last executing test programs: 3m53.067797024s ago: executing program 3 (id=1431): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x3, 0x6361, 0x7, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r4, &(0x7f00000005c0)="bad3", 0x2, 0x40, &(0x7f00000001c0)={0x11, 0x8100, r3, 0x1, 0xd8, 0x6, @multicast}, 0x14) 3m52.80146462s ago: executing program 3 (id=1437): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "db748d6b120426ad", "4fe429faa1e90c473725b5e429ac42fa", "917e060b", "92816af8b4efb2ad"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "1e00040000000100"}, 0x28) 3m52.79854689s ago: executing program 3 (id=1438): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x149640, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x627, 0x4c1, 0x43, 0x0, 0x30) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90224fc602f0000000a0c0100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 3m52.643010844s ago: executing program 3 (id=1439): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000100)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x1c1202, 0x0) sendfile(r1, r0, 0x0, 0x3ffff) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x187842, 0x3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x3920e, 0xffffffffffffffff, 0x2, 0x0, 0x2}) socket$nl_route(0x10, 0x3, 0x0) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000001c0)="997dc5ae84e598bc9d15e4b7a509689d0a4f277211f538390527020cd37fdaaf680d924302cde8160e9d2c56a8ad6b62a59b829f9665d2d97a7fd609a7a565bf1b6b774f572df3ff455201ec6420412363bfb73191", 0x55}], 0x1, 0x2, 0x0, 0xb) socket$inet_udp(0x2, 0x2, 0x0) 3m52.298407008s ago: executing program 3 (id=1447): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) close(0xffffffffffffffff) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a808682b7fc4c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000020000380100000800c00018006000100d10300000c00008008000340000000023f0000000e0a010200000000000000000a0000000900010073797a31000000000900020073797a31"], 0xdc}, 0x1, 0x0, 0x0, 0x48051}, 0x40) 3m51.698159055s ago: executing program 3 (id=1457): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x52, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) clock_nanosleep(0x9, 0x0, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="5800000000090101000000000000000000000000100004800800014000000004240002000c0002800500010a0000000014000280080001000000000008000200ac1414000800054000000000090001"], 0x58}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000c40)='./file2\x00', 0x10447, &(0x7f0000000140), 0x3, 0x43b, &(0x7f0000000200)="$eJzs3MtvG8UfAPDv2kn6Sx+/mKo8mhYIFETEI2nSUnrgAgKJA0hIcCjHkKRVqNugJki0iiAgVI6oEnfEEYm/gBNcEHBC4gp3VKlCubT0ZLT2buI4dh5uEgf8+UibzOzOaubr3bFnduIE0LWG0h9JxMGI+D0iBmrZ1QWGar/uLC1M/r20MJlEpfLWX0m13O2lhcm8aH7egTxTiih8lsSxJvXOXb12caJcnr6S5UfnL70/Onf12nMzlyYuTF+Yvjx+9uzpU2MvnBl/flviTOO6PfjR7PGjr71z443Jczfe/fnbJI+/IY4tKbQ8MrTeaU9WKm1Vt1cdqksnPSvJDU6rtH752A3FiEgvV2+1/w9EMVYu3kC8+mlHGwfsqL71Dy9WgP+wdDQPdKP8gz6d/+bbLgw79oxbL9UmQGncd7KtdqRneWrf2zC/3U5DEXFu8e5X6Rb38hwCAGCTvk/HP882G/8V4oG6cv/P1lBKEXFfRByOiDMRcSQi7o+oln0wIh7aYv2NiyRrxz+Fm20Ftknp+O/FbG1r9fhveWWiVMxyh6rx9ybnZ8rTJ7PXZDh696X5sXXq+OGV375odax+/Jduaf35WDBrx82efavPmZqYn7iXmOvd+iRisKdZ/MnySkASEUcjYrDNOmae/uZ4q2Mbx7+zKl9HPFW7/ovREH8uWX99cvR/UZ4+OZrfFWv98uv1N1vV3+n40+u/v+n9vxx/Kalfr53beh3X//i85Zym3fu/L3l71b4PJ+bnr4xF9CWv1xpdv3+8odz4Svk0/uETzfv/4Vh5JY5FRHoTPxwRj0TEo1nbH4uIxyPixDrx//TyE++1H//OSuOfioi72fOAja//SqIvGvc0TxQv/vjdqkpLW4k/vf6nq6nhbM9m3v8206727mYAAAD49ylExMFICiPL6UJhZKT2N/xHYn+hPDs3/8z52Q8uT9W+I1CK3kL+pGug7nnoWDatz/PjDflT2XPjL4v91fzI5Gx5qtPBQ5c70KL/p/4sdrp1wI7r6XQDgI7R/6F76f/QvfR/6F5N+n9/J9oB7L5q/2/4V00fd6gtwO5q+Py37AddxPwfupf+D91L/4euNNcfG39JXkJiTSIKe6IZEjuU6PQ7EwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwPb4JwAA///5++Y6") 3m51.697454795s ago: executing program 32 (id=1457): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x52, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) clock_nanosleep(0x9, 0x0, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="5800000000090101000000000000000000000000100004800800014000000004240002000c0002800500010a0000000014000280080001000000000008000200ac1414000800054000000000090001"], 0x58}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000c40)='./file2\x00', 0x10447, &(0x7f0000000140), 0x3, 0x43b, &(0x7f0000000200)="$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") 3m43.886687731s ago: executing program 4 (id=1567): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000013"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) recvmsg$unix(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001780)=""/4071, 0xfe7}], 0x12, 0x0, 0x0, 0x406}, 0x40020000) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0xfffe}], 0x1}, 0x0) 3m43.800437419s ago: executing program 4 (id=1568): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f0000000140)={'wg2\x00', @local}) 3m43.756823823s ago: executing program 4 (id=1570): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) close(0xffffffffffffffff) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a808682b7fc4c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000020000380100000800c00018006000100d10300000c00008008000340000000023f0000000e0a010200000000000000000a0000000900010073797a31000000000900020073797a31"], 0xdc}, 0x1, 0x0, 0x0, 0x48051}, 0x40) 3m43.566383221s ago: executing program 4 (id=1573): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000100)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x1c1202, 0x0) sendfile(r1, r0, 0x0, 0x3ffff) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x187842, 0x3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x3920e, 0xffffffffffffffff, 0x2, 0x0, 0x2}) socket$nl_route(0x10, 0x3, 0x0) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000001c0)="997dc5ae84e598bc9d15e4b7a509689d0a4f277211f538390527020cd37fdaaf680d924302cde8160e9d2c56a8ad6b62a59b829f9665d2d97a7fd609a7a565bf1b6b774f572df3ff455201ec6420412363bfb73191", 0x55}], 0x1, 0x2, 0x0, 0xb) socket$inet_udp(0x2, 0x2, 0x0) 3m43.433812384s ago: executing program 4 (id=1577): socket$netlink(0x10, 0x3, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000500), 0x20000, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x95255000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2f00, 0x4d, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) 3m43.206255345s ago: executing program 4 (id=1580): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='cmdline\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond_slave_1\x00', &(0x7f0000000000)=@ethtool_gstrings={0x1b, 0x1}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x18) r1 = syz_io_uring_setup(0x50a, &(0x7f0000000000)={0x0, 0xc2bf, 0x10, 0xb, 0x3a9}, &(0x7f0000000080)=0x0, &(0x7f0000000540)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f00000002c0)=0x9, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_STATX={0x15, 0xa, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x6000}) io_uring_enter(r1, 0x1c39, 0x106a, 0x22, 0x0, 0x0) 3m43.176007348s ago: executing program 33 (id=1580): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='cmdline\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond_slave_1\x00', &(0x7f0000000000)=@ethtool_gstrings={0x1b, 0x1}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x18) r1 = syz_io_uring_setup(0x50a, &(0x7f0000000000)={0x0, 0xc2bf, 0x10, 0xb, 0x3a9}, &(0x7f0000000080)=0x0, &(0x7f0000000540)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f00000002c0)=0x9, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_STATX={0x15, 0xa, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x6000}) io_uring_enter(r1, 0x1c39, 0x106a, 0x22, 0x0, 0x0) 2m35.626155536s ago: executing program 1 (id=2681): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00', 0x0}) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', r2}, 0x90) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00', 0x0}) sendmsg$unix(r1, 0x0, 0x840) vmsplice(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="3b256c7a40ff8cf30d776a89d5cf", 0xe}], 0x1, 0x4) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000001100010025bd7000ffdbdf2500000000", @ANYRES32=r5], 0x20}}, 0x8080) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="340000001000010027bd70000000000000000000", @ANYRES32=r1, @ANYBLOB="004100000000000014002b8008000100", @ANYRES32=r3], 0x34}}, 0x4008000) 2m35.513603117s ago: executing program 1 (id=2686): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = memfd_create(&(0x7f00000005c0)='\x103q}2[\xe0\x9a\xee\xaf\x03\x97\x9et\v\"|Ma\x86\xe7\xc0\x14\x9f\xb9h\xb1\x96\xe7=I\x860S6\xb5\xa8\xc2\x95Je%\xfeG\'\b\x00\x00\x00\x00\x00\x00\x00\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94k\xcd\t\x00\x90k\xd6\x05\xb6&\xd0\x9daA\xc5\x9c_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2Oc\xc0c\x03gB!\xb0\xb8n\x01\x9bT\x95\x10\x86\xe8$\x7f\r[\xf9\x0e1v\xb1\n\x88\v\x95uy\xb5:`\x8b\nC\x18A;\xaa%\xaf\xc7\xa3\xac\xa2D\xb5\xe2\xe1\xdc(\xfd\x05\x9fB\x84O\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\xa0\x17\xe3\xac\xe9\xc9\xa7\x8a\x1b\x03\"&\xac\xcap>\xccZ\x01\xbc\x18\xc1\xb9\xe9\v\x8b\x9c\xb4Q\xd4\x96EV<>\x99\xca\xb3\xe0\xc4tL\xed\xf5W\xbd#\xcf\x8a\x84\xed\x9f/\xd4\xbb\xea;-Dp\xf8\xd0F\x90\xf8\x92Ip6\xf4\x16\xe8\x14\xe0\x92!\x92-F\xe2\x14D\x91\xa8b\x04\xdd\x1d\a\xdc\xe0\x18\x85{\x80Q\xf6k\x96\xfaQ\x9fW\vO\xf0\xe4O\\\xceS\xe2\x05\x049d\x06#\x88\xc3\xdf\x85O\x1c\xc3\xad?r\xd7\x0e\x00\xd7\x83\xb0\x88\x9c\xf6Y-F\x98\xdd\x9c~\xfd\x95\xc3\xb6lC\xaa\"Y\xa2K\xecz\x84:*\xf5Y\xd1\x9b1\xbd\x9b\x15\xd4\xec\x02o\x01&\xaa\x90w\xc4\xc7\x8en\xb5\x1ag\xab&?\xbe\xcb\xe8v\xa8\xe0\xa4\x81sW\xacf\x149\xd2}\xef\x03Ga\x9a$4\x8c\xa5!p\x83\x05\x96%\x02%\xabj\n\b\xc8NC\x91}&y\xd3\xe1\xeep\'\xc5\xab\x19GsX5\x8c\n\x9fh\xee;4\xb1%V\xe0\xa9\x8e\xf30:\xd8\x18N~G\x139\xcaf2\x02F1\xc6\x82\x00E\xae\x9d\x17\x871N:\xb4\xea \x8e\xdelP\x83\x1f\'\xe2\xd6\xc0\xc3\xfc\xc9677u\xf3RUP@o>\xee\xb8\xa3\t\x02\xb7\\,\xebK\xed\x1b\xc9e\xb3\x16\xce\x9bI\xdb\xfa\x82\x85\t\x9bg\xd0s\xe2\f{\x8cp~;\xf8\x96\xf2\x91\x06\x89\xa6D\xce\xac\x03\xc1\x83\xd1\xe6 |\xa75\xd7\x80t\xfc\xf8\xd2\x12N\x1cB7^\xfd4\xae\xb0VFw\b!\xae\x1baTv\xc0z\x19\xc5\xc8w\xba\x97N\x9a`\x8f\xfc\x9ee\xf9\x00\x1cQA\x14]\r\xd4\"\xc2\x12GD\xdb{\x88\xaa\x81\xc8\xa2\xdeI\xa2\xbel\x0e\xec\x17fNI\x05\xff\x8d\xf4_\x1a\vqA\xb7\x0ed<\x98\xee\xb8\x19\xec\x9f\xee\xe1_\xacG\x8b\xa3\xc3\x13\x80\x0f\xf4I\xdeAwG\xbdkno\xa2\b\x126\x97\x9b\xf9|P\xd94\v\x15\xcb\xc0\x9d\x11\xf3\x18\xae!2\x1b\x12\xa9\xc8~\xb7S\x94\xb5\xc7;\xa90D>s\xe9\xa4N\xf8\xdb\xab\xa0\x94~\xa1]b\xa4\xe5\xe2e\x1c\x8b\xd2\xc7Md\x93\x02\xd8\xb0,\xeb\x03\xaa\v\xed\x9bR\x8a\x80\xc2\x1f\x17ej\x973wv\x83a\xe06\x96\xde\xbc%Uh;H\xf8S\xf1\xa1g\x02\xc4\xc3\xa4\xa8\x96\t\xfex\xa2?\xcb\\Y\x1e\xfe\xca\xa0i\x80O\x11\xac\xb7$\xdb\xbc\xb0\xcb\xacqU\xb5*\x00\x00\x00\x00\x00\x00\x00\f\xda\xf8oV\x89\xd3\x1f\x99+\xe5T\x8eM4\x1c\xc6\x7f\xd4\xf2\xcc\xd3\x94\xca\xd4\x00\x00\x00\x00\x00\x00\x00\x00\x00~A9\xf6IBu2L\x9e\xa2\xd0\x92\xd1\xbc\xb8\tJ\xa1\aN\x87\x95\xbb\xa9s\xab\x90\x06\xc6!p\x9e?~\xf9\xe6\xae*\v\xa3\xd9gxKN\'z]*\x93\xf7\b\x91\xd0\xff\xd9\xc6a\xb5q\x9c\xa1Go\xd58\x93\xe0,\x9f\xe4\xa9\xd9A\x9e\x95e\x98\xd0V\x9d\xed\x97\xf1\xc5\xce\xf5\x90!d\x9a\xd8\x10\xbbx\r8\xff\x8bNUK\xebA\xe5\x92f\xc4\xd1\xa8\x15\xbf\xb5iW\xdb.kbf*\x89\xf0\xecq m-~\xbbf?\xec=\xd2\xe2\x1e\x8d/o\xcd\xc8x\xdb\xe6\xd0W\xca\xc5kz\x8e9\xfa\x86\x0f\x96p', 0x3) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}) fcntl$addseals(r3, 0x409, 0xb) 2m35.361074261s ago: executing program 1 (id=2689): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./file1\x00', 0x1000002, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYBLOB="73686f72746e616d653d77696e39352c756e695f786c6174653d312c636865636b3d7374726963742c646f733178666c6f7070792c757466383d312c757466383d312c757466383d302c696f636861727365743d6370313235de26302c696f636861727365743d69736f383835392d342c696f636861727365743d64656661756c742c73686f72746e616d653d6d69786564"], 0xfc, 0x1b8, &(0x7f0000001400)="$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") prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000001cc0)='kfree\x00', r0, 0x0, 0xfffffffffffffffc}, 0x29) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair(0x23, 0x2, 0x1, &(0x7f0000000040)) 2m34.128693469s ago: executing program 1 (id=2697): getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xb, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff47}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) quotactl$Q_GETFMT(0xffffffff80000400, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0x1218088, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xa, 0x2c2, &(0x7f00000008c0)="$eJzs3T+LI2UcB/DfZHOTUYuksBLhBrzC6nCvE5sscgfiVh4p1EIX7w5kE4Q7WPAPxqtsbSwsfAWC4Au5xncg2Ap2rrAwMpOZndk1uyayWXH382n24Xl+33meJxmySZEnH74823+Qx6OnX/wSWZZEbxzjOExiFL1ofBUnjL8JAOD/7LAo4vdiYZ1cEhHZ5pYFAGzQav//+23zp0tZFgCwQffffe/tnd3du+9kkcW92dcHk/KTffl3Mb7zKD6OaTyM12IYRxHV+4T6g3/ZvlcUxbyfl0ZxazY/mJTJ2QfP6uvv/BZR5bdjGKPjWPVuo8q/tXt3u4rng05+Xq7j+Xr+cZm/E8N48Th8In9nkc+7+Zik8eornfXfjmH8/FF8EtN4UC2izX+5nedvFt/+8fn75fLKfDI/mAyqulaxdZnPCwAAAAAAAAAAAAAAAAAAAAAAV9vtvDl8J78Zt2ZlV33+ztZRWtfUJaM2VY4vWknT1TkfqDQv4vvOkYJ5URe25/v046V+92BBAAAAAAAAAAAAAAAAAAAAuL6efPrZ/t50+vDxhTSa0wD6EfHn/Yh/e51xp+dmnF88qOfcm057dfNEzbO02xNbTU0Sce4yyk1c0MPyT43nTq+5afzwY7nBdS6YdXpeX77BG5vfV3N37e8ly+caRNOT1TfJd2lEW5PGinOlZw0Vsc7tly4dGq699/SFqjE/s6Y5B+Os67zx62K87klO7yKtHtWls9+oG534qXtjpec9skX8768VSXVax2BDr0QAAAAAAAAAAAAAAAAAAED77d8lg0/PjfYKXwUGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4Ipof/9/jca8Dq9QnMbjJ//xFgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgG/goAAP///CFRHg==") mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x100) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) chroot(&(0x7f0000000100)='./file0\x00') mount$bind(&(0x7f0000000040)='.\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x2a05004, 0x0) pivot_root(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000180)='./file0/../file0\x00') 2m33.994331632s ago: executing program 1 (id=2703): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4000}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x50}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2, 0x0, 0xffffffffffffffff}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) 2m33.630385866s ago: executing program 1 (id=2708): prctl$PR_SET_NAME(0xf, &(0x7f0000000980)='\xff\x00\x00\x00\x00\x00\x000`\x14\x99\x06\xc0\x7fs\x00\t\x14\x17\xc3\xf5\xc9\v\x85\xe7\x00\x00\x18\x88\x06\x94\x98\xa9\xe7\x1c\x8a\x89\xdc\xcc\xf7L\xbd%\xc3!\x0e\x91S\xb2~8\"\xe2\xed\xbf\x12\x1a\\6p\'p\xef\x1a\n\x99\x12\xe8\'\x1c\x97M\xa5N\xd9\xbeV&\x1c2K?\x95\xd9\"\xbe\x050+\xca\xea\'\xe9)\xfe\xeb\x9c\xb5\xa0F`\xe4D\x10F\x831\xec\\v\xf0\xab_M\b\x03\xc3\n\x89\x01E`\xd35Q2\xecZz\xdc\x065p\x1c\x8f\x9b\x99IGXO\x00\x00\v\xed\xb0\xc5\xd4\xc7,\x1a\xb3}CMOO\x8a\xa8kh\x7f\x05c\xfc\xebb\xc8\xa2\xa9\xbf\xb3\x9b\xafE\xbd\xc5\xdc\xde\xbe_') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x3}, 0x18) socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@mask_cswp={0x58, 0x114, 0x9, {{0x9, 0x660}, 0x0, 0x0, 0x6, 0xd, 0x1, 0x3, 0x3a, 0x8}}], 0x58}, 0x0) r1 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r1, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000830b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) capset(0x0, 0x0) read(r3, 0x0, 0x0) 2m33.630235136s ago: executing program 34 (id=2708): prctl$PR_SET_NAME(0xf, &(0x7f0000000980)='\xff\x00\x00\x00\x00\x00\x000`\x14\x99\x06\xc0\x7fs\x00\t\x14\x17\xc3\xf5\xc9\v\x85\xe7\x00\x00\x18\x88\x06\x94\x98\xa9\xe7\x1c\x8a\x89\xdc\xcc\xf7L\xbd%\xc3!\x0e\x91S\xb2~8\"\xe2\xed\xbf\x12\x1a\\6p\'p\xef\x1a\n\x99\x12\xe8\'\x1c\x97M\xa5N\xd9\xbeV&\x1c2K?\x95\xd9\"\xbe\x050+\xca\xea\'\xe9)\xfe\xeb\x9c\xb5\xa0F`\xe4D\x10F\x831\xec\\v\xf0\xab_M\b\x03\xc3\n\x89\x01E`\xd35Q2\xecZz\xdc\x065p\x1c\x8f\x9b\x99IGXO\x00\x00\v\xed\xb0\xc5\xd4\xc7,\x1a\xb3}CMOO\x8a\xa8kh\x7f\x05c\xfc\xebb\xc8\xa2\xa9\xbf\xb3\x9b\xafE\xbd\xc5\xdc\xde\xbe_') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x3}, 0x18) socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@mask_cswp={0x58, 0x114, 0x9, {{0x9, 0x660}, 0x0, 0x0, 0x6, 0xd, 0x1, 0x3, 0x3a, 0x8}}], 0x58}, 0x0) r1 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r1, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000830b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) capset(0x0, 0x0) read(r3, 0x0, 0x0) 2.870194028s ago: executing program 5 (id=5500): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000007}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="800000000001010400000000141a000002"], 0x80}}, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x2a1, &(0x7f0000001340)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x64087000, 0x0, 0xffffff59, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000480)={'syztnl0\x00', 0x0, 0x80, 0x80, 0x6, 0x20000008, {{0x5, 0x4, 0x0, 0x20, 0x14, 0x66, 0x0, 0x80, 0x4, 0x0, @remote, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f3, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000040)={'erspan0\x00', r2, 0x0, 0x700, 0x4000002, 0x2, {{0x5, 0x4, 0x0, 0x16, 0x14, 0xfffd, 0x0, 0x81, 0x4, 0x0, @remote, @multicast2}}}}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) close(r3) 2.188696233s ago: executing program 5 (id=5503): socket$nl_route(0x10, 0x3, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x9) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xbf5, 0x2000402) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r1}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r2, &(0x7f0000000340)={0xa, 0x4e22, 0xff, @empty, 0x9c26}, 0x1c) listen(r3, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r5 = accept(r2, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[], 0xfffffdef}}, 0x1) recvfrom(r4, 0x0, 0x0, 0x4100, 0x0, 0x0) 2.156186836s ago: executing program 0 (id=5504): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="9b5800"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000a88602de00"/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000000)={[{@bsdgroups}, {@jqfmt_vfsv1}]}, 0xc1, 0x7e9, &(0x7f00000017c0)="$eJzs3c1rHG8dAPDvbF42SauJIGh7CggaKN2YGlsFDxEPIlgo6Nk2bLahZpMt2U1pQqDpQfAiqHgQ9NKzL/UgePXlqv+EeJAW0TRYT7oys7t53d0kbXa3/fXzgck8M/PMPPPN88yzz+4MuwF8sKbTP7mIKxHxwyRisrk+iYiRLDUcsdDI93p3u5hOSdTr3/pnkuX57aWDYyXN+aXmwqcj4o/fi7iWO17qeHNeLq03U7O11Yez1c2t6w9WF5dLy6W1m3Pz8zduffHWzZN7val//2Xr8ssfff1zv14Yjk89/8GfkliIy81te7vbxbc8/AnTMd38n4yk/8IjvnbRhQ1YMugT4I2kl+ZQ4yqPKzEZQ1mqg7e9AAGAd8KTiKgDAB+Y5LTX/yFDBAD4aGl9DrC3u11sTYP9RKK//vHViBhrxN+6v9nYMty8ZzeW3Qed2EuO3BlJImLqAsqfjoif/+47v0yn6NF9SIB2dp425nu7+WP9f5L2f6OnHyHfccvnu+1Wb+w3fWy1/g/65/fp+OdLJ8d/V/cf6BnL/h4b/4zl21y7b+L06z/3osOuZ+ibTpeO/75y6Nm2g/Hf/kNrU0PNpY9lY76R5P6Dcint2z4eETMxkk+X57Ks7Z+Cmnn131edyj88/vvXj7/7i7T8dH6QI/diOB/1xnN5/8vG60uLtcWLiD2L/2nE1eF28Sf749/kSP0v7Ed6p+NRj1bNN778/Z91ypnGn8bbmk7G31v1ZxGfbVv/B3WZdH0+cTZrDrOtRtHGb/7204lO5R/Ufz6bp+W33gv0Q1r/E93jn0pT1c2tlcVyubRePX8Zf342+YdO2w63//bxZ+3/iLT9jybfztKtlvZ4sVZbn4sYTb55cv2Ng31by638afwzn2l//bdv/42+IH1PeG9/qbvhl6O/ah6qbfyZnU7x91Ya/9K56r9Lot7c59im569XhjqVf7b6n89SM801Z+n/TjnTt2jNAAAAAAAAAAAAAAAAAAAAAAAAAHB+uYi4HEmusJ/O5QqFxm94fzImcuVKtXbtfmVjbSmy38qeipFc66suJw99H+pc8/vwW8s3ji1/ISI+ERE/yY9ny4Vipbw06OABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoOnS0d//f5LOCoXGtr/nB312AEDPjA36BACAvvP6DwAfnvO9/o/37DwAgP459/v/etKbEwEA+ubMr//3enseAED/uP8PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAj925fTud6v/Z3S6my0uPNjdWKo+uL5WqK4XVjWKhWFl/WFiuVJbLpUKxstrxQDuNWblSeTgfaxuPZ2ulam22url1d7WysVa7+2B1cbl0tzTSt8gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4Oyqm1sri+VyaV2iS2K8NN45TxIRAz/D0xJpXV/kAYff0ZB3/jqSteuumWPqvWn8o13yJBdZ1vjxNYd7ifFBdE0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA74X/BwAA///YTBJy") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) r3 = gettid() rt_tgsigqueueinfo(0x0, r3, 0x15, &(0x7f0000000000)={0x17, 0x3, 0x80}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r4) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000e80)={0x1c, r5, 0xb29, 0x0, 0x0, {{}, {@val={0x5}, @void}}}, 0x1c}}, 0x2404c044) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="b1921d91d43adc04000000", @ANYRES16=r5, @ANYBLOB="200029bd7000fedbdf2544000000040070000a0018000303030303030000"], 0x24}, 0x1, 0x0, 0x0, 0x4004084}, 0x4008080) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r6, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 1.768550692s ago: executing program 2 (id=5512): setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1b96aadc3618c72}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r3, 0x0) madvise(&(0x7f00007a6000/0x4000)=nil, 0x4000, 0x9) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x109a88, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x8}, 0x18) socket$inet(0x2, 0x1, 0x4) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 1.320381795s ago: executing program 6 (id=5519): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000007}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x2a1, &(0x7f0000001340)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x64087000, 0x0, 0xffffff59, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'sit0\x00', 0x0}) 1.309483776s ago: executing program 5 (id=5520): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYRES8, @ANYBLOB="00371154506edbabd0281c03b615346a3122b7476e890181b7f77c817f8242c212cb7bb52f85fd949956f2db03b7b73c34fed2a53e04c572e8c7e219288dc9cda12b072eff2321e464b07b9b7e317218004cd254002c354b6fcbb392580ed5522f7cb08b5c6ae8c691a68a7f6298126c30253e6401914857d65fba7bb3746bf89e75c2a04c0def27d7cb9cb2d84f1aaddb2fa45fca6eb1d0dd7592aa9bd70cc69c5d8002e2ef800f74", @ANYRESHEX=0x0, @ANYRES8, @ANYRES64=0x0, @ANYRES16], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000181100000900", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="18514cf1bfdef20b6d142844e6022600000700000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x18) syz_clone3(&(0x7f0000000580)={0x200, 0x0, 0x0, 0x0, {0x3a}, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1}, 0x58) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000a80)=0x1, 0x4) r5 = socket$inet6(0xa, 0x3, 0x88) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x18, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0300000004000000040000000100000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="1800"], 0x50) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x40, 0x0}, @in6=@local, 0x4e1f, 0x0, 0x0, 0x3, 0x2}, {0x0, 0x200000004, 0x40000000007, 0x20000a0de, 0x100000000, 0x4, 0x200000003, 0x9}, {0x5, 0x0, 0x7}, 0x1, 0x0, 0x1, 0x0, 0x6}, {{@in=@empty, 0x0, 0x6c}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3502, 0x1, 0x8, 0x0, 0x9}}, 0xe8) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x4}}}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00'}, 0x10) syz_io_uring_setup(0x6de4, 0x0, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) 1.207784415s ago: executing program 2 (id=5522): setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x80) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r2, {}, {}, {0xa, 0x1}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40098}, 0x4000000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000008c0)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r5, {0xffff}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) close(0x3) 1.207227306s ago: executing program 5 (id=5523): r0 = syz_create_resource$binfmt(&(0x7f0000001400)='./file0\x00') openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000710429000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="6400000000010104"], 0x64}}, 0x2000) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd63"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r4, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000001c0)="390000001400818c0000dc676f97daf01e2357f9ffffffffffffff0521018701546fabca1b4e8a06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) truncate(&(0x7f0000000180)='./file0\x00', 0x8fff5) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r6, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[0x4], 0x0, 0x0, 0x1, 0x1}}, 0x40) 1.206297086s ago: executing program 0 (id=5524): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x4, {{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x1000000000000000, 0x7, 0xffffffffffffff8b, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffffc}, {0x0, 0x2, 0x200000000000}, 0x0, 0x0, 0x1, 0x0, 0x2}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00', 0x2, 0x2b}, 0xa, @in6=@local, 0x0, 0x1}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x65, 0x0, 0x4, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2, 0xffff}}}}}}, 0x0) syz_emit_ethernet(0x76, &(0x7f0000000680)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x81, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x4, 0xca, 0x0, 0x1000, {[@timestamp={0x8, 0xa, 0x80000000, 0xfbc}, @nop, @sack={0x5, 0x12, [0x7, 0x767, 0xb, 0xfffffffc]}, @timestamp={0x8, 0xa, 0x800001, 0x8a}, @exp_fastopen={0xfe, 0x4}, @md5sig={0x13, 0x12, "0c39e122bd2f7556512830127a3fa7b7"}]}}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) r4 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), &(0x7f00000003c0)={'U+', 0x400}, 0x16, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="1c0000080301060b00873200000000000100000804000f80"], 0x18}, 0x1, 0x0, 0x0, 0x4800}, 0x40010) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x190da) 1.146178962s ago: executing program 7 (id=5525): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c00000010000104fcffffff8000000000000000", @ANYRES32=0x0, @ANYBLOB="0315000080840000140012800b0001006c6f7770616e000004000280080005003742"], 0x3c}, 0x1, 0x0, 0x0, 0x2004d808}, 0x40800) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, 0xffffffffffffffff}, 0x4) r4 = socket$caif_seqpacket(0x25, 0x5, 0x3) r5 = dup2(r4, r4) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, 0x0, 0x0) r6 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="140100002900010000000000fcdbdf2503"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xb, &(0x7f0000000740)=ANY=[@ANYRES16=r4, @ANYRES8=r0, @ANYRES64=r3, @ANYRES8=r1, @ANYRESDEC=r2, @ANYRESDEC, @ANYRES64=r1, @ANYBLOB="72075b5fffffffffffffff7f2ef346f968d8b0f48e963ef2bf9f95029849b2759d7235b68e5e519a01e931aa6e545646fd6cedf05211889415b993bb4a14a7f4c2aa83f15656e50808e04d5244672448761a16ab43d69e5038a0137109d0477f4f43facda280fb4b7406258f0282e38594cb4241a024e9cf1bc9872faad3f34b72bf75b7cecfbf32c2dff8b75172ee597eb46aec7223b8e5642a45c67ed3cb145969991eeb8d0ffa6fe2afa4d935107b7b3c9414caf263f9137bb1581f42eed9f5ae23e25dc6744879db58ce3ad54392a99446367d5859cff9181387aeac33a2c8db15875cddb302faec3efdf2fb6ecd44b41e7e28633e1e8974ed32c62f"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x30, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000003c0)='kmem_cache_free\x00', r7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x0, 0x0}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES32], 0x38}}, 0x0) 1.117232394s ago: executing program 6 (id=5526): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x2000000000000242, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffff, 0x2}, 0x6) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x78) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000006c0)=0xc) ioctl$TIOCVHANGUP(r2, 0x5437, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702"], 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x18) recvmmsg(r0, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000680)={[{@nodiscard}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") openat(0xffffffffffffff9c, 0x0, 0x4040, 0x4d) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$kcm(0x10, 0x2, 0x10) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x8, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e23, @local}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f00000004c0)={0xc, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e1d, @remote}}}, 0x108) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90224fc602f0000000a0c0100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) fsetxattr$security_selinux(r3, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) 1.107111665s ago: executing program 7 (id=5527): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000004, 0x3032, 0xffffffffffffffff, 0x0) timer_create(0x3, 0x0, &(0x7f00000001c0)=0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) syz_clone(0x4011, 0x0, 0xc, 0x0, 0x0, 0x0) timer_gettime(r1, &(0x7f0000000380)) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000100000001000013040000000200000088060000ff0f0000"], 0x0, 0x35, 0x0, 0x1}, 0x28) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0xf1712, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x101280, 0x10003, 0xc, 0x9, 0x5, 0x9, 0xb, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xa, 0x4000011, r4, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x10, 0x1403, 0x1, 0x70bd26, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0xd, 0x1000, &(0x7f0000002cc0)=""/4096, 0x40f00, 0x40, '\x00', 0x0, 0x0, r2, 0x19c00, 0x0, 0xfd7c, 0x10, &(0x7f0000000180)={0x0, 0x2, 0x5b, 0x9}, 0x10}, 0x94) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000020500000a3c000000090a010400000000000000000a0000040900010073797a3100000000080005400000002b0900020073797a310000000008000a40ff"], 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b00010062726964676500001800028005001900840000000c001e"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x1, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1}, {0xffff, 0xffff}, {0x5, 0xf}}}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) 1.017523794s ago: executing program 2 (id=5528): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x4000000}, 0x18) creat(0x0, 0x48) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr(0x0, 0x0, 0x0, 0x0, 0x2) lgetxattr(0x0, 0x0, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020200090f000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000002000100000004d20000020300000020050005002f8000000a00000000000000ff0100000000000000000000000000010000000000000000010018"], 0x78}}, 0x0) 926.218142ms ago: executing program 6 (id=5529): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x3, &(0x7f0000000440)=[{0x4d, 0x0, 0x1, 0xfffffffc}, {0x4, 0x4}, {0x6, 0xff, 0x0, 0x7fff0000}]}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000640)=@mangle={'mangle\x00', 0x64, 0x6, 0x4f8, 0x490, 0x390, 0xd0, 0xd0, 0x490, 0x608, 0x608, 0x1a0, 0x608, 0x608, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x5}}}, {{@ipv6={@mcast1, @local, [], [], 'macvtap0\x00', 'erspan0\x00', {}, {}, 0x0, 0x0, 0x0, 0x52}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_team\x00', 'syzkaller0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28}}, {{@ipv6={@local, @mcast1, [], [], 'lo\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x558) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x19, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e0000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) syz_emit_ethernet(0x6e, &(0x7f0000000640)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7d0, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local, [@srh={0x0, 0x0, 0x4, 0x0, 0x20}]}}}}}}}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100280000000000000002000000200001800d0001007564703a73797a32"], 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x2) 925.824312ms ago: executing program 0 (id=5530): syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x4c, &(0x7f0000000000), 0x4) recvmsg$unix(r9, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0xfd}, 0x2062) 925.553792ms ago: executing program 6 (id=5531): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x80) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r5, {}, {}, {0xa, 0x1}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40098}, 0x4000000) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000008c0)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r8, {0xffff}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) close(0x3) 916.591583ms ago: executing program 0 (id=5532): bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYRESDEC, @ANYRESOCT], 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000002c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x3000046, &(0x7f00000134c0)={[{@dioread_nolock}, {@noauto_da_alloc}, {@inlinecrypt}, {@sysvgroups}, {@data_err_ignore}, {@barrier_val={'barrier', 0x3d, 0x7f}}, {@data_err_ignore}, {@grpquota}, {@dioread_nolock}, {@nobarrier}, {@resuid}, {@quota}]}, 0x1, 0x553, &(0x7f0000001080)="$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") r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x7c}}, 0x0) syz_emit_ethernet(0x11dc0, &(0x7f0000000340)=ANY=[], 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x1000) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x0, 0x8, 0x1) get_mempolicy(0x0, 0x0, 0x4, &(0x7f000051f000/0x2000)=nil, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000080}, 0xc894) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x40305828, &(0x7f0000000240)={0x17c04, 0xffffffffffffffff, 0x100, 0x100000002, 0xfffffffffffffffe}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x183042, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, 0x0, &(0x7f00000005c0)='GPL\x00'}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r4, 0x0, 0x25, 0x0, @void}, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000100), 0xffffffffffffffff) pwrite64(r3, &(0x7f0000000140)='2', 0xfdef, 0xe7c) 824.196522ms ago: executing program 0 (id=5533): bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000002, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x22000401) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x31, 0xcb, &(0x7f0000000400)="9d806a25707c572c6ffad7aea58c27197234cc7df32f4b7face4e6d6920bd5ef2e9742577bc3a089686f1de13c39164ba4", &(0x7f0000000540)=""/203, 0x3ff, 0x0, 0x7d, 0x0, &(0x7f0000000640)="114ae7d2ac7d5a1b53c0b3c29d2586755304c16a35dd8f59affb4485bf547dbc76849290676480dbcba5fc6572eb3c663636d977c5ac3f2ecedb37b09517a984249d639163292322dacf77b78d81dbab4d94d89dd84a4fe97643a2621576b8b45a50a472e5a85eae4ba8b4a49e9205b5e9a14ab03dfec545b81d10d956", 0x0, 0x2, 0x0, 0x3}, 0x50) close(0xffffffffffffffff) execveat$binfmt(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) socket$inet_mptcp(0x2, 0x1, 0x106) lsm_get_self_attr(0x64, 0x0, &(0x7f0000000000), 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='net/ip6_flowlabel\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x22000, 0x4, 0x2}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='w\xde\xa3\x05\xff\a\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xd6\xd1\x98,\xc8\x18E/\x8c\x1a\xe3\xbd') r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r2, 0x0) 719.972651ms ago: executing program 6 (id=5534): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c45, 0x0) sendmsg$IPSET_CMD_ADD(r0, 0x0, 0xc1af42915917f226) flock(r0, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x80) flock(r1, 0x1) flock(r1, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) mmap(&(0x7f00003f0000/0x2000)=nil, 0x2000, 0x4, 0x11012, r2, 0x308000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10021, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x7}, 0x0, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x26801000, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) close(0xffffffffffffffff) dup3(r1, r0, 0x0) 670.235476ms ago: executing program 7 (id=5535): r0 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10`\xee\xa9\x8b\x06%\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xa96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xd9Jx\xaa\x8f~\xb94a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xd6m\xf7@]iNP\xf1\x1d\xab\x13\xce\x152s\xb8\x85\x98\x84\xbf\x8c\x80{\x16\t\xd6\x17P3\xe9\xebGKL\xd3\x88\xd2\rLG\x8e\xd6\xa72\xf4\x92\xeb&\xa5\xcc\x14FZN\x98%[p\x989\xf6\xf5\xb6\xedk\xe6\xb0\xa1\x8f\x90\xdb\xd6h)\x0f6\x88\x03P\x8ak\xf9\xc9\x82`\xa7Ku\x99\xab\xd4\xb2\xaa1\x99O\x8b\x99-\xe3', 0x1) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="ac5f006f1f1f89479295662ff1cf9e7829b1891bad3fd99dff48c35ad49aa4dc866d880e"], 0x50) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) sync() mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x3000)=nil) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffd000/0x3000)=nil) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x453, 0x400, 0x70bd29, 0x25dfdbfd, "8e656fc37d3e701719ffa53098786f5fd70c19", ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0xc010) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = dup(r0) write$binfmt_elf64(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4606ff78a3050000000000000002003e00cd000000c9030000000000004000000000000000ea02000000000000020001000500380001000600b1060004030000000b000d00ff000000000000000900000000000000070000000000000009"], 0x178) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 589.676984ms ago: executing program 5 (id=5536): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000007}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x2a1, &(0x7f0000001340)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x64087000, 0x0, 0xffffff59, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'sit0\x00', 0x0}) 563.034057ms ago: executing program 2 (id=5537): syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) socket$packet(0x11, 0xa, 0x300) socket$kcm(0x2, 0xa, 0x73) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x4) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r0}, 0x94) socket$kcm(0x2, 0xa, 0x73) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2673004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$inet6(0xa, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xd40, 0xd2) close(r2) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) listen(r3, 0x4) r4 = gettid() r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000700), 0x0) read(r5, &(0x7f0000000200)=""/202, 0xca) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x4058534c, &(0x7f00000000c0)={0x80, 0x0, {0x3, 0x3, 0x0, 0x0, 0x8001}}) tkill(r4, 0x7) syz_emit_ethernet(0x2a, &(0x7f0000000ac0)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x16, 0x1c, 0x67, 0x0, 0x0, 0x11, 0x0, @empty, @empty=0xe0000001}, {0x0, 0x4e20, 0x8}}}}}, 0x0) r6 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r6, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)="e188d493ce633186f71e", 0xa}, 0x1, 0x0, 0x0, 0x20004005}, 0x8095) 530.25989ms ago: executing