last executing test programs: 28m48.082862754s ago: executing program 32 (id=7): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = gettid() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x4, 0x7, 0x50000}]}) syz_clone(0xb44040, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigaction(0x1b, &(0x7f0000000040)={0xfffffffffffffffc, 0x4c000000, 0x0, {[0x8000000000005a]}}, 0x0, 0x8, &(0x7f00000001c0)) tkill(r2, 0x1b) 28m6.156416458s ago: executing program 33 (id=619): syz_mount_image$f2fs(&(0x7f00000004c0), &(0x7f0000000040)='./bus\x00', 0x2008410, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x1, 0x553b, &(0x7f000000ac00)="$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") symlink(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') creat(&(0x7f00000008c0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa6) syz_mount_image$fuse(0x0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x41) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000f40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 28m5.265250415s ago: executing program 34 (id=633): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000700000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x2) 28m3.079991677s ago: executing program 35 (id=661): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) r2 = socket(0x1, 0x80802, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000000c0)={0x10000001}) epoll_pwait(r3, &(0x7f0000000080)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r2, 0x0) 28m0.158548363s ago: executing program 36 (id=746): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_generic(0x11, 0x3, 0x10) sendmsg(r1, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="c4000000190001000000000000000000e0000002000000000000000000000000ff02000000000000000000000000000100000000200000000a00000087000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000082000000000000000000000fbffffffffffffff0000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000c001500590735008200"], 0xc4}}, 0x2c000010) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001300)=ANY=[@ANYBLOB="b8000000190001000000000000000000e000000200000000000000000000000000000000000000000000ffffac1414bb00000000000000000a"], 0xb8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x15, 0x1, 0x0, 0x25dfdbfd, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@loopback, 0x0, 0x0, 0x4e23, 0x0, 0xa, 0x10}, {0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffffffffffff}, {0x0, 0xfffffffffffffffa}, 0x4, 0x6e6bb5, 0x0, 0x1, 0x3, 0x3}}, 0xb8}}, 0x0) 27m58.431485536s ago: executing program 37 (id=774): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000200)=0x8) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x2000004) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='kmem_cache_free\x00', r2}, 0x18) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)='\x00!', 0x2}], 0x1, 0x738, 0x1) 27m56.457939744s ago: executing program 38 (id=825): socket$inet6(0xa, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000011}, 0x44040) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x20004015}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="60000000140001002bbd7000ffdbdf25020000fd", @ANYRES32=r1, @ANYBLOB="08000b00e000000108000200ac1414bb140006"], 0x60}}, 0x40010) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 27m50.523548438s ago: executing program 39 (id=987): mkdir(&(0x7f00000003c0)='./file0\x00', 0x137) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x43) mknodat$loop(r0, &(0x7f0000000000)='./file1\x00', 0x1000, 0x1) chdir(&(0x7f00000003c0)='./bus\x00') openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x101) 27m33.264091309s ago: executing program 40 (id=1383): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newqdisc={0x6c, 0x24, 0x4ee4e6a52ff56541, 0x72bd29, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0x2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x40, 0x2, [@TCA_TBF_BURST={0x8, 0x6, 0xe7be759}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x2, 0x2, 0x6, 0x3, 0x1}, {0x5, 0x1, 0x1, 0xa, 0xd3d, 0x1}, 0x26, 0x4b3b, 0x19c5}}, @TCA_TBF_PRATE64={0xc, 0x5, 0xc068fa965e4d9ca}]}}]}, 0x6c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x24, 0x28, 0x4ee4e6a52ff56f5d, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}, {0x2, 0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x400dc}, 0x4000080) 26m49.393767291s ago: executing program 41 (id=2265): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) 26m43.71948558s ago: executing program 42 (id=2351): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040), 0x208e24b) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 26m38.056811398s ago: executing program 8 (id=2469): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 26m38.044725509s ago: executing program 8 (id=2470): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x446, &(0x7f0000000480)={[{@min_batch_time={'min_batch_time', 0x3d, 0x9}}, {@journal_dev={'journal_dev', 0x3d, 0x1045}}, {@errors_continue}, {@noquota}, {@data_err_ignore}, {@noblock_validity}, {@delalloc}, {@noauto_da_alloc}, {@orlov}, {@user_xattr}, {@nodioread_nolock}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x553, &(0x7f0000001080)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) truncate(&(0x7f0000000900)='./file1\x00', 0x3000000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r0, 0x0) timer_create(0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r1 = socket(0x840000000002, 0x3, 0xfa) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendmmsg$inet(r1, &(0x7f0000005240), 0x4000095, 0x0) 26m37.087810697s ago: executing program 8 (id=2483): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000380)={[{@nodelalloc}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xe6}}, {@oldalloc}, {@barrier}, {@auto_da_alloc}, {@nodioread_nolock}]}, 0x1, 0x5b3, &(0x7f0000000780)="$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") r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0xfffffffffffffdd5) getsockname(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r1, 0x0) fstatfs(r2, &(0x7f0000000280)=""/181) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 26m36.821578682s ago: executing program 8 (id=2484): syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x840, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000", @ANYRES8], 0xfd, 0x2bc, &(0x7f0000000c40)="$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") syz_mount_image$fuse(0x0, &(0x7f00000001c0)='./file7/file0\x00', 0x144428, 0x0, 0x1, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffff004) renameat2(0xffffffffffffff9c, &(0x7f0000000780)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file7/file0\x00', 0x2) 26m36.685173885s ago: executing program 8 (id=2485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='sched_kthread_stop_ret\x00', r1}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="4000000010001fff000000000000000000060000", @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800e0001007769726567756172640000000400028008000a00b8"], 0x40}}, 0x0) 26m36.468041519s ago: executing program 8 (id=2489): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) rt_sigsuspend(&(0x7f0000000000)={[0x1]}, 0x8) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r1, 0x0, &(0x7f0000000340)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) 26m36.465576309s ago: executing program 43 (id=2489): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) rt_sigsuspend(&(0x7f0000000000)={[0x1]}, 0x8) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r1, 0x0, &(0x7f0000000340)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) 25m24.870152412s ago: executing program 7 (id=3912): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='9p_protocol_dump\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r1}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) creat(&(0x7f00000002c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}}) 25m24.722965195s ago: executing program 7 (id=3918): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='kmem_cache_free\x00', r1}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f00000006c0)='%-010d \x00'}, 0x20) timer_create(0x7, 0x0, &(0x7f0000000340)=0x0) timer_getoverrun(r2) socket$nl_xfrm(0x10, 0x3, 0x6) setreuid(0x0, 0x0) 25m24.684194455s ago: executing program 7 (id=3920): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sys_enter\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='block_bio_remap\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='block_bio_remap\x00', r2}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 25m24.642348486s ago: executing program 7 (id=3921): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet(0xa, 0x801, 0x0) syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000680)='./file2\x00', 0x800000, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x1, 0x5504, &(0x7f000000c0c0)="$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") mkdir(&(0x7f0000000400)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000300)='./bus\x00', 0x3000009, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000380)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) 25m24.176736745s ago: executing program 7 (id=3936): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000f00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = dup(r0) bind$xdp(r2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) getgid() 25m23.819903882s ago: executing program 7 (id=3951): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000180)="10030600e0fc020004004788aa96a13bb100001100007fca1a00", 0x10608, 0x0, &(0x7f0000000140)={0x11, 0x0, r3}, 0x14) 25m23.813849232s ago: executing program 44 (id=3951): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000180)="10030600e0fc020004004788aa96a13bb100001100007fca1a00", 0x10608, 0x0, &(0x7f0000000140)={0x11, 0x0, r3}, 0x14) 25m14.931617513s ago: executing program 6 (id=4137): pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0x4) mount$incfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x40, 0x0) 25m14.891357793s ago: executing program 6 (id=4142): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r0}, &(0x7f0000000380), &(0x7f0000000ac0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) connect$netlink(r2, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x68, 0x30, 0x829, 0x0, 0x0, {}, [{0x54, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xa}}]}, {0xff89}, {0xc}, {0xc, 0x8, {0x3}}}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0xc010}, 0x4044040) 25m14.769942155s ago: executing program 6 (id=4146): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1d0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x400a8, &(0x7f0000000380)=ANY=[], 0x5, 0x0, 0x0) symlinkat(&(0x7f0000000080)='.\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x104000, 0x0) mount$bind(&(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0/../file0\x00', 0x0, 0xa1c08, 0x0) mount$9p_unix(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x12d7498, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x8c000, 0x0) 25m14.711292607s ago: executing program 6 (id=4136): syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x214000, &(0x7f0000000540)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c757466383d302c636865636b3d7374726963742c646973636172642c757466383d312c6e66732c73686f72746e616d653d77696e39352c73686f72746e616d653d6c6f7765722c756e695f786c6174653d302c0036b5"], 0xfa, 0x2b0, &(0x7f0000000880)="$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") r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) r2 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_pidfd_open(r2, 0x0) setns(r3, 0x24020000) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x3ea, 0xffffffff, 0x40}) mount$cgroup(0x0, &(0x7f0000002980)='.\x00', &(0x7f00000029c0), 0x8004, &(0x7f0000000000)={[{@name={'name', 0x3d, '\xed\xe4\x00\x00'}}]}) 25m14.595620339s ago: executing program 6 (id=4140): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x4040086) 25m14.227860186s ago: executing program 6 (id=4152): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1}, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r4 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000040)={0xf6c447fee59251f4}) close_range(r2, r3, 0x0) 25m14.224412036s ago: executing program 45 (id=4152): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1}, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r4 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000040)={0xf6c447fee59251f4}) close_range(r2, r3, 0x0) 24m44.567446465s ago: executing program 9 (id=4781): mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x4) fcntl$setstatus(r0, 0x4, 0x42000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2400) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20842, 0x47) fcntl$setstatus(r2, 0x4, 0x42000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2400) close(0x3) 24m44.539120715s ago: executing program 9 (id=4772): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_da_reserve_space\x00'}, 0x18) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) r1 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4ea3, 0x0, @loopback, 0x3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xae, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) readlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001200)=""/4096, 0x1000) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x9521, &(0x7f0000000100)=[{&(0x7f0000000000)="2c10", 0xfff2}], 0x1, 0x0, 0x0, 0x2c}, 0x44004) 24m44.100385564s ago: executing program 9 (id=4778): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 24m44.035939495s ago: executing program 9 (id=4780): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2008002, &(0x7f0000000200)={[{@nojournal_checksum}, {@nodelalloc}, {@quota}]}, 0x1, 0x558, &(0x7f0000000680)="$eJzs3c9vI1cdAPDvTH52d9vsQg9QAbtAYUGrtTfedlX10nIBoaoSouKAOGxD4o3C2nGIndKESKR/A0ggcYI/gQMSB6SeOHDjiMQBEOWAVCACbZA4GM14kriJw5rEsdn485Fm58ebme979s6852dnXgBj60ZE7ETEdES8GRFzxfakmOLVzpTt92h3e3Fvd3sxiXb7jb8leXq2LbqOyVwuzjkbEV/9UsQ3k+Nxm5tbDxdqtep6sV5u1dfKzc2t2yv1heXqcnW1Urk3f+/OS3dfrAysrNfrP3v/iyuvfe2Xv/j4e7/Z+fx3s2xdKdK6yzFInaJPHcTJTEbEa+cRbAQmivn0iPPB6aQR8aGI+FR+/c/FRP6/EwC4yNrtuWjPda8DABddmveBJWkpItK0aASUOn14z8altNZotm49aGysLnX6yq7GVPpgpVa9c23md9/Od55KsvX5PC1Pz9crR9bvRsS1iPjBzFP5emmxUVsaTZMHAMbe5e76PyL+OZOmpVJfh/b4Vg8AeGLMjjoDAMDQqf8BYPyo/wFg/PRR/xdf9u+ce14AgOHw+R8Axo/6HwDGj/ofAMbKV15/PZvae8Xzr5fe2tx42Hjr9lK1+bBU31gsLTbW10rLjcZy/sye+uPOV2s01uZfiI23y61qs1Vubm7drzc2Vlv38+d6369ODaVUAMB/c+36u79NImLn5afyKbrGclBXw8WWDnAv4MkycZaDNRDgiWa0LxhffVXheSPh1+eeF2A0ej7Me7bn4gf96H8I4ndG8H/l5kf77/83xjNcLHr2YXydrv//lYHnAxi+U/f//2Gw+QCGr91Ojo75P32QBABcSGf4CV/7e4NqhAAj9bjBvAfy/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABcMFci4luRpKV8LPA0+zctlSKejoirMZU8WKlV70TEM3E9IqZmsvX5UWcaADij9C9JMf7XzbnnrxxNnU7+NZPPI+I7P37jh28vtFrr89n2vx9sn9kfPqxyeNwZxhUEAPr3p352yuvvSjHv+iD/aHd7cX86xzwe8/4XDgYfXdzb3c6nTspktNvtdsRs3pa49I8kJotjZiPiuYiYGED8nXci4iO9yp/kfSNXi5FPu+NHEfvpocZPPxA/zdM68+zl+/AA8gLj5t3s/vNqr+svjRv5vPf1P5vfoc4uv//NRuzf+/a64k8WkSZ6xM+u+Rv9xnjhV18+trE910l7J+K5yV7xk4P4yQnxn+8z/u8/9onvv3JCWvsnETejd/zuWOVWfa3c3Ny6vVJfWK4uV1crlXvz9+68dPfFSjnvoy7v91Qf99eXbz1zUt6y8l86IX7nnb98pPzTB8d+ps/y//Tfb37jk4erM0fjf+7Tvd//Z/N579c/qxM/22f8hUs/P3H47iz+0gnlf9z7f6vP+O/9eWupz10BgCFobm49XKjVqutnWsg+hQ7iPMcWsiz2t/N+c/FsQf8Y+cLhy5JEEoMuV9YY62fnqfN6Vc99YfKgrTjYM389O+OQi5MOvBSnWYirxcKjYQUd3T0JGI7Di37UOQEAAAAAAAAAAAAAAE4yjL9hGnUZAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuLj+EwAA//8GP8IF") mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./bus\x00', 0xe8) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f00000001c0)='./bus\x00') readlink(&(0x7f0000000240)='./bus\x00', &(0x7f0000001700)=""/4096, 0x1000) rmdir(&(0x7f0000000000)='./file0\x00') 24m43.643777643s ago: executing program 9 (id=4786): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{}, 0x3548, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}, @TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10, 0x1, 0x0, 0x0, {{}, {0x0, 0x0, 0x1}}}]}]}]}}]}, 0x54}}, 0x0) 24m43.542477614s ago: executing program 9 (id=4787): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) io_uring_setup(0x1de0, &(0x7f00000000c0)={0x0, 0x45d6, 0x0, 0x0, 0x2}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000c40)={0x0, 0xfe72}) close_range(r1, 0xffffffffffffffff, 0x0) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") 24m43.482973096s ago: executing program 46 (id=4787): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) io_uring_setup(0x1de0, &(0x7f00000000c0)={0x0, 0x45d6, 0x0, 0x0, 0x2}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000c40)={0x0, 0xfe72}) close_range(r1, 0xffffffffffffffff, 0x0) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") 21m37.296307397s ago: executing program 3 (id=7992): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RVERSION(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000780)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}}) 21m37.063395112s ago: executing program 3 (id=7997): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000007000000000f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{r0}, &(0x7f0000000400), &(0x7f00000004c0)='%pI4 \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0xaf, 0x5, 0x3}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) 21m36.985666973s ago: executing program 3 (id=8000): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x50) ftruncate(r4, 0x2007ffb) sendfile(r4, r4, 0x0, 0x1000000201005) 21m36.477320743s ago: executing program 3 (id=8002): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000300)={[{@noauto_da_alloc}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}, {@dioread_lock}, {@norecovery}, {@discard}, {@lazytime}, {@noload}, {@usrquota}, {@noauto_da_alloc}]}, 0xfe, 0x54d, &(0x7f0000000400)="$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") mkdir(&(0x7f0000000000)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@metacopy_on}]}) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000100)='./bus\x00', 0x100000, &(0x7f0000000200)=ANY=[], 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x48400) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./bus\x00', 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x1) 21m36.279984976s ago: executing program 3 (id=8007): sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0xc0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0)={0x41, 0x12}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x41}, 0x1be) bind$tipc(r2, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={&(0x7f0000000080), 0x10, 0x0}, 0x0) 21m35.462818212s ago: executing program 3 (id=8030): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00'}, 0x10) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1800, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) fsopen(0x0, 0x1) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) read(r2, &(0x7f0000000100)=""/123, 0x7b) close_range(r0, 0xffffffffffffffff, 0x0) 21m35.407375053s ago: executing program 47 (id=8030): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00'}, 0x10) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1800, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) fsopen(0x0, 0x1) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) read(r2, &(0x7f0000000100)=""/123, 0x7b) close_range(r0, 0xffffffffffffffff, 0x0) 14.560215499s ago: executing program 5 (id=13961): bpf$TOKEN_CREATE(0x24, &(0x7f0000000180), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r2, 0x0, &(0x7f0000000340)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0x9, 0x0, &(0x7f00000004c0)={0x0, 0x3938700}, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x21) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000540), &(0x7f0000000040)='./file4\x00', 0xa18c14, &(0x7f0000001140)={[{@shortname_lower}, {@shortname_mixed}, {@shortname_winnt}, {@fat=@gid}, {@utf8no}, {@fat=@check_strict}, {@shortname_win95}, {@uni_xlate}, {@shortname_mixed}, {@uni_xlate}, {@uni_xlateno}, {@fat=@dmask={'dmask', 0x3d, 0x4}}, {@iocharset={'iocharset', 0x3d, 'iso8859-14'}}]}, 0x89, 0x29b, &(0x7f0000000580)="$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") munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r3 = open(&(0x7f00000000c0)='.\x00', 0x8000, 0x50) getdents(r3, &(0x7f0000001fc0)=""/184, 0xb8) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 13.745976105s ago: executing program 4 (id=13964): prctl$PR_GET_KEEPCAPS(0x7) open(0x0, 0x60840, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000f0000000000000c00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x55f, &(0x7f0000000d00)="$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") r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x54, r6, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}}, {0x14, 0x2, @in={0x2, 0x0, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x54}}, 0x20000054) 12.147417276s ago: executing program 2 (id=13967): syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000240)='./bus\x00', 0x1800840, &(0x7f0000000600)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c64656275672c73686f72746e616d653d77696e6e742c696f636861727365743d63703836302c636865636b3d7374726963742c6e6f6e756d7461696c3d302c696f636861727365743d6d6163637972696c6c69632c73686f72746e616d653d77696e6e742c6e66732c73686f72746e616d653d77696e39352c696f636861727365743d63703836362c757466383d302c756e695f786c6174653d312c747a3d5554432c007e8220eaefd234b6ba8a1d08ca8d19ba0c"], 0x81, 0x360, &(0x7f0000000900)="$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") r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$netlink(0x10, 0x3, 0xc) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x90) getdents64(r4, &(0x7f0000000f80)=""/4096, 0x1000) socket$nl_generic(0x11, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="182fc700000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7957247d7617c240200004eb64d9932e200000000b703000000000080850000000400000095e91a3e9b0820ce0b98fdd4c872a6e8650a23b17559c5ea7a416efc8e9d3e3a71a5492b7c2dcc78076333b5a445d7a97ef5c78dc3eba6b4eea4e409be028804bdd0f56d8be8e03ff7b678b934bc21c71b413fe143f6ba8cc3991870e4d59eab241f44a82bfee0ea00"/211], &(0x7f00000004c0)='GPL\x00', 0x0, 0x7, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @address_request}}}}, 0x0) 12.136408577s ago: executing program 4 (id=13968): openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRES16, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_usb_connect(0x1, 0xfffffffffffffd22, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x25, 0x2, @void}, 0x10) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = eventfd(0xc) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000240)=r2) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000040)={0x1, r2}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/67, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/74}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000a40)) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000900)={&(0x7f00000007c0)=ANY=[@ANYBLOB="18200000", @ANYRES16=0x0, @ANYBLOB="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"], 0x118}, 0x1, 0x0, 0x0, 0x24004004}, 0x24040040) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f00000002c0)={0x1, r2}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xf}, 0x94) unshare(0x64000600) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 11.141770425s ago: executing program 5 (id=13970): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) syz_usb_disconnect(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 11.141158775s ago: executing program 2 (id=13971): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) unshare(0x2040400) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 10.300012741s ago: executing program 4 (id=13973): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000002d00)={0x0, 0x0, 0xffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) syz_mount_image$f2fs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYRES8=0x0], 0x1, 0x5514, &(0x7f000000b2c0)="$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") 9.447016568s ago: executing program 2 (id=13975): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x88e, &(0x7f0000000080)={[{@errors_remount}, {@mblk_io_submit}, {@inlinecrypt}, {@test_dummy_encryption_v1}, {@barrier}, {@mblk_io_submit}, {@nogrpid}]}, 0x3, 0x445, &(0x7f0000000800)="$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") r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) fdatasync(r3) r4 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x8000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) bind$unix(r2, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x1, 0x0, 0x0, 0x0) getsockname$unix(r2, &(0x7f0000000280)=@abs, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 8.485596117s ago: executing program 5 (id=13978): r0 = socket$pppl2tp(0x18, 0x1, 0x1) sched_setscheduler(0x0, 0x2, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) openat$kvm(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) getsockname$tipc(r0, 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000700), 0x40) 8.044052545s ago: executing program 0 (id=13979): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000040)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r1], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) 6.874667318s ago: executing program 2 (id=13981): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000001000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge0\x00', 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="3800000054000100040000000000000807000000", @ANYRES32=r4], 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x40080) r5 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r2, &(0x7f0000000000), 0xfffffecc) splice(r1, 0x0, r5, 0x0, 0x4ffe6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x216, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r7 = gettid() timer_create(0x7, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some', 0x20, 0x56, 0x20, 0xe}, 0x19) 6.73603153s ago: executing program 0 (id=13982): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8002, &(0x7f00000000c0), 0x1, 0x4b4, &(0x7f0000000c80)="$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") bind$inet6(r0, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 5.438916826s ago: executing program 1 (id=13983): syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}}, 0x0) 5.354967477s ago: executing program 2 (id=13984): r0 = socket$can_bcm(0x1d, 0x2, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1b00000000000000000000000000040000", @ANYBLOB], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) r6 = gettid() tkill(r6, 0x12) tkill(0x0, 0x14) connect$can_bcm(r0, &(0x7f00000002c0), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="050000000308"], 0x80}}, 0x0) 4.335890787s ago: executing program 5 (id=13985): ioctl$USBDEVFS_GET_SPEED(0xffffffffffffffff, 0x551f) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_emit_ethernet(0xaa, &(0x7f00000000c0)={@remote, @random="c1ec14fcd6b6", @val={@val={0x88a8, 0x1, 0x1, 0xffe}, {0x8100, 0x1, 0x1, 0x2}}, {@ipv4={0x800, @udp={{0x22, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @broadcast, {[@ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x4, 0x49, 0x3, 0xa}, @cipso={0x86, 0x34, 0xffffffffffffffff, [{0x1, 0x6, "12377724"}, {0x2, 0x10, "cf49e655e79e7118f751ea78e5d7"}, {0x1, 0x7, "e27cf1fcac"}, {0x2, 0x11, "3b7f7ea4a76a95ae5b2386969f90b4"}]}, @timestamp_prespec={0x44, 0x24, 0xa, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@loopback, 0x8}, {@private=0xa010101, 0x3}, {@multicast1, 0xa0c}]}, @rr={0x7, 0x13, 0xf0, [@multicast2, @dev={0xac, 0x14, 0x14, 0x1e}, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}, {0x0, 0x8100, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x7, 0x9) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb}, 0x11000) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x408e, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@min_batch_time={'min_batch_time', 0x3d, 0xfff}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x40}}, {@oldalloc}, {@errors_remount}, {@minixdf}]}, 0x3, 0x43a, &(0x7f0000000340)="$eJzs28tvG0UYAPBv13FKXySU8ugDCBRExCNp0gI9cAGBxAEkJDiUY0jSqtRtUBMkWlUQECpHVIk74ojEX8AJLgg4IXGFO6pUoVxaOBmtvZs4jp0mwY5L/ftJm8zsjjPzeXbs2Z1sAH1rJPuRROyJiN8jYqieXV1gpP7r5tLl6b+XLk8nUa2+9VdSK3dj6fJ0UbR43e48M5pGpJ8lcahFvfMXL52dqlRmL+T58YVz74/PX7z07JlzU6dnT8+enzxx4vixiReen3yuI3Fmbbpx8KO5wwdee+fqG9Mnr77787dJEX9THB0yst7BJ6rVDlfXW3sb0slADxvCppQiIuuucm38D0UpVjpvKF79tKeNA7qqWq1Wd7c/vFgF7mBJbLTk2fzzArgzFF/02fVvsW3T1OO2cP2l+gVQFvfNfKsfGYg0L1Nuur7tpJGIOLn4z1fZFt25DwEAsMr32fznmVbzvzTubyh3d742NBwR90TEvoi4NyL2R8R9EbWyD0TEg5usv3mRZO38J722pcA2KJv/vZivba2e/xWzvxgu5bm9tfjLyakzldmj+XsyGuUdWX5inTp+eOW3L9oda5z/ZVtWfzEXzNtxbWDH6tfMTC1M/ZeYG13/JOLgQKv4k+WVgCQiDkTEwS3Wceapbw63O9Yu/vJG/nAH1pmqX0c8We//xWiKv5Csvz45fldUZo+OF2fFWr/8euXNdvXfuv+7K+v/XS3P/+X4h5PG9dr5zddx5Y/P217TbPX8H0zerqUH830fTi0sXJiIGExerze6cf/kymuLfFE+i3/0SOvxvy9W3olDEZGdxA9FxMMR8Uje9kcj4rGIOLJO/D+9/Ph7W4+/u7L4ZzbV/yuJwWje0zpROvvjd6sqHd5M/Fn/H6+lRvM9G/n820i7tnY2AwAAwP9PGhF7IknHltNpOjZW/3/5/bErrczNLzx9au6D8zP1ZwSGo5wWd7qGGu6HTuSX9UV+sil/LL9v/GVpZy0/Nj1Xmel18NDndrcZ/5k/S71uHdB1nteC/mX8Q/8y/qF/Gf/Qv1qM/529aAew/Vp9/3/cg3YA269p/Fv2gz7i+h/6l/EP/cv4h740vzNu/ZC8hMSaRKS3RTMkupTo9ScTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAZ/wbAAD//9E940M=") r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000080)={0x0, 0x2000003}) read(r2, &(0x7f0000032440)=""/102364, 0x18fdc) write$binfmt_elf64(r3, 0x0, 0x78) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r6 = dup(r5) setsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000300)={{{@in=@multicast2, @in6=@loopback, 0x4e20, 0x5, 0x4e21, 0x8, 0xa, 0x90, 0xa0, 0xc}, {0x1, 0xf, 0x40000000, 0x4, 0xffffffffffffffff, 0x9, 0x7, 0x8}, {0x80, 0x7, 0x1, 0x81}, 0x662a, 0x6e6bba, 0x1, 0x1, 0x1}, {{@in=@rand_addr=0x64010101, 0x4d3, 0x32}, 0x2, @in6=@mcast1, 0x3503, 0x2, 0x2, 0xd, 0x9, 0x5, 0x2}}, 0xe8) r7 = socket$inet6(0xa, 0x2, 0x3a) sendto$inet6(r7, 0x0, 0x20, 0x24040010, 0x0, 0x0) 4.334971777s ago: executing program 0 (id=13986): openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000380)='sys_enter\x00', r1}, 0x10) syz_emit_ethernet(0x22, &(0x7f00000017c0)={@local, @random="6a2ddcf6177a", @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x3, 0x14, 0x68, 0x0, 0x3, 0x2b, 0x0, @broadcast, @multicast2}}}}}, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x400340, 0x11) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000280)=@req3={0x958, 0x1, 0x1, 0x7, 0x8, 0x1, 0x7}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x40) futex(&(0x7f000000cffc)=0x2, 0xa, 0x100000, 0x0, 0x0, 0x3000000) uname(0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r3) sendmsg$SEG6_CMD_GET_TUNSRC(r2, 0x0, 0x4844) r4 = eventfd(0x8c66) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000040)={0x27800000000, 0x0, 0x1, r4, 0x1}) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) 4.217238969s ago: executing program 2 (id=13987): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000740), 0x880, 0x0) socket$unix(0x1, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000380)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) syz_open_procfs$userns(0x0, &(0x7f0000000340)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffdec) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) preadv(r0, &(0x7f0000001d00)=[{&(0x7f0000000d00)=""/4096, 0x1000}], 0x1, 0x7, 0x3) 4.207573189s ago: executing program 0 (id=13988): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) write$binfmt_script(r2, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) getsockname$packet(r1, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x80000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00'}, 0x10) fstatfs(0xffffffffffffffff, &(0x7f0000000140)=""/166) 3.844284356s ago: executing program 0 (id=13989): r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000200)='.