 audit(4263432541.900:57898): avc: denied { block_suspend } for pid=1281 comm="syz.5.10540" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2143.630213][ T24] audit: type=1326 audit(4263432541.910:57899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1283 comm="syz.2.10541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2143.664241][ T24] audit: type=1326 audit(4263432541.910:57900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1283 comm="syz.2.10541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2143.705584][ T24] audit: type=1326 audit(4263432541.910:57901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1283 comm="syz.2.10541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2143.743894][ T24] audit: type=1326 audit(4263432541.910:57902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1283 comm="syz.2.10541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2143.769648][ T24] audit: type=1326 audit(4263432541.910:57903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1283 comm="syz.2.10541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2143.793614][ T24] audit: type=1326 audit(4263432541.910:57904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1283 comm="syz.2.10541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2143.833179][ T24] audit: type=1326 audit(4263432541.910:57905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1283 comm="syz.2.10541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2143.858349][ T24] audit: type=1326 audit(4263432541.910:57906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1283 comm="syz.2.10541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4f7589b69 code=0x7ffc0000 [ 2143.950494][ T1314] binfmt_misc: register: failed to install interpreter file ./file2 [ 2144.060029][ T1323] tipc: Failed to remove local publication {66,3,3}/829168532 [ 2144.336621][ T1330] tmpfs: Unsupported parameter 'mpol' [ 2145.225320][ T1378] mmap: syz.6.10584 (1378) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 2145.288199][ T1391] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10591'. [ 2145.366229][ T1406] 9pnet: Could not find request transport: rdma [ 2145.432398][ T1424] xt_socket: unknown flags 0x58 [ 2145.510435][ T1425] device wg2 entered promiscuous mode [ 2146.441483][ T1472] netlink: 'syz.6.10628': attribute type 27 has an invalid length. [ 2146.483244][ T1472] bridge0: port 2(bridge_slave_1) entered disabled state [ 2146.490504][ T1472] bridge0: port 1(bridge_slave_0) entered disabled state [ 2146.516659][ T1472] device wg2 left promiscuous mode [ 2146.547305][ T1472] device macsec1 left promiscuous mode [ 2146.604896][ T1482] device veth1 left promiscuous mode [ 2146.613837][ T1489] serio: Serial port ptm0 [ 2146.663148][ T1482] device veth0_vlan left promiscuous mode [ 2146.696400][ T1482] device veth0_vlan entered promiscuous mode [ 2146.696436][ T1496] syz.5.10637[1496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2146.712536][ T1496] syz.5.10637[1496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2146.729196][ T1482] device veth1_macvtap left promiscuous mode [ 2146.776756][ T1482] device veth1_macvtap entered promiscuous mode [ 2146.799842][ T1482] device veth1 entered promiscuous mode [ 2146.821114][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2146.849985][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2146.863699][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): macsec1: link becomes ready [ 2146.882222][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2146.917081][T26438] bridge0: port 1(bridge_slave_0) entered blocking state [ 2146.924327][T26438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2146.947388][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2146.962904][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2146.973773][T26438] bridge0: port 2(bridge_slave_1) entered blocking state [ 2146.980892][T26438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2146.989457][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2147.015907][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 2147.029740][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2147.042606][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 2147.056481][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2147.066180][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x4 [ 2147.074275][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x2 [ 2147.082792][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2147.091009][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.102537][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2147.110615][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.115626][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2147.127568][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2147.128944][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.136821][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2147.152668][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2147.159849][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.161804][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2147.177114][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2147.177226][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.185838][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2147.201770][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2147.210573][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2147.210907][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.218961][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2147.235650][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2147.242638][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.244101][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2147.259487][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2147.259850][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.267175][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2147.282381][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2147.289582][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.290974][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2147.306553][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2147.306795][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.314480][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 2147.329861][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 2147.338195][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.346072][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.353982][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.361906][ T9685] hid-generic 0000:3000000:0000.0035: unknown main item tag 0x0 [ 2147.369941][ T1498] netlink: '+}[@': attribute type 3 has an invalid length. [ 2147.380025][ T9685] hid-generic 0000:3000000:0000.0035: hidraw0: HID v0.00 Device [sy] on syz0 [ 2147.390313][T26438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2147.499487][ T1522] serio: Serial port ptm0 [ 2147.843218][ T1583] device sit0 entered promiscuous mode [ 2148.207245][ T1649] device pim6reg1 entered promiscuous mode [ 2149.300623][ T1696] serio: Serial port ptm0 [ 2149.398137][ T1711] device pim6reg1 entered promiscuous mode [ 2149.527398][ T24] kauditd_printk_skb: 114 callbacks