program 7 (id=5538): setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x80) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r2, {}, {}, {0xa, 0x1}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40098}, 0x4000000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000008c0)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r5, {0xffff}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) close(0x3) 375.312494ms ago: executing program 7 (id=5539): open_by_handle_at(0xffffffffffffffff, 0x0, 0x280500) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f0000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f00000004c0)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r3}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, 0x0, &(0x7f0000000540)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) gettid() r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="2e00000011008188040f80ec59acbc0413a1810031000000000f000000028002002d1f00"/46, 0x2e}], 0x1}, 0x0) 374.912464ms ago: executing program 5 (id=5540): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYRESHEX], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000380)='kfree\x00', r0}, 0x18) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x20) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x12, r2, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x804000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x80, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0xf) r5 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c000000100003052cbd7000fedbdf2500000020", @ANYRES32=0x0, @ANYBLOB="0000000000080400240012800b0001006d61637365630000140002800500060000000000050007000000000008000500", @ANYRES32=r6], 0x4c}}, 0x0) ioctl$TCFLSH(r4, 0x400455c8, 0x0) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r8}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x12, r3, 0x0) 214.059629ms ago: executing program 0 (id=5541): setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x800) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="200000006a0001002abd70009595df250a00000000000000080001"], 0x20}, 0x1, 0x0, 0x0, 0x20000011}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@local, 0x0, 0x5, 0x0, 0x0, 0xa}, {0x0, 0x3, 0x80000000000, 0x0, 0x4, 0xffffffffffffffff, 0x7fffffff}, {0x0, 0xa00, 0x40800000000000, 0x800000000000000}, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xb8}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000800000000000003000000000000000000000000000000fdfffffffbffffff0000000000000000ffffffffffffffff053b000000000000000000000000000002000000000000005600000000000000feffffffff7f40000200000000000008000000000000000001"], 0xfc}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x9}], 0x1c) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000540)={0x1, &(0x7f0000000300)=[{0x200000000006, 0x3, 0x2, 0x7ffc0002}]}) socket$nl_generic(0x10, 0x3, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5, 0x0, 0xffffffffffffffff}, 0x18) lsm_get_self_attr(0x67, &(0x7f0000000300)={0x0, 0x0, 0x85, 0x65, ""/101}, &(0x7f00000003c0)=0x85, 0x0) 164.279434ms ago: executing program 7 (id=5542): setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000180)=0xfffffff9, 0x0, 0x4) io_uring_enter(0xffffffffffffffff, 0x47bc, 0x0, 0x21, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r2 = socket(0x1, 0x803, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r4 = socket(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70400000000000085"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r5, 0x0, 0x136, 0x4c, &(0x7f0000001cc0)="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", &(0x7f0000001c40)=""/76, 0x0, 0x0, 0x0, 0x50, &(0x7f0000001ac0), &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008ac5", 0x1, 0x0, 0x13}, 0x4c) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="7fff0000000000002800128009000100766c616e000000001800028006000100340200000c0002001f0000001e00000008000500", @ANYRES32=r3], 0x50}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB="500000001000210400000000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="adffa888e16000002800128009000100766c616e00000000180002800c0002000e0000000a000000060001000001000008000500", @ANYRES32=r8], 0x50}}, 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r9}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 135.065746ms ago: executing program 6 (id=5543): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) madvise(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x16) syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f0000000080)=0x5) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000004200)='t', 0x1) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) epoll_create(0x3ff) epoll_create1(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 62.386884ms ago: executing program 2 (id=5544): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x80) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r5, {}, {}, {0xa, 0x1}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40098}, 0x4000000) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000008c0)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r8, {0xffff}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) close(0x3) 0s ago: executing program 2 (id=5545): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x223a2, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x20000, 0x3, 0x0, 0x20005, 0xb, 0x0, 0x0, 0x0, 0xa000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00'}, 0x10) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x6, 0x40, 0x3, 0x0, 0x4000000000, 0xd4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x100882, 0x7ff, 0x6, 0x3, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x100000a, 0x4082172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009c0000000b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x145d81, 0x4) write$binfmt_misc(r1, &(0x7f0000000780)="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", 0x7d9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) clock_nanosleep(0x2, 0x1000000, &(0x7f0000000180)={0x0, 0x3938700}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES32], 0x38}}, 0x0) kernel console output (not intermixed with test programs): 0): the slave hw address is in use by the bond; giving it the hw address of gretap0 [ 232.604869][T12785] bond3: left promiscuous mode [ 232.716381][ T1618] Bluetooth: hci0: Frame reassembly failed (-84) [ 234.095918][T12832] xt_hashlimit: max too large, truncated to 1048576 [ 234.198660][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 234.275199][T12838] xt_hashlimit: max too large, truncated to 1048576 [ 234.283467][T12838] xt_CT: You must specify a L4 protocol and not use inversions on it [ 234.312888][T12840] x_tables: ip_tables: tcp match: only valid for protocol 6 [ 234.423609][ T29] kauditd_printk_skb: 1222 callbacks suppressed [ 234.423623][ T29] audit: type=1400 audit(3050.412:15723): avc: denied { read write } for pid=11425 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 234.477217][ T29] audit: type=1326 audit(3050.462:15724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12835 comm="syz.6.3257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7efdb655f749 code=0x7ffc0000 [ 234.528767][ T29] audit: type=1326 audit(3050.522:15725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12846 comm="syz.7.3262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 234.558725][ T29] audit: type=1326 audit(3050.522:15726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12846 comm="syz.7.3262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 234.583315][ T29] audit: type=1400 audit(3050.522:15727): avc: denied { create } for pid=12846 comm="syz.7.3262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 234.604046][ T29] audit: type=1326 audit(3050.522:15728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12846 comm="syz.7.3262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 234.628708][ T29] audit: type=1326 audit(3050.522:15729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12846 comm="syz.7.3262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 234.653078][ T29] audit: type=1326 audit(3050.522:15730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12846 comm="syz.7.3262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 234.677710][ T29] audit: type=1326 audit(3050.522:15731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12846 comm="syz.7.3262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 234.702188][ T29] audit: type=1326 audit(3050.522:15732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12846 comm="syz.7.3262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 234.747754][ T3702] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 234.765638][T12852] netlink: 'syz.7.3264': attribute type 1 has an invalid length. [ 234.799286][T12852] bond1: (slave vxcan3): The slave device specified does not support setting the MAC address [ 234.811907][T12852] bond1: (slave vxcan3): Error -95 calling set_mac_address [ 234.843146][T12855] bond1: (slave bridge5): Enslaving as an active interface with a down link [ 234.904585][T12852] macvlan2: entered promiscuous mode [ 234.910069][T12852] macvlan2: entered allmulticast mode [ 234.915977][T12852] bond1: entered promiscuous mode [ 234.932809][T12852] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 234.958650][T12852] bond1: left promiscuous mode [ 235.642336][T12896] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3282'. [ 235.666474][T12896] team0: entered promiscuous mode [ 235.671637][T12896] team0: entered allmulticast mode [ 235.677816][T12896] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.818711][T12905] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3286'. [ 235.904539][T12913] netlink: '+}[@': attribute type 13 has an invalid length. [ 235.919234][T12913] tipc: Resetting bearer [ 237.453247][T12992] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3323'. [ 237.483617][T12994] syzkaller0: entered promiscuous mode [ 237.490633][T12994] syzkaller0: entered allmulticast mode [ 237.525661][T12992] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3323'. [ 237.592210][T13002] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3329'. [ 237.666626][T13007] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3330'. [ 237.694427][T13007] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3330'. [ 237.915652][T13025] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3339'. [ 237.951513][T13025] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3339'. [ 238.152205][T13031] serio: Serial port ptm0 [ 238.286171][T13047] netlink: '+}[@': attribute type 13 has an invalid length. [ 238.313011][T13031] serio: Serial port ptm0 [ 238.318982][T13047] 0ªî{X¹¦: refused to change device tx_queue_len [ 238.348811][T13047] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 238.376066][T13048] netlink: 'syz.0.3348': attribute type 4 has an invalid length. [ 238.870873][T13087] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3365'. [ 238.880040][T13087] netem: change failed [ 239.238865][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 239.300067][T13107] EXT4-fs error (device loop2): ext4_acquire_dquot:6986: comm syz.2.3373: Failed to acquire dquot type 0 [ 239.313320][T13107] Buffer I/O error on dev loop2, logical block 0, lost sync page write [ 239.321876][T13107] EXT4-fs (loop2): I/O error while writing superblock [ 239.389414][T13113] xt_l2tp: v2 sid > 0xffff: 4294901760 [ 239.460575][ T29] kauditd_printk_skb: 881 callbacks suppressed [ 239.460595][ T29] audit: type=1400 audit(3055.452:16612): avc: denied { read write } for pid=11425 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.538883][ T29] audit: type=1400 audit(3055.482:16613): avc: denied { open } for pid=13117 comm="syz.7.3378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 239.557907][ T29] audit: type=1400 audit(3055.482:16614): avc: denied { create } for pid=13117 comm="syz.7.3378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 239.577104][ T29] audit: type=1400 audit(3055.482:16615): avc: denied { allowed } for pid=13117 comm="syz.7.3378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 239.596346][ T29] audit: type=1400 audit(3055.482:16616): avc: denied { create } for pid=13117 comm="syz.7.3378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 239.615797][ T29] audit: type=1400 audit(3055.492:16617): avc: denied { read write } for pid=11425 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.639723][ T29] audit: type=1400 audit(3055.502:16618): avc: denied { map_create } for pid=13120 comm="syz.7.3379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.659118][ T29] audit: type=1400 audit(3055.502:16619): avc: denied { prog_load } for pid=13120 comm="syz.7.3379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.677917][ T29] audit: type=1400 audit(3055.502:16620): avc: denied { prog_load } for pid=13120 comm="syz.7.3379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.882424][T13135] netlink: 'syz.7.3382': attribute type 13 has an invalid length. [ 239.950074][ T29] audit: type=1400 audit(3055.532:16621): avc: denied { map_create } for pid=13122 comm="syz.6.3380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.985149][T13135] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 240.268131][T13157] ip6gretap0: entered promiscuous mode [ 240.275455][T13157] ip6gretap0: left promiscuous mode [ 240.466564][T13164] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 240.522655][T13166] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 240.977100][T13180] __nla_validate_parse: 5 callbacks suppressed [ 240.983523][T13180] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3401'. [ 240.992650][T13180] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3401'. [ 241.213841][ T3650] netdevsim netdevsim5 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 241.267596][ T3650] netdevsim netdevsim5 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 241.286092][ T3650] netdevsim netdevsim5 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 241.305979][ T3650] netdevsim netdevsim5 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 241.466866][T13194] netlink: 'syz.7.3409': attribute type 12 has an invalid length. [ 241.589534][T13197] ªªªªªª: renamed from wg2 (while UP) [ 241.601826][T13199] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3411'. [ 241.685218][T13199] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=13199 comm=syz.0.3411 [ 242.786049][T13228] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3422'. [ 242.804359][T13228] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3422'. [ 242.832502][T13230] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3423'. [ 243.670118][T13274] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3441'. [ 243.686241][T13274] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3441'. [ 243.809978][ T3607] Bluetooth: hci0: Frame reassembly failed (-84) [ 243.996359][T13283] team0 (unregistering): Port device team_slave_0 removed [ 244.005836][T13283] team0 (unregistering): Port device team_slave_1 removed [ 244.268808][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 244.481139][ T29] kauditd_printk_skb: 788 callbacks suppressed [ 244.481222][ T29] audit: type=1400 audit(3060.472:17410): avc: denied { name_bind } for pid=13298 comm="syz.6.3450" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 244.579707][ T29] audit: type=1400 audit(3060.572:17411): avc: denied { block_suspend } for pid=13296 comm="syz.5.3449" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 244.602288][ T29] audit: type=1400 audit(3060.572:17412): avc: denied { block_suspend } for pid=13296 comm="syz.5.3449" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 244.674212][ T29] audit: type=1400 audit(3060.622:17413): avc: denied { create } for pid=13302 comm="syz.6.3451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 244.695891][ T29] audit: type=1400 audit(3060.622:17414): avc: denied { module_request } for pid=13302 comm="syz.6.3451" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 244.719321][ T29] audit: type=1400 audit(3060.622:17415): avc: denied { sys_module } for pid=13302 comm="syz.6.3451" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 244.740558][ T29] audit: type=1400 audit(3060.622:17416): avc: denied { module_request } for pid=13302 comm="syz.6.3451" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 244.762675][ T29] audit: type=1400 audit(3060.622:17417): avc: denied { sys_module } for pid=13302 comm="syz.6.3451" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 244.784900][ T29] audit: type=1400 audit(3060.622:17418): avc: denied { create } for pid=13302 comm="syz.6.3451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 244.805700][ T29] audit: type=1400 audit(3060.652:17419): avc: denied { create } for pid=13305 comm="syz.6.3452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 245.838829][T13327] team0 (unregistering): Port device team_slave_0 removed [ 245.847244][T13327] team0 (unregistering): Port device team_slave_1 removed [ 245.867477][ T3702] Bluetooth: hci0: command 0x1003 tx timeout [ 245.874217][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 245.965610][T13336] bond0: entered promiscuous mode [ 245.972175][T13336] bond_slave_0: entered promiscuous mode [ 245.979509][T13336] ªªªªª!: entered promiscuous mode [ 245.985598][T13336] dummy0: entered promiscuous mode [ 245.998714][T13336] batadv0: entered promiscuous mode [ 246.006504][T13336] debugfs: 'hsr0' already exists in 'hsr' [ 246.013693][T13336] Cannot create hsr debugfs directory [ 246.022214][T13336] hsr0: Slave B (batadv0) is not up; please bring it up to get a fully working HSR network [ 246.034670][T13336] 8021q: adding VLAN 0 to HW filter on device hsr0 [ 246.047181][T13336] bond0: left promiscuous mode [ 246.052021][T13336] bond_slave_0: left promiscuous mode [ 246.058942][T13336] ªªªªª!: left promiscuous mode [ 246.063981][T13336] dummy0: left promiscuous mode [ 246.071690][T13336] batadv0: left promiscuous mode [ 246.291426][T13349] netlink: 14 bytes leftover after parsing attributes in process `syz.6.3469'. [ 246.305931][T13349] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 246.319569][T13349] bond0 (unregistering): (slave ªªªªª!): Releasing backup interface [ 246.330855][T13349] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 246.342890][T13349] bond0 (unregistering): Released all slaves [ 246.422767][T13357] ip6t_srh: unknown srh match flags 4000 [ 246.500407][T13365] netlink: 16 bytes leftover after parsing attributes in process `syz.6.3478'. [ 246.819222][T13395] syzkaller0: entered promiscuous mode [ 246.824910][T13395] syzkaller0: entered allmulticast mode [ 246.883834][T13401] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3492'. [ 246.944649][T13410] netlink: 16 bytes leftover after parsing attributes in process `syz.7.3506'. [ 247.064644][T13423] xt_CT: You must specify a L4 protocol and not use inversions on it [ 247.563569][T13451] netlink: 'syz.0.3512': attribute type 21 has an invalid length. [ 248.090274][T13469] netlink: 8 bytes leftover after parsing attributes in