\x00', 0x400) dup(r0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = gettid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x4008032, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f0000000180)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) mmap(&(0x7f0000568000/0x2000)=nil, 0x1000000, 0x0, 0x11, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeeb, 0x8031, 0xffffffffffffffff, 0x70f9a000) r2 = syz_open_dev$hidraw(&(0x7f0000000000), 0x0, 0x81) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000), 0x4) ioctl$HIDIOCSFEATURE(r2, 0xc0404806, &(0x7f00000000c0)) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000140)='/dev/hwrng\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 3.726627508s ago: executing program 1 (id=13990): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001e40), 0x0, 0x40) socket$inet6(0x10, 0x2, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1010, 0x89}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000380), &(0x7f0000000000), 0x80, r4, 0x0, 0x7}, 0x38) 3.60384786s ago: executing program 4 (id=13991): openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000380)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffc000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000b2000000000200001d9a1fd047a422bd404661a3c5ebbdf583e4a6e6a69a1ede58f3978052f1214f071125c59127c6"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$exfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x800, &(0x7f0000000180)=ANY=[@ANYBLOB="dd75cff19093f5c82099"], 0x1, 0x153d, &(0x7f00000005c0)="$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") open(&(0x7f00000000c0)='.\x00', 0x0, 0xc6) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0xc3b, 0x70bd28, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6200}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x21f3}, @IFLA_GRE_ENCAP_TYPE={0x6}]}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x180}, 0x40080c0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x0, 0x300}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 2.366065315s ago: executing program 5 (id=13992): syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000480)='./file0\x00', 0x18000, &(0x7f0000003b40)=ANY=[@ANYRES32=0x0, @ANYRESDEC, @ANYRES16=0x0, @ANYBLOB="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", @ANYBLOB="fe2ecf20a9a17bd2ed7e803f830375c150a1f848f604c2c1f932d2b7163be4b2b9a5bd521d185cfbee555b27608594beba6325923aaf5db74cff01000053db92c6c5fcbba0abd975fc76bea49b00513afc856ed89d3fadeda307ca587354322803b0983cc65725ae7f45fb95e7cdb28c6b886959b7dde2c87c73f6008cf6eed7861f24b7423704b95f3d05b92d3d7ff9d392833ecd02443320b60131a350360fcc1d659e2a03cb469caf0498bacae0735a161345b3d71a55f14ef636b6f832c7a6071fce83904dfd871b6d8e03648dbaa3a039eb5673792cae80335732030f9aeabaf3bb3cc4ca5fe75271d69b2e78beb2b81fc3cf3a18a7ae93a3cdbe6599b99408275e2b4b4477c6fcf4806134e839e13533ec000000000000006a1c000000000000000000000000000000000000000000000000000069c3288311b7414705e975eb3f1b77a120", @ANYRES64], 0x8, 0x2eb, &(0x7f00000004c0)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffe2d, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000549000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) 2.341355555s ago: executing program 1 (id=13993): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x8, 0x3, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000001200)='syzkaller\x00'}, 0x80) r2 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000380)={r1, r3, 0x1, 0x0, @void}, 0x10) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0xfdfe, 0x7, @remote, 0x4}, 0x1c) connect$pppl2tp(r4, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) writev(r4, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x300) r6 = syz_pidfd_open(0x0, 0x0) setns(r6, 0x24020000) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) 2.09067066s ago: executing program 4 (id=13994): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r7, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) 2.09007971s ago: executing program 1 (id=14004): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x96676e7eb14b4b45, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYRESOCT], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00', 0x2, 0x2b}, 0xa, @in6=@private1, 0x0, 0x4}]}]}, 0xfc}}, 0x0) r5 = socket(0x2, 0x3, 0x6) bind$inet(r5, &(0x7f0000000080)={0x2, 0xfffa, @local}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x48812, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) 1.935336693s ago: executing program 5 (id=13995): socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = eventfd(0xc) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000240)=r2) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000040)={0x1, r2}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f00000000c0)=""/87, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) unshare(0x64000600) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x10, 0x3, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0x1, 0x0) removexattr(0x0, 0x0) 970.802562ms ago: executing program 1 (id=13996): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYBLOB="0000000000000000b704"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) eventfd(0xb) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x9504, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0xffbd}], 0x1, 0x0, 0x0, 0x2c}, 0x4) 483.231121ms ago: executing program 4 (id=13997): bpf$PROG_LOAD(0x5, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x10b, 0x4, 0x0, &(0x7f00000001c0), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000040), &(0x7f0000048000), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x65b9, 0x4) sendmmsg$inet6(r2, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x400c844) write(r2, &(0x7f00000001c0)='+', 0x1) recvfrom(r2, &(0x7f0000000200)=""/146, 0x92, 0x2021, 0x0, 0x0) add_key$keyring(&(0x7f0000000300), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102000028"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) pivot_root(&(0x7f0000000000)='.\x00', &(0x7f00000004c0)='./file1\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 249.473516ms ago: executing program 0 (id=13998): sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x8040) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800000000101000028000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBMETA(r1, 0x4b63, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) timer_settime(r3, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) waitid(0x0, r4, 0x0, 0x8, 0xfffffffffffffffd) waitid(0x1, r4, 0x0, 0x4, 0x0) 0s ago: executing program 1 (id=13999): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x42, 0x3c, 0xc0, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r4}, 0x38) kernel console output (not intermixed with test programs): t: type=1326 audit(2000000729.848:20445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29462 comm="syz.1.11289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 922.453077][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 922.471297][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 922.481620][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 922.500576][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 922.509382][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 922.518051][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 922.526363][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 922.534847][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 922.544008][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 922.556417][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 922.565367][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 922.574233][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 922.582839][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 922.592457][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 922.601217][ T8352] kernel read not supported for file [userfaultfd] (pid: 8352 comm: kworker/0:6) [ 922.610812][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 922.610831][ T30] audit: type=1400 audit(2000000733.823:20471): avc: denied { read } for pid=8352 comm="kworker/0:6" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=102925 scontext=system_u:system_r:kernel_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 922.645570][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 922.654237][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 922.662752][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 922.671298][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 922.680720][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 922.689619][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 922.699197][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 922.708936][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 922.716516][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 922.724370][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 922.732676][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 922.813435][T29512] netlink: 56 bytes leftover after parsing attributes in process `syz.4.11302'. [ 922.908491][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth7: link becomes ready [ 922.993130][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [ 923.007971][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth9: link becomes ready [ 923.015647][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth8: link becomes ready [ 923.023787][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth11: link becomes ready [ 923.031826][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready [ 923.040314][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth13: link becomes ready [ 923.048576][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready [ 923.057036][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth15: link becomes ready [ 923.068787][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth14: link becomes ready [ 923.076990][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth17: link becomes ready [ 923.085220][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth16: link becomes ready [ 923.094520][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth19: link becomes ready [ 923.102485][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth18: link becomes ready [ 923.110939][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth21: link becomes ready [ 923.119223][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready [ 923.130682][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth23: link becomes ready [ 923.138748][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth22: link becomes ready [ 923.147799][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth25: link becomes ready [ 923.155797][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth24: link becomes ready [ 923.164582][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth27: link becomes ready [ 923.173053][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth26: link becomes ready [ 923.181339][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth29: link becomes ready [ 923.189217][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth28: link becomes ready [ 925.402655][T29545] device batadv_slave_0 left promiscuous mode [ 925.717225][T29549] netlink: 12 bytes leftover after parsing attributes in process `syz.2.11315'. [ 926.022875][T29554] syz.5.11317[29554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 926.022957][T29554] syz.5.11317[29554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 928.657694][T29594] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11331'. [ 929.094621][T29607] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11335'. [ 933.089896][T29657] syz.4.11348[29657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 933.090087][T29657] syz.4.11348[29657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 935.055836][ T8352] kernel read not supported for file [userfaultfd] (pid: 8352 comm: kworker/0:6) [ 939.070157][T29692] xt_CT: No such helper "pptp" [ 939.706398][ T30] audit: type=1326 audit(2000000749.819:20472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29707 comm="syz.1.11363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x50000 [ 939.721337][T29706] netlink: 'syz.4.11365': attribute type 27 has an invalid length. [ 939.736453][ T30] audit: type=1326 audit(2000000749.856:20473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29707 comm="syz.1.11363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x50000 [ 939.774580][ T30] audit: type=1326 audit(2000000749.856:20474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29707 comm="syz.1.11363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x50000 [ 939.847434][ T30] audit: type=1326 audit(2000000749.856:20475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29707 comm="syz.1.11363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x50000 [ 939.906321][T29706] device macsec0 left promiscuous mode [ 939.921386][ T30] audit: type=1326 audit(2000000749.856:20476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29707 comm="syz.1.11363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x50000 [ 939.995883][ T30] audit: type=1326 audit(2000000749.856:20477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29707 comm="syz.1.11363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x50000 [ 940.064014][ T30] audit: type=1326 audit(2000000749.856:20478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29707 comm="syz.1.11363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x50000 [ 940.114519][ T30] audit: type=1326 audit(2000000749.856:20479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29707 comm="syz.1.11363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x50000 [ 940.146720][T29709] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 940.164004][ T30] audit: type=1326 audit(2000000749.856:20480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29707 comm="syz.1.11363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x50000 [ 940.172694][T29709] device gretap0 left promiscuous mode [ 940.252654][ T30] audit: type=1326 audit(2000000749.856:20481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29707 comm="syz.1.11363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x50000 [ 940.332842][T29709] device veth1_macvtap left promiscuous mode [ 940.355453][T29709] device veth1_macvtap entered promiscuous mode [ 940.404227][T29709] device gretap0 entered promiscuous mode [ 941.620828][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 941.628810][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 941.637911][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 941.663748][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 941.692716][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 941.709016][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 941.722832][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 941.735824][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 941.744530][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 941.752897][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 941.793180][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 941.801950][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 941.810649][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 941.823649][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 941.831967][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [ 941.842396][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth8: link becomes ready [ 941.850576][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready [ 941.858537][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready [ 941.866583][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth14: link becomes ready [ 941.874390][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth16: link becomes ready [ 941.882662][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth18: link becomes ready [ 941.890916][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready [ 941.898935][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth22: link becomes ready [ 941.906718][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth24: link becomes ready [ 941.915007][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth26: link becomes ready [ 941.999148][T29727] tipc: Resetting bearer [ 942.503548][T29755] netlink: 'syz.0.11376': attribute type 12 has an invalid length. [ 944.453706][T29804] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11391'. [ 944.469612][T29804] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11391'. [ 944.490018][T29804] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11391'. [ 946.020376][T29837] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11399'. [ 948.505909][T29859] netlink: 36 bytes leftover after parsing attributes in process `syz.1.11405'. [ 948.515137][T29859] netlink: 36 bytes leftover after parsing attributes in process `syz.1.11405'. [ 948.805090][ T30] kauditd_printk_skb: 60 callbacks suppressed [ 948.805108][ T30] audit: type=1326 audit(2000000758.340:20542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29861 comm="syz.0.11408" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 948.835987][ T30] audit: type=1326 audit(2000000758.340:20543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29861 comm="syz.0.11408" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 948.860995][ T30] audit: type=1326 audit(2000000758.387:20544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29861 comm="syz.0.11408" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 948.885159][ T30] audit: type=1326 audit(2000000758.387:20545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29861 comm="syz.0.11408" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 948.923616][ T30] audit: type=1326 audit(2000000758.453:20546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29861 comm="syz.0.11408" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 948.950347][ T30] audit: type=1326 audit(2000000758.471:20547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29861 comm="syz.0.11408" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 948.986901][ T30] audit: type=1326 audit(2000000758.471:20548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29861 comm="syz.0.11408" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 949.013973][ T30] audit: type=1326 audit(2000000758.471:20549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29861 comm="syz.0.11408" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 949.037719][ T30] audit: type=1326 audit(2000000758.471:20550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29861 comm="syz.0.11408" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 949.061611][ T30] audit: type=1326 audit(2000000758.471:20551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29861 comm="syz.0.11408" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 955.530036][ T428] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 956.344811][T29745] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 959.304687][T29990] netlink: 'syz.5.11462': attribute type 27 has an invalid length. [ 959.339302][T29990] device lo left promiscuous mode [ 959.358900][T29990] device tunl0 left promiscuous mode [ 959.378585][T29990] device gre0 left promiscuous mode [ 959.394272][T29990] device erspan0 left promiscuous mode [ 959.401438][T29994] xt_hashlimit: max too large, truncated to 1048576 [ 959.408762][T29990] device ip_vti0 left promiscuous mode [ 959.428240][T29990] device ip6_vti0 left promiscuous mode [ 959.445077][T29990] device sit0 left promiscuous mode [ 959.461850][T29990] device ip6tnl0 left promiscuous mode [ 959.481083][T29990] device ip6gre0 left promiscuous mode [ 959.501507][T29990] device ip6gretap0 left promiscuous mode [ 959.520668][T29990] device dummy0 left promiscuous mode [ 959.542801][T29990] device wg0 left promiscuous mode [ 959.560610][T29990] device wg2 left promiscuous mode [ 959.578270][T29990] device veth0_to_bridge left promiscuous mode [ 959.599823][T29990] device veth1_to_bridge left promiscuous mode [ 959.622029][T29990] device bridge_slave_1 left promiscuous mode [ 959.643107][T29990] device veth0_to_bond left promiscuous mode [ 959.664069][T29990] device bond_slave_0 left promiscuous mode [ 959.684364][T29990] device veth1_to_bond left promiscuous mode [ 959.705577][T29990] device bond_slave_1 left promiscuous mode [ 959.725581][T29990] device veth0_to_team left promiscuous mode [ 959.745478][T29990] device team_slave_0 left promiscuous mode [ 959.765424][T29990] device veth1_to_team left promiscuous mode [ 959.786523][T29990] device team_slave_1 left promiscuous mode [ 959.803685][T29990] device veth0_to_batadv left promiscuous mode [ 959.823845][T29990] device batadv_slave_0 left promiscuous mode [ 959.844412][T29990] device veth1_to_batadv left promiscuous mode [ 959.879849][T29990] device batadv_slave_1 left promiscuous mode [ 959.907744][T29990] device xfrm0 left promiscuous mode [ 959.947464][T29990] device veth0_to_hsr left promiscuous mode [ 959.972638][T29990] device hsr_slave_0 left promiscuous mode [ 959.986031][T29990] device veth1_to_hsr left promiscuous mode [ 960.009780][T29990] device hsr_slave_1 left promiscuous mode [ 960.034777][T29990] device veth1_virt_wifi left promiscuous mode [ 960.058063][T29990] device veth0_virt_wifi left promiscuous mode [ 960.069292][T29990] device veth0_macvtap left promiscuous mode [ 960.075660][T29990] device macsec0 left promiscuous mode [ 960.081360][T29990] device ipip0 left promiscuous mode [ 960.081577][ T30] kauditd_printk_skb: 108 callbacks suppressed [ 960.081593][ T30] audit: type=1326 audit(2000000768.882:20660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29998 comm="syz.1.11453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 960.086845][T29990] device sit1 left promiscuous mode [ 960.118271][ T30] audit: type=1326 audit(2000000768.920:20661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29998 comm="syz.1.11453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=282 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 960.122322][T29990] device syztnl1 left promiscuous mode [ 960.152022][T29990] device veth0 left promiscuous mode [ 960.157433][T29990] device veth1 left promiscuous mode [ 960.162814][ T30] audit: type=1326 audit(2000000768.948:20662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29998 comm="syz.1.11453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 960.197812][T29990] device veth2 left promiscuous mode [ 960.210287][T29990] device veth3 left promiscuous mode [ 960.215710][ T30] audit: type=1326 audit(2000000768.948:20663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29998 comm="syz.1.11453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 960.239918][T29990] device ip6gre1 left promiscuous mode [ 960.275692][ T30] audit: type=1326 audit(2000000768.948:20664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29998 comm="syz.1.11453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 960.299888][ T30] audit: type=1326 audit(2000000768.948:20665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29998 comm="syz.1.11453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 960.322102][T29990] device bridge1 left promiscuous mode [ 960.329355][T29990] device syzkaller0 left promiscuous mode [ 960.335776][ T30] audit: type=1326 audit(2000000768.948:20666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29998 comm="syz.1.11453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 960.336843][T29990] device bridge2 left promiscuous mode [ 960.360639][ T30] audit: type=1326 audit(2000000768.948:20667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29998 comm="syz.1.11453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 960.366099][T29990] device bridge3 left promiscuous mode [ 960.392635][ T30] audit: type=1326 audit(2000000768.985:20668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29998 comm="syz.1.11453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 960.395326][T29990] device bridge4 left promiscuous mode [ 960.424646][T29990] device veth4 left promiscuous mode [ 960.431363][T29990] device veth5 left promiscuous mode [ 960.438395][T29990] device ip6erspan0 left promiscuous mode [ 960.463766][T29990] device bridge5 left promiscuous mode [ 960.469906][T29990] device gretap1 left promiscuous mode [ 960.476154][T29990] device veth6 left promiscuous mode [ 960.483892][T29990] device veth7 left promiscuous mode [ 960.493484][T29990] device bridge6 left promiscuous mode [ 960.499621][T29990] device bridge7 left promiscuous