suppressed [ 2149.527410][ T24] audit: type=1400 audit(4263432547.840:58021): avc: denied { create } for pid=1737 comm="syz.6.10746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 2149.728311][ T1785] serio: Serial port ptm0 [ 2150.870139][ T2017] tipc: Enabled bearer , priority 0 [ 2150.928617][ T2020] tipc: Resetting bearer [ 2151.021098][ T2016] tipc: Disabling bearer [ 2162.374745][ T2260] tipc: Enabled bearer , priority 0 [ 2162.391180][ T2260] tipc: Resetting bearer [ 2162.413329][ T2259] tipc: Disabling bearer [ 2162.455650][ T24] audit: type=1400 audit(4263432560.770:58022): avc: denied { mounton } for pid=2263 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2162.536863][ T2270] device pim6reg1 entered promiscuous mode [ 2162.555411][ T2263] bridge0: port 1(bridge_slave_0) entered blocking state [ 2162.563397][ T2263] bridge0: port 1(bridge_slave_0) entered disabled state [ 2162.571036][ T2263] device bridge_slave_0 entered promiscuous mode [ 2162.582037][ T2263] bridge0: port 2(bridge_slave_1) entered blocking state [ 2162.589130][ T2263] bridge0: port 2(bridge_slave_1) entered disabled state [ 2162.596957][ T2263] device bridge_slave_1 entered promiscuous mode [ 2162.635144][ T2275] device pim6reg1 entered promiscuous mode [ 2162.697876][ T2263] bridge0: port 2(bridge_slave_1) entered blocking state [ 2162.704999][ T2263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2162.712333][ T2263] bridge0: port 1(bridge_slave_0) entered blocking state [ 2162.719723][ T2263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2162.756330][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2162.771631][ T2083] bridge0: port 1(bridge_slave_0) entered disabled state [ 2162.783024][ T2083] bridge0: port 2(bridge_slave_1) entered disabled state [ 2162.806579][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2162.815785][ T2083] bridge0: port 1(bridge_slave_0) entered blocking state [ 2162.822901][ T2083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2162.831122][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2162.839363][ T2083] bridge0: port 2(bridge_slave_1) entered blocking state [ 2162.846551][ T2083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2162.890512][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2162.900935][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2162.918103][ T2263] device veth0_vlan entered promiscuous mode [ 2162.933791][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2162.943312][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2162.951678][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2162.959266][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2162.978986][ T2263] device veth1_macvtap entered promiscuous mode [ 2162.989280][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2163.042154][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2163.134669][ T2083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2163.279870][ T24] audit: type=1400 audit(4263432561.580:58023): avc: denied { mounton } for pid=2263 comm="syz-executor" path="/root/syzkaller.AecuNB/syz-tmp" dev="sda1" ino=2089 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 2163.536368][ T24] audit: type=1400 audit(4263432561.590:58024): avc: denied { mount } for pid=2263 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2163.565782][T30012] tipc: Disabling bearer [ 2163.591214][T30012] tipc: Disabling bearer [ 2163.632832][T30012] tipc: Left network mode [ 2163.705783][ T24] audit: type=1400 audit(4263432561.640:58025): avc: denied { mount } for pid=2263 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2163.906311][ T24] audit: type=1400 audit(4263432561.660:58026): avc: denied { mounton } for pid=2263 comm="syz-executor" path="/root/syzkaller.AecuNB/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2164.024076][ T24] audit: type=1400 audit(4263432561.660:58027): avc: denied { mounton } for pid=2263 comm="syz-executor" path="/root/syzkaller.AecuNB/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=134311 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 2164.057757][ T24] audit: type=1400 audit(4263432561.690:58028): avc: denied { unmount } for pid=2263 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2164.079678][ T24] audit: type=1400 audit(4263432561.700:58029): avc: denied { mounton } for pid=2263 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=517 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 2164.103018][ T24] audit: type=1400 audit(4263432561.720:58030): avc: denied { mount } for pid=2263 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2164.126298][ T2324] device wg2 entered promiscuous mode [ 2164.132979][ T24] audit: type=1400 audit(4263432561.720:58031): avc: denied { mounton } for pid=2263 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2164.301316][ T2363] device wg2 left promiscuous mode [ 2164.317624][ T2365] device syzkaller0 entered promiscuous mode [ 2164.334205][ T2363] device wg2 entered promiscuous mode [ 2164.465524][ T2389] device pim6reg1 entered promiscuous mode [ 2164.484652][ T2402] device wg2 left promiscuous mode [ 2164.493900][ T2402] device wg2 entered promiscuous mode [ 2164.617150][ T2433] device wg2 entered promiscuous mode [ 2165.941102][ T2488] device wg2 left promiscuous mode [ 2165.953913][ T2488] device wg2 entered promiscuous mode [ 2165.980491][ T2485] device pim6reg1 entered promiscuous mode [ 2167.348603][ T2554] device wg2 left promiscuous mode [ 2167.380711][ T2554] device wg2 entered promiscuous mode [ 2167.581678][ T2558] netlink: 8 bytes leftover after parsing attributes in process `syz.2.11103'. [ 2167.816172][ T2558] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11103'. [ 2168.346287][ T2558] device veth1 entered promiscuous mode [ 2168.475050][ T2558] device macsec1 entered promiscuous mode [ 2168.547907][ T2565] device pim6reg1 entered promiscuous mode [ 2168.646175][ T2579] device pim6reg1 entered promiscuous mode [ 2168.774003][ T2591] device pim6reg1 entered promiscuous mode [ 2169.789299][ T2619] device pim6reg1 entered promiscuous mode [ 2170.489916][ T2778] device pim6reg1 entered promiscuous mode [ 2170.720070][ T2808] bridge0: port 1(bridge_slave_0) entered blocking state [ 2170.727141][ T2808] bridge0: port 1(bridge_slave_0) entered disabled state [ 2170.734927][ T2808] device bridge_slave_0 entered promiscuous mode [ 2170.743283][ T2808] bridge0: port 2(bridge_slave_1) entered blocking state [ 2170.750903][ T2808] bridge0: port 2(bridge_slave_1) entered disabled state [ 2170.758778][ T2808] device bridge_slave_1 entered promiscuous mode [ 2170.831386][ T2808] bridge0: port 2(bridge_slave_1) entered blocking state [ 2170.838494][ T2808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2170.845952][ T2808] bridge0: port 1(bridge_slave_0) entered blocking state [ 2170.853021][ T2808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2170.874015][ T2833] device wg2 entered promiscuous mode [ 2170.915683][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2170.923892][T30012] bridge0: port 1(bridge_slave_0) entered disabled state [ 2170.932797][T30012] bridge0: port 2(bridge_slave_1) entered disabled state [ 2170.952937][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2170.961506][T30012] bridge0: port 