process `syz.7.3521'. [ 248.105112][T13469] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3521'. [ 248.381581][T13478] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3526'. [ 248.440135][T13486] netlink: 'syz.5.3530': attribute type 12 has an invalid length. [ 248.506281][T13471] sch_tbf: burst 22 is lower than device lo mtu (11337746) ! [ 248.947701][T13521] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 249.185516][T13543] bridge0: port 5(macvtap0) entered blocking state [ 249.192189][T13543] bridge0: port 5(macvtap0) entered disabled state [ 249.199200][T13543] macvtap0: entered allmulticast mode [ 249.204632][T13543] bridge0: entered allmulticast mode [ 249.210804][T13543] macvtap0: left allmulticast mode [ 249.215958][T13543] bridge0: left allmulticast mode [ 249.309191][T13550] ALSA: seq fatal error: cannot create timer (-22) [ 249.320264][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 249.567204][ T29] kauditd_printk_skb: 885 callbacks suppressed [ 249.567224][ T29] audit: type=1400 audit(3066.384:18305): avc: denied { read write } for pid=13551 comm="syz.2.3556" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 249.597599][ T29] audit: type=1400 audit(3066.394:18306): avc: denied { create } for pid=13551 comm="syz.2.3556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 249.617752][ T29] audit: type=1400 audit(3066.394:18307): avc: denied { create } for pid=13551 comm="syz.2.3556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 249.637999][ T29] audit: type=1400 audit(3066.404:18308): avc: denied { map } for pid=13553 comm="syz.6.3558" path="socket:[46306]" dev="sockfs" ino=46306 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=0 [ 249.660979][ T29] audit: type=1400 audit(3066.414:18309): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 249.684886][ T29] audit: type=1400 audit(3066.424:18310): avc: denied { map_create } for pid=13560 comm="syz.2.3561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 249.703817][ T29] audit: type=1400 audit(3066.424:18311): avc: denied { prog_load } for pid=13560 comm="syz.2.3561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 249.722864][ T29] audit: type=1400 audit(3066.424:18312): avc: denied { prog_load } for pid=13556 comm="syz.5.3560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 249.741751][ T29] audit: type=1400 audit(3066.424:18313): avc: denied { prog_load } for pid=13560 comm="syz.2.3561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 249.760501][ T29] audit: type=1400 audit(3066.474:18314): avc: denied { watch } for pid=13560 comm="syz.2.3561" path="/676/control" dev="tmpfs" ino=3548 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 251.284181][T13628] netlink: 'syz.7.3584': attribute type 4 has an invalid length. [ 251.292118][T13628] netlink: 152 bytes leftover after parsing attributes in process `syz.7.3584'. [ 251.345919][T13628] .`: renamed from bond0 (while UP) [ 252.011479][T13656] netlink: 'syz.0.3599': attribute type 4 has an invalid length. [ 252.020701][T13656] netlink: 152 bytes leftover after parsing attributes in process `syz.0.3599'. [ 252.070904][T13656] .`: renamed from bond0 [ 252.973573][T13703] xt_connbytes: Forcing CT accounting to be enabled [ 252.992663][T13703] Cannot find set identified by id 0 to match [ 253.292084][T13726] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 253.302544][T13726] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 253.344754][T13726] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 253.374532][T13726] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 253.424002][T13726] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 253.996343][T13761] netlink: 'syz.6.3638': attribute type 10 has an invalid length. [ 254.005581][T13761] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3638'. [ 254.016182][T13761] A link change request failed with some changes committed already. Interface geneve1 may have been left with an inconsistent configuration, please check. [ 254.214068][T13775] netlink: '+}[@': attribute type 13 has an invalid length. [ 254.234110][T13775] gretap0: refused to change device tx_queue_len [ 254.243547][T13775] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 254.265959][T13775] netlink: '+}[@': attribute type 4 has an invalid length. [ 254.276221][T13779] netlink: 'syz.6.3647': attribute type 2 has an invalid length. [ 254.325260][T13783] netlink: 'syz.5.3649': attribute type 1 has an invalid length. [ 254.395010][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 254.420804][T13783] 8021q: adding VLAN 0 to HW filter on device bond3 [ 254.499253][T13783] bond3: (slave geneve3): making interface the new active one [ 254.540336][T13783] bond3: (slave geneve3): Enslaving as an active interface with an up link [ 254.549245][ T1618] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.560057][ T1618] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.571207][ T1618] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.584025][ T29] kauditd_printk_skb: 594 callbacks suppressed [ 254.584045][ T29] audit: type=1400 audit(3071.574:18909): avc: denied { map_create } for pid=13798 comm="syz.2.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 254.586090][ T1618] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.622780][ T29] audit: type=1400 audit(3071.614:18910): avc: denied { prog_load } for pid=13798 comm="syz.2.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 254.642464][T13796] tipc: Resetting bearer [ 254.670700][T13802] Cannot find add_set index 0 as target [ 254.683929][ T29] audit: type=1400 audit(3071.614:18911): avc: denied { create } for pid=13798 comm="syz.2.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 254.704362][ T29] audit: type=1400 audit(3071.614:18912): avc: denied { create } for pid=13798 comm="syz.2.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 254.724714][ T29] audit: type=1400 audit(3071.614:18913): avc: denied { create } for pid=13798 comm="syz.2.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 254.735618][T13805] xt_connbytes: Forcing CT accounting to be enabled [ 254.745223][ T29] audit: type=1400 audit(3071.614:18914): avc: denied { create } for pid=13798 comm="syz.2.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 254.745282][ T29] audit: type=1400 audit(3071.614:18915): avc: denied { create } for pid=13798 comm="syz.2.3654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 254.745314][ T29] audit: type=1400 audit(3071.644:18916): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 254.745436][ T29] audit: type=1400 audit(3071.654:18917): avc: denied { prog_load } for pid=13801 comm="syz.2.3655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 254.745471][ T29] audit: type=1326 audit(3071.664:18918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13801 comm="syz.2.3655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f214d0af749 code=0x7ffc0000 [ 254.873575][T13805] Cannot find set identified by id 0 to match [ 254.959878][T13820] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=13820 comm=syz.5.3664 [ 254.984910][T13821] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3665'. [ 255.244981][T13843] netlink: 'syz.2.3672': attribute type 4 has an invalid length. [ 255.357267][T13846] sch_fq: defrate 0 ignored. [ 256.252579][T13864] bridge: RTM_NEWNEIGH with unconfigured vlan 4 on bridge_slave_0 [ 256.399371][T13874] netlink: 'syz.6.3685': attribute type 13 has an invalid length. [ 256.493856][T13874] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 256.522518][T13883] netlink: 'syz.5.3687': attribute type 1 has an invalid length. [ 256.596760][T13883] 8021q: adding VLAN 0 to HW filter on device bond4 [ 256.633078][T13885] netlink: 'syz.6.3688': attribute type 30 has an invalid length. [ 256.666382][T13883] veth7: entered promiscuous mode [ 256.683756][T13883] bond4: (slave veth7): Enslaving as an active interface with a down link [ 256.708939][T13883] erspan0: entered allmulticast mode [ 256.719179][T13883] bond4: (slave erspan0): making interface the new active one [ 256.728334][T13883] erspan0: entered promiscuous mode [ 256.733845][T13883] bond4: (slave erspan0): Enslaving as an active interface with an up link [ 256.999304][T13909] netlink: 'syz.6.3698': attribute type 4 has an invalid length. [ 257.007410][T13909] netlink: 152 bytes leftover after parsing attributes in process `syz.6.3698'. [ 257.297988][T13914] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3700'. [ 258.156985][T13939] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 258.168109][T13939] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 258.178606][T13939] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 258.188943][T13939] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 258.205996][T13939] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 258.370864][T13944] erspan0: left promiscuous mode [ 258.376399][T13944] ip6gre0: left promiscuous mode [ 258.437642][T13944] wg2: left promiscuous mode [ 258.442467][T13944] wg2: left allmulticast mode [ 258.458488][T13944] tipc: Resetting bearer [ 258.470027][T13944] syzkaller0: left promiscuous mode [ 258.475310][T13944] syzkaller0: left allmulticast mode [ 258.509485][T13944] veth2: left promiscuous mode [ 258.514330][T13944] veth2: left allmulticast mode [ 258.520948][T13944] ip6gre1: left promiscuous mode [ 258.526007][T13944] ip6gre1: left allmulticast mode [ 258.533214][T13944] bridge5: left promiscuous mode [ 258.539645][T13944] bridge5: left allmulticast mode [ 258.551026][T13944] veth12: left promiscuous mode [ 258.555924][T13944] veth12: left allmulticast mode [ 258.561231][T13944] vlan1: left promiscuous mode [ 258.566025][T13944] bridge12: left promiscuous mode [ 258.571192][T13944] vlan1: left allmulticast mode [ 258.576061][T13944] bridge12: left allmulticast mode [ 258.619700][T13944] gretap0: left promiscuous mode [ 258.642637][T13944] team0: left promiscuous mode [ 258.648921][T13944] team0: left allmulticast mode [ 259.380658][T13974] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=13974 comm=syz.2.3725 [ 259.422928][T13974] netlink: 'syz.2.3725': attribute type 1 has an invalid length. [ 259.465652][T13974] 8021q: adding VLAN 0 to HW filter on device bond5 [ 259.478622][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 259.490678][T13976] $Hÿ: (slave dummy0): Releasing backup interface [ 259.511886][T13976] bond5: (slave dummy0): making interface the new active one [ 259.525239][T13976] bond5: (slave dummy0): Enslaving as an active interface with an up link [ 259.591949][ T29] kauditd_printk_skb: 420 callbacks suppressed [ 259.592029][ T29] audit: type=1400 audit(3076.584:19339): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 259.657204][ T29] audit: type=1400 audit(3076.624:19340): avc: denied { create } for pid=13977 comm="syz.2.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 259.678973][ T29] audit: type=1400 audit(3076.624:19341): avc: denied { create } for pid=13977 comm="syz.2.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 259.700672][ T29] audit: type=1400 audit(3076.634:19342): avc: denied { prog_load } for pid=13977 comm="syz.2.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.720911][ T29] audit: type=1400 audit(3076.634:19343): avc: denied { prog_load } for pid=13977 comm="syz.2.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.741125][ T29] audit: type=1400 audit(3076.634:19344): avc: denied { read write } for pid=13977 comm="syz.2.3726" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 259.766923][ T29] audit: type=1400 audit(3076.724:19345): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 259.802970][T13980] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3727'. [ 259.826671][ T29] audit: type=1400 audit(3076.784:19346): avc: denied { prog_load } for pid=13979 comm="syz.2.3727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.846804][ T29] audit: type=1400 audit(3076.784:19347): avc: denied { prog_load } for pid=13979 comm="syz.2.3727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.866986][ T29] audit: type=1400 audit(3076.784:19348): avc: denied { prog_load } for pid=13979 comm="syz.2.3727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 260.063827][T13991] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=13991 comm=wg1 [ 260.079027][T13991] netlink: 1072 bytes leftover after parsing attributes in process `wg1'. [ 261.336457][T14043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14043 comm=syz.2.3753 [ 261.667057][T14056] xt_hashlimit: max too large, truncated to 1048576 [ 261.811625][T14077] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3765'. [ 261.820779][T14077] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3765'. [ 261.952969][T14092] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=14092 comm=syz.5.3767 [ 262.199627][T14108] ip6gre1: entered allmulticast mode [ 262.703785][T14141] 0ªî{X¹¦: left allmulticast mode [ 262.711015][T14141] 0ªî{X¹¦: left promiscuous mode [ 262.716291][T14141] bridge0: port 4(30ªî{X¹¦) entered disabled state [ 262.740955][T14141] bond5: (slave dummy0): Releasing active interface [ 262.750544][T14141] bridge_slave_0: left promiscuous mode [ 262.756348][T14141] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.766693][T14141] bridge_slave_1: left allmulticast mode [ 262.772552][T14141] bridge_slave_1: left promiscuous mode [ 262.778388][T14141] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.803182][T14141] $Hÿ: (slave bond_slave_0): Releasing backup interface [ 262.821064][T14141] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 262.843706][T14141] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 262.860766][T14150] sch_tbf: burst 127 is lower than device syzkaller0 mtu (313) ! [ 262.871674][T14146] tipc: Resetting bearer [ 262.926361][ T1618] Bluetooth: hci0: Frame reassembly failed (-84) [ 263.197660][T14165] xt_ecn: cannot match TCP bits for non-tcp packets [ 263.344155][T14178] __nla_validate_parse: 5 callbacks suppressed [ 263.344169][T14178] netlink: 28 bytes leftover after parsing attributes in process `syz.6.3794'. [ 263.362619][T14178] netlink: 28 bytes leftover after parsing attributes in process `syz.6.3794'. [ 263.373629][T14178] netlink: 28 bytes leftover after parsing attributes in process `syz.6.3794'. [ 263.383972][T14178] netlink: 28 bytes leftover after parsing attributes in process `syz.6.3794'. [ 263.414259][T14180] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 263.557751][T14190] netlink: 36 bytes leftover after parsing attributes in process `syz.7.3800'. [ 263.871507][T14229] IPv6: Can't replace route, no match found [ 264.085313][T14241] netlink: 28 bytes leftover after parsing attributes in process `syz.6.3808'. [ 264.094510][T14241] netlink: 28 bytes leftover after parsing attributes in process `syz.6.3808'. [ 264.147528][T14246] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3812'. [ 264.196315][T14250] netlink: 'syz.5.3814': attribute type 13 has an invalid length. [ 264.219100][T14250] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14250 comm=syz.5.3814 [ 264.249867][T14252] syzkaller0: tun_chr_ioctl cmd 35108 [ 264.441815][T14276] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3826'. [ 264.452276][T14276] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3826'. [ 264.507200][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 264.598730][ T29] kauditd_printk_skb: 1671 callbacks suppressed [ 264.598802][ T29] audit: type=1326 audit(3081.594:21020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14261 comm="syz.6.3820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7efdb6592005 code=0x7ffc0000 [ 264.628462][ T29] audit: type=1326 audit(3081.594:21021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14261 comm="syz.6.3820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7efdb6592005 code=0x7ffc0000 [ 264.651938][ T29] audit: type=1326 audit(3081.594:21022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14261 comm="syz.6.3820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7efdb6592005 code=0x7ffc0000 [ 264.675528][ T29] audit: type=1326 audit(3081.594:21023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14261 comm="syz.6.3820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7efdb6592005 code=0x7ffc0000 [ 264.698847][ T29] audit: type=1326 audit(3081.594:21024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14261 comm="syz.6.3820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7efdb6592005 code=0x7ffc0000 [ 264.722455][ T29] audit: type=1326 audit(3081.594:21025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14261 comm="syz.6.3820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7efdb6592005 code=0x7ffc0000 [ 264.745996][ T29] audit: type=1326 audit(3081.604:21027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14280 comm="syz.2.3828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f214d0af749 code=0x7ffc0000 [ 264.769490][ T29] audit: type=1326 audit(3081.634:21028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14280 comm="syz.2.3828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f214d0af749 code=0x7ffc0000 [ 264.792646][ T29] audit: type=1326 audit(3081.664:21029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14280 comm="syz.2.3828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f214d0af749 code=0x7ffc0000 [ 264.815821][ T29] audit: type=1400 audit(3081.664:21030): avc: denied { prog_load } for pid=14280 comm="syz.2.3828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 264.988670][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 265.825583][T14365] bridge_slave_0: left allmulticast mode [ 265.832741][T14365] bridge_slave_0: left promiscuous mode [ 265.840153][T14365] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.852014][T14365] bridge_slave_1: left allmulticast mode [ 265.859391][T14365] bridge_slave_1: left promiscuous mode [ 265.865186][T14365] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.883020][T14365] .`: (slave bond_slave_0): Releasing backup interface [ 265.895196][T14365] .