mode [ 960.508043][T29990] device bridge8 left promiscuous mode [ 960.515236][T29990] device veth8 left promiscuous mode [ 960.535959][T29990] device veth9 left promiscuous mode [ 960.543888][ T30] audit: type=1326 audit(2000000768.985:20669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29998 comm="syz.1.11453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 960.583265][T29990] device ip6gre2 left promiscuous mode [ 960.591968][T29990] device syztnl0 left promiscuous mode [ 960.603152][T29990] device veth10 left promiscuous mode [ 960.608937][T29990] device veth11 left promiscuous mode [ 960.614815][T29990] device bridge9 left promiscuous mode [ 960.620598][T29990] device veth12 left promiscuous mode [ 960.626103][T29990] device veth13 left promiscuous mode [ 960.631799][T29990] device bridge10 left promiscuous mode [ 960.637477][T29990] device bridge11 left promiscuous mode [ 960.643323][T29990] device ip6tnl1 left promiscuous mode [ 960.648919][T29990] device bridge12 left promiscuous mode [ 960.654753][T29990] device bridge13 left promiscuous mode [ 960.660758][T29990] device gretap0 left promiscuous mode [ 960.666331][T29990] device veth14 left promiscuous mode [ 960.671955][T29990] device veth15 left promiscuous mode [ 960.677469][T29990] device gre1 left promiscuous mode [ 960.682889][T29990] device bridge14 left promiscuous mode [ 960.688873][T29990] device bridge15 left promiscuous mode [ 960.694745][T29990] device bridge16 left promiscuous mode [ 960.700481][T29990] device veth16 left promiscuous mode [ 960.706186][T29990] device veth17 left promiscuous mode [ 960.711730][T29990] device veth18 left promiscuous mode [ 960.717657][T29990] device veth19 left promiscuous mode [ 960.723201][T29990] device ip6gre3 left promiscuous mode [ 960.729084][T29990] device veth20 left promiscuous mode [ 960.734634][T29990] device veth21 left promiscuous mode [ 960.740610][T29990] device veth22 left promiscuous mode [ 960.746276][T29990] device veth23 left promiscuous mode [ 960.751826][T29990] device veth24 left promiscuous mode [ 960.757308][T29990] device veth25 left promiscuous mode [ 960.762864][T29990] device ip6gre4 left promiscuous mode [ 960.768490][T29990] device gretap2 left promiscuous mode [ 960.774088][T29990] device bridge17 left promiscuous mode [ 960.779715][T29990] device bridge18 left promiscuous mode [ 960.785378][T29990] device ip6gre5 left promiscuous mode [ 960.790989][T29990] device sit2 left promiscuous mode [ 960.796346][T29990] device ipip1 left promiscuous mode [ 960.802085][T29990] device veth26 left promiscuous mode [ 960.808075][T29990] device veth27 left promiscuous mode [ 960.814270][T29990] device bridge0 left promiscuous mode [ 960.820362][T29990] device vlan0 left promiscuous mode [ 960.825818][T29990] device bridge_slave_0 left promiscuous mode [ 961.005416][T29993] device veth1_macvtap left promiscuous mode [ 961.019712][T29993] device veth1_macvtap entered promiscuous mode [ 961.070559][T29997] netlink: 96 bytes leftover after parsing attributes in process `syz.4.11452'. [ 961.090328][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 961.098954][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 961.107523][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 961.115821][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 961.125493][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 961.135463][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 961.149671][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 961.158612][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 961.167482][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 961.177279][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 961.186041][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 961.237984][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 961.247860][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 961.257325][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 961.266226][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 961.275760][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 961.284748][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 962.331172][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 962.346705][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 962.356328][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 962.365603][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 962.381049][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 962.433642][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 962.486864][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 962.496868][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 962.585721][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 962.728458][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 962.738186][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 962.747525][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 962.755652][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 962.763638][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 962.771790][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 962.781854][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth7: link becomes ready [ 962.790195][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [ 962.798177][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth9: link becomes ready [ 962.806463][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth8: link becomes ready [ 962.814560][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth11: link becomes ready [ 962.823018][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready [ 962.831170][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth13: link becomes ready [ 962.839217][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready [ 962.847512][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth15: link becomes ready [ 962.855869][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth14: link becomes ready [ 962.864568][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth17: link becomes ready [ 962.873219][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth16: link becomes ready [ 962.881160][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth19: link becomes ready [ 962.889583][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth18: link becomes ready [ 962.898173][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth21: link becomes ready [ 962.906700][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready [ 962.914831][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth23: link becomes ready [ 962.923203][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth22: link becomes ready [ 962.931458][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth25: link becomes ready [ 962.939750][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth24: link becomes ready [ 962.947784][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth27: link becomes ready [ 962.956094][ T567] IPv6: ADDRCONF(NETDEV_CHANGE): veth26: link becomes ready [ 970.133998][T30079] netlink: 36 bytes leftover after parsing attributes in process `syz.0.11476'. [ 970.144693][T30079] netlink: 36 bytes leftover after parsing attributes in process `syz.0.11476'. [ 971.236535][ T30] kauditd_printk_skb: 27 callbacks suppressed [ 971.236579][ T30] audit: type=1326 audit(2000000779.321:20697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30096 comm="syz.1.11484" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 971.271914][ T30] audit: type=1326 audit(2000000779.349:20698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30096 comm="syz.1.11484" exe="/root/syz-executor" sig=0 arch=c000003e syscall=282 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 971.298736][ T30] audit: type=1326 audit(2000000779.377:20699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30096 comm="syz.1.11484" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 971.336216][ T30] audit: type=1326 audit(2000000779.405:20700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30096 comm="syz.1.11484" exe="/root/syz-executor" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 971.361262][ T30] audit: type=1326 audit(2000000779.415:20701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30096 comm="syz.1.11484" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 971.432001][ T30] audit: type=1326 audit(2000000779.415:20702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30096 comm="syz.1.11484" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 971.555638][ T30] audit: type=1326 audit(2000000779.415:20703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30096 comm="syz.1.11484" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 971.593022][ T30] audit: type=1326 audit(2000000779.415:20704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30096 comm="syz.1.11484" exe="/root/syz-executor" sig=0 arch=c000003e syscall=294 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 971.651704][ T30] audit: type=1326 audit(2000000779.415:20705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30096 comm="syz.1.11484" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 971.761129][ T30] audit: type=1326 audit(2000000779.415:20706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30096 comm="syz.1.11484" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 971.824664][T30110] device lo left promiscuous mode [ 971.864303][T30110] device tunl0 left promiscuous mode [ 971.884168][T30110] device gre0 left promiscuous mode [ 971.918515][T30110] device erspan0 left promiscuous mode [ 971.940950][T30110] device ip_vti0 left promiscuous mode [ 971.947627][T30110] device sit0 left promiscuous mode [ 971.956745][T30110] device ip6tnl0 left promiscuous mode [ 971.963047][T30110] device ip6gre0 left promiscuous mode [ 971.969269][T30110] device ip6gretap0 left promiscuous mode [ 971.976735][T30110] device dummy0 left promiscuous mode [ 971.983812][T30110] device veth0 left promiscuous mode [ 971.989960][T30110] device veth1 left promiscuous mode [ 971.996457][T30110] device wg0 left promiscuous mode [ 972.012666][T30110] device wg1 left promiscuous mode [ 972.019293][T30110] device veth0_to_bridge left promiscuous mode [ 972.032843][T30110] device bridge_slave_0 left promiscuous mode [ 972.049502][T30110] device veth1_to_bridge left promiscuous mode [ 972.066078][T30110] device bridge_slave_1 left promiscuous mode [ 972.090988][T30110] device veth1_to_bond left promiscuous mode [ 972.110789][T30110] device bond_slave_1 left promiscuous mode [ 972.126244][T30110] device veth0_to_team left promiscuous mode [ 972.142370][T30110] device team_slave_0 left promiscuous mode [ 972.157259][T30110] device veth1_to_team left promiscuous mode [ 972.164109][T30110] device team_slave_1 left promiscuous mode [ 972.170585][T30110] device veth0_to_batadv left promiscuous mode [ 972.177531][T30110] device batadv_slave_0 left promiscuous mode [ 972.184326][T30110] device veth1_to_batadv left promiscuous mode [ 972.191495][T30110] device batadv_slave_1 left promiscuous mode [ 972.198471][T30110] device xfrm0 left promiscuous mode [ 972.204432][T30110] device veth0_to_hsr left promiscuous mode [ 972.223231][T30110] device hsr_slave_0 left promiscuous mode [ 972.351139][T30110] device veth1_to_hsr left promiscuous mode [ 972.559903][T30110] device hsr_slave_1 left promiscuous mode [ 972.651074][T30110] device veth1_vlan left promiscuous mode [ 972.678971][T30110] device vlan0 left promiscuous mode [ 972.684903][T30110] device vlan1 left promiscuous mode [ 972.712561][T30110] tipc: Resetting bearer [ 972.736911][T30110] device sit1 left promiscuous mode [ 972.750427][T30110] device bridge1 left promiscuous mode [ 972.778835][T30110] device bridge2 left promiscuous mode [ 972.803343][T30110] device bridge3 left promiscuous mode [ 972.815652][T30110] device bridge4 left promiscuous mode [ 972.830051][T30110] device bridge5 left promiscuous mode [ 972.852795][T30110] device bridge6 left promiscuous mode [ 972.872275][T30110] device bridge7 left promiscuous mode [ 972.891075][T30110] device veth2 left promiscuous mode [ 972.907029][T30110] device veth3 left promiscuous mode [ 972.924817][T30110] device bridge8 left promiscuous mode [ 972.943682][T30110] device bridge9 left promiscuous mode [ 972.961285][T30110] device veth4 left promiscuous mode [ 973.010676][T30110] device veth5 left promiscuous mode [ 973.020026][T30110] device ip6gre1 left promiscuous mode [ 973.035311][T30110] device bridge10 left promiscuous mode [ 973.053053][T30110] device veth6 left promiscuous mode [ 973.059544][T30110] device veth7 left promiscuous mode [ 973.081239][T30110] device bridge11 left promiscuous mode [ 973.087892][T30110] device syztnl0 left promiscuous mode [ 973.095908][T30110] device bridge12 left promiscuous mode [ 973.106917][T30110] device veth8 left promiscuous mode [ 973.113144][T30110] device veth9 left promiscuous mode [ 973.119811][T30110] device ip6tnl1 left promiscuous mode [ 973.129970][T30110] device ip6gre2 left promiscuous mode [ 973.138009][T30110] device bridge0 left promiscuous mode [ 973.144294][T30110] device gretap1 left promiscuous mode [ 973.156183][T30110] device macsec1 left promiscuous mode [ 973.164559][T30110] device vti0 left promiscuous mode [ 973.178980][T30110] device veth10 left promiscuous mode [ 973.186360][T30110] device veth11 left promiscuous mode [ 973.197624][T30110] device veth12 left promiscuous mode [ 973.209054][T30110] device veth13 left promiscuous mode [ 973.222357][T30110] device bridge13 left promiscuous mode [ 973.249141][T30119] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 974.565245][T30131] netlink: 36 bytes leftover after parsing attributes in process `syz.5.11493'. [ 974.575035][T30131] netlink: 36 bytes leftover after parsing attributes in process `syz.5.11493'. [ 974.883436][T30139] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11496'. [ 975.070596][T30144] tipc: Enabling of bearer rejected, already enabled [ 975.182025][T30149] xt_hashlimit: max too large, truncated to 1048576 [ 977.294426][T30182] netlink: 40 bytes leftover after parsing attributes in process `syz.2.11507'. [ 978.643819][T30194] syz.2.11510[30194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 978.643906][T30194] syz.2.11510[30194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 979.752667][T30200] tipc: Resetting bearer [ 980.282990][ T30] kauditd_printk_skb: 1762 callbacks suppressed [ 980.283008][ T30] audit: type=1326 audit(2000000787.777:22469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30202 comm="syz.1.11525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 980.321184][ T30] audit: type=1326 audit(2000000787.824:22470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30202 comm="syz.1.11525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 981.118664][ T30] audit: type=1326 audit(2000000788.563:22471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30233 comm="syz.2.11524" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 981.163223][ T30] audit: type=1326 audit(2000000788.591:22472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30233 comm="syz.2.11524" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 981.216517][ T30] audit: type=1326 audit(2000000788.591:22473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30233 comm="syz.2.11524" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 981.274908][ T30] audit: type=1326 audit(2000000788.591:22474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30233 comm="syz.2.11524" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 981.324546][ T30] audit: type=1326 audit(2000000788.591:22475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30233 comm="syz.2.11524" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 981.450052][ T30] audit: type=1326 audit(2000000788.591:22476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30233 comm="syz.2.11524" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 981.495645][ T30] audit: type=1326 audit(2000000788.591:22477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30233 comm="syz.2.11524" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 981.584488][ T30] audit: type=1326 audit(2000000788.591:22478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30233 comm="syz.2.11524" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 982.045346][T30241] xt_CT: You must specify a L4 protocol and not use inversions on it [ 982.247110][T30262] device lo left promiscuous mode [ 982.256371][T30262] device tunl0 left promiscuous mode [ 982.263019][T30262] device gre0 left promiscuous mode [ 982.288922][T30262] device ip_vti0 left promiscuous mode [ 982.302363][T30262] device sit0 left promiscuous mode [ 982.309276][T30262] device ip6tnl0 left promiscuous mode [ 982.369625][T30262] device ip6gre0 left promiscuous mode [ 982.375934][T30262] device ip6gretap0 left promiscuous mode [ 982.386483][T30262] device dummy0 left promiscuous mode [ 982.407565][T30262] device wg0 left promiscuous mode [ 982.424202][T30262] device wg1 left promiscuous mode [ 982.430403][T30262] device wg2 left promiscuous mode [ 982.436314][T30262] device veth0_to_bridge left promiscuous mode [ 982.451429][T30262] device veth1_to_bridge left promiscuous mode [ 982.463410][T30262] device bridge_slave_1 left promiscuous mode [ 982.475759][T30262] device veth0_to_bond left promiscuous mode [ 982.494800][T30262] device bond_slave_0 left promiscuous mode [ 982.501789][T30262] device veth1_to_bond left promiscuous mode [ 982.514709][T30262] device bond_slave_1 left promiscuous mode [ 982.534713][T30262] device veth0_to_team left promiscuous mode [ 982.554047][T30262] device team_slave_0 left promiscuous mode [ 982.573353][T30262] device veth1_to_team left promiscuous mode [ 982.588192][T30262] device team_slave_1 left promiscuous mode [ 982.598879][T30262] device veth0_to_batadv left promiscuous mode [ 982.651604][T30262] device batadv_slave_0 left promiscuous mode [ 982.660562][T30262] device xfrm0 left promiscuous mode [ 982.672502][T30262] device veth0_to_hsr left promiscuous mode [ 982.680581][T30262] device hsr_slave_0 left promiscuous mode [ 982.687515][T30262] device veth1_to_hsr left promiscuous mode [ 983.216228][T30262] device hsr_slave_1 left promiscuous mode [ 983.223071][T30262] device veth2 left promiscuous mode [ 983.229988][T30262] device veth3 left promiscuous mode [ 983.236471][T30262] device bridge1 left promiscuous mode [ 983.242679][T30262] device gre1 left promiscuous mode [ 983.253450][T30262] device veth0 left promiscuous mode [ 983.259756][T30262] device veth1 left promiscuous mode [ 983.266443][T30262] device bridge2 left promiscuous mode [ 983.275812][T30262] device bridge3 left promiscuous mode [ 983.284435][T30262] device syztnl1 left promiscuous mode [ 983.294410][T30262] device bridge4 left promiscuous mode [ 983.302731][T30262] device veth4 left promiscuous mode [ 983.431601][T30262] device veth5 left promiscuous mode [ 983.685359][T30262] device bridge5 left promiscuous mode [ 983.691538][T30262] device bridge6 left promiscuous mode [ 983.697709][T30262] device bridge7 left promiscuous mode [ 983.703966][T30262] device ip6gre1 left promiscuous mode [ 983.740984][T30262] device veth6 left promiscuous mode [ 983.747118][T30262] device veth7 left promiscuous mode [ 983.753312][T30262] device gre2 left promiscuous mode [ 983.763342][T30262] device vlan2 left promiscuous mode [ 983.773764][T30262] device bridge8 left promiscuous mode [ 983.784033][T30262] device sit1 left promiscuous mode [ 983.796910][T30262] device bridge9 left promiscuous mode [ 983.804778][T30262] device bridge10 left promiscuous mode [ 983.866234][T30285] netlink: 56 bytes leftover after parsing attributes in process `syz.0.11538'. [ 983.887358][T30262] device bridge11 left promiscuous mode [ 983.917956][T30262] device ip6tnl1 left promiscuous mode [ 983.948639][T30262] device bridge12 left promiscuous mode [ 983.979028][T30262] device veth8 left promiscuous mode [ 984.008058][T30262] device veth9 left promiscuous mode [ 984.023283][T30262] device bridge13 left promiscuous mode [ 984.029551][T30262] device bridge14 left promiscuous mode [ 984.035791][T30262] device bridge15 left promiscuous mode [ 984.041983][T30262] device veth10 left promiscuous mode [ 984.048196][T30262] device veth11 left promiscuous mode [ 984.054571][T30262] device ip6gre2 left promiscuous mode [ 984.060521][T30262] device ip6gre3 left promiscuous mode [ 984.066752][T30262] device bridge16 left promiscuous mode [ 984.072943][T30262] device ip6erspan0 left promiscuous mode [ 984.079200][T30262] device veth12 left promiscuous mode [ 984.085442][T30262] device veth13 left promiscuous mode [ 984.091532][T30262] device veth14 left promiscuous mode [ 984.097794][T30262] device veth15 left promiscuous mode [ 984.104748][T30262] device veth16 left promiscuous mode [ 984.114777][T30262] device veth17 left promiscuous mode [ 984.121249][T30262] device bridge17 left promiscuous mode [ 984.127687][T30262] device sit2 left promiscuous mode [ 984.133375][T30262] device veth18 left promiscuous mode [ 984.139722][T30262] device veth19 left promiscuous mode [ 984.145844][T30262] device veth20 left promiscuous mode [ 984.152186][T30262] device veth21 left promiscuous mode [ 984.158791][T30262] device sit3 left promiscuous mode [ 984.164434][T30262] device veth22 left promiscuous mode [ 984.170768][T30262] device veth23 left promiscuous mode [ 984.176812][T30262] device veth24 left promiscuous mode [ 984.182985][T30262] device veth25 left promiscuous mode [ 984.189109][T30262] device erspan0.1 left promiscuous mode [ 984.195233][T30262] device erspan0 left promiscuous mode [ 984.201195][T30262] device macsec1 left promiscuous mode [ 984.207201][T30262] device sit4 left promiscuous mode [ 984.213334][T30262] device bridge18 left promiscuous mode [ 984.219508][T30262] device bridge19 left promiscuous mode [ 984.225922][T30262] device ipip0 left promiscuous mode [ 984.231633][T30262] device vlan0 left promiscuous mode [ 984.237310][T30262] device bridge_slave_0 left promiscuous mode [ 984.243899][T30262] device veth26 left promiscuous mode [ 984.250098][T30262] device veth27 left promiscuous mode [ 987.496244][T30322] xt_CT: You must specify a L4 protocol and not use inversions on it [ 990.616051][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 990.616067][ T30] audit: type=1326 audit(2000000797.440:22509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30337 comm="syz.4.11555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 990.765993][T30338] SELinux: Context system_u:object_r:netcontrol_device_t:s0 is not valid (left unmapped). [ 990.819132][ T30] audit: type=1326 audit(2000000797.440:22510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30337 comm="syz.4.11555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 991.427699][ T30] audit: type=1326 audit(2000000797.440:22511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30337 comm="syz.4.11555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 991.999354][ T30] audit: type=1326 audit(2000000797.449:22512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30337 comm="syz.4.11555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 992.096263][ T30] audit: type=1326 audit(2000000797.449:22513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30337 comm="syz.4.11555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 992.120413][ T30] audit: type=1326 audit(2000000797.449:22514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30337 comm="syz.4.11555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 992.144641][ T30] audit: type=1326 audit(2000000797.590:22515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30337 comm="syz.4.11555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=188 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 992.169048][ T30] audit: type=1400 audit(2000000797.608:22516): avc: denied { relabelto } for pid=30337 comm="syz.4.11555" name="file0" dev="tmpfs" ino=11781 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:netcontrol_device_t:s0" [ 992.214720][ T30] audit: type=1400 audit(2000000797.608:22517): avc: denied { associate } for pid=30337 comm="syz.4.11555" name="file0" dev="tmpfs" ino=11781 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:netcontrol_device_t:s0" [ 992.284496][ T30] audit: type=1326 audit(2000000797.608:22518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30337 comm="syz.4.11555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 992.803375][T30369] netlink: 56 bytes leftover after parsing attributes in process `syz.2.11563'. [ 994.361518][T30387] tipc: Failed to remove unknown binding: 66,1,1/2886997007:1092729105/1092729107 [ 994.376664][T30387] tipc: Failed to remove unknown binding: 66,1,1/2886997007:1092729105/1092729107 [ 994.392094][T30387] netlink: 40 bytes leftover after parsing attributes in process `syz.5.11568'. [ 994.486897][T30402] netlink: 8 bytes leftover after parsing attributes in process `syz.2.11576'. [ 996.901676][T30428] netlink: 80 bytes leftover after parsing attributes in process `syz.5.11583'. [ 998.832386][ T30] kauditd_printk_skb: 33 callbacks suppressed [ 998.832402][ T30] audit: type=1326 audit(2000000805.129:22552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30464 comm="syz.5.11596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 999.303313][ T30] audit: type=1326 audit(2000000805.129:22553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30464 comm="syz.5.11596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 999.928133][ T30] audit: type=1326 audit(2000000805.129:22554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30464 comm="syz.5.11596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 999.953081][ T30] audit: type=1326 audit(2000000805.129:22555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30464 comm="syz.5.11596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 999.999796][ T30] audit: type=1326 audit(2000000805.129:22556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30464 comm="syz.5.11596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1000.065950][ T30] audit: type=1326 audit(2000000805.129:22557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30464 comm="syz.5.11596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1000.094758][ T30] audit: type=1326 audit(2000000805.363:22558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30464 comm="syz.5.11596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1000.118712][T30469] netlink: 80 bytes leftover after parsing attributes in process `syz.4.11597'. [ 1000.129283][ T30] audit: type=1326 audit(2000000805.382:22559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30464 comm="syz.5.11596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1000.153177][T30462] tmpfs: Unexpected value for 'inode32' [ 1000.156750][T30480] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 1000.159403][ T30] audit: type=1326 audit(2000000805.784:22560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30464 comm="syz.5.11596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1000.199825][ T30] audit: type=1326 audit(2000000805.802:22561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30464 comm="syz.5.11596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7ff06df05f03 code=0x7ffc0000 [ 1000.753204][T30482] netlink: 116 bytes leftover after parsing attributes in process `syz.4.11601'. [ 1001.202979][T30499] SELinux: security_context_str_to_sid(unconfined_u) failed for (dev ?, type ?) errno=-22 [ 1001.213160][T30499] tmpfs: Unknown parameter 'nolazytimeff' [ 1001.644981][T30503] lo: Caught tx_queue_len zero misconfig [ 1003.260634][T30528] netlink: 80 bytes leftover after parsing attributes in process `syz.0.11612'. [ 1007.144092][T30554] lo: Caught tx_queue_len zero misconfig [ 1007.149876][T30554] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1008.302886][T30560] netlink: 116 bytes leftover after parsing attributes in process `syz.1.11621'. [ 1008.393451][T30569] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=30569 comm=syz.2.11625 [ 1008.415984][T30569] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11625'. [ 1009.730059][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 1009.730079][ T30] audit: type=1326 audit(2000000815.315:22590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30604 comm="syz.0.11637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1009.805341][ T30] audit: type=1326 audit(2000000815.315:22591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30604 comm="syz.0.11637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1009.829265][ T30] audit: type=1326 audit(2000000815.315:22592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30604 comm="syz.0.11637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1009.855932][ T30] audit: type=1326 audit(2000000815.315:22593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30604 comm="syz.0.11637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1009.880653][ T30] audit: type=1326 audit(2000000815.315:22594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30604 comm="syz.0.11637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1009.914459][T30612] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=30612 comm=syz.4.11640 [ 1009.929765][T30612] netlink: 4 bytes leftover after parsing attributes in process `syz.4.11640'. [ 1009.939289][ T30] audit: type=1326 audit(2000000815.325:22595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30604 comm="syz.0.11637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1010.024793][ T30] audit: type=1326 audit(2000000815.325:22596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30604 comm="syz.0.11637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f9010b18f03 code=0x7ffc0000 [ 1010.142690][ T30] audit: type=1326 audit(2000000815.325:22597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30604 comm="syz.0.11637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1010.363052][ T30] audit: type=1326 audit(2000000815.325:22598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30604 comm="syz.0.11637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1011.285923][ T30] audit: type=1326 audit(2000000815.325:22599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30604 comm="syz.0.11637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1012.252061][T30632] device bridge0 entered promiscuous mode [ 1020.593376][T30715] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 1020.613144][T30719] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11670'. [ 1023.146758][T30743] overlayfs: failed to clone upperpath [ 1024.255366][T30760] 9pnet: p9_errstr2errno: server reported unknown error 184467440737095 [ 1027.385024][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1027.385148][ T30] audit: type=1326 audit(2000000831.030:22605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30778 comm="syz.0.11694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1027.934894][ T30] audit: type=1326 audit(2000000831.030:22606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30778 comm="syz.0.11694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1027.984584][ T30] audit: type=1326 audit(2000000831.133:22607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30778 comm="syz.0.11694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1028.008452][ T30] audit: type=1326 audit(2000000831.133:22608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30778 comm="syz.0.11694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1028.032223][ T30] audit: type=1326 audit(2000000831.133:22609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30778 comm="syz.0.11694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1028.077843][ T30] audit: type=1326 audit(2000000831.227:22610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30778 comm="syz.0.11694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1028.119980][ T30] audit: type=1326 audit(2000000831.227:22611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30778 comm="syz.0.11694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1029.005987][ T30] audit: type=1326 audit(2000000831.227:22612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30778 comm="syz.0.11694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1029.030431][ T30] audit: type=1326 audit(2000000831.330:22613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30778 comm="syz.0.11694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=249 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1029.742704][ T30] audit: type=1326 audit(2000000831.330:22614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30778 comm="syz.0.11694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1034.593908][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1034.593925][ T30] audit: type=1326 audit(2000001094.582:22616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30854 comm="syz.0.11712" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1034.691468][ T30] audit: type=1326 audit(2000001094.656:22617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30854 comm="syz.0.11712" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1034.730371][ T30] audit: type=1326 audit(2000001094.656:22618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30854 comm="syz.0.11712" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1034.775032][ T30] audit: type=1326 audit(2000001094.656:22619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30854 comm="syz.0.11712" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1034.800383][ T30] audit: type=1326 audit(2000001094.656:22620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30854 comm="syz.0.11712" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1034.826112][ T30] audit: type=1326 audit(2000001094.656:22621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30854 comm="syz.0.11712" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1034.850306][ T30] audit: type=1326 audit(2000001094.656:22622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30854 comm="syz.0.11712" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1035.866208][ T30] audit: type=1326 audit(2000001094.656:22623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30854 comm="syz.0.11712" exe="/root/syz-executor" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1036.933435][T30887] netlink: 116 bytes leftover after parsing attributes in process `syz.5.11721'. [ 1036.944543][T30880] netlink: 108 bytes leftover after parsing attributes in process `syz.1.11730'. [ 1037.220153][T30891] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11723'. [ 1038.630518][ T30] audit: type=1326 audit(2000001098.361:22624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30906 comm="syz.2.11729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1038.672374][ T30] audit: type=1326 audit(2000001098.361:22625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30906 comm="syz.2.11729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1040.687731][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1040.687749][ T30] audit: type=1326 audit(2000001100.278:22629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30956 comm="syz.2.11744" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1041.577779][ T30] audit: type=1326 audit(2000001100.316:22630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30956 comm="syz.2.11744" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1041.731337][ T30] audit: type=1326 audit(2000001100.316:22631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30956 comm="syz.2.11744" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1042.744108][ T30] audit: type=1326 audit(2000001100.316:22632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30956 comm="syz.2.11744" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1042.769595][ T30] audit: type=1326 audit(2000001100.316:22633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30956 comm="syz.2.11744" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1042.793446][ T30] audit: type=1326 audit(2000001100.316:22634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30956 comm="syz.2.11744" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1042.942183][ T30] audit: type=1326 audit(2000001100.325:22635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30956 comm="syz.2.11744" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1043.396603][ T30] audit: type=1326 audit(2000001100.325:22636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30956 comm="syz.2.11744" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1043.470550][ T30] audit: type=1326 audit(2000001100.325:22637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30956 comm="syz.2.11744" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1043.496172][ T30] audit: type=1326 audit(2000001100.325:22638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30956 comm="syz.2.11744" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1048.810269][T31060] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11771'. [ 1053.454831][T31143] overlayfs: missing 'lowerdir' [ 1053.524086][T31140] netlink: 116 bytes leftover after parsing attributes in process `syz.5.11796'. [ 1053.655680][T31145] incfs: Error accessing: ./file0. [ 1053.661127][T31145] incfs: mount failed -2 [ 1057.167679][T31201] overlayfs: './file0' not a directory [ 1058.437406][T31230] syz.5.11822[31230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1058.438158][T31230] syz.5.11822[31230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1060.211230][T31243] overlayfs: failed to clone upperpath [ 1060.684680][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 1060.684695][ T30] audit: type=1326 audit(2000001118.997:22676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31268 comm="syz.4.11835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1061.018005][ T30] audit: type=1326 audit(2000001119.063:22677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31268 comm="syz.4.11835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=235 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1061.046319][ T30] audit: type=1326 audit(2000001119.063:22678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31268 comm="syz.4.11835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1061.070499][ T30] audit: type=1326 audit(2000001119.063:22679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31268 comm="syz.4.11835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1062.102592][ T30] audit: type=1326 audit(2000001120.064:22680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31277 comm="syz.5.11838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1062.131537][ T30] audit: type=1326 audit(2000001120.064:22681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31277 comm="syz.5.11838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1062.155898][ T30] audit: type=1326 audit(2000001120.064:22682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31277 comm="syz.5.11838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1062.186830][ T30] audit: type=1326 audit(2000001120.064:22683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31277 comm="syz.5.11838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1062.234795][T31293] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11843'. [ 1062.252552][ T30] audit: type=1326 audit(2000001120.064:22684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31277 comm="syz.5.11838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1062.276848][ T30] audit: type=1326 audit(2000001120.073:22685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31277 comm="syz.5.11838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1066.141814][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1066.153620][ T30] audit: type=1326 audit(2000001123.843:22691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31332 comm="syz.1.11855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1066.722299][ T30] audit: type=1326 audit(2000001123.843:22692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31332 comm="syz.1.11855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1066.879703][ T30] audit: type=1326 audit(2000001123.852:22693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31332 comm="syz.1.11855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1066.903715][ T30] audit: type=1326 audit(2000001123.852:22694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31332 comm="syz.1.11855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1067.214226][ T30] audit: type=1326 audit(2000001123.852:22695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31332 comm="syz.1.11855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1067.256290][ T30] audit: type=1326 audit(2000001123.852:22696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31332 comm="syz.1.11855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1067.309652][ T30] audit: type=1326 audit(2000001123.852:22697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31332 comm="syz.1.11855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1067.373850][ T30] audit: type=1326 audit(2000001123.852:22698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31332 comm="syz.1.11855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1067.430142][ T30] audit: type=1326 audit(2000001123.861:22699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31332 comm="syz.1.11855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=249 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1067.499407][ T30] audit: type=1326 audit(2000001123.861:22700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31332 comm="syz.1.11855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1075.177746][T31441] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11883'. [ 1075.423154][T31439] overlayfs: failed to clone upperpath [ 1076.450308][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 1076.450348][ T30] audit: type=1326 audit(2000001133.702:22713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31452 comm="syz.4.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7fc00000 [ 1077.005341][T31461] netlink: 12 bytes leftover after parsing attributes in process `syz.5.11891'. [ 1077.081963][ T30] audit: type=1326 audit(2000001133.702:22714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31452 comm="syz.4.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe60ea21ec9 code=0x7fc00000 [ 1077.198004][ T30] audit: type=1326 audit(2000001133.702:22715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31452 comm="syz.4.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7fc00000 [ 1077.296607][ T30] audit: type=1326 audit(2000001133.711:22716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31452 comm="syz.4.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7fc00000 [ 1077.386931][T31484] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11895'. [ 1077.387569][ T30] audit: type=1326 audit(2000001133.721:22717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31452 comm="syz.4.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7fc00000 [ 1077.421805][T31484] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11895'. [ 1077.495121][ T30] audit: type=1326 audit(2000001133.721:22718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31452 comm="syz.4.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7fc00000 [ 1077.572665][ T30] audit: type=1326 audit(2000001133.721:22719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31452 comm="syz.4.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7fc00000 [ 1077.629156][ T30] audit: type=1326 audit(2000001133.721:22720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31452 comm="syz.4.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7fc00000 [ 1077.714311][ T30] audit: type=1326 audit(2000001133.721:22721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31452 comm="syz.4.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7fc00000 [ 1077.797230][ T30] audit: type=1326 audit(2000001133.721:22722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31452 comm="syz.4.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7fc00000 [ 1080.237922][T31502] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11904'. [ 1080.632488][T31506] batadv_slave_0: Caught tx_queue_len zero misconfig [ 1081.921028][T31530] netlink: 96 bytes leftover after parsing attributes in process `syz.1.11914'. [ 1082.326636][T31539] netlink: 12 bytes leftover after parsing attributes in process `syz.4.11918'. [ 1083.427677][T31562] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 1085.062179][T31586] syz.4.11931[31586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1085.062736][T31586] syz.4.11931[31586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1086.285486][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 1086.285508][ T30] audit: type=1400 audit(2000001142.934:22739): avc: denied { create } for pid=31593 comm="syz.5.11935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1087.069819][T31600] xt_NFQUEUE: number of total queues is 0 [ 1087.776972][T31606] netlink: 'syz.1.11949': attribute type 13 has an invalid length. [ 1088.644876][ T30] audit: type=1326 audit(2000001145.151:22740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31616 comm="syz.5.11941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1088.669919][ T30] audit: type=1326 audit(2000001145.170:22741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31616 comm="syz.5.11941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1088.698909][ T30] audit: type=1326 audit(2000001145.170:22742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31616 comm="syz.5.11941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1088.731838][T31615] netlink: 'syz.4.11940': attribute type 12 has an invalid length. [ 1088.733865][ T30] audit: type=1326 audit(2000001145.179:22743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31616 comm="syz.5.11941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1088.791689][T31621] No source specified [ 1088.901779][ T30] audit: type=1326 audit(2000001145.179:22744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31616 comm="syz.5.11941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1088.992407][ T30] audit: type=1326 audit(2000001145.179:22745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31616 comm="syz.5.11941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1089.061740][ T30] audit: type=1326 audit(2000001145.179:22746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31616 comm="syz.5.11941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1089.119988][ T30] audit: type=1326 audit(2000001145.179:22747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31616 comm="syz.5.11941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1089.169978][ T30] audit: type=1326 audit(2000001145.301:22748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31616 comm="syz.5.11941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1089.927585][T31641] netlink: 'syz.5.11948': attribute type 13 has an invalid length. [ 1089.972553][T31641] 1{X: refused to change device tx_queue_len [ 1089.979934][T31641] A link change request failed with some changes committed already. Interface 31{X may have been left with an inconsistent configuration, please check. [ 1090.944643][T31647] overlayfs: failed to clone upperpath [ 1090.953610][T31647] overlayfs: failed to clone upperpath [ 1091.074695][T31657] ------------[ cut here ]------------ [ 1091.111847][T31657] WARNING: CPU: 0 PID: 31657 at mm/page_alloc.c:5783 __alloc_pages+0x376/0x440 [ 1091.142427][T31657] Modules linked in: [ 1091.154935][T31657] CPU: 0 PID: 31657 Comm: syz.4.11951 Tainted: G W syzkaller #0 [ 1091.182893][T31657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1091.214582][T31657] RIP: 0010:__alloc_pages+0x376/0x440 [ 1091.231759][T31657] Code: ff e8 4e d4 00 03 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c 75 fd ff ff 41 89 ff 4c 89 e7 e8 c2 c1 04 00 44 89 ff e9 62 fd ff ff <0f> 0b e9 1f ff ff ff 65 8b 05 74 95 5f 7e 89 44 24 08 c1 e8 06 48 [ 1091.292694][T31657] RSP: 0018:ffffc90000bb78e0 EFLAGS: 00010246 [ 1091.311845][T31657] RAX: ffffc90000bb7940 RBX: 000000000000000f RCX: 0000000000000000 [ 1091.336807][T31657] RDX: 0000000000000018 RSI: 0000000000000000 RDI: ffffc90000bb7958 [ 1091.361798][T31657] RBP: ffffc90000bb79c8 R08: dffffc0000000000 R09: ffffc90000bb7940 [ 1091.386944][T31657] R10: fffff52000176f2b R11: 1ffff92000176f28 R12: ffffc90000bb7920 [ 1091.411789][T31657] R13: dffffc0000000000 R14: 1ffff92000176f20 R15: 0000000000000000 [ 1091.436724][T31657] FS: 00007fe60d4486c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1091.464561][T31657] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1091.485193][T31657] CR2: ffffffff80000000 CR3: 000000012f635000 CR4: 00000000003506b0 [ 1091.510300][T31657] Call Trace: [ 1091.521171][T31657] [ 1091.530601][T31657] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1091.550233][T31657] ? prep_new_page+0x110/0x110 [ 1091.565251][T31657] kmalloc_order+0x4c/0x160 [ 1091.570474][T31657] kmalloc_order_trace+0x18/0xb0 [ 1091.575460][T31657] __kmalloc+0x199/0x2c0 [ 1091.579808][T31657] incfs_realloc_mount_info+0x99/0x440 [ 1091.585310][T31657] incfs_alloc_mount_info+0x476/0x540 [ 1091.590810][T31657] incfs_mount_fs+0x3c6/0x880 [ 1091.595514][T31657] ? incfs_unlink+0x90/0x90 [ 1091.600090][T31657] ? selinux_sb_eat_lsm_opts+0xa6b/0xbf0 [ 1091.605746][T31657] legacy_get_tree+0xed/0x190 [ 1091.610591][T31657] ? incfs_unlink+0x90/0x90 [ 1091.615123][T31657] vfs_get_tree+0x89/0x260 [ 1091.619576][T31657] do_new_mount+0x25a/0xa20 [ 1091.624187][T31657] path_mount+0x675/0x1020 [ 1091.628637][T31657] ? user_path_at_empty+0x161/0x1c0 [ 1091.633966][T31657] __se_sys_mount+0x318/0x380 [ 1091.638679][T31657] ? __x64_sys_mount+0xd0/0xd0 [ 1091.645559][T31657] ? __bpf_trace_sys_enter+0x62/0x70 [ 1091.650923][T31657] __x64_sys_mount+0xbf/0xd0 [ 1091.724304][T31657] x64_sys_call+0x6bf/0x9a0 [ 1091.734446][T31657] do_syscall_64+0x4c/0xa0 [ 1091.744785][T31657] ? clear_bhb_loop+0x50/0xa0 [ 1091.768287][T31657] ? clear_bhb_loop+0x50/0xa0 [ 1091.809570][T31657] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1092.156794][T31657] RIP: 0033:0x7fe60ea21ec9 [ 1092.161275][T31657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1092.183691][T31657] RSP: 002b:00007fe60d448038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1092.227930][T31657] RAX: ffffffffffffffda RBX: 00007fe60ec79180 RCX: 00007fe60ea21ec9 [ 1092.237374][T31662] syz.2.11956[31662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1092.237463][T31662] syz.2.11956[31662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1092.252113][T31657] RDX: 0000200000000500 RSI: 0000200000000040 RDI: 0000200000000000 [ 1092.293183][T31657] RBP: 00007fe60eaa4f91 R08: 00002000000001c0 R09: 0000000000000000 [ 1092.309536][T31657] R10: 000000000000c802 R11: 0000000000000246 R12: 0000000000000000 [ 1092.318004][T31657] R13: 00007fe60ec79218 R14: 00007fe60ec79180 R15: 00007fff02935a98 [ 1092.326349][T31657] [ 1092.329463][T31657] ---[ end trace 29104c28a288ff3e ]--- [ 1092.335037][T31657] incfs: Error allocating mount info. -12 [ 1092.341198][T31657] incfs: mount failed -12 [ 1093.363258][T31683] syz.5.11962[31683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1093.363386][T31683] syz.5.11962[31683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1095.722516][T31722] netlink: 8 bytes leftover after parsing attributes in process `syz.5.11972'. [ 1095.863595][T31722] netlink: 8 bytes leftover after parsing attributes in process `syz.5.11972'. [ 1096.094720][T31732] overlayfs: failed to clone lowerpath [ 1099.838614][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1099.838633][ T30] audit: type=1326 audit(2000001155.600:22750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31755 comm="syz.1.11980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1099.870192][ T30] audit: type=1326 audit(2000001155.600:22751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31755 comm="syz.1.11980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1099.894113][ T30] audit: type=1326 audit(2000001155.600:22752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31755 comm="syz.1.11980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1099.954776][ T30] audit: type=1326 audit(2000001155.600:22753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31755 comm="syz.1.11980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1100.043096][ T30] audit: type=1326 audit(2000001155.609:22754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31755 comm="syz.1.11980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1100.341150][T31774] xt_hashlimit: size too large, truncated to 1048576 [ 1100.355630][ T30] audit: type=1326 audit(2000001155.609:22755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31755 comm="syz.1.11980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1100.443786][ T30] audit: type=1326 audit(2000001155.609:22756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31755 comm="syz.1.11980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1100.494659][ T30] audit: type=1326 audit(2000001155.609:22757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31755 comm="syz.1.11980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1100.544677][ T30] audit: type=1326 audit(2000001155.609:22758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31755 comm="syz.1.11980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1100.615544][ T30] audit: type=1326 audit(2000001155.609:22759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31755 comm="syz.1.11980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1100.738777][T31777] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11986'. [ 1101.159236][T31796] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11990'. [ 1101.192005][T31796] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11990'. [ 1104.797019][T31825] overlayfs: failed to clone lowerpath [ 1105.153620][T31835] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 1105.165539][T31837] netlink: 'syz.0.12007': attribute type 13 has an invalid length. [ 1106.322411][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 1106.322430][ T30] audit: type=1326 audit(2000001161.689:22799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31845 comm="syz.1.12010" exe="/root/syz-executor" sig=31 arch=c000003e syscall=39 compat=0 ip=0x7f7262636d67 code=0x0 [ 1106.399485][T31848] tipc: Enabling of bearer rejected, already enabled [ 1106.439907][T31848] syzkaller0: Caught tx_queue_len zero misconfig [ 1107.452800][T31872] No source specified [ 1108.570948][T31893] overlayfs: failed to clone lowerpath [ 1110.263165][T31918] tipc: Enabling of bearer rejected, already enabled [ 1110.501346][T31929] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1110.732634][T31938] xt_hashlimit: size too large, truncated to 1048576 [ 1112.938111][T31973] netlink: 'syz.1.12047': attribute type 13 has an invalid length. [ 1113.091674][T31973] device gretap0 left promiscuous mode [ 1113.100799][T31973] gretap0: refused to change device tx_queue_len [ 1113.108017][T31973] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 1115.975790][T32010] tipc: Enabling of bearer rejected, already enabled [ 1117.746868][T32023] syz.0.12064[32023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1117.746989][T32023] syz.0.12064[32023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1117.867862][T32033] syz.4.12062[32033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1117.881599][T32033] syz.4.12062[32033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1121.145281][ T30] audit: type=1400 audit(2000001175.552:22800): avc: denied { mount } for pid=32035 comm="syz.4.12066" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 1121.179055][T32061] device wireguard0 entered promiscuous mode [ 1122.425426][T32080] syz.4.12076[32080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1122.425574][T32080] syz.4.12076[32080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1126.398537][T32130] netlink: 4 bytes leftover after parsing attributes in process `syz.5.12095'. [ 1126.464009][T32131] netlink: 'syz.2.12094': attribute type 6 has an invalid length. [ 1126.486915][T32131] IPv6: NLM_F_CREATE should be specified when creating new route [ 1126.514986][T32130] netlink: 4 bytes leftover after parsing attributes in process `syz.5.12095'. [ 1127.243387][T32146] netlink: 