1(bridge_slave_0) entered blocking state [ 2170.968616][T30012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2170.979081][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2170.993216][T30012] bridge0: port 2(bridge_slave_1) entered blocking state [ 2171.000329][T30012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2171.008141][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2171.016515][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2171.047295][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2171.060535][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2171.068945][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2171.076974][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2171.085830][ T2808] device veth0_vlan entered promiscuous mode [ 2171.104265][ T2808] device veth1_macvtap entered promiscuous mode [ 2171.111963][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2171.131607][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2171.159889][T30012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2171.253854][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 2171.253868][ T24] audit: type=1326 audit(4263432569.570:58033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2887 comm="syz.5.11276" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2171.295892][ T24] audit: type=1326 audit(4263432569.570:58034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2887 comm="syz.5.11276" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2171.319958][ T24] audit: type=1326 audit(4263432569.600:58035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2887 comm="syz.5.11276" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2171.369265][ T24] audit: type=1326 audit(4263432569.600:58036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2887 comm="syz.5.11276" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2171.433630][ T24] audit: type=1326 audit(4263432569.600:58037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2887 comm="syz.5.11276" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2171.485282][ T2083] device bridge_slave_1 left promiscuous mode [ 2171.493059][ T2083] bridge0: port 2(bridge_slave_1) entered disabled state [ 2171.496126][ T24] audit: type=1326 audit(4263432569.750:58038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2915 comm="syz.6.11290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2171.524345][ T24] audit: type=1326 audit(4263432569.750:58039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2915 comm="syz.6.11290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2171.548491][ T2083] device bridge_slave_0 left promiscuous mode [ 2171.554983][ T2083] bridge0: port 1(bridge_slave_0) entered disabled state [ 2171.576931][ T24] audit: type=1326 audit(4263432569.750:58040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2915 comm="syz.6.11290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f16be7d7b69 code=0x7ffc0000 [ 2171.602960][ T2083] device veth1 left promiscuous mode [ 2171.614007][ T2083] device veth1_macvtap left promiscuous mode [ 2171.621563][ T2938] xt_socket: unknown flags 0x58 [ 2171.625114][ T2083] device veth0_vlan left promiscuous mode [ 2171.851130][ T2978] device pim6reg1 entered promiscuous mode [ 2171.953064][ T2994] device pim6reg1 entered promiscuous mode [ 2172.113844][ T3030] device pim6reg1 entered promiscuous mode [ 2172.231921][ T3056] bridge0: port 2(bridge_slave_1) entered disabled state [ 2172.239405][ T3056] bridge0: port 1(bridge_slave_0) entered disabled state [ 2172.257953][ T24] audit: type=1400 audit(4263432570.560:58041): avc: denied { write } for pid=3059 comm="syz.6.11358" laddr=127.0.0.1 lport=256 faddr=127.0.0.1 fport=19999 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2172.288707][ T3056] device wg2 left promiscuous mode [ 2172.321420][ T3056] device macsec1 left promiscuous mode [ 2172.333901][ T3063] device pim6reg1 entered promiscuous mode [ 2172.412863][ T24] audit: type=1400 audit(4263432570.730:58042): avc: denied { relabelfrom } for pid=3074 comm="syz.2.11365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2172.588419][ T3113] device pim6reg1 entered promiscuous mode [ 2172.737910][ T3143] device pim6reg1 entered promiscuous mode [ 2172.913078][ T3185] device wg2 entered promiscuous mode [ 2174.363388][ T3253] device wg2 entered promiscuous mode [ 2178.240289][ T3407] device pim6reg1 entered promiscuous mode [ 2178.472460][ T3453] device pim6reg1 entered promiscuous mode [ 2178.662457][ T3493] device pim6reg1 entered promiscuous mode [ 2178.707803][ T3502] device pim6reg1 entered promiscuous mode [ 2179.198092][ T3500] netlink: 8 bytes leftover after parsing attributes in process `syz.9.11554'. [ 2179.207090][ T3500] netlink: 4 bytes leftover after parsing attributes in process `syz.9.11554'. [ 2179.234210][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 2179.234224][ T24] audit: type=1326 audit(4263432577.550:58044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3517 comm="syz.5.11572" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2179.289095][ T24] audit: type=1326 audit(4263432577.550:58045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3517 comm="syz.5.11572" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2179.335559][ T3533] device pim6reg1 entered promiscuous mode [ 2179.357571][ T24] audit: type=1326 audit(4263432577.550:58046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3517 comm="syz.5.11572" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2179.360345][ T3538] device pim6reg1 entered promiscuous mode [ 2179.429942][ T3547] device pim6reg1 entered promiscuous mode [ 2179.577499][ T24] audit: type=1326 audit(4263432577.890:58047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.5.11594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2179.621490][ T24] audit: type=1326 audit(4263432577.920:58048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.5.11594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2179.670228][ T3580] device pim6reg1 entered promiscuous mode [ 2179.682761][ T24] audit: type=1326 audit(4263432577.920:58049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.5.11594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2179.804619][ T24] audit: type=1326 audit(4263432578.110:58050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.9.11612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2179.864275][ T3608] device pim6reg1 entered promiscuous mode [ 2179.882419][ T24] audit: type=1326 audit(4263432578.110:58051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.9.11612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2179.915113][ T24] audit: type=1326 audit(4263432578.110:58052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.9.11612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2180.000863][ T3624] device pim6reg1 entered promiscuous mode [ 2180.111120][ T3654] device pim6reg1 entered promiscuous mode [ 2180.164661][ T3670] device pim6reg1 entered promiscuous mode [ 2180.263481][ T3693] device pim6reg1 entered promiscuous mode [ 2180.330866][ T3711] device pim6reg1 entered promiscuous mode [ 2180.457311][ T3743] device syzkaller0 entered promiscuous mode [ 2180.471310][ T3745] device pim6reg1 entered promiscuous mode [ 2180.518244][ T3763] device