`: (slave bond_slave_1): Releasing backup interface [ 265.910791][T14365] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 265.919893][T14365] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 265.930840][T14365] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 265.939891][T14365] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 265.952189][T14365] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 266.104700][T14373] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14373 comm=syz.6.3851 [ 266.661787][T14391] tipc: Resetting bearer [ 267.483440][T14421] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=14421 comm=syz.0.3866 [ 267.978833][T14446] netlink: 'syz.2.3876': attribute type 21 has an invalid length. [ 267.986798][T14446] netlink: 'syz.2.3876': attribute type 4 has an invalid length. [ 268.097465][ T3645] erspan0: left promiscuous mode [ 268.154635][T14460] wireguard0: entered promiscuous mode [ 268.161625][T14460] wireguard0: entered allmulticast mode [ 268.979741][T14512] netlink: 'syz.7.3901': attribute type 39 has an invalid length. [ 269.110022][T14515] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=14515 comm=syz.5.3902 [ 269.124263][T14515] __nla_validate_parse: 4 callbacks suppressed [ 269.124277][T14515] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3902'. [ 269.258674][T14535] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3908'. [ 269.281021][T14535] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3908'. [ 269.290374][T14534] netlink: 8 bytes leftover after parsing attributes in process `syz.6.3909'. [ 269.302875][T14534] ip6gretap1: entered allmulticast mode [ 269.350269][T14542] netlink: 8 bytes leftover after parsing attributes in process `syz.6.3910'. [ 269.426876][T14549] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 269.450610][T14551] $Hÿ: entered promiscuous mode [ 269.476292][T14553] IPv6: Can't replace route, no match found [ 269.547463][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 269.560763][T14558] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=14558 comm=syz.6.3917 [ 269.574190][T14558] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3917'. [ 269.619985][ T29] kauditd_printk_skb: 1527 callbacks suppressed [ 269.620071][ T29] audit: type=1400 audit(3598.611:22554): avc: denied { prog_load } for pid=14528 comm="syz.0.3906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.649825][ T29] audit: type=1400 audit(3598.621:22555): avc: denied { prog_load } for pid=14528 comm="syz.0.3906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.670229][ T29] audit: type=1400 audit(3598.621:22556): avc: denied { map_create } for pid=14528 comm="syz.0.3906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.711453][ T29] audit: type=1400 audit(3598.701:22557): avc: denied { map_create } for pid=14567 comm="syz.6.3918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.749991][ T29] audit: type=1400 audit(3598.721:22558): avc: denied { prog_load } for pid=14567 comm="syz.6.3918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.794110][ T29] audit: type=1400 audit(3598.761:22559): avc: denied { create } for pid=14569 comm="syz.6.3919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 269.814661][ T29] audit: type=1400 audit(3598.761:22560): avc: denied { create } for pid=14569 comm="syz.6.3919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 269.835105][ T29] audit: type=1400 audit(3598.761:22561): avc: denied { create } for pid=14569 comm="syz.6.3919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 269.855561][ T29] audit: type=1400 audit(3598.761:22562): avc: denied { open } for pid=14569 comm="syz.6.3919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 269.874918][ T29] audit: type=1400 audit(3598.761:22563): avc: denied { map_create } for pid=14569 comm="syz.6.3919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.967314][T14582] syzkaller0: entered promiscuous mode [ 269.972924][T14582] syzkaller0: entered allmulticast mode [ 270.250160][T14637] ip6erspan0: entered promiscuous mode [ 271.150605][T14698] netlink: 'syz.6.3951': attribute type 7 has an invalid length. [ 271.221660][T14715] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3953'. [ 271.370858][T14750] netlink: 8 bytes leftover after parsing attributes in process `syz.6.3958'. [ 271.381709][T14750] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3958'. [ 271.480351][T14756] netlink: 12 bytes leftover after parsing attributes in process `syz.6.3960'. [ 271.693883][T14797] wireguard1: entered promiscuous mode [ 271.699644][T14797] wireguard1: entered allmulticast mode [ 271.911333][T14835] tipc: Resetting bearer [ 271.937814][T14836] netlink: 'syz.6.3974': attribute type 13 has an invalid length. [ 272.254639][T14856] netlink: 'syz.5.3980': attribute type 12 has an invalid length. [ 273.124568][T15007] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=15007 comm=syz.0.3999 [ 273.412057][T15040] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 273.523898][T15040] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 273.963832][T15066] 0: reclassify loop, rule prio 0, protocol 800 [ 274.141445][T15078] __nla_validate_parse: 11 callbacks suppressed [ 274.141460][T15078] netlink: 16150 bytes leftover after parsing attributes in process `syz.6.4024'. [ 274.230294][T15081] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4025'. [ 274.590298][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 274.717139][ T29] kauditd_printk_skb: 1381 callbacks suppressed [ 274.717166][ T29] audit: type=1400 audit(3603.691:23945): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 274.753751][ T29] audit: type=1400 audit(3603.741:23946): avc: denied { prog_load } for pid=15099 comm="syz.2.4031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.753784][ T29] audit: type=1400 audit(3603.741:23947): avc: denied { map_create } for pid=15099 comm="syz.2.4031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.753810][ T29] audit: type=1400 audit(3603.741:23948): avc: denied { prog_load } for pid=15099 comm="syz.2.4031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.753836][ T29] audit: type=1400 audit(3603.741:23949): avc: denied { map_create } for pid=15099 comm="syz.2.4031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.815901][ T29] audit: type=1400 audit(3603.781:23950): avc: denied { prog_load } for pid=15083 comm="syz.5.4026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.815939][ T29] audit: type=1400 audit(3603.801:23951): avc: denied { prog_load } for pid=15083 comm="syz.5.4026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.816193][ T29] audit: type=1400 audit(3603.801:23952): avc: denied { map_create } for pid=15083 comm="syz.5.4026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.816228][ T29] audit: type=1400 audit(3603.801:23953): avc: denied { prog_load } for pid=15083 comm="syz.5.4026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.819822][ T29] audit: type=1400 audit(3603.811:23954): avc: denied { map_create } for pid=15083 comm="syz.5.4026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 275.959823][T15150] netlink: 176 bytes leftover after parsing attributes in process `syz.5.4046'. [ 277.125604][T15186] syzkaller0: entered promiscuous mode [ 277.131728][T15186] syzkaller0: entered allmulticast mode [ 277.138916][T15186] tipc: Resetting bearer [ 277.242956][T15199] netlink: 3 bytes leftover after parsing attributes in process `syz.0.4065'. [ 277.258905][T15199] 0ªX¹¦À: renamed from caif0 [ 277.290771][T15199] 0ªX¹¦À: entered allmulticast mode [ 277.296105][T15199] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 277.334498][T15203] bond3: (slave lo): Releasing backup interface [ 277.343367][T15203] bond3: (slave lo): last VLAN challenged slave left bond - VLAN blocking is removed [ 277.354909][T15203] gretap0: left allmulticast mode [ 277.360149][T15203] gretap0: left promiscuous mode [ 277.365240][T15203] bridge0: port 3(gretap0) entered disabled state [ 277.385896][T15208] netlink: 'syz.6.4067': attribute type 10 has an invalid length. [ 277.436526][T15211] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4067'. [ 277.447958][T15203] bridge_slave_0: left allmulticast mode [ 277.453846][T15203] bridge_slave_0: left promiscuous mode [ 277.459624][T15203] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.490615][T15203] bridge_slave_1: left allmulticast mode [ 277.496456][T15203] bridge_slave_1: left promiscuous mode [ 277.502538][T15203] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.511220][T15203] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 277.522461][T15203] bond1: (slave ip6erspan0): Releasing active interface [ 277.548954][T15203] bond4: (slave geneve2): Releasing active interface [ 277.564064][ T3633] netdevsim netdevsim6 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.572604][ T3633] netdevsim netdevsim6 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.582696][ T3633] netdevsim netdevsim6 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.597350][ T3633] netdevsim netdevsim6 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.754623][T15224] 0ªX¹¦À: left allmulticast mode [ 277.761725][T15224] tipc: Resetting bearer [ 277.959562][T15224] syzkaller0: left promiscuous mode [ 277.964909][T15224] syzkaller0: left allmulticast mode [ 278.044698][T15235] netlink: 'syz.0.4079': attribute type 4 has an invalid length. [ 279.073143][T15287] xt_recent: hitcount (16777216) is larger than allowed maximum (65535) [ 279.352827][T15308] x_tables: duplicate underflow at hook 1 [ 279.372215][T15308] x_tables: duplicate underflow at hook 2 [ 279.627229][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 279.783956][ T29] kauditd_printk_skb: 783 callbacks suppressed [ 279.784006][ T29] audit: type=1400 audit(3608.771:24738): avc: denied { read write } for pid=11425 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 279.822224][ T29] audit: type=1400 audit(3608.811:24739): avc: denied { create } for pid=15329 comm="syz.7.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 279.849271][ T29] audit: type=1400 audit(3608.841:24740): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 279.874632][ T29] audit: type=1400 audit(3608.841:24741): avc: denied { create } for pid=15329 comm="syz.7.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 279.896444][ T29] audit: type=1400 audit(3608.841:24742): avc: denied { prog_load } for pid=15329 comm="syz.7.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.918638][ T29] audit: type=1400 audit(3608.841:24743): avc: denied { create } for pid=15329 comm="syz.7.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 279.940623][ T29] audit: type=1400 audit(3608.841:24744): avc: denied { map_create } for pid=15329 comm="syz.7.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.961261][ T29] audit: type=1400 audit(3608.841:24745): avc: denied { prog_load } for pid=15329 comm="syz.7.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.981671][ T29] audit: type=1400 audit(3608.841:24746): avc: denied { prog_load } for pid=15329 comm="syz.7.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 280.002465][ T29] audit: type=1400 audit(3608.841:24747): avc: denied { create } for pid=15329 comm="syz.7.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 280.056822][T15338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15338 comm=syz.7.4107 [ 280.931584][T15428] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4125'. [ 280.951928][T15428] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4125'. [ 280.986237][T15428] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4125'. [ 281.012527][T15428] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4125'. [ 281.033599][T15428] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4125'. [ 281.651643][T15466] netlink: 'syz.2.4137': attribute type 1 has an invalid length. [ 281.683423][T15466] 8021q: adding VLAN 0 to HW filter on device bond7 [ 281.748997][T15466] macvlan0: entered promiscuous mode [ 281.754383][T15466] macvlan0: entered allmulticast mode [ 281.801532][T15466] bond7: entered promiscuous mode [ 281.829190][T15466] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 281.838931][T15466] bond7: left promiscuous mode [ 281.856176][T15502] macvlan0: entered promiscuous mode [ 281.863569][T15502] macvlan0: entered allmulticast mode [ 281.887570][T15502] bond7: entered promiscuous mode [ 281.907248][T15502] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 281.924865][T15502] bond7: left promiscuous mode [ 282.090489][T15545] netlink: 'gtp': attribute type 13 has an invalid length. [ 282.491722][T15576] netlink: 'syz.0.4154': attribute type 1 has an invalid length. [ 282.523657][T15576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.556148][T15576] macvlan0: entered promiscuous mode [ 282.563081][T15576] macvlan0: entered allmulticast mode [ 282.571502][T15576] bond0: entered promiscuous mode [ 282.636382][T15576] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 282.671403][T15576] bond0: left promiscuous mode [ 282.719521][T15618] bond0: (slave ip6gretap0): making interface the new active one [ 282.768917][T15618] bond0: (slave ip6gretap0): Enslaving as an active interface with an up link [ 282.823440][T15576] macvlan0: entered promiscuous mode [ 282.828991][T15576] macvlan0: entered allmulticast mode [ 282.836059][T15576] bond0: entered promiscuous mode [ 282.841272][T15576] ip6gretap0: entered promiscuous mode [ 282.847685][T15576] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 282.855106][T15576] bond0: (slave macvlan0): the slave hw address is in use by the bond; giving it the hw address of ip6gretap0 [ 282.868737][T15576] bond0: left promiscuous mode [ 282.873629][T15576] ip6gretap0: left promiscuous mode [ 283.453424][T15674] tc_dump_action: action bad kind [ 283.765790][T15682] xt_limit: Overflow, try lower: 0/0 [ 284.006073][T15698] wireguard2: entered promiscuous mode [ 284.011669][T15698] wireguard2: entered allmulticast mode [ 284.093320][T15709] macsec0: entered promiscuous mode [ 284.098712][T15709] macsec0: entered allmulticast mode [ 284.104131][T15709] veth1_macvtap: entered allmulticast mode [ 284.121103][T15711] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4183'. [ 284.131505][T15711] netlink: 'syz.0.4183': attribute type 30 has an invalid length. [ 284.159420][ T3622] netdevsim netdevsim0 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 284.181685][ T3622] netdevsim netdevsim0 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 284.219897][ T3622] netdevsim netdevsim0 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 284.239141][ T3622] netdevsim netdevsim0 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 284.572368][T15790] netlink: 'syz.0.4204': attribute type 10 has an invalid length. [ 284.581673][T15790] netlink: 40 bytes leftover after parsing attributes in process `syz.0.4204'. [ 284.667302][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 284.863021][ T29] kauditd_printk_skb: 634 callbacks suppressed [ 284.863039][ T29] audit: type=1400 audit(3613.851:25382): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 284.901518][ T29] audit: type=1400 audit(3613.891:25383): avc: denied { create } for pid=15801 comm="syz.2.4198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=0 [ 284.922912][ T29] audit: type=1400 audit(3613.911:25384): avc: denied { map_create } for pid=15801 comm="syz.2.4198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.942114][ T29] audit: type=1326 audit(3613.921:25385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15798 comm="syz.5.4197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 284.965414][ T29] audit: type=1326 audit(3613.921:25386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15798 comm="syz.5.4197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 284.988602][ T29] audit: type=1400 audit(3613.921:25387): avc: denied { prog_load } for pid=15798 comm="syz.5.4197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 285.007540][ T29] audit: type=1326 audit(3613.921:25388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15798 comm="syz.5.4197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 285.030876][ T29] audit: type=1326 audit(3613.921:25389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15798 comm="syz.5.4197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 285.053970][ T29] audit: type=1326 audit(3613.921:25390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15798 comm="syz.5.4197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 285.077107][ T29] audit: type=1326 audit(3613.921:25391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15798 comm="syz.5.4197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=135 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 285.154635][T15805] wireguard2: entered promiscuous mode [ 285.161669][T15805] wireguard2: entered allmulticast mode [ 285.625617][T15859] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4210'. [ 285.636107][T15859] netlink: 12 bytes leftover after parsing attributes in process `syz.7.4210'. [ 285.663159][ T3622] netdevsim netdevsim7 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 285.676857][ T3622] netdevsim netdevsim7 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 285.701079][ T3622] netdevsim netdevsim7 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 285.716671][ T3622] netdevsim netdevsim7 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 285.998749][T15914] ip6erspan0: entered promiscuous mode [ 286.205840][T15930] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4222'. [ 286.216568][T15930] hsr_slave_0: left promiscuous mode [ 286.224652][T15930] hsr_slave_1: left promiscuous mode [ 286.303191][T15934] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4223'. [ 286.326007][T15934] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4223'. [ 286.522676][T15936] xt_ecn: cannot match TCP bits for non-tcp packets [ 287.094530][T16033] sit0: Caught tx_queue_len zero misconfig [ 287.376811][T16074] netlink: 'syz.0.4246': attribute type 21 has an invalid length. [ 287.385092][T16074] netlink: 128 bytes leftover after parsing attributes in process `syz.0.4246'. [ 287.409865][T16074] netlink: 'syz.0.4246': attribute type 4 has an invalid length. [ 287.417762][T16074] netlink: 3 bytes leftover after parsing attributes in process `syz.0.4246'. [ 287.489573][T16082] tipc: Resetting bearer [ 288.079538][T16149] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4266'. [ 288.089844][T16149] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4266'. [ 288.100190][T16149] netlink: 'syz.6.4266': attribute type 6 has an invalid length. [ 288.109368][T16149] netlink: 'syz.6.4266': attribute type 5 has an invalid length. [ 288.156064][ T3645] netdevsim netdevsim6 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 288.177302][ T3645] netdevsim netdevsim6 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 288.211972][ T3645] netdevsim netdevsim6 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 288.229936][ T3645] netdevsim netdevsim6 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 288.290324][T16176] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4268'. [ 288.303606][T16178] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4269'. [ 288.552961][T16192] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4275'. [ 288.822634][ T3613] Bluetooth: hci0: Frame reassembly failed (-84) [ 288.879700][T16232] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 288.886285][T16232] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 288.894278][T16232] vhci_hcd vhci_hcd.0: Device attached [ 289.001402][T16239] netlink: 'syz.6.4280': attribute type 16 has an invalid length. [ 289.010770][T16239] netlink: 'syz.6.4280': attribute type 17 has an invalid length. [ 289.041252][T16239] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 289.051079][T16247] IPv6: Can't replace route, no match found [ 289.142339][T16250] netlink: 'syz.0.4285': attribute type 1 has an invalid length. [ 289.144450][ T4136] usb 5-1: new high-speed USB device number 2 using vhci_hcd [ 289.231878][ T3641] netdevsim netdevsim6 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 289.269576][ T3641] netdevsim netdevsim6 