8 bytes leftover after parsing attributes in process `syz.2.12099'. [ 1127.254260][T32146] netlink: 8 bytes leftover after parsing attributes in process `syz.2.12099'. [ 1127.647226][T32152] overlayfs: failed to clone upperpath [ 1129.719143][T32174] xt_bpf: check failed: parse error [ 1135.743888][T32260] fuse: Invalid rootmode [ 1138.207281][T32291] syz.5.12139[32291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1138.209182][T32291] syz.5.12139[32291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1143.278780][T32330] xt_hashlimit: size too large, truncated to 1048576 [ 1144.598572][T32346] bridge: RTM_NEWNEIGH with invalid ether address [ 1144.668547][T32343] xt_CT: No such helper "pptp" [ 1145.058772][T32360] netlink: 'syz.0.12159': attribute type 13 has an invalid length. [ 1145.084911][T32360] gretap0: refused to change device tx_queue_len [ 1145.092295][T32360] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 1146.166902][T32367] xt_bpf: check failed: parse error [ 1146.183464][T32361] tipc: Enabling of bearer rejected, already enabled [ 1146.283864][T32370] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. [ 1146.565207][T32387] netlink: 12 bytes leftover after parsing attributes in process `syz.5.12169'. [ 1150.295271][T32423] xt_bpf: check failed: parse error [ 1152.364190][T32446] netlink: 'syz.1.12183': attribute type 6 has an invalid length. [ 1152.372143][T32446] IPv6: NLM_F_CREATE should be specified when creating new route [ 1152.942200][ T30] audit: type=1326 audit(2000001205.297:22801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32458 comm="syz.1.12190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1152.991193][ T30] audit: type=1326 audit(2000001205.297:22802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32458 comm="syz.1.12190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1153.047135][ T30] audit: type=1326 audit(2000001205.325:22803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32458 comm="syz.1.12190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1153.103367][ T30] audit: type=1326 audit(2000001205.335:22804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32458 comm="syz.1.12190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1153.146547][ T30] audit: type=1326 audit(2000001205.344:22805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32458 comm="syz.1.12190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1153.170498][ T30] audit: type=1326 audit(2000001205.372:22806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32458 comm="syz.1.12190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1153.197900][ T30] audit: type=1326 audit(2000001205.391:22807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32458 comm="syz.1.12190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1153.336973][ T30] audit: type=1326 audit(2000001205.391:22808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32458 comm="syz.1.12190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=221 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1153.416095][ T30] audit: type=1326 audit(2000001205.391:22809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32458 comm="syz.1.12190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1153.470638][ T30] audit: type=1326 audit(2000001205.391:22810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32458 comm="syz.1.12190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1157.784978][T32501] overlayfs: failed to clone upperpath [ 1159.539669][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 1159.554781][ T30] audit: type=1400 audit(2000001211.434:22848): avc: denied { map } for pid=32525 comm="syz.1.12209" path="socket:[112579]" dev="sockfs" ino=112579 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1162.190596][T32573] xt_limit: Overflow, try lower: 268435456/134217728 [ 1162.612442][T32578] xt_hashlimit: max too large, truncated to 1048576 [ 1162.970259][T32587] bridge: RTM_NEWNEIGH with invalid ether address [ 1164.080302][T32605] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1164.090666][T32605] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1165.193184][T32607] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12231'. [ 1170.546386][T32644] netlink: 8 bytes leftover after parsing attributes in process `syz.5.12242'. [ 1170.748570][T32644] IPv6: ADDRCONF(NETDEV_CHANGE): gre2: link becomes ready [ 1170.945721][T32647] netlink: 44 bytes leftover after parsing attributes in process `syz.5.12242'. [ 1171.002446][T32647] IPv6: ADDRCONF(NETDEV_CHANGE): gre2: link becomes ready [ 1171.191827][T32658] netlink: 12 bytes leftover after parsing attributes in process `syz.0.12247'. [ 1172.303213][T32674] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12252'. [ 1172.327778][T32674] netlink: 'syz.1.12252': attribute type 16 has an invalid length. [ 1172.345309][T32674] netlink: 'syz.1.12252': attribute type 17 has an invalid length. [ 1172.401547][T32674] device veth0_vlan left promiscuous mode [ 1172.409363][ T295] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 1172.422210][T32674] device veth0_vlan entered promiscuous mode [ 1172.437998][T32674] tipc: Resetting bearer [ 1172.450920][T32674] tipc: Resetting bearer [ 1172.549225][T32674] device gretap0 entered promiscuous mode [ 1172.574930][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1172.626832][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1172.661943][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1172.681076][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1172.707009][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1172.734190][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1172.760959][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 1172.769339][T27648] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 1172.788491][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1172.805043][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1172.820780][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1172.850195][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1172.908920][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1173.099398][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1173.119049][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1173.149930][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1173.181187][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1173.221934][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1173.240991][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1173.254181][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1173.273208][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1173.294815][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1173.328974][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1173.337035][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1173.361205][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1173.390529][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 1173.401294][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 1173.425043][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 1173.433081][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 1173.466538][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth7: link becomes ready [ 1173.488631][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [ 1173.510554][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth9: link becomes ready [ 1173.527387][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth8: link becomes ready [ 1173.544845][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth11: link becomes ready [ 1173.559475][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready [ 1173.575478][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth13: link becomes ready [ 1173.591283][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready [ 1173.607317][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth15: link becomes ready [ 1173.619160][ T734] IPv6: ADDRCONF(NETDEV_CHANGE): veth14: link becomes ready [ 1174.157503][T32697] 9pnet: Insufficient options for proto=fd [ 1174.174728][T32697] xt_hashlimit: max too large, truncated to 1048576 [ 1174.239903][T32703] syz.0.12271[32703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1174.240010][T32703] syz.0.12271[32703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1174.293659][T32699] netlink: 12 bytes leftover after parsing attributes in process `syz.2.12260'. [ 1174.312787][T32707] netlink: 8 bytes leftover after parsing attributes in process `syz.0.12271'. [ 1174.341915][T32703] netlink: 4 bytes leftover after parsing attributes in process `syz.0.12271'. [ 1177.285249][T32726] tipc: Enabling of bearer rejected, already enabled [ 1177.770940][T32735] syz.1.12268[32735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1177.771025][T32735] syz.1.12268[32735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1181.238427][T32754] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12275'. [ 1182.488936][T32765] netlink: 8 bytes leftover after parsing attributes in process `syz.5.12277'. [ 1184.015068][T32762] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12278'. [ 1190.004533][ T409] xt_hashlimit: max too large, truncated to 1048576 [ 1195.571574][ T465] tipc: Enabling of bearer rejected, already enabled [ 1201.304649][ T524] A link change request failed with some changes committed already. Interface ip6_vti0 may have been left with an inconsistent configuration, please check. [ 1204.137183][ T30] audit: type=1326 audit(2000001253.180:22849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=970 comm="syz.1.12347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1205.497169][ T30] audit: type=1326 audit(2000001253.209:22850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=970 comm="syz.1.12347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=28 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1205.641659][ T30] audit: type=1326 audit(2000001253.209:22851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=970 comm="syz.1.12347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1205.665385][ T30] audit: type=1326 audit(2000001253.209:22852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=970 comm="syz.1.12347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1205.689038][ T30] audit: type=1326 audit(2000001253.209:22853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=970 comm="syz.1.12347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1205.712635][ T30] audit: type=1326 audit(2000001253.209:22854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=970 comm="syz.1.12347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1205.829710][ T30] audit: type=1326 audit(2000001253.209:22855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=970 comm="syz.1.12347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1205.869730][ T30] audit: type=1326 audit(2000001253.209:22856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=970 comm="syz.1.12347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1208.039371][ T1002] TCP: TCP_TX_DELAY enabled [ 1208.066571][ T1001] netlink: 24 bytes leftover after parsing attributes in process `syz.5.12356'. [ 1208.180201][ T30] audit: type=1326 audit(2000001253.209:22857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=970 comm="syz.1.12347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1208.207893][ T1017] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=1017 comm=syz.5.12356 [ 1208.221752][ T30] audit: type=1326 audit(2000001254.368:22858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=970 comm="syz.1.12347" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1209.824762][ T1030] sch_tbf: burst 32855 is lower than device lo mtu (11337746) ! [ 1210.204864][ T1040] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12366'. [ 1211.329678][ T1048] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12371'. [ 1211.558647][ T1054] netlink: 148 bytes leftover after parsing attributes in process `syz.4.12372'. [ 1211.568248][ T1054] netlink: 116 bytes leftover after parsing attributes in process `syz.4.12372'. [ 1211.577514][ T1054] netlink: 32 bytes leftover after parsing attributes in process `syz.4.12372'. [ 1212.770872][ T1058] xt_hashlimit: max too large, truncated to 1048576 [ 1212.935464][ T1066] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4087 sclass=netlink_route_socket pid=1066 comm=syz.1.12375 [ 1216.230987][ T1098] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 1216.925704][ T1109] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12386'. [ 1218.023951][ T1128] incfs: Options parsing error. -22 [ 1218.029418][ T1128] incfs: mount failed -22 [ 1221.077459][ T1160] netlink: 148 bytes leftover after parsing attributes in process `syz.1.12410'. [ 1221.086916][ T1160] netlink: 116 bytes leftover after parsing attributes in process `syz.1.12410'. [ 1221.096148][ T1160] netlink: 32 bytes leftover after parsing attributes in process `syz.1.12410'. [ 1222.093026][ T1176] 9pnet: Insufficient options for proto=fd [ 1222.389699][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 1222.389716][ T30] audit: type=1326 audit(2000001270.261:22882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1170 comm="syz.1.12414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1222.448507][ T30] audit: type=1326 audit(2000001270.261:22883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1170 comm="syz.1.12414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1222.477794][ T30] audit: type=1326 audit(2000001270.261:22884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1170 comm="syz.1.12414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1222.510879][ T30] audit: type=1326 audit(2000001270.261:22885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1170 comm="syz.1.12414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1222.536283][ T30] audit: type=1326 audit(2000001270.261:22886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1170 comm="syz.1.12414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1222.560743][ T30] audit: type=1326 audit(2000001270.261:22887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1170 comm="syz.1.12414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1222.584570][ T30] audit: type=1326 audit(2000001270.261:22888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1170 comm="syz.1.12414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1222.608917][ T30] audit: type=1326 audit(2000001270.261:22889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1170 comm="syz.1.12414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1222.648907][ T30] audit: type=1326 audit(2000001270.261:22890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1170 comm="syz.1.12414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1222.729369][ T30] audit: type=1326 audit(2000001270.261:22891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1170 comm="syz.1.12414" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1222.878573][ T1200] tipc: Enabling of bearer rejected, already enabled [ 1224.679091][ T1219] overlayfs: failed to clone upperpath [ 1225.577617][ T1234] tipc: Enabling of bearer rejected, already enabled [ 1225.834837][ T1239] sch_tbf: burst 32855 is lower than device lo mtu (11337746) ! [ 1226.257123][ T1243] syz.5.12425[1243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1226.257623][ T1243] syz.5.12425[1243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1226.286182][ T1243] netlink: 'syz.5.12425': attribute type 3 has an invalid length. [ 1227.577109][ T1261] xt_CT: No such helper "netbios-ns" [ 1230.109894][ T1277] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 1230.118712][ T1277] overlayfs: missing 'lowerdir' [ 1231.277058][ T1315] syz.0.12446[1315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1231.277539][ T1315] syz.0.12446[1315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1233.455963][ T30] kauditd_printk_skb: 62 callbacks suppressed [ 1233.456027][ T30] audit: type=1326 audit(2000001280.589:22954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1337 comm="syz.2.12453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1233.754034][ T30] audit: type=1326 audit(2000001280.589:22955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1337 comm="syz.2.12453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1233.814685][ T30] audit: type=1326 audit(2000001280.598:22956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1337 comm="syz.2.12453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=117 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1233.838790][ T30] audit: type=1326 audit(2000001280.598:22957): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1337 comm="syz.2.12453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1233.862986][ T30] audit: type=1326 audit(2000001280.598:22958): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1337 comm="syz.2.12453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1234.009306][ T1352] netlink: 148 bytes leftover after parsing attributes in process `syz.5.12457'. [ 1234.018837][ T1352] netlink: 116 bytes leftover after parsing attributes in process `syz.5.12457'. [ 1234.028007][ T1352] netlink: 32 bytes leftover after parsing attributes in process `syz.5.12457'. [ 1236.425397][ T1384] netlink: 182 bytes leftover after parsing attributes in process `syz.1.12465'. [ 1238.035465][ T1403] futex_wake_op: syz.5.12472 tries to shift op by 36; fix this program [ 1239.051439][ T1426] netlink: 20 bytes leftover after parsing attributes in process `syz.4.12476'. [ 1241.335754][ T1450] overlayfs: failed to clone lowerpath [ 1243.534852][ T1489] netlink: 'syz.1.12496': attribute type 4 has an invalid length. [ 1243.555667][ T1489] netlink: 'syz.1.12496': attribute type 4 has an invalid length. [ 1243.645814][ T1489] tipc: Resetting bearer [ 1244.067240][ T1496] device vlan0 entered promiscuous mode [ 1244.072904][ T1496] device bridge_slave_0 entered promiscuous mode [ 1245.678604][ T1499] netlink: 'syz.4.12499': attribute type 3 has an invalid length. [ 1245.686640][ T1499] netlink: 'syz.4.12499': attribute type 3 has an invalid length. [ 1246.448025][ T1517] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 1247.670363][ T30] audit: type=1326 audit(2000001293.910:22959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1532 comm="syz.2.12508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1247.754624][ T30] audit: type=1326 audit(2000001293.938:22960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1532 comm="syz.2.12508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1247.876862][ T30] audit: type=1326 audit(2000001294.012:22961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1532 comm="syz.2.12508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=254 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1247.968789][ T30] audit: type=1326 audit(2000001294.012:22962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1532 comm="syz.2.12508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1247.992655][ T30] audit: type=1326 audit(2000001294.012:22963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1532 comm="syz.2.12508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1248.016296][ T30] audit: type=1326 audit(2000001294.012:22964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1532 comm="syz.2.12508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=84 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1248.039883][ T30] audit: type=1326 audit(2000001294.012:22965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1532 comm="syz.2.12508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1248.093858][ T30] audit: type=1326 audit(2000001294.012:22966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1532 comm="syz.2.12508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1248.216925][ T1545] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12512'. [ 1250.140520][ T1572] device macsec0 entered promiscuous mode [ 1250.320430][ T1582] netlink: 4 bytes leftover after parsing attributes in process `syz.0.12524'. [ 1250.682466][ T1588] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12527'. [ 1250.717722][ T30] audit: type=1326 audit(2000001296.763:22967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1583 comm="syz.0.12525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1250.776885][ T30] audit: type=1326 audit(2000001296.763:22968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1583 comm="syz.0.12525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1251.869669][ T1601] fuse: Bad value for 'fd' [ 1252.139267][ T1603] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 1259.193644][ T1651] overlayfs: failed to clone upperpath [ 1259.505955][ T1656] tipc: Enabling of bearer rejected, already enabled [ 1259.579050][ T1660] overlayfs: failed to clone upperpath [ 1260.275905][ T1669] netlink: 24 bytes leftover after parsing attributes in process `syz.2.12551'. [ 1260.981885][ T1683] tipc: Enabling of bearer rejected, already enabled [ 1261.676438][ T1698] overlayfs: failed to clone upperpath [ 1272.294808][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 1272.294826][ T30] audit: type=1400 audit(2000001316.940:22987): avc: denied { create } for pid=1815 comm="syz.4.12595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1275.404880][ T1855] netlink: 188 bytes leftover after parsing attributes in process `syz.1.12614'. [ 1277.617355][ T1893] netlink: 8 bytes leftover after parsing attributes in process `syz.5.12612'. [ 1280.051867][ T30] audit: type=1326 audit(2000001324.200:22988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1914 comm="syz.1.12625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1280.105906][ T30] audit: type=1326 audit(2000001324.228:22989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1914 comm="syz.1.12625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1280.202489][ T30] audit: type=1326 audit(2000001324.228:22990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1914 comm="syz.1.12625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1280.358869][ T30] audit: type=1326 audit(2000001324.228:22991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1914 comm="syz.1.12625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1280.487487][ T30] audit: type=1326 audit(2000001324.228:22992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1914 comm="syz.1.12625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1280.521655][ T30] audit: type=1326 audit(2000001324.228:22993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1914 comm="syz.1.12625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1280.571535][ T30] audit: type=1326 audit(2000001324.228:22994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1914 comm="syz.1.12625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1280.599017][ T30] audit: type=1326 audit(2000001324.228:22995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1914 comm="syz.1.12625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1280.626203][ T30] audit: type=1326 audit(2000001324.228:22996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1914 comm="syz.1.12625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1280.657840][ T30] audit: type=1326 audit(2000001324.228:22997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1914 comm="syz.1.12625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=327 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1284.457737][ T1945] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev ?, type ?) errno=-22 [ 1286.380536][ T1987] xt_bpf: check failed: parse error [ 1288.239937][ T2017] syz.2.12653[2017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1288.240064][ T2017] syz.2.12653[2017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1288.368693][ T2023] netlink: 57 bytes leftover after parsing attributes in process `syz.1.12652'. [ 1290.820663][ T2038] overlayfs: failed to clone upperpath [ 1293.149013][ T2069] netlink: 60 bytes leftover after parsing attributes in process `syz.2.12666'. [ 1293.857348][ T2076] overlayfs: failed to clone upperpath [ 1295.478837][ T2097] netlink: 'syz.0.12674': attribute type 12 has an invalid length. [ 1297.109844][ T2118] syz.2.12679[2118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1297.110048][ T2118] syz.2.12679[2118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1300.203013][ T2128] incfs: Backing dir is not set, filesystem can't be mounted. [ 1300.223109][ T2128] incfs: mount failed -2 [ 1300.771722][ T2131] overlayfs: failed to clone upperpath [ 1303.572104][ T6660] kworker/dying (6660) used greatest stack depth: 18464 bytes left [ 1305.765916][ T2176] netlink: 12 bytes leftover after parsing attributes in process `syz.5.12695'. [ 1305.775347][ T2176] 8021q: VLANs not supported on ip6gre0 [ 1307.501050][ T2200] overlayfs: failed to clone upperpath [ 1309.129055][ T2225] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 1310.527606][ T2238] xt_CONNSECMARK: invalid mode: 0 [ 1310.976565][ T2251] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12719'. [ 1310.985568][ T2251] bridge_slave_1: default FDB implementation only supports local addresses [ 1315.639143][ T2310] overlayfs: unrecognized mount option "uuid=null" or missing value [ 1317.626592][ T2332] netlink: 'syz.5.12738': attribute type 4 has an invalid length. [ 1317.637387][ T2332] netlink: 'syz.5.12738': attribute type 4 has an invalid length. [ 1318.130481][ T2340] netlink: 32 bytes leftover after parsing attributes in process `syz.1.12743'. [ 1324.215034][ T2405] device macsec0 entered promiscuous mode [ 1324.220953][ T2405] device bridge0 entered promiscuous mode [ 1324.235916][ T2405] bridge0: port 1(macsec0) entered blocking state [ 1324.242502][ T2405] bridge0: port 1(macsec0) entered disabled state [ 1324.632863][ T2405] device bridge0 left promiscuous mode [ 1325.140679][ T2417] overlayfs: failed to clone upperpath [ 1325.570007][ T2420] netlink: 8 bytes leftover after parsing attributes in process `syz.4.12760'. [ 1327.159978][ T2438] netlink: 24 bytes leftover after parsing attributes in process `syz.4.12773'. [ 1327.793205][ T2454] device bridge0 entered promiscuous mode [ 1327.799454][ T2454] device macsec0 entered promiscuous mode [ 1327.813723][ T2454] bridge0: port 1(macsec0) entered blocking state [ 1327.820314][ T2454] bridge0: port 1(macsec0) entered disabled state [ 1328.362494][ T2454] device bridge0 left promiscuous mode [ 1329.284657][ T30] kauditd_printk_skb: 43 callbacks suppressed [ 1329.284678][ T30] audit: type=1326 audit(2000001369.663:23041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2461 comm="syz.0.12778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1331.282601][ T30] audit: type=1326 audit(2000001369.663:23042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2461 comm="syz.0.12778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1331.402892][ T30] audit: type=1326 audit(2000001369.672:23043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2461 comm="syz.0.12778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1331.542714][ T30] audit: type=1326 audit(2000001369.672:23044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2461 comm="syz.0.12778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1331.583629][ T30] audit: type=1326 audit(2000001369.672:23045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2461 comm="syz.0.12778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1331.629677][ T30] audit: type=1326 audit(2000001369.672:23046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2461 comm="syz.0.12778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1331.718751][ T30] audit: type=1326 audit(2000001369.681:23047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2461 comm="syz.0.12778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1332.418816][ T30] audit: type=1326 audit(2000001369.681:23048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2461 comm="syz.0.12778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1332.453873][ T30] audit: type=1326 audit(2000001369.681:23049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2461 comm="syz.0.12778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1332.489423][ T30] audit: type=1326 audit(2000001369.681:23050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2461 comm="syz.0.12778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1333.891411][ T2512] device gretap0 left promiscuous mode [ 1334.289101][ T2512] device gretap0 entered promiscuous mode [ 1334.320094][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1334.329164][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1334.338901][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1334.346684][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1334.367289][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1334.378937][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 1334.402601][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1334.419842][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 1334.436820][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1334.467113][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1334.498024][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1334.854025][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1334.955175][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1335.054722][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1335.141502][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1335.180881][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1335.606224][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1335.614530][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 1335.622324][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 1335.630276][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1335.655874][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1335.669661][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 1335.685280][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 1335.693261][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth7: link becomes ready [ 1335.700812][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [ 1335.798171][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth9: link becomes ready [ 1335.881224][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth8: link becomes ready [ 1335.895975][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth11: link becomes ready [ 1335.910046][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready [ 1335.923697][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth13: link becomes ready [ 1335.939667][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready [ 1335.955954][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth15: link becomes ready [ 1335.972034][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth14: link becomes ready [ 1336.013756][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth17: link becomes ready [ 1336.021801][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth16: link becomes ready [ 1336.030822][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth19: link becomes ready [ 1336.039020][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth18: link becomes ready [ 1336.047956][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth21: link becomes ready [ 1336.055970][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready [ 1337.017071][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth23: link becomes ready [ 1337.507085][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth22: link becomes ready [ 1337.529826][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth25: link becomes ready [ 1337.553635][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth24: link becomes ready [ 1337.561436][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth27: link becomes ready [ 1337.569162][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth26: link becomes ready [ 1337.576876][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth29: link becomes ready [ 1337.584552][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth28: link becomes ready [ 1337.592190][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth31: link becomes ready [ 1337.600320][T19035] IPv6: ADDRCONF(NETDEV_CHANGE): veth30: link becomes ready [ 1337.609893][ T2514] device bridge0 entered promiscuous mode [ 1337.615682][ T2514] device macsec2 entered promiscuous mode [ 1337.621944][ T2514] device bridge0 left promiscuous mode [ 1338.620925][ T2556] overlayfs: failed to clone upperpath [ 1344.353026][ T2595] xt_CT: No such helper "snmp" [ 1344.382414][ T2613] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12819'. [ 1344.513320][ T2618] netlink: 12 bytes leftover after parsing attributes in process `syz.4.12822'. [ 1345.932968][ T2634] netlink: 28 bytes leftover after parsing attributes in process `syz.2.12825'. [ 1345.964158][ T2634] netlink: 28 bytes leftover after parsing attributes in process `syz.2.12825'. [ 1346.154481][ T2648] netlink: 8 bytes leftover after parsing attributes in process `syz.2.12830'. [ 1346.167117][ T2648] netlink: 24 bytes leftover after parsing attributes in process `syz.2.12830'. [ 1348.317706][ T2673] netlink: 8 bytes leftover after parsing attributes in process `syz.5.12837'. [ 1348.351273][ T2673] bridge_slave_1: default FDB implementation only supports local addresses [ 1351.609826][ T2712] overlayfs: unrecognized mount option "uuid=null" or missing value [ 1354.249309][ T2737] netlink: 76 bytes leftover after parsing attributes in process `syz.4.12851'. [ 1357.768154][ T2742] netlink: 'syz.2.12855': attribute type 11 has an invalid length. [ 1357.788914][ T2742] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.12855'. [ 1359.467051][ T2770] overlayfs: unrecognized mount option "uuid=null" or missing value [ 1360.338912][ T2779] overlayfs: failed to clone upperpath [ 1361.854217][ T2786] tipc: Failed to remove unknown binding: 66,1,1/269062628:823639786/823639788 [ 1361.880958][ T2786] tipc: Failed to remove unknown binding: 66,1,1/269062628:823639786/823639788 [ 1362.324149][ T30] kauditd_printk_skb: 220 callbacks suppressed [ 1362.324165][ T30] audit: type=1326 audit(2000001401.160:23271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2793 comm="syz.0.12869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1362.386529][ T30] audit: type=1326 audit(2000001401.197:23272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2793 comm="syz.0.12869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1362.411466][ T30] audit: type=1326 audit(2000001401.197:23273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2793 comm="syz.0.12869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=119 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1362.435417][ T30] audit: type=1326 audit(2000001401.197:23274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2793 comm="syz.0.12869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1362.483915][ T30] audit: type=1326 audit(2000001401.197:23275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2793 comm="syz.0.12869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1362.829255][ T30] audit: type=1326 audit(2000001401.197:23276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2793 comm="syz.0.12869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1362.855237][ T30] audit: type=1326 audit(2000001401.197:23277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2793 comm="syz.0.12869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f9010b18f03 code=0x7ffc0000 [ 1362.977330][ T30] audit: type=1326 audit(2000001401.197:23278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2793 comm="syz.0.12869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f9010b1797f code=0x7ffc0000 [ 1363.014666][ T30] audit: type=1326 audit(2000001401.216:23279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2793 comm="syz.0.12869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f9010b18f57 code=0x7ffc0000 [ 1363.054844][ T30] audit: type=1326 audit(2000001401.216:23280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2793 comm="syz.0.12869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9010b17710 code=0x7ffc0000 [ 1363.849562][ T2817] xt_socket: unknown flags 0x50 [ 1366.370340][ T2847] syz.2.12881[2847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1366.370518][ T2847] syz.2.12881[2847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1370.229614][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 1370.229654][ T30] audit: type=1326 audit(2000001408.494:23317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2878 comm="syz.5.12903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1370.882910][ T30] audit: type=1326 audit(2000001408.494:23318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2878 comm="syz.5.12903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1370.907651][ T30] audit: type=1326 audit(2000001408.522:23319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2878 comm="syz.5.12903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=119 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1370.931487][ T30] audit: type=1326 audit(2000001408.531:23320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2878 comm="syz.5.12903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1370.955529][ T30] audit: type=1326 audit(2000001408.540:23321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2878 comm="syz.5.12903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1370.979397][ T30] audit: type=1326 audit(2000001408.550:23322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2878 comm="syz.5.12903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1371.042385][ T30] audit: type=1326 audit(2000001408.596:23323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2878 comm="syz.5.12903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7ff06df05f03 code=0x7ffc0000 [ 1371.102930][ T30] audit: type=1326 audit(2000001408.653:23324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2878 comm="syz.5.12903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7ff06df0497f code=0x7ffc0000 [ 1371.126643][ T30] audit: type=1326 audit(2000001408.699:23325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2878 comm="syz.5.12903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7ff06df05f57 code=0x7ffc0000 [ 1371.150249][ T30] audit: type=1326 audit(2000001408.709:23326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2878 comm="syz.5.12903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff06df04710 code=0x7ffc0000 [ 1371.243574][ T2888] netlink: 12 bytes leftover after parsing attributes in process `syz.0.12895'. [ 1375.761967][ T2937] netlink: 12 bytes leftover after parsing attributes in process `syz.5.12908'. [ 1377.024272][ T2956] syz.5.12915[2956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1377.068554][ T2962] bridge: RTM_NEWNEIGH with invalid ether address [ 1377.138934][ T2965] netlink: 'syz.5.12918': attribute type 4 has an invalid length. [ 1377.159821][ T2965] netlink: 'syz.5.12918': attribute type 4 has an invalid length. [ 1378.051352][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 1378.051369][ T30] audit: type=1326 audit(2000001415.874:23362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2976 comm="syz.4.12921" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fe60ea21ec9 code=0x0 [ 1378.895480][ T30] audit: type=1326 audit(2000001416.660:23363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2995 comm="syz.5.12927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1378.927422][ T30] audit: type=1326 audit(2000001416.688:23364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2995 comm="syz.5.12927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1378.983856][ T30] audit: type=1326 audit(2000001416.688:23365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2995 comm="syz.5.12927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1379.010295][ T30] audit: type=1326 audit(2000001416.688:23366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2995 comm="syz.5.12927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1379.045650][ T30] audit: type=1326 audit(2000001416.688:23367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2995 comm="syz.5.12927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1379.079812][ T30] audit: type=1326 audit(2000001416.688:23368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2995 comm="syz.5.12927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=323 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1379.866043][ T30] audit: type=1326 audit(2000001416.688:23369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2995 comm="syz.5.12927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1379.964328][ T30] audit: type=1326 audit(2000001416.688:23370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2995 comm="syz.5.12927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1380.904957][ T30] audit: type=1326 audit(2000001416.688:23371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2995 comm="syz.5.12927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1384.265119][ T3055] netlink: 'syz.4.12942': attribute type 2 has an invalid length. [ 1388.885108][ T3085] netlink: 24 bytes leftover after parsing attributes in process `syz.2.12950'. [ 1394.670887][ T3132] netlink: 44 bytes leftover after parsing attributes in process `syz.0.12963'. [ 1394.680123][ T3132] netlink: 51 bytes leftover after parsing attributes in process `syz.0.12963'. [ 1394.689245][ T3132] netlink: 'syz.0.12963': attribute type 6 has an invalid length. [ 1394.697104][ T3132] netlink: 51 bytes leftover after parsing attributes in process `syz.0.12963'. [ 1394.969196][ T3120] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 1395.373713][ T3139] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12974'. [ 1395.465851][ T3139] device vlan2 entered promiscuous mode [ 1397.593988][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 1397.594005][ T30] audit: type=1400 audit(2000001434.153:23393): avc: denied { setopt } for pid=3149 comm="syz.5.12969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1398.182469][ T30] audit: type=1326 audit(2000001434.705:23394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3161 comm="syz.2.12971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1398.206498][ T30] audit: type=1326 audit(2000001434.705:23395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3161 comm="syz.2.12971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1398.230686][ T30] audit: type=1326 audit(2000001434.705:23396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3161 comm="syz.2.12971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1398.254745][ T30] audit: type=1326 audit(2000001434.705:23397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3161 comm="syz.2.12971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1398.278807][ T30] audit: type=1326 audit(2000001434.705:23398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3161 comm="syz.2.12971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1398.302836][ T30] audit: type=1326 audit(2000001434.705:23399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3161 comm="syz.2.12971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1398.326834][ T30] audit: type=1326 audit(2000001434.733:23400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3161 comm="syz.2.12971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1398.374416][ T30] audit: type=1326 audit(2000001434.733:23401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3161 comm="syz.2.12971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1398.416881][ T30] audit: type=1326 audit(2000001434.733:23402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3161 comm="syz.2.12971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1403.157672][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 1403.157691][ T30] audit: type=1326 audit(2000001439.364:23414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3227 comm="syz.2.12991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1403.248851][ T30] audit: type=1326 audit(2000001439.364:23415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3227 comm="syz.2.12991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1403.332057][ T30] audit: type=1326 audit(2000001439.364:23416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3227 comm="syz.2.12991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1403.369147][ T30] audit: type=1326 audit(2000001439.364:23417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3227 comm="syz.2.12991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1403.953225][ T30] audit: type=1326 audit(2000001439.364:23418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3227 comm="syz.2.12991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1403.980898][ T3242] overlayfs: failed to clone upperpath [ 1404.009987][ T30] audit: type=1326 audit(2000001439.364:23419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3227 comm="syz.2.12991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1404.084255][ T30] audit: type=1326 audit(2000001439.364:23420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3227 comm="syz.2.12991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1404.208827][ T30] audit: type=1326 audit(2000001439.364:23421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3227 comm="syz.2.12991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1404.252587][ T30] audit: type=1326 audit(2000001439.364:23422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3227 comm="syz.2.12991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1404.285585][ T30] audit: type=1326 audit(2000001439.364:23423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3227 comm="syz.2.12991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1406.393442][ T3275] device ip6tnl0 entered promiscuous mode [ 1406.404698][ T3276] incfs: Error accessing: ./bus. [ 1406.409750][ T3276] incfs: mount failed -20 [ 1406.436092][ T3275] netlink: 4 bytes leftover after parsing attributes in process `syz.2.13005'. [ 1406.792350][ T3274] device ip6tnl0 left promiscuous mode [ 1407.730857][ T3299] netlink: 96 bytes leftover after parsing attributes in process `syz.4.13012'. [ 1408.906812][ T3321] netlink: 4 bytes leftover after parsing attributes in process `syz.2.13017'. [ 1410.721152][ T30] kauditd_printk_skb: 57 callbacks suppressed [ 1410.721181][ T30] audit: type=1400 audit(2000001446.398:23481): avc: denied { ioctl } for pid=3325 comm="syz.2.13022" path="socket:[119349]" dev="sockfs" ino=119349 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1413.745269][ T3361] overlayfs: failed to clone upperpath [ 1414.084002][ T3367] netlink: 24 bytes leftover after parsing attributes in process `syz.1.13029'. [ 1419.434559][ T3392] syz.0.13038[3392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1419.435099][ T3392] syz.0.13038[3392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1422.282731][ T3427] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3427 comm=syz.4.13050 [ 1422.484644][ T3429] overlayfs: failed to clone upperpath [ 1422.493109][ T3427] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=3427 comm=syz.4.13050 [ 1425.028094][ T3462] 9pnet: Insufficient options for proto=fd [ 1431.403257][ T3536] IPv6: sit3: Disabled Multicast RS [ 1437.160034][ T30] audit: type=1326 audit(2000001471.169:23482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.2.13090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1437.221320][ T3566] device ip6tnl0 entered promiscuous mode [ 1437.235696][ T3566] netlink: 4 bytes leftover after parsing attributes in process `syz.0.13092'. [ 1437.244805][ T30] audit: type=1326 audit(2000001471.197:23483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.2.13090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1437.296392][ T30] audit: type=1326 audit(2000001471.197:23484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.2.13090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=264 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1437.349172][ T30] audit: type=1326 audit(2000001471.197:23485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.2.13090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1437.399663][ T30] audit: type=1326 audit(2000001471.197:23486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.2.13090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1437.473598][ T3565] device ip6tnl0 left promiscuous mode [ 1437.495584][ T30] audit: type=1326 audit(2000001471.197:23487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.2.13090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1437.851626][ T30] audit: type=1326 audit(2000001471.197:23488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.2.13090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1437.875648][ T30] audit: type=1326 audit(2000001471.197:23489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.2.13090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1437.899559][ T30] audit: type=1326 audit(2000001471.197:23490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.2.13090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1437.923595][ T30] audit: type=1326 audit(2000001471.197:23491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.2.13090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1441.352171][ T3617] device bridge0 entered promiscuous mode [ 1441.853669][ T3628] overlayfs: failed to clone upperpath [ 1442.736264][ T3633] xt_CT: No such helper "pptp" [ 1443.311528][ T3649] overlayfs: missing 'lowerdir' [ 1444.641428][ T3657] overlayfs: failed to clone lowerpath [ 1446.195980][ T3677] overlayfs: failed to clone upperpath [ 1446.552794][ T3679] xt_hashlimit: max too large, truncated to 1048576 [ 1452.197876][ T3726] netlink: 12 bytes leftover after parsing attributes in process `syz.4.13133'. [ 1452.924247][ T3730] overlayfs: failed to clone upperpath [ 1453.887908][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 1453.887926][ T30] audit: type=1326 audit(2000001486.791:23501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3732 comm="syz.5.13138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1454.241225][ T30] audit: type=1326 audit(2000001486.791:23502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3732 comm="syz.5.13138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1454.276900][ T30] audit: type=1326 audit(2000001486.791:23503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3732 comm="syz.5.13138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=435 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1454.411784][ T30] audit: type=1326 audit(2000001486.791:23504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3732 comm="syz.5.13138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1454.440505][ T30] audit: type=1326 audit(2000001486.791:23505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3732 comm="syz.5.13138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=234 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1454.488002][ T30] audit: type=1326 audit(2000001486.791:23506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3732 comm="syz.5.13138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1454.519305][ T3747] overlayfs: failed to clone upperpath [ 1454.560278][ T30] audit: type=1326 audit(2000001486.791:23507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3732 comm="syz.5.13138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1454.605509][ T30] audit: type=1326 audit(2000001486.791:23508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3732 comm="syz.5.13138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1454.691329][ T30] audit: type=1326 audit(2000001486.801:23509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3732 comm="syz.5.13138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1454.742312][ T30] audit: type=1326 audit(2000001486.801:23510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3732 comm="syz.5.13138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1456.494095][ T3765] xt_bpf: check failed: parse error [ 1467.612814][ T3865] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1468.139568][ T3876] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1472.503672][ T3889] overlayfs: failed to clone upperpath [ 1473.292760][ T3908] netlink: 4 bytes leftover after parsing attributes in process `syz.4.13185'. [ 1477.713736][ T3921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1478.206308][ T3919] netlink: 44 bytes leftover after parsing attributes in process `syz.4.13188'. [ 1480.168276][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 1480.168292][ T30] audit: type=1326 audit(2000001511.403:23533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.5.13197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1480.198534][ T30] audit: type=1326 audit(2000001511.403:23534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.5.13197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1480.226714][ T30] audit: type=1326 audit(2000001511.403:23535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.5.13197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1480.266212][ T30] audit: type=1326 audit(2000001511.403:23536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.5.13197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1480.298311][ T30] audit: type=1326 audit(2000001511.403:23537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.5.13197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1480.348011][ T30] audit: type=1326 audit(2000001511.403:23538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.5.13197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1480.372421][ T3940] syz.5.13197[3940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.372504][ T3940] syz.5.13197[3940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.386227][ T30] audit: type=1326 audit(2000001511.403:23539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.5.13197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1480.422630][ T30] audit: type=1326 audit(2000001511.403:23540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.5.13197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1480.627113][ T30] audit: type=1326 audit(2000001511.403:23541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.5.13197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1480.701346][ T30] audit: type=1326 audit(2000001511.403:23542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.5.13197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1481.176138][ T3959] netlink: 165 bytes leftover after parsing attributes in process `syz.2.13200'. [ 1481.276563][ T3957] netlink: 8 bytes leftover after parsing attributes in process `syz.5.13199'. [ 1486.163344][ T4009] device veth1_macvtap left promiscuous mode [ 1486.185098][ T4009] device veth1_macvtap entered promiscuous mode [ 1486.193276][ T4009] device macsec0 left promiscuous mode [ 1486.671528][ T4008] device macsec0 entered promiscuous mode [ 1486.678629][ T4008] bridge0: port 1(macsec0) entered blocking state [ 1486.685155][ T4008] bridge0: port 1(macsec0) entered disabled state [ 1486.703406][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1486.900876][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1486.909526][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1486.926703][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1486.943215][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1486.956110][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 1486.964621][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1486.981346][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 1486.989927][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1486.999092][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1487.007858][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1487.016322][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1487.025248][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1487.072581][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1487.081149][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1487.095178][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1487.104584][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1487.113123][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1487.121452][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1487.130518][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1487.139030][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1487.147446][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1487.157336][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1487.165827][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1487.174346][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1487.182847][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1487.199951][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1487.210819][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1487.219518][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 