pim6reg1 entered promiscuous mode [ 2180.610223][ T3788] device syzkaller0 entered promiscuous mode [ 2180.646597][ T3797] device pim6reg1 entered promiscuous mode [ 2180.762879][ T3824] device pim6reg1 entered promiscuous mode [ 2180.775340][ T3827] device syzkaller0 entered promiscuous mode [ 2180.792377][ T3829] device pim6reg1 entered promiscuous mode [ 2181.012965][ T3861] device pim6reg1 entered promiscuous mode [ 2181.060864][ T3871] device pim6reg1 entered promiscuous mode [ 2181.099238][ T3877] serio: Serial port ptm0 [ 2181.268263][ T3909] serio: Serial port ptm0 [ 2181.335105][ T3922] device syzkaller0 entered promiscuous mode [ 2181.590707][ T3942] netlink: 8 bytes leftover after parsing attributes in process `syz.6.11776'. [ 2181.599824][ T3942] netlink: 4 bytes leftover after parsing attributes in process `syz.6.11776'. [ 2183.445174][ T3962] serio: Serial port ptm0 [ 2183.564899][ T24] audit: type=1326 audit(4263432581.880:58053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3991 comm="syz.5.11801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2183.565187][ T3986] device pim6reg1 entered promiscuous mode [ 2183.745751][ T4028] device pim6reg1 entered promiscuous mode [ 2184.079603][ T4111] device pim6reg1 entered promiscuous mode [ 2184.125063][ T4127] device pim6reg1 entered promiscuous mode [ 2184.336562][ T4180] device pim6reg1 entered promiscuous mode [ 2184.424617][ T4205] tipc: Enabling of bearer rejected, failed to enable media [ 2184.436052][ T4206] device pim6reg1 entered promiscuous mode [ 2184.444942][ T4205] device syzkaller0 entered promiscuous mode [ 2184.475666][ T4214] device pim6reg1 entered promiscuous mode [ 2184.494213][ T4218] device wg2 left promiscuous mode [ 2184.628136][ T4250] tipc: Enabling of bearer rejected, failed to enable media [ 2184.641451][ T4250] device syzkaller0 entered promiscuous mode [ 2184.724798][ T4272] device pim6reg1 entered promiscuous mode [ 2184.777150][ T4284] device pim6reg1 entered promiscuous mode [ 2184.813597][ T4294] tipc: Enabling of bearer rejected, failed to enable media [ 2184.885387][ T4307] device pim6reg1 entered promiscuous mode [ 2184.927056][ T4316] tipc: Enabling of bearer rejected, failed to enable media [ 2184.946389][ T4316] device syzkaller0 entered promiscuous mode [ 2185.124441][ T4359] tipc: Enabling of bearer rejected, failed to enable media [ 2185.221050][ T4375] device pim6reg1 entered promiscuous mode [ 2185.352501][ T4405] syz.1.12003[4405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2185.352601][ T4405] syz.1.12003[4405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2185.370355][ T4412] device wg2 entered promiscuous mode [ 2185.430365][ T4425] device pim6reg1 entered promiscuous mode [ 2185.880023][ T4496] serio: Serial port ptm0 [ 2187.585552][ T4491] netlink: 8 bytes leftover after parsing attributes in process `syz.9.12038'. [ 2187.594932][ T4491] netlink: 4 bytes leftover after parsing attributes in process `syz.9.12038'. [ 2187.641458][ T4527] serio: Serial port ptm0 [ 2187.655126][ T4534] device pim6reg1 entered promiscuous mode [ 2187.721136][ T4546] device pim6reg1 entered promiscuous mode [ 2188.627758][ T4563] device wg2 left promiscuous mode [ 2188.840080][ T4592] device pim6reg1 entered promiscuous mode [ 2188.874945][ T4601] device pim6reg1 entered promiscuous mode [ 2190.140885][ T4680] device pim6reg1 entered promiscuous mode [ 2190.620657][ T4687] netlink: 8 bytes leftover after parsing attributes in process `syz.9.12118'. [ 2190.629740][ T4687] netlink: 4 bytes leftover after parsing attributes in process `syz.9.12118'. [ 2190.656188][ T4698] xt_socket: unknown flags 0x58 [ 2191.635251][ T4787] device pim6reg1 entered promiscuous mode [ 2192.081117][ T4800] xt_socket: unknown flags 0x58 [ 2192.534254][ T24] kauditd_printk_skb: 12 callbacks suppressed [ 2192.534269][ T24] audit: type=1326 audit(4263432590.850:58066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4812 comm="syz.9.12186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2192.594317][ T4816] device pim6reg1 entered promiscuous mode [ 2192.601780][ T24] audit: type=1326 audit(4263432590.920:58067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4812 comm="syz.9.12186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2192.652001][ T24] audit: type=1326 audit(4263432590.920:58068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4812 comm="syz.9.12186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2192.800528][ T4832] device pim6reg1 entered promiscuous mode [ 2192.874003][ T4836] device pim6reg1 entered promiscuous mode [ 2193.113381][ T24] audit: type=1326 audit(4263432591.430:58069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.5.12217" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2193.141237][ T4885] device pim6reg1 entered promiscuous mode [ 2193.146278][ T24] audit: type=1326 audit(4263432591.430:58070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.5.12217" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2193.181814][ T24] audit: type=1326 audit(4263432591.460:58071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.5.12217" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2193.221364][ T24] audit: type=1326 audit(4263432591.460:58072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.5.12217" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2193.246919][ T24] audit: type=1326 audit(4263432591.460:58073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.5.12217" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4e5318b69 code=0x7ffc0000 [ 2193.323438][ T24] audit: type=1326 audit(4263432591.640:58074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4908 comm="syz.2.12231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb4cb2acb69 code=0x7ffc0000 [ 2193.347862][ T24] audit: type=1326 audit(4263432591.640:58075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4908 comm="syz.2.12231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7fb4cb2acb69 code=0x7ffc0000 [ 2195.730246][ T5030] device pim6reg1 entered promiscuous mode [ 2195.783452][ T5037] device pim6reg1 entered promiscuous mode [ 2197.479162][ T5055] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12290'. [ 2198.453362][ T5097] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12311'. [ 2199.621637][ T5108] device pim6reg1 entered promiscuous mode [ 2199.665761][ T5120] device pim6reg1 entered promiscuous mode [ 2199.777213][ T5152] device pim6reg1 entered promiscuous mode [ 2199.850181][ T5161] device pim6reg1 entered promiscuous mode [ 2199.858721][ T5167] device pim6reg1 entered promiscuous mode [ 2199.908410][ T5179] serio: Serial port ptm0 [ 2199.992283][ T5192] device pim6reg1 entered promiscuous mode [ 2200.183897][ T5212] bridge0: port 1(bridge_slave_0) entered blocking state [ 2200.191308][ T5212] bridge0: port 1(bridge_slave_0) entered disabled state [ 2200.199014][ T5212] device bridge_slave_0 entered promiscuous mode [ 2200.209366][ T5212] bridge0: port 2(bridge_slave_1) entered blocking state [ 2200.217606][ T5212] bridge0: port 2(bridge_slave_1) entered disabled state [ 2200.225417][ T5212] device bridge_slave_1 entered promiscuous mode [ 2200.322098][ T5212] bridge0: port 2(bridge_slave_1) entered blocking state [ 2200.329286][ T5212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2200.336713][ T5212] bridge0: port 1(bridge_slave_0) entered blocking state [ 2200.343798][ T5212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2200.372737][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2200.380603][T30035] bridge0: port 1(bridge_slave_0) entered disabled state [ 2200.388115][T30035] bridge0: port 2(bridge_slave_1) entered disabled state [ 2200.397623][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2200.406052][T30035] bridge0: port 1(bridge_slave_0) entered blocking state [ 2200.413138][T30035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2200.434459][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2200.443998][T30035] bridge0: port 2(bridge_slave_1) entered blocking state [ 2200.451087][T30035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2200.478303][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2200.488239][ T5259] device pim6reg1 entered promiscuous mode [ 2200.501373][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2200.520145][ T5268] device pim6reg1 entered promiscuous mode [ 2200.531284][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2200.543181][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2200.554031][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2200.563487][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2200.572083][ T5212] device veth0_vlan entered promiscuous mode [ 2200.583567][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2200.599495][ T5212] device veth1_macvtap entered promiscuous mode [ 2200.614119][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2200.634200][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2200.650957][ T2083] tipc: Left network mode [ 2200.667473][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 2200.667487][ T24] audit: type=1400 audit(4263432598.980:58080): avc: denied { write } for pid=5212 comm="syz-executor" name="cgroup.procs" dev="cgroup" ino=421 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:setrans_var_run_t:s0" [ 2200.723717][ T24] audit: type=1400 audit(4263432598.980:58081): avc: denied { open } for pid=5212 comm="syz-executor" path="/syzcgroup/cpu/syz6/cgroup.procs" dev="cgroup" ino=421 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:setrans_var_run_t:s0" [ 2200.835032][ T5291] device pim6reg1 entered promiscuous mode [ 2200.979281][ T5294] bridge0: port 1(bridge_slave_0) entered blocking state [ 2200.992423][ T5294] bridge0: port 1(bridge_slave_0) entered disabled state [ 2201.000217][ T5294] device bridge_slave_0 entered promiscuous mode [ 2201.013501][ T5294] bridge0: port 2(bridge_slave_1) entered blocking state [ 2201.020662][ T5294] bridge0: port 2(bridge_slave_1) entered disabled state [ 2201.032134][ T5294] device bridge_slave_1 entered promiscuous mode [ 2201.137602][ T5294] bridge0: port 2(bridge_slave_1) entered blocking state [ 2201.144713][ T5294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2201.152226][ T5294] bridge0: port 1(bridge_slave_0) entered blocking state [ 2201.159277][ T5294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2201.207987][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2201.220339][T30035] bridge0: port 1(bridge_slave_0) entered disabled state [ 2201.229231][T30035] bridge0: port 2(bridge_slave_1) entered disabled state [ 2201.248012][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2201.258863][T30035] bridge0: port 1(bridge_slave_0) entered blocking state [ 2201.265956][T30035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2201.274753][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2201.286545][T30035] bridge0: port 2(bridge_slave_1) entered blocking state [ 2201.293665][T30035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2201.308693][ T5349] device wg2 entered promiscuous mode [ 2201.323493][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2201.346011][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2201.381073][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2201.404020][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2201.418094][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2201.433306][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2201.446724][ T24] audit: type=1326 audit(4263432599.760:58082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5376 comm="syz.9.12442" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2201.472274][ T5294] device veth0_vlan entered promiscuous mode [ 2201.481865][ T2083] device bridge_slave_1 left promiscuous mode [ 2201.488064][ T2083] bridge0: port 2(bridge_slave_1) entered disabled state [ 2201.490635][ T24] audit: type=1326 audit(4263432599.760:58083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5376 comm="syz.9.12442" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2201.519302][ T24] audit: type=1326 audit(4263432599.760:58084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5376 comm="syz.9.12442" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc50ef39b69 code=0x7ffc0000 [ 2201.543534][ T2083] device bridge_slave_0 left promiscuous mode [ 2201.554939][ T2083] bridge0: port 1(bridge_slave_0) entered disabled state [ 2201.564275][ T2083] device veth1 left promiscuous mode [ 2201.569762][ T2083] device veth1_macvtap left promiscuous mode [ 2201.577386][ T2083] device veth0_vlan left promiscuous mode [ 2201.681139][ T5294] device veth1_macvtap entered promiscuous mode [ 2201.699146][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2201.725848][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2201.730241][ T24] audit: type=1326 audit(4263432600.050:58085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.6.12453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9077c0cb69 code=0x7ffc0000 [ 2201.761903][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2201.783498][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2201.796747][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2201.805797][ T24] audit: type=1326 audit(4263432600.080:58086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.6.12453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7f9077c0cb69 code=0x7ffc0000 [ 2201.852161][ T5409] syz.9.12459[5409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2201.852248][ T5409] syz.9.12459[5409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2201.863637][ T24] audit: type=1326 audit(4263432600.080:58087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.6.12453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9077c0cb69 code=0x7ffc0000 [ 2201.917566][ T5413] device pim6reg1 entered promiscuous mode [ 2201.972027][ T24] audit: type=1326 audit(4263432600.290:58088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5427 comm="syz.5.12465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a53e9b69 code=0x7ffc0000 [ 2202.000424][ T5431] device wg2 left promiscuous mode [ 2202.015260][ T24] audit: type=1326 audit(4263432600.290:58089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5427 comm="syz.5.12465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a53e9b69 code=0x7ffc0000 [ 2202.174852][ T2083] tipc: Left network mode [ 2202.295063][ T5500] device wg2 entered promiscuous mode [ 2202.629536][ T5572] bridge0: port 2(bridge_slave_1) entered disabled state [ 