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 289.287717][ T3641] netdevsim netdevsim6 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 289.300449][ T3641] netdevsim netdevsim6 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 289.631251][T16321] netlink: 'syz.6.4294': attribute type 13 has an invalid length. [ 289.704881][T16321] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 289.737476][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 289.884305][ T29] kauditd_printk_skb: 795 callbacks suppressed [ 289.884323][ T29] audit: type=1400 audit(3618.871:26187): avc: denied { read write } for pid=16325 comm="syz.7.4297" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 289.958489][ T29] audit: type=1400 audit(3618.931:26188): avc: denied { prog_load } for pid=16341 comm="syz.6.4299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.978833][ T29] audit: type=1400 audit(3618.931:26189): avc: denied { prog_load } for pid=16341 comm="syz.6.4299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.999007][ T29] audit: type=1400 audit(3618.931:26190): avc: denied { create } for pid=16341 comm="syz.6.4299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 290.019646][ T29] audit: type=1400 audit(3618.931:26191): avc: denied { prog_load } for pid=16341 comm="syz.6.4299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.039887][ T29] audit: type=1400 audit(3618.931:26192): avc: denied { create } for pid=16341 comm="syz.6.4299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 290.060773][ T29] audit: type=1400 audit(3618.931:26193): avc: denied { map_create } for pid=16341 comm="syz.6.4299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.081017][ T29] audit: type=1400 audit(3618.931:26194): avc: denied { prog_load } for pid=16341 comm="syz.6.4299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.191809][ T29] audit: type=1400 audit(3619.101:26195): avc: denied { map_create } for pid=16349 comm="syz.6.4300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.212111][ T29] audit: type=1326 audit(3619.111:26196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16349 comm="syz.6.4300" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efdb655f749 code=0x7ffc0000 [ 290.409534][T16397] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 290.829128][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 290.835383][ T3702] Bluetooth: hci0: command 0x1003 tx timeout [ 290.844376][T16233] vhci_hcd: connection closed [ 290.844525][ T3611] vhci_hcd vhci_hcd.2: stop threads [ 290.854535][ T3611] vhci_hcd vhci_hcd.2: release socket [ 290.859989][ T3611] vhci_hcd vhci_hcd.2: disconnect device [ 291.050970][T16437] netlink: 'syz.5.4312': attribute type 30 has an invalid length. [ 292.815305][T16502] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 292.842898][ T1037] IPVS: starting estimator thread 0... [ 292.938574][T16505] IPVS: using max 2160 ests per chain, 108000 per kthread [ 293.947686][T16618] netlink: 'syz.5.4343': attribute type 7 has an invalid length. [ 294.255418][T16655] __nla_validate_parse: 1 callbacks suppressed [ 294.255437][T16655] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4345'. [ 294.347554][ T4136] vhci_hcd vhci_hcd.2: vhci_device speed not set [ 294.381253][T16666] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4346'. [ 294.390217][T16666] netlink: 'syz.6.4346': attribute type 15 has an invalid length. [ 294.484601][T16673] netlink: 'syz.2.4349': attribute type 16 has an invalid length. [ 294.493875][T16673] netlink: 'syz.2.4349': attribute type 17 has an invalid length. [ 294.615009][T16673] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 294.629966][T16673] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 294.647435][ T3647] netdevsim netdevsim7 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 294.656432][ T3647] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 294.686041][ T3647] netdevsim netdevsim7 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 294.695116][ T3647] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 294.711558][T16678] wireguard0: entered promiscuous mode [ 294.717316][T16678] wireguard0: entered allmulticast mode [ 294.723714][ T3647] netdevsim netdevsim7 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 294.732705][ T3647] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 294.744864][ T3647] netdevsim netdevsim7 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 294.753919][ T3647] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 294.763014][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 294.882019][T16708] netlink: 'syz.2.4356': attribute type 7 has an invalid length. [ 294.892043][ T29] kauditd_printk_skb: 527 callbacks suppressed [ 294.892061][ T29] audit: type=1400 audit(3623.881:26724): avc: denied { prog_load } for pid=16700 comm="syz.7.4360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 294.959608][T16722] Cannot find add_set index 0 as target [ 294.965493][ T29] audit: type=1326 audit(3623.921:26725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16700 comm="syz.7.4360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 294.990150][ T29] audit: type=1326 audit(3623.921:26726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16700 comm="syz.7.4360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 295.014867][ T29] audit: type=1326 audit(3623.921:26727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16700 comm="syz.7.4360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 295.039486][ T29] audit: type=1400 audit(3623.921:26728): avc: denied { prog_load } for pid=16700 comm="syz.7.4360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.048699][T16725] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4362'. [ 295.062146][ T29] audit: type=1326 audit(3623.921:26729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16700 comm="syz.7.4360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 295.092467][ T29] audit: type=1326 audit(3623.921:26730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16700 comm="syz.7.4360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 295.118506][ T29] audit: type=1400 audit(3623.921:26731): avc: denied { create } for pid=16700 comm="syz.7.4360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 295.140293][ T29] audit: type=1326 audit(3623.921:26732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16700 comm="syz.7.4360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 295.165015][ T29] audit: type=1326 audit(3623.921:26733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16700 comm="syz.7.4360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 295.321693][T16740] wireguard0: entered promiscuous mode [ 295.328705][T16740] wireguard0: entered allmulticast mode [ 295.491704][T16786] netlink: 'syz.7.4376': attribute type 29 has an invalid length. [ 295.501779][T16786] netlink: 'syz.7.4376': attribute type 29 has an invalid length. [ 295.540299][T16790] netlink: 'syz.6.4377': attribute type 39 has an invalid length. [ 295.672102][T16804] ALSA: seq fatal error: cannot create timer (-19) [ 296.215419][T16932] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4404'. [ 296.501838][T16965] Process accounting resumed [ 296.801591][T17022] syzkaller0: entered promiscuous mode [ 296.807190][T17022] syzkaller0: entered allmulticast mode [ 296.950062][T17062] netlink: 'syz.7.4428': attribute type 1 has an invalid length. [ 297.259315][T17078] Process accounting resumed [ 297.630881][T17119] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 297.646900][T17119] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 298.223080][T17136] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4449'. [ 298.409699][T17170] veth8: entered promiscuous mode [ 299.327398][T17249] netlink: 'syz.7.4466': attribute type 30 has an invalid length. [ 299.429455][T17268] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 299.447308][T17268] .`: (slave bridge0): Releasing backup interface [ 299.470495][T17268] bond2: (slave .`): Releasing backup interface [ 299.502898][T17268] .`: (slave dummy0): Releasing backup interface [ 299.520482][T17268] bridge_slave_0: left promiscuous mode [ 299.526295][T17268] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.553918][T17268] bridge_slave_1: left allmulticast mode [ 299.561144][T17268] bridge_slave_1: left promiscuous mode [ 299.567014][T17268] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.588903][T17268] .`: (slave bond_slave_0): Releasing backup interface [ 299.597574][T17268] .`: (slave bond_slave_1): Releasing backup interface [ 299.606817][T17268] tipc: Resetting bearer [ 299.620768][T17268] bond3: (slave gretap0): Releasing active interface [ 299.641577][T17268] bond0: (slave ip6gretap0): Releasing active interface [ 299.787348][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 299.892700][T17317] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4480'. [ 299.901778][ T29] kauditd_printk_skb: 1683 callbacks suppressed [ 299.901792][ T29] audit: type=1400 audit(3628.881:28417): avc: denied { watch } for pid=17316 comm="syz.7.4480" path="/358" dev="tmpfs" ino=1898 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 299.930987][ T29] audit: type=1400 audit(3628.881:28418): avc: denied { prog_load } for pid=17316 comm="syz.7.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 299.951228][ T29] audit: type=1400 audit(3628.881:28419): avc: denied { prog_load } for pid=17316 comm="syz.7.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.065610][ T29] audit: type=1400 audit(3628.981:28420): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 300.090950][ T29] audit: type=1400 audit(3628.981:28421): avc: denied { create } for pid=17319 comm="syz.2.4481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 300.111621][ T29] audit: type=1400 audit(3628.981:28422): avc: denied { map_create } for pid=17319 comm="syz.2.4481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.131875][ T29] audit: type=1400 audit(3628.981:28423): avc: denied { prog_load } for pid=17319 comm="syz.2.4481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.151961][ T29] audit: type=1400 audit(3628.981:28424): avc: denied { create } for pid=17319 comm="syz.2.4481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 300.172468][ T29] audit: type=1400 audit(3628.981:28425): avc: denied { prog_load } for pid=17319 comm="syz.2.4481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.192693][ T29] audit: type=1400 audit(3628.981:28426): avc: denied { block_suspend } for pid=17319 comm="syz.2.4481" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 301.390676][T17408] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 301.528601][T17422] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17422 comm=syz.2.4498 [ 302.463179][T17489] netlink: 176 bytes leftover after parsing attributes in process `syz.0.4515'. [ 303.064766][T17533] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4521'. [ 303.073889][T17533] netlink: 'syz.5.4521': attribute type 15 has an invalid length. [ 303.111473][T17533] vxlan1: entered promiscuous mode [ 303.514084][T17578] netlink: 'syz.6.4529': attribute type 21 has an invalid length. [ 303.622105][T17580] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4530'. [ 303.744181][T17584] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 303.794177][T17584] netlink: 'syz.2.4533': attribute type 10 has an invalid length. [ 303.802390][T17584] $Hÿ: left promiscuous mode [ 303.809043][T17584] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4533'. [ 303.911757][T17596] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4538'. [ 303.959559][T17596] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4538'. [ 304.224102][T17613] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4546'. [ 304.233148][T17613] netlink: 'syz.2.4546': attribute type 15 has an invalid length. [ 304.271794][T17613] vxlan0: entered promiscuous mode [ 304.288189][ T3613] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 304.304411][T17623] bond4: (slave erspan0): Releasing active interface [ 304.358025][T17626] netlink: 'syz.5.4548': attribute type 10 has an invalid length. [ 304.368963][T17623] bridge_slave_0: left allmulticast mode [ 304.374673][T17623] bridge_slave_0: left promiscuous mode [ 304.376583][T17625] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 304.383772][T17623] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.418447][T17628] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4548'. [ 304.469618][T17623] bridge_slave_1: left allmulticast mode [ 304.475423][T17623] bridge_slave_1: left promiscuous mode [ 304.482512][T17623] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.535307][T17623] bond0: (slave bond_slave_0): Releasing backup interface [ 304.560347][T17623] bond0: (slave bond_slave_1): Releasing backup interface [ 304.571172][T17623] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 304.587504][ T3613] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 304.597479][ T3613] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 304.605956][ T3613] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 304.837155][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 304.930741][ T29] kauditd_printk_skb: 609 callbacks suppressed [ 304.930759][ T29] audit: type=1400 audit(3633.921:29036): avc: denied { map_create } for pid=17670 comm="syz.0.4566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.103097][ T29] audit: type=1400 audit(3633.921:29037): avc: denied { prog_load } for pid=17670 comm="syz.0.4566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.123313][ T29] audit: type=1400 audit(3633.921:29038): avc: denied { create } for pid=17670 comm="syz.0.4566" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 305.145141][ T29] audit: type=1400 audit(3633.981:29039): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 305.170419][ T29] audit: type=1400 audit(3634.041:29040): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 305.195698][ T29] audit: type=1400 audit(3634.051:29041): avc: denied { allowed } for pid=17667 comm="syz.6.4555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 305.216136][ T29] audit: type=1400 audit(3634.091:29042): avc: denied { open } for pid=17675 comm="syz.2.4558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 305.236464][ T29] audit: type=1400 audit(3634.091:29043): avc: denied { read } for pid=17675 comm="syz.2.4558" dev="nsfs" ino=4026532740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 305.275300][ T29] audit: type=1400 audit(3634.251:29044): avc: denied { prog_load } for pid=17675 comm="syz.2.4558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.298496][ T29] audit: type=1400 audit(3634.291:29045): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 305.719669][T17684] Cannot find add_set index 0 as target [ 305.820309][T17690] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4562'. [ 306.213756][T17725] x_tables: duplicate underflow at hook 1 [ 306.220515][T17725] x_tables: duplicate underflow at hook 2 [ 306.235084][T17727] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4568'. [ 306.732388][T17784] netlink: 'syz.6.4584': attribute type 21 has an invalid length. [ 306.741706][T17784] netlink: 152 bytes leftover after parsing attributes in process `syz.6.4584'. [ 306.879494][T17801] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4587'. [ 306.936532][T17801] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4587'. [ 307.046184][T17814] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4590'. [ 307.428421][T17873] xt_CT: No such helper "pptp" [ 307.720296][T17882] geneve2: entered promiscuous mode [ 307.726578][ T3641] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.736783][ T3641] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.758852][ T3641] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.785939][ T3641] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.929093][T17898] xt_CT: You must specify a L4 protocol and not use inversions on it [ 307.967724][T17898] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 307.983524][T17900] netlink: 8 bytes leftover after parsing attributes in process `'. [ 308.000562][T17900] netlink: 8 bytes leftover after parsing attributes in process `'. [ 308.017841][T17900] netlink: 8 bytes leftover after parsing attributes in process `'. [ 308.775335][T17968] IPVS: rr: FWM 3 0x00000003 - no destination available [ 309.176056][T18025] netlink: 'syz.0.4634': attribute type 1 has an invalid length. [ 309.254050][T18025] bond4: (slave vxcan1): The slave device specified does not support setting the MAC address [ 309.290537][T18025] bond4: (slave vxcan1): Error -95 calling set_mac_address [ 309.346103][T18078] macvlan0: entered promiscuous mode [ 309.353134][T18078] macvlan0: entered allmulticast mode [ 309.372950][T18078] bond4: entered promiscuous mode [ 309.380434][T18078] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 309.390512][T18078] bond4: left promiscuous mode [ 309.871587][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 310.110797][ T29] kauditd_printk_skb: 2221 callbacks suppressed [ 310.110814][ T29] audit: type=1400 audit(3639.101:31267): avc: denied { map_create } for pid=18107 comm="syz.6.4643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.198647][ T29] audit: type=1400 audit(3639.131:31268): avc: denied { prog_load } for pid=18107 comm="syz.6.4643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.218962][ T29] audit: type=1400 audit(3639.131:31269): avc: denied { prog_load } for pid=18107 comm="syz.6.4643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.239417][ T29] audit: type=1400 audit(3639.131:31270): avc: denied { create } for pid=18107 comm="syz.6.4643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 310.303522][T18114] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 310.317149][ T29] audit: type=1400 audit(3639.291:31271): avc: denied { create } for pid=18113 comm="syz.6.4645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 310.336562][ T29] audit: type=1400 audit(3639.291:31272): avc: denied { create } for pid=18113 comm="syz.6.4645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 310.358101][ T29] audit: type=1400 audit(3639.291:31273): avc: denied { create } for pid=18113 comm="syz.6.4645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 310.418432][ T29] audit: type=1400 audit(3639.351:31274): avc: denied { block_suspend } for pid=18113 comm="syz.6.4645" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 310.441186][ T29] audit: type=1400 audit(3639.351:31275): avc: denied { create } for pid=18113 comm="syz.6.4645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 310.462788][ T29] audit: type=1400 audit(3639.351:31276): avc: denied { create } for pid=18113 comm="syz.6.4645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 311.121939][T18187] @0Ù: renamed from bond_slave_1 [ 311.459662][T18239] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=18239 comm=syz.5.4659 [ 311.584851][T18246] netlink: 'syz.5.4662': attribute type 10 has an invalid length. [ 311.592923][T18246] __nla_validate_parse: 4 callbacks suppressed [ 311.592941][T18246] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4662'. [ 