1487.227762][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 1487.235682][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 1487.243958][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 1487.255973][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth7: link becomes ready [ 1487.263927][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [ 1487.272563][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth9: link becomes ready [ 1487.281308][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth8: link becomes ready [ 1487.290909][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth11: link becomes ready [ 1487.300119][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready [ 1487.309336][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth13: link becomes ready [ 1487.317848][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready [ 1487.329807][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth15: link becomes ready [ 1487.338805][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth14: link becomes ready [ 1487.346668][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth17: link becomes ready [ 1487.354846][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth16: link becomes ready [ 1487.362957][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth19: link becomes ready [ 1487.371071][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth18: link becomes ready [ 1487.378936][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth21: link becomes ready [ 1487.387142][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready [ 1487.395189][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth23: link becomes ready [ 1487.403380][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth22: link becomes ready [ 1487.411202][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth25: link becomes ready [ 1487.419372][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth24: link becomes ready [ 1487.427398][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth27: link becomes ready [ 1487.435470][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth26: link becomes ready [ 1487.443300][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth29: link becomes ready [ 1487.451590][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth28: link becomes ready [ 1487.499194][ T4024] device bond_slave_1 entered promiscuous mode [ 1487.531237][ T4016] device bond_slave_1 left promiscuous mode [ 1490.085012][ T4040] netlink: 176 bytes leftover after parsing attributes in process `syz.4.13222'. [ 1490.183558][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 1490.183576][ T30] audit: type=1326 audit(2000001521.770:23564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4052 comm="syz.5.13227" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7ff06df05ec9 code=0x0 [ 1493.075895][ T4090] netlink: 96 bytes leftover after parsing attributes in process `syz.5.13231'. [ 1495.441399][ T4124] netlink: 24 bytes leftover after parsing attributes in process `syz.2.13245'. [ 1496.101610][ T4122] bridge0: port 1(31{X) entered blocking state [ 1496.108459][ T4122] bridge0: port 1(31{X) entered disabled state [ 1496.115906][ T4122] device 31{X entered promiscuous mode [ 1496.122258][ T4122] bridge0: port 1(31{X) entered blocking state [ 1496.128981][ T4122] bridge0: port 1(31{X) entered forwarding state [ 1498.636585][ T30] audit: type=1326 audit(2000001529.675:23565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4170 comm="syz.5.13257" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7ff06df05ec9 code=0x0 [ 1502.060793][ T4200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1503.570619][ T30] audit: type=1326 audit(2000001534.286:23566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1503.619978][ T4277] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13273'. [ 1503.648490][ T30] audit: type=1326 audit(2000001534.286:23567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1503.696035][ T30] audit: type=1326 audit(2000001534.333:23568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1504.434518][ T30] audit: type=1326 audit(2000001534.333:23569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1504.520321][ T30] audit: type=1326 audit(2000001534.333:23570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1504.546362][ T30] audit: type=1326 audit(2000001534.333:23571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1504.572015][ T30] audit: type=1326 audit(2000001534.333:23572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1504.596062][ T30] audit: type=1326 audit(2000001534.333:23573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1504.821096][ T30] audit: type=1326 audit(2000001534.333:23574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=322 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1504.924006][ T4296] overlayfs: failed to clone upperpath [ 1505.416165][ T30] audit: type=1326 audit(2000001534.333:23575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1506.024342][ T30] audit: type=1326 audit(2000001534.333:23576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=268 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1506.094291][ T30] audit: type=1326 audit(2000001534.333:23577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1506.118063][ T30] audit: type=1326 audit(2000001534.333:23578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4270 comm="syz.2.13272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=322 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1508.978363][ T4335] netlink: 96 bytes leftover after parsing attributes in process `syz.4.13289'. [ 1514.318837][ T4367] device 31{X left promiscuous mode [ 1514.566430][ T4367] bridge0: port 1(31{X) entered disabled state [ 1514.605898][ T4367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1514.684685][ T4367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1520.863786][ T4417] overlayfs: failed to clone upperpath [ 1521.005397][ T4418] netlink: 24 bytes leftover after parsing attributes in process `syz.2.13309'. [ 1530.046056][ T4764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1530.071756][ T4764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1537.685370][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 1537.685388][ T30] audit: type=1326 audit(2000001566.204:23588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4802 comm="syz.5.13351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1537.843223][ T30] audit: type=1326 audit(2000001566.204:23589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4802 comm="syz.5.13351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1537.874629][ T30] audit: type=1326 audit(2000001566.232:23590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4802 comm="syz.5.13351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1537.901988][ T30] audit: type=1326 audit(2000001566.232:23591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4802 comm="syz.5.13351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1538.222735][ T30] audit: type=1326 audit(2000001566.232:23592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4802 comm="syz.5.13351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1538.292177][ T30] audit: type=1326 audit(2000001566.242:23593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4802 comm="syz.5.13351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1538.319099][ T30] audit: type=1326 audit(2000001566.242:23594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4802 comm="syz.5.13351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1538.344620][ T30] audit: type=1326 audit(2000001566.242:23595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4802 comm="syz.5.13351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1538.371457][ T30] audit: type=1326 audit(2000001566.242:23596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4802 comm="syz.5.13351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1538.413375][ T30] audit: type=1326 audit(2000001566.242:23597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4802 comm="syz.5.13351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1543.653564][ T4890] futex_wake_op: syz.5.13372 tries to shift op by 32; fix this program [ 1544.916555][ T4908] SELinux: security_context_str_to_sid(E) failed for (dev ?, type ?) errno=-22 [ 1544.933947][ T4908] SELinux: security_context_str_to_sid(E) failed for (dev sysfs, type sysfs) errno=-22 [ 1545.411112][ T30] kauditd_printk_skb: 107 callbacks suppressed [ 1545.411128][ T30] audit: type=1400 audit(2000001573.435:23705): avc: denied { create } for pid=4919 comm="syz.5.13381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1546.712609][ T4942] netlink: 'syz.2.13388': attribute type 12 has an invalid length. [ 1548.416846][ T30] audit: type=1326 audit(2000001576.242:23706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.2.13400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1548.418038][ T4955] fuse: Unknown parameter './file0' [ 1548.440927][ T30] audit: type=1326 audit(2000001576.242:23707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.2.13400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1549.204284][ T4964] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13392'. [ 1549.265130][ T4964] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13392'. [ 1549.278432][ T4964] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13392'. [ 1549.291551][ T4964] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13392'. [ 1549.303802][ T4964] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13392'. [ 1549.459588][ T30] audit: type=1326 audit(2000001576.242:23708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.2.13400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=187 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1549.492146][ T30] audit: type=1326 audit(2000001576.242:23709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.2.13400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1549.936164][ T30] audit: type=1326 audit(2000001576.242:23710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.2.13400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1549.978471][ T30] audit: type=1326 audit(2000001576.242:23711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.2.13400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f32a0ff7617 code=0x7ffc0000 [ 1550.002395][ T30] audit: type=1326 audit(2000001576.242:23712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.2.13400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f32a0ffa66a code=0x7ffc0000 [ 1550.035028][ T30] audit: type=1326 audit(2000001576.663:23713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.2.13400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1550.066053][ T30] audit: type=1326 audit(2000001576.663:23714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.2.13400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1550.692638][ T4986] netlink: 28 bytes leftover after parsing attributes in process `syz.5.13397'. [ 1555.951008][ T5035] netlink: 24 bytes leftover after parsing attributes in process `syz.2.13418'. [ 1556.047685][ T5036] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13408'. [ 1556.200979][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 1556.200995][ T30] audit: type=1326 audit(2000001583.520:23744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5031 comm="syz.1.13411" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x0 [ 1558.259833][ T5059] SELinux: security_context_str_to_sid(E) failed for (dev ?, type ?) errno=-22 [ 1558.280358][ T5059] SELinux: security_context_str_to_sid(E) failed for (dev ramfs, type ramfs) errno=-22 [ 1558.500520][ T5064] overlayfs: failed to clone lowerpath [ 1560.225032][ T5073] netlink: 220 bytes leftover after parsing attributes in process `syz.4.13421'. [ 1561.090125][ T5080] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13423'. [ 1564.630622][ T5115] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13433'. [ 1564.640492][ T5115] netlink: 12 bytes leftover after parsing attributes in process `syz.1.13433'. [ 1565.466695][ T30] audit: type=1326 audit(2000001592.191:23745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5124 comm="syz.2.13436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1566.130068][ T30] audit: type=1326 audit(2000001592.219:23746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5124 comm="syz.2.13436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1566.154055][ T30] audit: type=1326 audit(2000001592.219:23747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5124 comm="syz.2.13436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1566.254030][ T30] audit: type=1326 audit(2000001592.219:23748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5124 comm="syz.2.13436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1568.175765][ T30] audit: type=1326 audit(2000001592.219:23749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5124 comm="syz.2.13436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1569.960333][ T30] audit: type=1326 audit(2000001592.219:23750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5124 comm="syz.2.13436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=8 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1570.073327][ T30] audit: type=1326 audit(2000001592.219:23751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5124 comm="syz.2.13436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1570.190352][ T30] audit: type=1326 audit(2000001592.219:23752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5124 comm="syz.2.13436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1570.214185][ T30] audit: type=1326 audit(2000001592.799:23753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5131 comm="syz.5.13439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1570.237879][ T30] audit: type=1326 audit(2000001592.799:23754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5131 comm="syz.5.13439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=274 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1571.414410][ T5176] netlink: 8 bytes leftover after parsing attributes in process `syz.5.13449'. [ 1574.251119][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1574.251136][ T30] audit: type=1326 audit(2000001600.414:23762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.5.13456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1574.354777][ T30] audit: type=1326 audit(2000001600.414:23763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.5.13456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1576.564212][ T30] audit: type=1326 audit(2000001600.442:23764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.5.13456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1576.627823][ T30] audit: type=1326 audit(2000001600.442:23765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.5.13456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1577.146275][ T30] audit: type=1326 audit(2000001600.442:23766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.5.13456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1577.177014][ T30] audit: type=1326 audit(2000001600.442:23767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.5.13456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1577.223502][ T5225] device vlan0 left promiscuous mode [ 1577.234329][ T30] audit: type=1326 audit(2000001600.442:23768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.5.13456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1577.258000][ T30] audit: type=1326 audit(2000001600.442:23769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.5.13456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1577.260178][ T5225] device bridge_slave_0 left promiscuous mode [ 1577.281624][ T30] audit: type=1326 audit(2000001600.442:23770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.5.13456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1577.281657][ T30] audit: type=1326 audit(2000001600.442:23771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.5.13456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1577.398710][ T5225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1577.406509][ T5225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1577.415537][ T5225] device wireguard0 left promiscuous mode [ 1577.424575][ T4601] IPv6: ADDRCONF(NETDEV_CHANGE): veth33: link becomes ready [ 1577.437662][ T4601] IPv6: ADDRCONF(NETDEV_CHANGE): veth32: link becomes ready [ 1577.461601][ T4601] IPv6: ADDRCONF(NETDEV_CHANGE): veth35: link becomes ready [ 1577.569916][ T4601] IPv6: ADDRCONF(NETDEV_CHANGE): veth34: link becomes ready [ 1578.111679][ T5237] bridge21: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1579.366676][ T5243] device bridge0 entered promiscuous mode [ 1580.716053][ T5269] sch_fq: defrate 0 ignored. [ 1580.906284][ T5259] futex_wake_op: syz.4.13475 tries to shift op by 32; fix this program [ 1581.300879][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 1581.301058][ T30] audit: type=1326 audit(2000001606.990:23807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5252 comm="syz.0.13474" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1582.733400][ T30] audit: type=1326 audit(2000001606.999:23808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5252 comm="syz.0.13474" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1585.507500][ T5299] overlayfs: failed to clone upperpath [ 1585.689379][ T5303] overlayfs: failed to clone upperpath [ 1586.605822][ T5314] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 1587.802606][ T30] audit: type=1326 audit(2000001613.080:23809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5330 comm="syz.5.13496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1587.853565][ T30] audit: type=1326 audit(2000001613.080:23810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5330 comm="syz.5.13496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1587.888932][ T30] audit: type=1326 audit(2000001613.080:23811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5330 comm="syz.5.13496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1587.962822][ T30] audit: type=1326 audit(2000001613.080:23812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5330 comm="syz.5.13496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1587.992776][ T30] audit: type=1326 audit(2000001613.080:23813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5330 comm="syz.5.13496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1588.016644][ T30] audit: type=1326 audit(2000001613.080:23814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5330 comm="syz.5.13496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1588.042319][ T30] audit: type=1326 audit(2000001613.080:23815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5330 comm="syz.5.13496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1589.804977][ T30] audit: type=1326 audit(2000001613.080:23816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5330 comm="syz.5.13496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1589.887549][ T30] audit: type=1326 audit(2000001613.080:23817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5330 comm="syz.5.13496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1589.919083][ T30] audit: type=1326 audit(2000001613.080:23818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5330 comm="syz.5.13496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1589.960069][ T5352] device wireguard0 entered promiscuous mode [ 1590.145820][ T5355] overlayfs: failed to clone lowerpath [ 1591.113868][ T5369] overlayfs: failed to clone upperpath [ 1593.853720][ T5389] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 1595.459370][ T5410] 9pnet: Insufficient options for proto=fd [ 1597.147879][ T5447] futex_wake_op: syz.1.13527 tries to shift op by -1; fix this program [ 1597.400713][ T5454] overlayfs: failed to clone upperpath [ 1600.742304][ T5491] overlayfs: failed to clone upperpath [ 1602.238516][ T5511] tipc: Enabling of bearer rejected, already enabled [ 1602.752378][ T5517] netlink: 12 bytes leftover after parsing attributes in process `syz.1.13547'. [ 1602.964177][ T5523] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1602.975384][ T5523] FAT-fs (loop9): unable to read boot sector [ 1603.969750][ T5538] netlink: 'syz.2.13553': attribute type 16 has an invalid length. [ 1603.977756][ T5538] netlink: 'syz.2.13553': attribute type 17 has an invalid length. [ 1603.985700][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1603.993469][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 1604.001285][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 1604.012818][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 1604.020855][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 1604.029207][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 1604.037051][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): sit0: link becomes ready [ 1604.049767][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ip6tnl0: link becomes ready [ 1604.058171][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ip6gre0: link becomes ready [ 1604.066167][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ip6gretap0: link becomes ready [ 1604.074624][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 1604.082524][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): wg0: link becomes ready [ 1604.090095][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): wg1: link becomes ready [ 1604.099733][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): xfrm0: link becomes ready [ 1604.108626][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge1: link becomes ready [ 1604.116741][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): gre1: link becomes ready [ 1604.128750][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge2: link becomes ready [ 1604.137040][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge3: link becomes ready [ 1604.145051][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): syztnl1: link becomes ready [ 1604.153175][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge4: link becomes ready [ 1604.161526][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge5: link becomes ready [ 1604.169532][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge6: link becomes ready [ 1604.177540][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge7: link becomes ready [ 1604.185531][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ip6gre1: link becomes ready [ 1604.193850][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): gre2: link becomes ready [ 1604.205962][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready [ 1604.213783][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge8: link becomes ready [ 1604.221677][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): sit1: link becomes ready [ 1604.233089][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge9: link becomes ready [ 1604.241031][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge10: link becomes ready [ 1604.249709][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge11: link becomes ready [ 1604.258555][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ip6tnl1: link becomes ready [ 1604.267339][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge12: link becomes ready [ 1604.276574][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge13: link becomes ready [ 1604.284590][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge14: link becomes ready [ 1604.292691][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge15: link becomes ready [ 1604.301124][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ip6gre2: link becomes ready [ 1604.309126][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ip6gre3: link becomes ready [ 1604.317012][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge16: link becomes ready [ 1604.325042][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ip6erspan0: link becomes ready [ 1604.334190][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge17: link becomes ready [ 1604.342217][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): sit2: link becomes ready [ 1604.354986][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): sit3: link becomes ready [ 1604.367439][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0.1: link becomes ready [ 1604.375679][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): macsec1: link becomes ready [ 1604.383712][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): sit4: link becomes ready [ 1604.395310][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge18: link becomes ready [ 1604.403363][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge19: link becomes ready [ 1604.411411][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ipip0: link becomes ready [ 1604.419393][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1604.658257][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 1604.658273][ T30] audit: type=1326 audit(2000001628.852:23851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5546 comm="syz.4.13557" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1604.691916][ T30] audit: type=1326 audit(2000001628.852:23852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5546 comm="syz.4.13557" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1604.716054][ T30] audit: type=1326 audit(2000001628.880:23853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5546 comm="syz.4.13557" exe="/root/syz-executor" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1604.768271][ T30] audit: type=1326 audit(2000001628.908:23854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5546 comm="syz.4.13557" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1604.792512][ T30] audit: type=1326 audit(2000001628.908:23855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5546 comm="syz.4.13557" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1605.503401][ T30] audit: type=1326 audit(2000001628.908:23856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5546 comm="syz.4.13557" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1605.554646][ T30] audit: type=1326 audit(2000001628.908:23857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5546 comm="syz.4.13557" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1605.942552][ T30] audit: type=1326 audit(2000001628.908:23858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5546 comm="syz.4.13557" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1605.975418][ T30] audit: type=1326 audit(2000001628.908:23859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5546 comm="syz.4.13557" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1606.079560][ T30] audit: type=1326 audit(2000001628.908:23860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5546 comm="syz.4.13557" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe60ea21ec9 code=0x7ffc0000 [ 1609.191403][ T5593] syz.2.13568[5593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1609.192985][ T5593] syz.2.13568[5593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1612.316723][ T5599] netlink: 20 bytes leftover after parsing attributes in process `syz.2.13570'. [ 1616.621406][ T5647] incfs: Options parsing error. -22 [ 1616.748970][ T5647] incfs: mount failed -22 [ 1619.200903][ T5684] device veth0_vlan left promiscuous mode [ 1619.229636][ T5684] device veth0_vlan entered promiscuous mode [ 