2202.637344][ T5572] bridge0: port 1(bridge_slave_0) entered disabled state [ 2202.655508][ T5572] device wg2 left promiscuous mode [ 2202.711215][ T5592] device pim6reg1 entered promiscuous mode [ 2202.863794][ T5624] device wg2 left promiscuous mode [ 2202.889563][ T5630] device pim6reg1 entered promiscuous mode [ 2202.914107][ T5636] device wg2 entered promiscuous mode [ 2202.986748][ T5660] tipc: Started in network mode [ 2202.991940][ T5660] tipc: Own node identity 06991894555b, cluster identity 4711 [ 2202.999468][ T5660] tipc: Enabled bearer , priority 0 [ 2203.007160][ T5660] device syzkaller0 entered promiscuous mode [ 2203.016530][ T5660] tipc: Resetting bearer [ 2203.025816][ T5659] tipc: Resetting bearer [ 2203.034416][ T5659] tipc: Disabling bearer [ 2203.053136][ T2083] device bridge_slave_1 left promiscuous mode [ 2203.060167][ T2083] bridge0: port 2(bridge_slave_1) entered disabled state [ 2203.068683][ T2083] device bridge_slave_0 left promiscuous mode [ 2203.075221][ T2083] bridge0: port 1(bridge_slave_0) entered disabled state [ 2203.159756][ T5668] bridge0: port 2(bridge_slave_1) entered disabled state [ 2203.167103][ T5668] bridge0: port 1(bridge_slave_0) entered disabled state [ 2203.340788][ T5718] tipc: Started in network mode [ 2203.348265][ T5718] tipc: Own node identity e2d1efa2988c, cluster identity 4711 [ 2203.359755][ T5718] tipc: Enabled bearer , priority 0 [ 2203.384235][ T5718] device syzkaller0 entered promiscuous mode [ 2203.416267][ T5718] tipc: Resetting bearer [ 2203.425287][ T5717] tipc: Resetting bearer [ 2203.431932][ T5717] tipc: Disabling bearer [ 2203.446655][ T5737] device pim6reg1 entered promiscuous mode [ 2203.616531][ T5777] tipc: Started in network mode [ 2203.629675][ T5777] tipc: Own node identity be024ba4d85, cluster identity 4711 [ 2203.637310][ T5777] tipc: Enabled bearer , priority 0 [ 2203.660574][ T5777] device syzkaller0 entered promiscuous mode [ 2203.670732][ T5777] tipc: Resetting bearer [ 2203.677541][ T5776] tipc: Resetting bearer [ 2203.698485][ T5776] tipc: Disabling bearer [ 2203.815305][ T5798] device wg2 left promiscuous mode [ 2204.194561][ T5838] xt_socket: unknown flags 0x58 [ 2204.365799][ T5845] bridge0: port 1(bridge_slave_0) entered blocking state [ 2204.373097][ T5845] bridge0: port 1(bridge_slave_0) entered disabled state [ 2204.381109][ T5845] device bridge_slave_0 entered promiscuous mode [ 2204.402375][ T5845] bridge0: port 2(bridge_slave_1) entered blocking state [ 2204.421035][ T5845] bridge0: port 2(bridge_slave_1) entered disabled state [ 2204.429001][ T5845] device bridge_slave_1 entered promiscuous mode [ 2204.486146][ T2083] tipc: Disabling bearer [ 2204.491984][ T2083] tipc: Left network mode [ 2204.562244][ T5859] device pim6reg1 entered promiscuous mode [ 2204.581402][ T5845] bridge0: port 2(bridge_slave_1) entered blocking state [ 2204.588462][ T5845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2204.595771][ T5845] bridge0: port 1(bridge_slave_0) entered blocking state [ 2204.602920][ T5845] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2204.654515][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2204.665573][T30035] bridge0: port 1(bridge_slave_0) entered disabled state [ 2204.677911][T30035] bridge0: port 2(bridge_slave_1) entered disabled state [ 2204.706317][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2204.717345][T30035] bridge0: port 1(bridge_slave_0) entered blocking state [ 2204.724495][T30035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2204.742253][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2204.750854][T30035] bridge0: port 2(bridge_slave_1) entered blocking state [ 2204.757910][T30035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2204.774300][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2204.799648][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2204.818391][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2204.828399][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2204.868454][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2204.882649][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2204.906905][ T5845] device veth0_vlan entered promiscuous mode [ 2204.913437][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2204.936618][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2204.955740][ T5845] device veth1_macvtap entered promiscuous mode [ 2204.990739][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2205.000582][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2205.013633][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2205.027744][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2205.036306][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2205.078196][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2205.090110][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2205.125761][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2205.146452][T30035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2205.277599][ T5908] bridge0: port 2(bridge_slave_1) entered disabled state [ 2205.284840][ T5908] bridge0: port 1(bridge_slave_0) entered disabled state [ 2205.300586][ T5908] device wg2 left promiscuous mode [ 2205.371108][ T5921] device pim6reg1 entered promiscuous mode [ 2205.390909][ T5928] tipc: Enabled bearer , priority 0 [ 2205.399034][ T5928] device syzkaller0 entered promiscuous mode [ 2205.413482][ T5928] tipc: Resetting bearer [ 2205.425641][ T5927] tipc: Resetting bearer [ 2205.436765][ T5927] tipc: Disabling bearer [ 2205.461220][ T5932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5932 comm=syz.1.12698 [ 2205.489926][ T5932] netlink: 'syz.1.12698': attribute type 9 has an invalid length. [ 2205.497239][ T5936] xt_socket: unknown flags 0x58 [ 2205.504236][ T5932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5932 comm=syz.1.12698 [ 2205.620819][ T2083] device bridge_slave_1 left promiscuous mode [ 2205.630515][ T2083] bridge0: port 2(bridge_slave_1) entered disabled state [ 2205.665037][ T2083] device bridge_slave_0 left promiscuous mode [ 2205.672473][ T2083] bridge0: port 1(bridge_slave_0) entered disabled state [ 2205.765978][ T5951] device wg2 entered promiscuous mode [ 2205.982273][ T5988] device wg2 entered promiscuous mode [ 2206.232011][ T6012] device pim6reg1 entered promiscuous mode [ 2206.328034][ T24] kauditd_printk_skb: 60 callbacks suppressed [ 2206.328049][ T24] audit: type=1400 audit(4263432604.640:58150): avc: denied { connect } for pid=6024 comm="syz.6.12739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2206.364334][ T24] audit: type=1400 audit(4263432604.680:58151): avc: denied { ioctl } for pid=6024 comm="syz.6.12739" path="socket:[146348]" dev="sockfs" ino=146348 ioctlcmd=0x48c8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2206.532498][ T24] audit: type=1326 audit(4263432604.850:58152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.9.12752" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4fcb258b69 code=0x7ffc0000 [ 2206.587859][ T24] audit: type=1326 audit(4263432604.850:58153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.9.12752" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4fcb258b69 code=0x7ffc0000 [ 2206.612635][ T24] audit: type=1326 