311.778945][T18275] netlink: 'syz.5.4664': attribute type 30 has an invalid length. [ 311.995650][T18308] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 312.002963][T18308] IPv6: NLM_F_CREATE should be set when creating new route [ 312.010217][T18308] IPv6: NLM_F_CREATE should be set when creating new route [ 312.021518][T18308] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 312.419330][T18375] batadv0: entered promiscuous mode [ 312.424695][T18375] batadv0: entered allmulticast mode [ 312.656670][T18413] bridge0: entered allmulticast mode [ 313.022460][T18426] veth1_macvtap: left allmulticast mode [ 313.066468][ T3674] netdevsim netdevsim5 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 313.075137][ T3674] netdevsim netdevsim5 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.214555][ T3611] netdevsim netdevsim5 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 313.223063][ T3611] netdevsim netdevsim5 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.316787][ T3611] netdevsim netdevsim5 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 313.325274][ T3611] netdevsim netdevsim5 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.359000][ T3611] netdevsim netdevsim5 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 313.368989][ T3611] netdevsim netdevsim5 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.788979][T18493] netlink: 1932 bytes leftover after parsing attributes in process `syz.0.4699'. [ 313.799553][T18493] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4699'. [ 313.866125][T18518] netlink: 'syz.7.4703': attribute type 13 has an invalid length. [ 314.460166][T18660] syzkaller0: entered promiscuous mode [ 314.466149][T18660] syzkaller0: entered allmulticast mode [ 314.762025][T18713] tc_dump_action: action bad kind [ 314.868709][ T4236] IPVS: starting estimator thread 0... [ 314.908022][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 314.967517][T18743] IPVS: using max 2160 ests per chain, 108000 per kthread [ 315.126138][ T29] kauditd_printk_skb: 1247 callbacks suppressed [ 315.126218][ T29] audit: type=1400 audit(3644.111:32524): avc: denied { map_create } for pid=18774 comm="syz.6.4749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.172291][T18777] netlink: 'wÞ£ÿ': attribute type 1 has an invalid length. [ 315.180058][ T29] audit: type=1400 audit(3644.121:32525): avc: denied { open } for pid=18767 comm="syz.2.4747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 315.199063][ T29] audit: type=1400 audit(3644.121:32526): avc: denied { prog_load } for pid=18767 comm="syz.2.4747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.218133][ T29] audit: type=1400 audit(3644.121:32527): avc: denied { create } for pid=18767 comm="syz.2.4747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 315.238087][ T29] audit: type=1400 audit(3644.121:32528): avc: denied { create } for pid=18767 comm="syz.2.4747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 315.257635][ T29] audit: type=1400 audit(3644.121:32529): avc: denied { create } for pid=18767 comm="syz.2.4747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 315.276950][ T29] audit: type=1400 audit(3644.141:32530): avc: denied { map_create } for pid=18774 comm="syz.6.4749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.290763][T18781] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4750'. [ 315.295766][ T29] audit: type=1400 audit(3644.141:32531): avc: denied { prog_load } for pid=18774 comm="syz.6.4749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.295792][ T29] audit: type=1400 audit(3644.141:32532): avc: denied { prog_load } for pid=18774 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.342015][ T29] audit: type=1400 audit(3644.141:32533): avc: denied { watch watch_reads } for pid=18774 comm="gtp" path="/680/file0" dev="tmpfs" ino=3583 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 315.369295][T18777] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.384592][T18781] bond0 (unregistering): Released all slaves [ 315.530820][ T4937] netdevsim netdevsim2 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 315.547256][ T4937] netdevsim netdevsim2 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 315.565972][ T4937] netdevsim netdevsim2 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 315.574506][ T4937] netdevsim netdevsim2 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 315.595904][T18877] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4753'. [ 316.355722][T19044] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 316.458291][T19057] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4793'. [ 318.043477][T19237] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4821'. [ 318.120093][T19239] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4822'. [ 318.244297][T19271] netlink: 20 bytes leftover after parsing attributes in process `syz.2.4829'. [ 318.335133][T19293] netlink: 'syz.7.4833': attribute type 3 has an invalid length. [ 318.573402][T19347] netlink: 48 bytes leftover after parsing attributes in process `syz.0.4846'. [ 318.582814][T19347] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4846'. [ 318.592071][T19347] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4846'. [ 318.651697][T19356] syzkaller0: entered promiscuous mode [ 318.658760][T19356] syzkaller0: entered allmulticast mode [ 318.664800][T19356] tipc: Resetting bearer [ 319.216032][T19385] netlink: 40 bytes leftover after parsing attributes in process `syz.2.4851'. [ 319.235863][T19385] ip6gre2: entered promiscuous mode [ 319.242750][T19385] ip6gre2: entered allmulticast mode [ 319.359285][T19403] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4852'. [ 319.377421][T19403] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4852'. [ 319.600554][T19434] netlink: 'syz.5.4858': attribute type 21 has an invalid length. [ 319.633683][T19434] netlink: 156 bytes leftover after parsing attributes in process `syz.5.4858'. [ 320.075907][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 320.130265][ T29] kauditd_printk_skb: 1199 callbacks suppressed [ 320.130284][ T29] audit: type=1326 audit(3649.121:33733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19448 comm="syz.7.4862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe7486e65e7 code=0x7ffc0000 [ 320.413486][T19482] audit: audit_backlog=65 > audit_backlog_limit=64 [ 320.420147][T19482] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 320.428031][T19482] audit: backlog limit exceeded [ 320.462924][ T3323] audit: audit_backlog=65 > audit_backlog_limit=64 [ 320.469564][ T3323] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 320.477565][ T3323] audit: backlog limit exceeded [ 320.489767][T19484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 320.496366][T19484] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 320.504149][T19484] audit: backlog limit exceeded [ 320.514284][T19484] netlink: 'syz.2.4866': attribute type 39 has an invalid length. [ 320.884469][ T4937] Bluetooth: hci0: Frame reassembly failed (-84) [ 320.895798][T19556] Bluetooth: hci0: Frame reassembly failed (-84) [ 320.987293][T19593] ªªªªªª: renamed from vlan0 [ 321.264291][T19611] netlink: '': attribute type 30 has an invalid length. [ 322.348794][T19753] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 322.908475][ T44] Bluetooth: hci0: command 0x1003 tx timeout [ 322.914937][ T3702] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 323.403362][T19844] netlink: 28 bytes leftover after parsing attributes in process `syz.6.4927'. [ 323.412522][T19844] netlink: 108 bytes leftover after parsing attributes in process `syz.6.4927'. [ 323.429170][T19844] netlink: 28 bytes leftover after parsing attributes in process `syz.6.4927'. [ 323.439258][T19844] netlink: 108 bytes leftover after parsing attributes in process `syz.6.4927'. [ 323.448550][T19844] netlink: 84 bytes leftover after parsing attributes in process `syz.6.4927'. [ 323.604419][T19873] can0: slcan on ttyS3. [ 323.667353][T19873] can0 (unregistered): slcan off ttyS3. [ 324.142081][T19886] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4932'. [ 324.196157][T19929] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 324.322634][T19952] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4939'. [ 324.467483][T19987] netdevsim netdevsim7: Direct firmware load for ./file1 failed with error -2 [ 324.516772][T19997] IPVS: ovf: UDP 224.0.0.2:0 - no destination available [ 324.673521][T19998] serio: Serial port ptm1 [ 324.768657][T20058] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4953'. [ 324.777632][T20058] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4953'. [ 324.791457][T20058] bridge8: entered promiscuous mode [ 324.796800][T20058] bridge8: entered allmulticast mode [ 325.147139][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 325.256830][ T29] kauditd_printk_skb: 1372 callbacks suppressed [ 325.256847][ T29] audit: type=1400 audit(325.247:34992): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.308761][ T29] audit: type=1400 audit(325.307:34993): avc: denied { prog_load } for pid=20065 comm="syz.2.4955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.328096][ T29] audit: type=1400 audit(325.307:34994): avc: denied { prog_load } for pid=20065 comm="syz.2.4955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.346857][ T29] audit: type=1400 audit(325.307:34995): avc: denied { prog_load } for pid=20065 comm="syz.2.4955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.365818][ T29] audit: type=1400 audit(325.307:34996): avc: denied { execmem } for pid=20065 comm="syz.2.4955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 325.374040][T20071] xt_hashlimit: max too large, truncated to 1048576 [ 325.416866][ T29] audit: type=1400 audit(325.367:34997): avc: denied { prog_load } for pid=20065 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.435040][ T29] audit: type=1400 audit(325.377:34998): avc: denied { prog_load } for pid=20068 comm="syz.6.4956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.453694][ T29] audit: type=1400 audit(325.397:34999): avc: denied { create } for pid=20068 comm="syz.6.4956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 325.473847][ T29] audit: type=1400 audit(325.397:35000): avc: denied { create } for pid=20068 comm="syz.6.4956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 325.493892][ T29] audit: type=1326 audit(325.407:35001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20074 comm="syz.6.4957" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7efdb655f749 code=0x0 [ 325.509858][T20071] xt_CT: You must specify a L4 protocol and not use inversions on it [ 325.544012][T20087] netlink: 'syz.7.4958': attribute type 13 has an invalid length. [ 325.603514][T20108] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20108 comm=syz.5.4960 [ 326.067419][T20186] netlink: 28 bytes leftover after parsing attributes in process `syz.2.4970'. [ 328.099603][T20454] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 328.584373][T20471] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 328.596402][T20471] block device autoloading is deprecated and will be removed. [ 328.701239][T20499] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=20499 comm=syz.2.5012 [ 329.279440][T20603] macvtap0: entered promiscuous mode [ 329.284884][T20603] macvtap0: entered allmulticast mode [ 329.366193][T20617] netlink: 'syz.0.5032': attribute type 29 has an invalid length. [ 329.385309][T20617] netlink: 'syz.0.5032': attribute type 29 has an invalid length. [ 329.397571][T20620] netlink: 'syz.5.5036': attribute type 10 has an invalid length. [ 329.405453][T20620] __nla_validate_parse: 4 callbacks suppressed [ 329.405530][T20620] netlink: 40 bytes leftover after parsing attributes in process `syz.5.5036'. [ 329.433581][T20620] veth1_vlan: left promiscuous mode [ 329.440067][T20620] A link change request failed with some changes committed already. Interface veth1_vlan may have been left with an inconsistent configuration, please check. [ 329.601775][T20687] netlink: 'syz.0.5040': attribute type 12 has an invalid length. [ 329.650208][T20692] netlink: 'syz.7.5046': attribute type 1 has an invalid length. [ 329.673008][T20692] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.683514][T20692] netlink: 8 bytes leftover after parsing attributes in process `syz.7.5046'. [ 329.699165][T20692] vlan3: entered promiscuous mode [ 329.704341][T20692] bond0: entered promiscuous mode [ 329.713393][T20692] dummy0: entered promiscuous mode [ 329.724587][T20692] bond0: (slave dummy0): making interface the new active one [ 329.734724][T20692] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 330.197460][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 330.428899][ T29] kauditd_printk_skb: 985 callbacks suppressed [ 330.428914][ T29] audit: type=1400 audit(330.427:35987): avc: denied { execmem } for pid=20805 comm="syz.0.5059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 330.556992][ T29] audit: type=1400 audit(330.497:35988): avc: denied { prog_load } for pid=20805 comm="syz.0.5059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.578533][ T29] audit: type=1400 audit(330.497:35989): avc: denied { prog_load } for pid=20805 comm="syz.0.5059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.598607][ T29] audit: type=1400 audit(330.497:35990): avc: denied { map_create } for pid=20805 comm="syz.0.5059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.618761][ T29] audit: type=1400 audit(330.497:35991): avc: denied { prog_load } for pid=20805 comm="syz.0.5059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.638867][ T29] audit: type=1400 audit(330.497:35992): avc: denied { prog_load } for pid=20805 comm="syz.0.5059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.658955][ T29] audit: type=1400 audit(330.497:35993): avc: denied { prog_load } for pid=20805 comm="syz.0.5059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.679066][ T29] audit: type=1400 audit(330.497:35994): avc: denied { prog_load } for pid=20808 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.699101][ T29] audit: type=1400 audit(330.497:35995): avc: denied { create } for pid=20808 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 330.721028][ T29] audit: type=1400 audit(330.497:35996): avc: denied { map_create } for pid=20808 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.845911][T20857] veth0_to_team: entered promiscuous mode [ 331.722432][T20917] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5075'. [ 332.002023][T20948] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5079'. [ 332.592416][T21038] tipc: Resetting bearer [ 332.615650][T21027] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5092'. [ 332.624789][T21027] netlink: 32 bytes leftover after parsing attributes in process `syz.5.5092'. [ 332.633875][T21027] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5092'. [ 332.643136][T21027] netlink: 32 bytes leftover after parsing attributes in process `syz.5.5092'. [ 332.972147][T21113] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5107'. [ 332.983090][T21113] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5107'. [ 333.093091][T21125] netlink: 'syz.0.5111': attribute type 30 has an invalid length. [ 333.301392][T21193] bridge_slave_0: entered promiscuous mode [ 333.307633][T21193] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 333.583844][T21268] netlink: 'syz.5.5133': attribute type 30 has an invalid length. [ 333.632956][ T3659] netdevsim netdevsim5 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 333.641852][ T3659] netdevsim netdevsim5 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 333.650365][ T3659] netdevsim netdevsim5 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 333.659328][ T3659] netdevsim netdevsim5 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 333.968377][T21283] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 334.248160][T21346] netdevsim netdevsim7: Direct firmware load for ./file0 failed with error -2 [ 334.416834][T21367] __nla_validate_parse: 5 callbacks suppressed [ 334.416849][T21367] netlink: 28 bytes leftover after parsing attributes in process `syz.6.5153'. [ 334.432262][T21367] netlink: 108 bytes leftover after parsing attributes in process `syz.6.5153'. [ 334.452552][T21367] netlink: 28 bytes leftover after parsing attributes in process `syz.6.5153'. [ 334.462193][T21367] netlink: 108 bytes leftover after parsing attributes in process `syz.6.5153'. [ 334.471325][T21367] netlink: 84 bytes leftover after parsing attributes in process `syz.6.5153'. [ 335.046112][T21451] netlink: 'syz.5.5167': attribute type 30 has an invalid length. [ 335.227926][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 335.343348][T21536] x_tables: ip6_tables: sctp match: only valid for protocol 132 [ 335.450389][ T29] kauditd_printk_skb: 2658 callbacks suppressed [ 335.450405][ T29] audit: type=1400 audit(335.447:38655): avc: denied { prog_load } for pid=21527 comm="syz.0.5179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.475415][ T29] audit: type=1400 audit(335.447:38656): avc: denied { map_create } for pid=21527 comm="syz.0.5179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.495548][ T29] audit: type=1400 audit(335.447:38657): avc: denied { prog_load } for pid=21527 comm="syz.0.5179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.519430][ T29] audit: type=1326 audit(335.517:38658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21527 comm="syz.0.5179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b1fb9f749 code=0x7ffc0000 [ 335.554859][ T29] audit: type=1326 audit(335.517:38659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21527 comm="syz.0.5179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b1fb9f749 code=0x7ffc0000 [ 335.661785][ T29] audit: type=1400 audit(335.627:38660): avc: denied { map_create } for pid=21563 comm="syz.5.5182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.682051][ T29] audit: type=1400 audit(335.627:38661): avc: denied { prog_load } for pid=21563 comm="syz.5.5182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.702039][ T29] audit: type=1400 audit(335.627:38662): avc: denied { prog_load } for pid=21563 comm="syz.5.5182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.702160][ T29] audit: type=1400 audit(335.677:38663): avc: denied { prog_load } for pid=21569 comm="syz.0.5183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.800747][ T29] audit: type=1400 audit(335.777:38664): avc: denied { create } for pid=21569 comm="syz.0.5183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 336.540743][T21674] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 336.602906][T21678] netlink: 48 bytes leftover after parsing attributes in process `syz.5.5194'. [ 336.619349][T21675] IPv6: sit2: Disabled Multicast RS [ 336.671240][T21678] netlink: 20 bytes leftover after parsing attributes in process `syz.5.5194'. [ 336.680366][T21678] netlink: 20 bytes leftover after parsing attributes in process `syz.5.5194'. [ 336.966543][T21690] netlink: 16186 bytes leftover after parsing attributes in process `syz.6.5198'. [ 337.394630][T21690] Timeout policy `syz1' can only be used by L3 protocol number 34525 [ 338.005557][T21799] netlink: 'syz.7.5214': attribute type 13 has an invalid length. [ 338.022034][T21802] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5215'. [ 338.035831][T21799] bridge6: entered allmulticast mode [ 339.557224][T21903] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5230'. [ 339.619078][T21903] vlan0: entered allmulticast mode [ 339.624266][T21903] veth0_to_bond: entered allmulticast mode [ 339.710551][T21927] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 339.955809][T21955] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 340.277735][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 340.498304][ T29] kauditd_printk_skb: 2167 callbacks suppressed [ 340.498322][ T29] audit: type=1400 audit(596.491:40808): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 340.538369][ T29] audit: type=1400 audit(596.521:40809): avc: denied { map_create } for pid=21997 comm="syz.2.