1619.297869][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1619.328068][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1619.340704][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1619.409417][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1619.458348][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1619.472281][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1619.481418][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 1619.491794][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1619.502264][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 1619.510808][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1620.001272][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1620.093368][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1620.108531][ T5680] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1620.119560][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1620.128153][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1620.137134][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1620.145156][ T5680] FAT-fs (loop3): unable to read boot sector [ 1620.152704][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1620.161779][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1620.171490][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1620.187599][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1620.207192][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1620.226245][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1620.237047][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1620.245910][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready [ 1620.297499][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1620.306026][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 1620.313776][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 1620.327013][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 1620.334926][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 1620.342588][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth7: link becomes ready [ 1620.350275][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [ 1620.365511][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth9: link becomes ready [ 1620.374425][ T4665] IPv6: ADDRCONF(NETDEV_CHANGE): veth8: link becomes ready [ 1620.411217][ T5700] netlink: 44 bytes leftover after parsing attributes in process `syz.4.13595'. [ 1620.420372][ T5700] netlink: 44 bytes leftover after parsing attributes in process `syz.4.13595'. [ 1623.655241][ T30] kauditd_printk_skb: 47 callbacks suppressed [ 1623.655259][ T30] audit: type=1326 audit(2000001646.625:23908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5744 comm="syz.2.13606" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1623.782269][ T30] audit: type=1326 audit(2000001646.663:23909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5744 comm="syz.2.13606" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1623.806212][ T30] audit: type=1326 audit(2000001646.663:23910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5744 comm="syz.2.13606" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f32a0ff8f03 code=0x7ffc0000 [ 1623.831741][ T30] audit: type=1326 audit(2000001646.663:23911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5744 comm="syz.2.13606" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f32a0ff797f code=0x7ffc0000 [ 1623.892706][ T30] audit: type=1326 audit(2000001646.663:23912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5744 comm="syz.2.13606" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f32a0ff8f57 code=0x7ffc0000 [ 1624.679094][ T5755] netlink: 'syz.4.13612': attribute type 1 has an invalid length. [ 1624.693978][ T30] audit: type=1326 audit(2000001646.663:23913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5744 comm="syz.2.13606" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f32a0ff7710 code=0x7ffc0000 [ 1624.723254][ T30] audit: type=1326 audit(2000001646.663:23914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5744 comm="syz.2.13606" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f32a0ff8acb code=0x7ffc0000 [ 1624.778209][ T30] audit: type=1326 audit(2000001646.663:23915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5744 comm="syz.2.13606" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f32a0ff7b2a code=0x7ffc0000 [ 1624.802987][ T30] audit: type=1326 audit(2000001646.663:23916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5744 comm="syz.2.13606" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f32a0ff7b2a code=0x7ffc0000 [ 1625.619089][ T5768] overlayfs: failed to clone lowerpath [ 1625.978622][ T30] audit: type=1326 audit(2000001646.663:23917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5744 comm="syz.2.13606" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1626.109767][ T5774] netlink: 8 bytes leftover after parsing attributes in process `syz.0.13610'. [ 1626.118894][ T5774] netlink: 8 bytes leftover after parsing attributes in process `syz.0.13610'. [ 1627.126808][ T5796] netlink: 104 bytes leftover after parsing attributes in process `syz.1.13621'. [ 1627.462066][ T5801] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13623'. [ 1628.020463][ T5815] overlayfs: failed to clone upperpath [ 1632.093941][ T30] kauditd_printk_skb: 85 callbacks suppressed [ 1632.093973][ T30] audit: type=1400 audit(2000001654.521:24003): avc: denied { connect } for pid=5824 comm="syz.4.13633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1633.860787][ T5876] netlink: 28 bytes leftover after parsing attributes in process `syz.4.13645'. [ 1633.877611][ T5876] netlink: 28 bytes leftover after parsing attributes in process `syz.4.13645'. [ 1634.660228][ T5888] syz.1.13648[5888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1634.660322][ T5888] syz.1.13648[5888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1634.693383][ T5888] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13648'. [ 1634.741330][ T5888] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13648'. [ 1634.887544][ T5898] futex_wake_op: syz.4.13651 tries to shift op by -1; fix this program [ 1638.003678][ T5938] incfs: Options parsing error. -22 [ 1638.009034][ T5938] incfs: mount failed -22 [ 1638.105541][ T5940] netlink: 4 bytes leftover after parsing attributes in process `syz.5.13664'. [ 1639.770680][ T5958] futex_wake_op: syz.2.13666 tries to shift op by -1; fix this program [ 1641.495153][ T30] audit: type=1326 audit(2000001663.314:24004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.0.13669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1641.525321][ T30] audit: type=1326 audit(2000001663.314:24005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.0.13669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1641.590582][ T30] audit: type=1326 audit(2000001663.361:24006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.0.13669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1641.619837][ T30] audit: type=1326 audit(2000001663.361:24007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.0.13669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1642.549925][ T30] audit: type=1326 audit(2000001663.361:24008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.0.13669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1642.574825][ T30] audit: type=1326 audit(2000001663.361:24009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.0.13669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f9010b17617 code=0x7ffc0000 [ 1642.602233][ T30] audit: type=1326 audit(2000001663.361:24010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.0.13669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1642.626092][ T30] audit: type=1326 audit(2000001663.361:24011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.0.13669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1642.651877][ T30] audit: type=1326 audit(2000001663.361:24012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.0.13669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1642.814655][ T30] audit: type=1326 audit(2000001663.361:24013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.0.13669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1643.059455][ T5990] device bridge0 entered promiscuous mode [ 1643.075551][ T5990] bridge0: port 1(macsec0) entered blocking state [ 1643.118022][ T5990] bridge0: port 1(macsec0) entered disabled state [ 1643.126723][ T5990] device bridge0 left promiscuous mode [ 1653.754038][ T6087] netlink: 44 bytes leftover after parsing attributes in process `syz.5.13702'. [ 1653.763687][ T6087] netlink: 44 bytes leftover after parsing attributes in process `syz.5.13702'. [ 1653.775379][ T6087] netlink: 44 bytes leftover after parsing attributes in process `syz.5.13702'. [ 1653.785272][ T6087] netlink: 44 bytes leftover after parsing attributes in process `syz.5.13702'. [ 1653.794884][ T6087] netlink: 44 bytes leftover after parsing attributes in process `syz.5.13702'. [ 1653.804353][ T6087] netlink: 44 bytes leftover after parsing attributes in process `syz.5.13702'. [ 1653.813857][ T6087] netlink: 44 bytes leftover after parsing attributes in process `syz.5.13702'. [ 1653.823629][ T6087] netlink: 44 bytes leftover after parsing attributes in process `syz.5.13702'. [ 1653.833169][ T6087] netlink: 44 bytes leftover after parsing attributes in process `syz.5.13702'. [ 1653.842633][ T6087] netlink: 44 bytes leftover after parsing attributes in process `syz.5.13702'. [ 1655.715258][ T6112] netlink: 'syz.2.13711': attribute type 16 has an invalid length. [ 1655.723409][ T6112] netlink: 'syz.2.13711': attribute type 17 has an invalid length. [ 1655.779022][ T6112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1659.869510][ T6173] syz.5.13728[6173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1659.869736][ T6173] syz.5.13728[6173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1661.504833][ T6189] overlayfs: failed to resolve './file1': -2 [ 1661.634433][ T6199] __nla_validate_parse: 48 callbacks suppressed [ 1661.634454][ T6199] netlink: 96 bytes leftover after parsing attributes in process `syz.4.13736'. [ 1662.407022][ T6207] tmpfs: Unknown parameter 'nolazu!}2y1#j`FPn@@m_97|z+G' [ 1663.992921][ T6224] overlayfs: failed to clone upperpath [ 1665.333236][ T6237] overlayfs: failed to clone upperpath [ 1666.282109][ T6250] netlink: 8 bytes leftover after parsing attributes in process `syz.0.13748'. [ 1671.342497][ T6282] overlayfs: './file0' not a directory [ 1676.657361][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 1676.657380][ T30] audit: type=1326 audit(2000001696.205:24052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6326 comm="syz.1.13770" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1676.729953][ T30] audit: type=1326 audit(2000001696.205:24053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6326 comm="syz.1.13770" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1677.758809][ T30] audit: type=1326 audit(2000001697.234:24054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6344 comm="syz.0.13774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1677.786948][ T30] audit: type=1326 audit(2000001697.262:24055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6344 comm="syz.0.13774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1678.071203][ T30] audit: type=1326 audit(2000001697.262:24056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6344 comm="syz.0.13774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1678.258004][ T30] audit: type=1326 audit(2000001697.262:24057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6344 comm="syz.0.13774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1678.315052][ T30] audit: type=1326 audit(2000001697.262:24058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6344 comm="syz.0.13774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1678.358725][ T30] audit: type=1326 audit(2000001697.262:24059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6344 comm="syz.0.13774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=311 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1678.390415][ T30] audit: type=1326 audit(2000001697.262:24060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6344 comm="syz.0.13774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1678.446897][ T30] audit: type=1326 audit(2000001697.262:24061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6344 comm="syz.0.13774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=28 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1679.461321][ T6363] netlink: 'syz.1.13781': attribute type 6 has an invalid length. [ 1684.044560][ T6405] overlayfs: failed to resolve './file1': -2 [ 1688.522028][ T6431] netlink: 24 bytes leftover after parsing attributes in process `syz.5.13801'. [ 1688.596982][ T6431] netlink: 4 bytes leftover after parsing attributes in process `syz.5.13801'. [ 1691.466882][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 1691.466898][ T30] audit: type=1326 audit(2000001710.059:24100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6481 comm="syz.0.13814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1691.658346][ T30] audit: type=1326 audit(2000001710.059:24101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6481 comm="syz.0.13814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1691.795814][ T30] audit: type=1326 audit(2000001710.087:24102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6481 comm="syz.0.13814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1691.819752][ T30] audit: type=1326 audit(2000001710.087:24103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6481 comm="syz.0.13814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1691.847088][ T30] audit: type=1326 audit(2000001710.087:24104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6481 comm="syz.0.13814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1691.875218][ T30] audit: type=1326 audit(2000001710.087:24105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6481 comm="syz.0.13814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1691.946256][ T30] audit: type=1326 audit(2000001710.087:24106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6481 comm="syz.0.13814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1692.499581][ T6502] overlayfs: failed to clone upperpath [ 1693.194878][ T30] audit: type=1326 audit(2000001710.087:24107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6481 comm="syz.0.13814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1693.628286][ T30] audit: type=1326 audit(2000001710.087:24108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6481 comm="syz.0.13814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1693.782007][ T30] audit: type=1326 audit(2000001710.087:24109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6481 comm="syz.0.13814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9010b18ec9 code=0x7ffc0000 [ 1695.616530][ T6548] syz.5.13830[6548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1695.618122][ T6548] syz.5.13830[6548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1697.713865][ T6568] netlink: 24 bytes leftover after parsing attributes in process `syz.2.13835'. [ 1698.441429][ T6575] xt_hashlimit: max too large, truncated to 1048576 [ 1700.235952][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1700.235990][ T30] audit: type=1326 audit(2000001718.263:24117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1700.838906][ T6602] overlayfs: failed to clone upperpath [ 1701.726337][ T30] audit: type=1326 audit(2000001718.263:24118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1701.757822][ T30] audit: type=1326 audit(2000001719.554:24119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1701.831899][ T30] audit: type=1326 audit(2000001719.554:24120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1702.777034][ T30] audit: type=1326 audit(2000001719.554:24121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1702.801394][ T30] audit: type=1326 audit(2000001719.554:24122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1706.656748][ T30] audit: type=1326 audit(2000001719.554:24123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1707.307714][ T30] audit: type=1326 audit(2000001719.554:24124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1708.066599][ T6625] netlink: 'syz.4.13851': attribute type 5 has an invalid length. [ 1708.147279][ T30] audit: type=1326 audit(2000001719.554:24125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=311 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1708.252407][ T30] audit: type=1326 audit(2000001719.554:24126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1708.277760][ T30] audit: type=1326 audit(2000001719.554:24127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1708.341988][ T30] audit: type=1326 audit(2000001719.554:24128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=28 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1708.400525][ T30] audit: type=1326 audit(2000001719.554:24129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1708.446484][ T30] audit: type=1326 audit(2000001719.554:24130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1708.471107][ T30] audit: type=1326 audit(2000001719.554:24131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=25 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1708.502909][ T30] audit: type=1326 audit(2000001719.554:24132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6591 comm="syz.5.13845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1708.555220][ T6623] fuse: Bad value for 'fd' [ 1710.300553][ T6670] overlayfs: failed to clone upperpath [ 1710.880250][ T6681] IPv6: sit3: Disabled Multicast RS [ 1715.898325][ T6722] overlayfs: failed to clone upperpath [ 1718.194723][ T6755] overlayfs: failed to clone upperpath [ 1718.871288][ T6757] netlink: 'syz.0.13885': attribute type 2 has an invalid length. [ 1722.127545][ T30] kauditd_printk_skb: 54 callbacks suppressed [ 1722.127562][ T30] audit: type=1107 audit(2000001994.742:24187): pid=6818 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1725.613569][ T6845] IPv6: sit4: Disabled Multicast RS [ 1726.221026][ T6857] overlayfs: failed to clone upperpath [ 1726.777832][ T6861] tipc: Enabling of bearer rejected, already enabled [ 1729.687614][ T30] audit: type=1326 audit(2000002001.814:24188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6883 comm="syz.5.13916" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1729.758196][ T30] audit: type=1326 audit(2000002001.814:24189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6883 comm="syz.5.13916" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1730.086848][ T30] audit: type=1326 audit(2000002001.842:24190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6883 comm="syz.5.13916" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1730.119352][ T30] audit: type=1326 audit(2000002001.842:24191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6883 comm="syz.5.13916" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1730.210335][ T30] audit: type=1326 audit(2000002001.842:24192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6883 comm="syz.5.13916" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06df05ec9 code=0x7ffc0000 [ 1730.769103][ T6911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready [ 1730.795566][ T6911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready [ 1730.828749][ T6911] device bridge0 left promiscuous mode [ 1734.929601][ T6942] netlink: 'syz.1.13928': attribute type 4 has an invalid length. [ 1738.553877][ T30] audit: type=1326 audit(2000002010.083:24193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6969 comm="syz.2.13935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1738.582665][ T30] audit: type=1326 audit(2000002010.083:24194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6969 comm="syz.2.13935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f32a0ff7710 code=0x7ffc0000 [ 1738.608378][ T30] audit: type=1326 audit(2000002010.083:24195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6969 comm="syz.2.13935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1738.632305][ T30] audit: type=1326 audit(2000002010.092:24196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6969 comm="syz.2.13935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1738.657221][ T30] audit: type=1326 audit(2000002010.092:24197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6969 comm="syz.2.13935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1738.723800][ T30] audit: type=1326 audit(2000002010.092:24198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6969 comm="syz.2.13935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1738.803709][ T30] audit: type=1326 audit(2000002010.092:24199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6969 comm="syz.2.13935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1738.881542][ T30] audit: type=1326 audit(2000002010.092:24200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6969 comm="syz.2.13935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1738.905574][ T30] audit: type=1326 audit(2000002010.092:24201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6969 comm="syz.2.13935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1738.940684][ T30] audit: type=1326 audit(2000002010.092:24202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6969 comm="syz.2.13935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32a0ff8ec9 code=0x7ffc0000 [ 1739.919478][ T6992] xt_CT: No such helper "pptp" [ 1740.907095][ T7009] device bridge0 entered promiscuous mode [ 1740.912899][ T7009] device macsec0 entered promiscuous mode [ 1740.919355][ T7009] bridge0: port 1(macsec0) entered blocking state [ 1740.925797][ T7009] bridge0: port 1(macsec0) entered disabled state [ 1741.155638][ T7009] device bridge0 left promiscuous mode [ 1743.157347][ T7036] netlink: 8 bytes leftover after parsing attributes in process `syz.4.13950'. [ 1744.392618][ T7052] netlink: 32 bytes leftover after parsing attributes in process `syz.4.13956'. Stopping sshd: [ 1744.693399][ T7064] netlink: 'syz.0.13958': attribute type 16 has an invalid length. [ 1744.711097][ T7064] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready stopped /usr/sbin/sshd (pid 192) OK Stopping crond: stopped /usr/sbin/crond (pid 185) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 1745.419502][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 1745.419553][ T30] audit: type=1400 audit(2000002016.528:24239): avc: denied { search } for pid=7078 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 1746.931494][ T30] audit: type=1400 audit(2000002017.903:24240): avc: denied { read write } for pid=7098 comm="ip" path="/dev/console" dev="rootfs" ino=31 scontext=system_u:system_r:ifconfig_t tcontext=system_u:object_r:root_t tclass=chr_file permissive=1 [ 1746.983354][ T7106] tipc: Enabling of bearer rejected, already enabled [ 1747.456950][ T7105] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7105 comm=syz.2.13966 [ 1748.074504][ T30] audit: type=1400 audit(2000002019.007:24241): avc: denied { write } for pid=140 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1748.241064][ T30] audit: type=1400 audit(2000002019.007:24242): avc: denied { remove_name } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 1748.885417][ T30] audit: type=1400 audit(2000002019.007:24243): avc: denied { unlink } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 1749.037484][ T30] audit: type=1400 audit(2000002019.063:24244): avc: denied { unlink } for pid=140 comm="dhcpcd" name="pid" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Stopping iptables: [ 1749.123887][ T30] audit: type=1400 audit(2000002019.989:24245): avc: denied { read write } for pid=7124 comm="iptables" path="/dev/console" dev="rootfs" ino=31 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:root_t tclass=chr_file permissive=1 OK Stopping system message bus: [ 1749.170316][ T30] audit: type=1400 audit(2000002020.017:24246): avc: denied { search } for pid=7124 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1749.225953][ T30] audit: type=1400 audit(2000002020.017:24247): avc: denied { write } for pid=7124 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1749.307037][ T7134] fuse: Bad value for 'fd' [ 1749.329909][ T30] audit: type=1400 audit(2000002020.017:24248): avc: denied { add_name } for pid=7124 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 done killall: udevd: no process killed [ 1753.462530][ T7177] netlink: 32 bytes leftover after parsing attributes in process `syz.2.13981'. Stopping klogd: [ 1754.697151][ T7184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=7184 comm=syz.2.13981 OK [ 1754.737330][ T7184] netlink: 32 bytes leftover after parsing attributes in process `syz.2.13981'. Stopping acpid: [ 1754.865688][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1754.865707][ T30] audit: type=1400 audit(2000002025.358:24252): avc: denied { write } for pid=86 comm="acpid" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1755.856922][ T30] audit: type=1400 audit(2000002025.358:24253): avc: denied { remove_name } for pid=86 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1755.884125][ T30] audit: type=1400 audit(2000002025.358:24254): avc: denied { unlink } for pid=86 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping syslogd: stopped /sbin/syslogd (pid 83) OK [ 1758.712725][ T7243] netlink: 24 bytes leftover after parsing attributes in process `syz.4.13994'. [ 1759.742707][ T30] audit: type=1326 audit(2000002029.904:24255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.13996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1759.936977][ T30] audit: type=1326 audit(2000002029.904:24256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.13996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1759.960764][ T30] audit: type=1326 audit(2000002029.904:24257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.13996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1759.984418][ T30] audit: type=1326 audit(2000002029.913:24258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.13996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1760.009792][ T30] audit: type=1326 audit(2000002029.913:24259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.13996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 umount: can't remount debugfs read-only [ 1760.061753][ T30] audit: type=1326 audit(2000002029.913:24260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.13996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 [ 1760.109805][ T30] audit: type=1326 audit(2000002029.913:24261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.13996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f726263fec9 code=0x7ffc0000 umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only [ 1760.309143][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 1760.309165][ T30] audit: type=1400 audit(2000002030.390:24280): avc: denied { execmem } for pid=7259 comm="syz.1.13999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 The system is going down NOW! Connection to 10.128.1.34 closed by remote host. Sent SIGTERM to all processes [ 1760.625843][ T30] audit: type=1400 audit(2000002030.559:24281): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14965]" dev="pipefs" ino=14965 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1761.116704][ T681] tipc: Disabling bearer [ 1761.122287][ T681] tipc: Disabling bearer [ 1761.127672][ T681] tipc: Disabling bearer [ 1761.132928][ T681] tipc: Left network mode [ 1761.137855][ T681] tipc: Disabling bearer [ 1761.143371][ T681] tipc: Disabling bearer [ 1761.148816][ T681] tipc: Disabling bearer [ 1761.154222][ T681] tipc: Left network mode [ 1761.159322][ T681] tipc: Disabling bearer [ 1761.165212][ T681] tipc: Disabling bearer [ 1761.170548][ T681] tipc: Disabling bearer [ 1761.175893][ T681] tipc: Left network mode [ 1761.986221][ T681] device veth0_vlan left promiscuous mode Sent SIGKILL to all processes Requesting system poweroff [ 1763.250090][ T7262] kvm: exiting hardware virtualization [ 1763.257259][ T7262] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1763.264436][ T7262] ACPI: PM: Preparing to enter system sleep state S5 [ 1763.271622][ T7262] reboot: Power down serialport: VM disconnected.