audit(4263432604.850:58154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.9.12752" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4fcb258b69 code=0x7ffc0000 [ 2206.665661][ T24] audit: type=1326 audit(4263432604.850:58155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.9.12752" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4fcb258b69 code=0x7ffc0000 [ 2206.692719][ T24] audit: type=1326 audit(4263432604.850:58156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.9.12752" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4fcb258b69 code=0x7ffc0000 [ 2206.717360][ T24] audit: type=1326 audit(4263432604.850:58157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.9.12752" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4fcb258b69 code=0x7ffc0000 [ 2206.741497][ T24] audit: type=1326 audit(4263432604.850:58158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.9.12752" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4fcb258b69 code=0x7ffc0000 [ 2206.766510][ T24] audit: type=1326 audit(4263432604.850:58159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.9.12752" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4fcb258b69 code=0x7ffc0000 [ 2206.896577][ T6086] tipc: Enabled bearer , priority 0 [ 2206.903876][ T6086] device syzkaller0 entered promiscuous mode [ 2206.912626][ T6086] tipc: Resetting bearer [ 2206.919320][ T6085] tipc: Resetting bearer [ 2206.926101][ T6085] tipc: Disabling bearer [ 2207.454962][ T6139] device pim6reg1 entered promiscuous mode [ 2207.521980][ T6151] device pim6reg1 entered promiscuous mode [ 2208.097822][ T6203] device pim6reg1 entered promiscuous mode [ 2208.490779][ T6256] device pim6reg1 entered promiscuous mode [ 2208.728072][ T6294] netlink: 12 bytes leftover after parsing attributes in process `syz.6.12868'. [ 2208.757712][ T6295] device pim6reg1 entered promiscuous mode [ 2208.922505][ T6312] device pim6reg1 entered promiscuous mode [ 2208.941474][ T6317] device pim6reg1 entered promiscuous mode [ 2208.979447][ T6322] tipc: Enabled bearer , priority 0 [ 2208.987360][ T6322] device syzkaller0 entered promiscuous mode [ 2208.996815][ T6322] tipc: Resetting bearer [ 2209.005229][ T6321] tipc: Resetting bearer [ 2209.011788][ T6321] tipc: Disabling bearer [ 2209.090605][ T6328] device pim6reg1 entered promiscuous mode [ 2209.393096][ T6287] netlink: 4 bytes leftover after parsing attributes in process `syz.9.12856'. [ 2209.796301][ T6413] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12915'. [ 2210.084136][ T6415] device pim6reg1 entered promiscuous mode [ 2210.184348][ T6437] tipc: Enabled bearer , priority 0 [ 2210.193371][ T6437] device syzkaller0 entered promiscuous mode [ 2210.204073][ T6437] tipc: Resetting bearer [ 2210.210856][ T6436] tipc: Resetting bearer [ 2210.217444][ T6436] tipc: Disabling bearer [ 2210.228461][ T6443] device syzkaller0 entered promiscuous mode [ 2210.296863][ T6455] device pim6reg1 entered promiscuous mode [ 2210.451453][ T6486] device wg2 entered promiscuous mode [ 2210.530628][ T6495] device pim6reg1 entered promiscuous mode [ 2210.923078][ T6565] device pim6reg1 entered promiscuous mode [ 2211.217178][ T6610] device pim6reg1 entered promiscuous mode [ 2211.240787][ T6615] tipc: Enabled bearer , priority 0 [ 2211.252643][ T6615] device syzkaller0 entered promiscuous mode [ 2211.261432][ T6615] tipc: Resetting bearer [ 2211.267932][ T6614] tipc: Resetting bearer [ 2211.276217][ T6614] tipc: Disabling bearer [ 2211.315033][ T6620] bridge0: port 2(bridge_slave_1) entered disabled state [ 2211.322262][ T6620] bridge0: port 1(bridge_slave_0) entered disabled state [ 2211.335698][ T6620] device wg2 left promiscuous mode [ 2211.434780][ T6645] device pim6reg1 entered promiscuous mode [ 2211.670088][ T24] kauditd_printk_skb: 16 callbacks suppressed [ 2211.670102][ T24] audit: type=1400 audit(4263432609.990:58176): avc: denied { setopt } for pid=6683 comm="syz.2.13053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2211.700256][ T6684] ================================================================== [ 2211.708373][ T6684] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 2211.717603][ T6684] Read of size 1 at addr ffff88812b74bbd8 by task syz.2.13053/6684 [ 2211.725828][ T6684] [ 2211.728273][ T6684] CPU: 1 PID: 6684 Comm: syz.2.13053 Tainted: G W 5.10.240-syzkaller-00225-g1154f779f3f3 #0 [ 2211.739639][ T6684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 2211.750562][ T6684] Call Trace: [ 2211.753958][ T6684] __dump_stack+0x21/0x24 [ 2211.758328][ T6684] dump_stack_lvl+0x169/0x1d8 [ 2211.763117][ T6684] ? show_regs_print_info+0x18/0x18 [ 2211.768312][ T6684] ? thaw_kernel_threads+0x220/0x220 [ 2211.773809][ T6684] ? unwind_get_return_address+0x4d/0x90 [ 2211.779518][ T6684] print_address_description+0x7f/0x2c0 [ 2211.785066][ T6684] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 2211.791553][ T6684] kasan_report+0xe2/0x130 [ 2211.796045][ T6684] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 2211.802542][ T6684] __asan_report_load1_noabort+0x14/0x20 [ 2211.808162][ T6684] xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 2211.814597][ T6684] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 2211.820743][ T6684] ? xfrm_netlink_rcv+0x72/0x90 [ 2211.825597][ T6684] ? netlink_unicast+0x876/0xa40 [ 2211.830610][ T6684] ? netlink_sendmsg+0x88d/0xb30 [ 2211.835540][ T6684] ? ____sys_sendmsg+0x5a2/0x8c0 [ 2211.840465][ T6684] ? ___sys_sendmsg+0x1f0/0x260 [ 2211.845333][ T6684] ? do_syscall_64+0x31/0x40 [ 2211.849983][ T6684] xfrm_policy_inexact_alloc_chain+0x53a/0xb30 [ 2211.856136][ T6684] xfrm_policy_inexact_insert+0x70/0x1130 [ 2211.862115][ T6684] ? __get_hash_thresh+0x10c/0x420 [ 2211.867544][ T6684] ? policy_hash_bysel+0x110/0x4f0 [ 2211.872649][ T6684] xfrm_policy_insert+0x126/0x9a0 [ 2211.877758][ T6684] ? xfrm_policy_construct+0x54f/0x1f00 [ 2211.883465][ T6684] xfrm_add_policy+0x4d1/0x830 [ 2211.888228][ T6684] ? xfrm_dump_sa_done+0xc0/0xc0 [ 2211.893161][ T6684] xfrm_user_rcv_msg+0x450/0x6d0 [ 2211.898090][ T6684] ? xfrm_netlink_rcv+0x90/0x90 [ 2211.902941][ T6684] ? selinux_nlmsg_lookup+0x219/0x4a0 [ 2211.908308][ T6684] netlink_rcv_skb+0x1e0/0x430 [ 2211.913064][ T6684] ? xfrm_netlink_rcv+0x90/0x90 [ 2211.917919][ T6684] ? netlink_ack+0xb80/0xb80 [ 2211.922505][ T6684] ? mutex_trylock+0xa0/0xa0 [ 2211.927085][ T6684] ? __netlink_lookup+0x387/0x3b0 [ 2211.932194][ T6684] xfrm_netlink_rcv+0x72/0x90 [ 2211.936895][ T6684] netlink_unicast+0x876/0xa40 [ 2211.941667][ T6684] netlink_sendmsg+0x88d/0xb30 [ 2211.946452][ T6684] ? netlink_getsockopt+0x530/0x530 [ 2211.951646][ T6684] ? security_socket_sendmsg+0x82/0xa0 [ 2211.957095][ T6684] ? netlink_getsockopt+0x530/0x530 [ 2211.962302][ T6684] ____sys_sendmsg+0x5a2/0x8c0 [ 2211.967071][ T6684] ? __sys_sendmsg_sock+0x40/0x40 [ 2211.972088][ T6684] ? import_iovec+0x7c/0xb0 [ 2211.976583][ T6684] ___sys_sendmsg+0x1f0/0x260 [ 2211.981253][ T6684] ? __sys_sendmsg+0x250/0x250 [ 2211.986044][ T6684] ? __fdget+0x1a1/0x230 [ 2211.990290][ T6684] __x64_sys_sendmsg+0x1e2/0x2a0 [ 2211.995222][ T6684] ? ___sys_sendmsg+0x260/0x260 [ 2212.000227][ T6684] ? switch_fpu_return+0x197/0x340 [ 2212.005332][ T6684] do_syscall_64+0x31/0x40 [ 2212.009741][ T6684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2212.015715][ T6684] RIP: 0033:0x7fb4cb2acb69 [ 2212.020127][ T6684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2212.039817][ T6684] RSP: 002b:00007fb4c9915038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2212.048353][ T6684] RAX: ffffffffffffffda RBX: 00007fb4cb4d3fa0 RCX: 00007fb4cb2acb69 [ 2212.056317][ T6684] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000007 [ 2212.064365][ T6684] RBP: 00007fb4cb32fdf1 R08: 0000000000000000 R09: 0000000000000000 [ 2212.072416][ T6684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2212.080563][ T6684] R13: 0000000000000000 R14: 00007fb4cb4d3fa0 R15: 00007ffdf06d6478 [ 2212.088553][ T6684] [ 2212.090878][ T6684] Allocated by task 6684: [ 2212.095317][ T6684] __kasan_kmalloc+0xda/0x110 [ 2212.100073][ T6684] __kmalloc+0x1a7/0x330 [ 2212.104307][ T6684] sk_prot_alloc+0xb2/0x340 [ 2212.108859][ T6684] sk_alloc+0x38/0x4e0 [ 2212.113012][ T6684] pfkey_create+0x12a/0x660 [ 2212.117503][ T6684] __sock_create+0x38d/0x770 [ 2212.122084][ T6684] __sys_socket+0xec/0x190 [ 2212.126573][ T6684] __x64_sys_socket+0x7a/0x90 [ 2212.131246][ T6684] do_syscall_64+0x31/0x40 [ 2212.135668][ T6684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2212.141539][ T6684] [ 2212.143945][ T6684] Last potentially related work creation: [ 2212.149924][ T6684] kasan_save_stack+0x3a/0x60 [ 2212.154590][ T6684] __kasan_record_aux_stack+0xd2/0x100 [ 2212.160038][ T6684] kasan_record_aux_stack_noalloc+0xb/0x10 [ 2212.166110][ T6684] call_rcu+0x10e/0x1050 [ 2212.170469][ T6684] qdisc_destroy+0x154/0x250 [ 2212.175061][ T6684] dev_shutdown+0x198/0x580 [ 2212.179557][ T6684] unregister_netdevice_many+0x92d/0x1980 [ 2212.185275][ T6684] unregister_netdevice_queue+0x31c/0x360 [ 2212.190987][ T6684] __tun_detach+0xca6/0x1450 [ 2212.195565][ T6684] tun_chr_close+0x92/0x140 [ 2212.200056][ T6684] __fput+0x2fb/0x770 [ 2212.204025][ T6684] ____fput+0x15/0x20 [ 2212.208016][ T6684] task_work_run+0x127/0x190 [ 2212.212627][ T6684] exit_to_user_mode_loop+0xcb/0xe0 [ 2212.217821][ T6684] syscall_exit_to_user_mode+0x68/0x90 [ 2212.223380][ T6684] do_syscall_64+0x3d/0x40 [ 2212.227803][ T6684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2212.233682][ T6684] [ 2212.236027][ T6684] Second to last potentially related work creation: [ 2212.242603][ T6684] kasan_save_stack+0x3a/0x60 [ 2212.247269][ T6684] __kasan_record_aux_stack+0xd2/0x100 [ 2212.252726][ T6684] kasan_record_aux_stack_noalloc+0xb/0x10 [ 2212.258520][ T6684] insert_work+0x52/0x310 [ 2212.262927][ T6684] __queue_work+0x923/0xca0 [ 2212.267447][ T6684] queue_work_on+0xd5/0x130 [ 2212.271943][ T6684] bpf_prog_free+0x139/0x150 [ 2212.276517][ T6684] __bpf_prog_put_rcu+0x14b/0x170 [ 2212.281529][ T6684] __bpf_prog_put_noref+0xdf/0x120 [ 2212.286736][ T6684] bpf_prog_load+0x105d/0x1420 [ 2212.291504][ T6684] __se_sys_bpf+0x442/0x680 [ 2212.296015][ T6684] __x64_sys_bpf+0x7b/0x90 [ 2212.300422][ T6684] do_syscall_64+0x31/0x40 [ 2212.304850][ T6684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2212.310723][ T6684] [ 2212.313056][ T6684] The buggy address belongs to the object at ffff88812b74b800 [ 2212.313056][ T6684] which belongs to the cache kmalloc-1k of size 1024 [ 2212.327108][ T6684] The buggy address is located 984 bytes inside of [ 2212.327108][ T6684] 1024-byte region [ffff88812b74b800, ffff88812b74bc00) [ 2212.344487][ T6684] The buggy address belongs to the page: [ 2212.350233][ T6684] page:ffffea0004add200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12b748 [ 2212.360469][ T6684] head:ffffea0004add200 order:3 compound_mapcount:0 compound_pincount:0 [ 2212.368789][ T6684] flags: 0x4000000000010200(slab|head) [ 2212.374329][ T6684] raw: 4000000000010200 dead000000000100 dead000000000122 ffff888100042f00 [ 2212.383086][ T6684] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 2212.391913][ T6684] page dumped because: kasan: bad access detected [ 2212.398323][ T6684] page_owner tracks the page as allocated [ 2212.404036][ T6684] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d2a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 267, ts 329385688023, free_ts 329369782288 [ 2212.424162][ T6684] prep_new_page+0x179/0x180 [ 2212.428833][ T6684] get_page_from_freelist+0x2235/0x23d0 [ 2212.434367][ T6684] __alloc_pages_nodemask+0x268/0x5f0 [ 2212.439831][ T6684] new_slab+0x84/0x3f0 [ 2212.443889][ T6684] ___slab_alloc+0x2a6/0x450 [ 2212.448470][ T6684] __slab_alloc+0x63/0xa0 [ 2212.452874][ T6684] __kmalloc_track_caller+0x1ef/0x320 [ 2212.458230][ T6684] __alloc_skb+0xdc/0x520 [ 2212.462549][ T6684] __tcp_send_ack+0x9b/0x650 [ 2212.467605][ T6684] tcp_send_ack+0x3b/0x60 [ 2212.471960][ T6684] tcp_cleanup_rbuf+0x319/0x5f0 [ 2212.476866][ T6684] tcp_recvmsg+0x1eb7/0x2e10 [ 2212.481463][ T6684] inet_recvmsg+0x134/0x470 [ 2212.486068][ T6684] sock_read_iter+0x2a2/0x340 [ 2212.490737][ T6684] vfs_read+0x874/0xa10 [ 2212.494890][ T6684] ksys_read+0x140/0x240 [ 2212.499113][ T6684] page last free stack trace: [ 2212.503778][ T6684] __free_pages_ok+0x7fc/0x820 [ 2212.508630][ T6684] __free_pages+0xdd/0x380 [ 2212.513296][ T6684] __free_slab+0xcf/0x190 [ 2212.517613][ T6684] unfreeze_partials+0x15f/0x190 [ 2212.522535][ T6684] put_cpu_partial+0xc1/0x180 [ 2212.527201][ T6684] __slab_free+0x2c9/0x3a0 [ 2212.531621][ T6684] ___cache_free+0x111/0x130 [ 2212.536201][ T6684] qlink_free+0x50/0x90 [ 2212.540346][ T6684] qlist_free_all+0x5f/0xb0 [ 2212.544855][ T6684] kasan_quarantine_reduce+0x14a/0x160 [ 2212.550304][ T6684] __kasan_slab_alloc+0x2f/0xf0 [ 2212.555178][ T6684] slab_post_alloc_hook+0x5d/0x2f0 [ 2212.560373][ T6684] kmem_cache_alloc+0x165/0x2e0 [ 2212.565214][ T6684] audit_log_start+0x3b7/0x860 [ 2212.570140][ T6684] audit_seccomp+0x62/0x160 [ 2212.574638][ T6684] __seccomp_filter+0xb4c/0x1990 [ 2212.579564][ T6684] [ 2212.582224][ T6684] Memory state around the buggy address: [ 2212.587844][ T6684] ffff88812b74ba80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2212.595909][ T6684] ffff88812b74bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2212.603964][ T6684] >ffff88812b74bb80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2212.612014][ T6684] ^ [ 2212.618934][ T6684] ffff88812b74bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2212.627191][ T6684] ffff88812b74bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2212.635350][ T6684] ================================================================== [ 2212.643405][ T6684] Disabling lock debugging due to kernel taint [ 2212.674530][ T24] audit: type=1400 audit(4263432610.990:58177): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2212.720108][ T24] audit: type=1400 audit(4263432610.990:58178): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2212.742182][ T24] audit: type=1400 audit(4263432610.990:58179): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2212.764744][ T24] audit: type=1400 audit(4263432610.990:58180): avc: denied { add_name } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2212.785822][ T24] audit: type=1400 audit(4263432610.990:58181): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2212.806599][ T24] audit: type=1400 audit(4263432610.990:58182): avc: denied { append open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2212.829904][ T24] audit: type=1400 audit(4263432610.990:58183): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1