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.579744][ T29] audit: type=1400 audit(596.551:40810): avc: denied { prog_load } for pid=21997 comm="syz.2.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.599742][ T29] audit: type=1400 audit(596.551:40811): avc: denied { prog_load } for pid=21997 comm="syz.2.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.619978][ T29] audit: type=1326 audit(596.551:40812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21997 comm="syz.2.5243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f214d0af749 code=0x7ffc0000 [ 340.644358][ T29] audit: type=1326 audit(596.551:40813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21997 comm="syz.2.5243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f214d0af749 code=0x7ffc0000 [ 340.668823][ T29] audit: type=1326 audit(596.551:40814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21997 comm="syz.2.5243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=76 compat=0 ip=0x7f214d0af749 code=0x7ffc0000 [ 340.693171][ T29] audit: type=1326 audit(596.551:40815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21997 comm="syz.2.5243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f214d0af749 code=0x7ffc0000 [ 340.717548][ T29] audit: type=1326 audit(596.551:40816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21997 comm="syz.2.5243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f214d0af749 code=0x7ffc0000 [ 340.741898][ T29] audit: type=1326 audit(596.551:40817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21997 comm="syz.2.5243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f214d0af749 code=0x7ffc0000 [ 342.167610][T22197] sch_tbf: burst 22 is lower than device lo mtu (11337746) ! [ 342.236048][T22205] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5273'. [ 342.245547][T22205] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5273'. [ 342.405132][T22230] xt_TPROXY: Can be used only with -p tcp or -p udp [ 343.251040][T22313] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5295'. [ 343.272573][T22313] bond5: (slave lo): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 343.288328][T22313] bond5: (slave lo): Enslaving as a backup interface with an up link [ 343.297181][T22313] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 343.314624][T22313] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5295'. [ 343.324032][T22313] bond_slave_0: Caught tx_queue_len zero misconfig [ 343.971135][T22396] netlink: 12 bytes leftover after parsing attributes in process `syz.7.5306'. [ 344.000674][T22398] netlink: 'syz.7.5307': attribute type 1 has an invalid length. [ 344.036022][T22398] bond2: (slave vxcan3): The slave device specified does not support setting the MAC address [ 344.048383][T22398] bond2: (slave vxcan3): Error -95 calling set_mac_address [ 344.062859][T22437] bridge0: port 1(macsec0) entered blocking state [ 344.069545][T22437] bridge0: port 1(macsec0) entered disabled state [ 344.076649][T22437] macsec0: entered allmulticast mode [ 344.082013][T22437] bridge0: entered allmulticast mode [ 344.088576][T22437] macsec0: left allmulticast mode [ 344.093626][T22437] bridge0: left allmulticast mode [ 344.106680][T22444] bond2: (slave bridge7): Enslaving as an active interface with a down link [ 344.269948][T22456] netlink: 'syz.0.5310': attribute type 4 has an invalid length. [ 344.392905][T22465] xt_hashlimit: max too large, truncated to 1048576 [ 344.548955][T22500] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 345.309997][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 345.536567][ T29] kauditd_printk_skb: 1125 callbacks suppressed [ 345.536586][ T29] audit: type=1400 audit(601.521:41943): avc: denied { map_create } for pid=22614 comm="syz.0.5346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.566324][ T29] audit: type=1400 audit(601.531:41944): avc: denied { prog_load } for pid=22614 comm="syz.0.5346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.566410][ T29] audit: type=1400 audit(601.531:41945): avc: denied { prog_load } for pid=22614 comm="syz.0.5346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.566440][ T29] audit: type=1400 audit(601.531:41946): avc: denied { prog_load } for pid=22614 comm="syz.0.5346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.566485][ T29] audit: type=1400 audit(601.531:41947): avc: denied { create } for pid=22614 comm="syz.0.5346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 345.566517][ T29] audit: type=1400 audit(601.531:41948): avc: denied { create } for pid=22614 comm="syz.0.5346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 345.566591][ T29] audit: type=1400 audit(601.531:41949): avc: denied { prog_load } for pid=22614 comm="syz.0.5346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.566615][ T29] audit: type=1400 audit(601.551:41950): avc: denied { prog_load } for pid=22614 comm="syz.0.5346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.579754][ T29] audit: type=1400 audit(601.571:41951): avc: denied { prog_load } for pid=22609 comm="syz.6.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.583904][ T29] audit: type=1400 audit(601.571:41952): avc: denied { allowed } for pid=22609 comm="syz.6.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 345.584562][T22621] netlink: 1004 bytes leftover after parsing attributes in process `syz.6.5343'. [ 345.876537][T22674] erspan0: left allmulticast mode [ 346.422700][T22818] netlink: 'syz.0.5374': attribute type 5 has an invalid length. [ 346.435707][T22818] ip6erspan0: entered promiscuous mode [ 346.566987][T22829] netlink: 48 bytes leftover after parsing attributes in process `syz.2.5375'. [ 346.600894][T22841] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5377'. [ 346.611709][T22841] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5377'. [ 346.622461][T22841] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5377'. [ 346.633385][T22841] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5377'. [ 346.644424][T22841] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5377'. [ 346.655026][T22841] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5377'. [ 346.792177][T22856] loop7: detected capacity change from 0 to 128 [ 346.869810][ T3650] Bluetooth: hci0: Frame reassembly failed (-84) [ 346.910594][T22862] Cannot find del_set index 0 as target [ 346.923319][T22865] netlink: 'syz.5.5383': attribute type 16 has an invalid length. [ 346.932714][T22865] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5383'. [ 346.948651][T22865] 8021q: adding VLAN 0 to HW filter on device bond0 [ 347.023740][T22893] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5384'. [ 347.087305][T22897] netlink: 'syz.5.5386': attribute type 1 has an invalid length. [ 347.140257][T22901] syzkaller0: entered promiscuous mode [ 347.145816][T22901] syzkaller0: entered allmulticast mode [ 347.758379][T22951] loop7: detected capacity change from 0 to 1024 [ 347.793610][T22951] EXT4-fs: inline encryption not supported [ 347.799573][T22951] EXT4-fs: Ignoring removed orlov option [ 348.019114][T22951] EXT4-fs (loop7): stripe (2) is not aligned with cluster size (16), stripe is disabled [ 348.095422][T22951] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e840c018, mo2=0002] [ 348.139661][T22951] System zones: 0-1, 3-12 [ 348.152330][T22951] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 348.907194][ T3702] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 348.913392][ T44] Bluetooth: hci0: command 0x1003 tx timeout [ 348.970393][T11425] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 350.137757][T23073] pim6reg: entered allmulticast mode [ 350.146315][T23073] pim6reg: left allmulticast mode [ 350.156931][T23085] SELinux: Context @ is not valid (left unmapped). [ 350.236666][T23091] Unsupported ieee802154 address type: 0 [ 350.347255][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 350.546954][ T29] kauditd_printk_skb: 797 callbacks suppressed [ 350.546974][ T29] audit: type=1400 audit(606.531:42750): avc: denied { read } for pid=23127 comm="syz.6.5418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 350.572182][ T29] audit: type=1400 audit(606.531:42751): avc: denied { getopt } for pid=23127 comm="syz.6.5418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 350.615127][T23135] __nla_validate_parse: 6 callbacks suppressed [ 350.615144][T23135] netlink: 16402 bytes leftover after parsing attributes in process `syz.6.5418'. [ 350.740121][ T29] audit: type=1400 audit(606.731:42752): avc: denied { name_bind } for pid=23150 comm="syz.6.5421" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 350.764628][ T29] audit: type=1400 audit(606.731:42753): avc: denied { node_bind } for pid=23150 comm="syz.6.5421" saddr=::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 350.786183][ T29] audit: type=1400 audit(606.751:42754): avc: denied { read } for pid=23150 comm="syz.6.5421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 350.805302][ T29] audit: type=1400 audit(606.751:42755): avc: denied { write } for pid=23150 comm="syz.6.5421" path="socket:[66777]" dev="sockfs" ino=66777 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 350.813534][T23151] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5421'. [ 350.970873][ T29] audit: type=1400 audit(606.961:42756): avc: denied { unlink } for pid=7680 comm="syz-executor" name="cgroup.controllers" dev="tmpfs" ino=4109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="@" [ 351.004029][T23186] loop7: detected capacity change from 0 to 128 [ 351.012812][ T29] audit: type=1400 audit(607.001:42757): avc: denied { write } for pid=23154 comm="syz.0.5422" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 351.032623][ T29] audit: type=1326 audit(607.021:42758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23185 comm="syz.7.5425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 351.056247][ T29] audit: type=1326 audit(607.021:42760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23185 comm="syz.7.5425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7486ef749 code=0x7ffc0000 [ 351.088733][T23193] netem: change failed [ 352.243095][T23258] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 352.286100][T23258] Buffer I/O error on dev loop2, logical block 0, lost sync page write [ 352.314318][T23258] EXT4-fs (loop2): I/O error while writing superblock [ 352.358564][ T6337] Buffer I/O error on dev loop2, logical block 8, lost sync page write [ 352.378804][T23268] SET target dimension over the limit! [ 352.384748][T23269] loop7: detected capacity change from 0 to 128 [ 352.614810][T23315] netlink: 16386 bytes leftover after parsing attributes in process `syz.2.5444'. [ 352.736672][T23324] netlink: 24 bytes leftover after parsing attributes in process `syz.5.5446'. [ 352.911600][T23355] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=23355 comm=syz.7.5447 [ 353.003996][T23366] random: crng reseeded on system resumption [ 353.017409][T23362] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5450'. [ 353.026464][T23362] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5450'. [ 353.080636][T23362] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5450'. [ 353.089960][T23362] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5450'. [ 353.169799][T23362] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5450'. [ 353.178865][T23362] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5450'. [ 354.321126][T23474] bond5: (slave lo): Releasing backup interface [ 354.359661][T23474] bond5: (slave lo): last VLAN challenged slave left bond - VLAN blocking is removed [ 354.375625][T23474] tipc: Resetting bearer [ 355.529269][T23524] unsupported nla_type 52263 [ 355.773967][ T29] kauditd_printk_skb: 687 callbacks suppressed [ 355.773986][ T29] audit: type=1400 audit(611.761:43447): avc: denied { connect } for pid=23564 comm="syz.6.5484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 355.873073][T23568] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 355.880402][ T29] audit: type=1400 audit(611.861:43448): avc: denied { ioctl } for pid=23567 comm="syz.0.5485" path="socket:[66162]" dev="sockfs" ino=66162 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 355.974475][T23574] __nla_validate_parse: 2 callbacks suppressed [ 355.974496][T23574] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5487'. [ 356.088177][ T29] audit: type=1326 audit(612.081:43449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23580 comm="syz.5.5489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 356.169828][ T29] audit: type=1326 audit(612.111:43450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23580 comm="syz.5.5489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 356.193666][ T29] audit: type=1326 audit(612.111:43451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23580 comm="syz.5.5489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 356.216780][ T29] audit: type=1326 audit(612.111:43452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23580 comm="syz.5.5489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=440 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 356.239818][ T29] audit: type=1326 audit(612.111:43453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23580 comm="syz.5.5489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 356.262935][ T29] audit: type=1326 audit(612.111:43454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23580 comm="syz.5.5489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 356.285973][ T29] audit: type=1326 audit(612.111:43455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23580 comm="syz.5.5489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 356.309246][ T29] audit: type=1326 audit(612.111:43456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23580 comm="syz.5.5489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f912862f749 code=0x7ffc0000 [ 356.396533][T23584] bridge0: entered allmulticast mode [ 356.438739][T23584] pim6reg: entered allmulticast mode [ 356.478797][T23596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=23596 comm=syz.6.5492 [ 356.557767][T23581] netlink: 128 bytes leftover after parsing attributes in process `syz.5.5489'. [ 356.628847][T23607] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5495'. [ 356.792938][T23637] loop7: detected capacity change from 0 to 512 [ 356.849115][T23637] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 357.075012][T23660] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 357.569276][T23637] EXT4-fs error (device loop7): ext4_do_update_inode:5617: inode #2: comm syz.7.5497: corrupted inode contents [ 357.603404][T23637] EXT4-fs error (device loop7): ext4_dirty_inode:6502: inode #2: comm syz.7.5497: mark_inode_dirty error [ 357.633001][T23637] EXT4-fs error (device loop7): ext4_do_update_inode:5617: inode #2: comm syz.7.5497: corrupted inode contents [ 357.682749][T23749] netlink: 'syz.0.5504': attribute type 3 has an invalid length. [ 358.167785][T11425] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 358.620087][T23921] netlink: 256 bytes leftover after parsing attributes in process `syz.7.5525'. [ 358.710628][T23938] netlink: 82908 bytes leftover after parsing attributes in process `syz.6.5526'. [ 358.721571][T23938] netlink: zone id is out of range [ 358.726715][T23938] netlink: zone id is out of range [ 358.733745][T23938] netlink: zone id is out of range [ 358.740651][T23938] netlink: zone id is out of range [ 358.745943][T23938] netlink: zone id is out of range [ 358.752681][T23938] netlink: zone id is out of range [ 358.759476][T23938] netlink: zone id is out of range [ 358.764680][T23938] netlink: zone id is out of range [ 358.771649][T23938] netlink: zone id is out of range [ 358.776909][T23938] netlink: zone id is out of range [ 358.894746][T23937] netlink: 'syz.7.5527': attribute type 30 has an invalid length. [ 359.436614][T24024] netlink: 14 bytes leftover after parsing attributes in process `syz.7.5539'. [ 359.481655][T24024] hsr_slave_0: left promiscuous mode [ 359.492391][T24024] hsr_slave_1: left promiscuous mode [ 359.585981][T24052] netlink: 68 bytes leftover after parsing attributes in process `syz.0.5541'. [ 359.659687][T24060] vlan4: entered promiscuous mode [ 359.665017][T24060] hsr_slave_1: entered promiscuous mode [ 359.671876][T24060] vlan4: entered allmulticast mode [ 359.677180][T24060] hsr_slave_1: entered allmulticast mode [ 359.739567][T24060] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5542'. [ 359.819538][T24065] ================================================================== [ 359.827696][T24065] BUG: KCSAN: data-race in shmem_file_splice_read / shmem_file_splice_read [ 359.836357][T24065] [ 359.838704][T24065] write to 0xffff888148162468 of 8 bytes by task 24087 on cpu 1: [ 359.846454][T24065] shmem_file_splice_read+0x470/0x600 [ 359.851881][T24065] splice_direct_to_actor+0x26f/0x680 [ 359.857291][T24065] do_splice_direct+0xda/0x150 [ 359.862103][T24065] do_sendfile+0x380/0x650 [ 359.866560][T24065] __x64_sys_sendfile64+0x105/0x150 [ 359.871808][T24065] x64_sys_call+0x2db1/0x3000 [ 359.876532][T24065] do_syscall_64+0xca/0x2b0 [ 359.881090][T24065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.887116][T24065] [ 359.889480][T24065] write to 0xffff888148162468 of 8 bytes by task 24065 on cpu 0: [ 359.897231][T24065] shmem_file_splice_read+0x470/0x600 [ 359.902668][T24065] splice_direct_to_actor+0x26f/0x680 [ 359.908073][T24065] do_splice_direct+0xda/0x150 [ 359.912943][T24065] do_sendfile+0x380/0x650 [ 359.917393][T24065] __x64_sys_sendfile64+0x105/0x150 [ 359.922634][T24065] x64_sys_call+0x2db1/0x3000 [ 359.927384][T24065] do_syscall_64+0xca/0x2b0 [ 359.931939][T24065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.938152][T24065] [ 359.940497][T24065] value changed: 0x0000000000000be9 -> 0x0000000000000beb [ 359.947710][T24065] [ 359.950098][T24065] Reported by Kernel Concurrency Sanitizer on: [ 359.956308][T24065] CPU: 0 UID: 0 PID: 24065 Comm: syz.6.5543 Not tainted syzkaller #0 PREEMPT(voluntary) [ 359.966152][T24065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 359.976245][T24065] ==================================================================