last executing test programs: 4.233831001s ago: executing program 3 (id=1344): mkdir(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000181100006a5bc9affb83420362b8554ea2768e1c46fc4ab65c0a0347ee506a1a3dee71130c2f79a25f0efb81ad6e0a155585915f09", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r3) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r3) sendmsg$NL802154_CMD_NEW_INTERFACE(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r4, 0x1, 0x60, 0x0, {0x1e}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan3\x00'}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x8d0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f0000000080)) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000000100)=0xffff0000) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000002540)=0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1451c2, 0x0) ftruncate(r7, 0x2007ffb) sendfile(r7, r7, 0x0, 0x800000009) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = socket$netlink(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWTABLE={0x24, 0x0, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_USERDATA={0x4}]}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x3, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x6c}, 0x1, 0x0, 0x0, 0x840}, 0x20040040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 3.770305063s ago: executing program 2 (id=1348): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000400"/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000000691089241ea227d9"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000580)=""/208, 0xd0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) sigaltstack(0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r4, &(0x7f0000000000)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000380)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x28}}], 0x2, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x20, 0xc, &(0x7f0000000800)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x7, 0x1, 0x0, r6}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @map_fd={0x18, 0x5, 0x1, 0x0, r6}, @ldst={0x0, 0x1, 0x6, 0x5, 0x6, 0x30, 0xfffffffffffffff1}, @snprintf, @ldst={0x3, 0x2, 0x0, 0x9, 0xb, 0x18}], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000003c0)='kfree\x00', r7}, 0x10) lsetxattr$security_selinux(&(0x7f0000000000)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000940), &(0x7f0000000980)='system_u:object_r:semanage_exec_t:s0\x00', 0x25, 0x1) 3.757852923s ago: executing program 4 (id=1350): socket$inet_udp(0x2, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_MM(0x23, 0x2, &(0x7f00002b4000/0x3000)=nil) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x6897b900, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r2, 0x5607, 0x2c) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) ioctl$TIOCL_SETVESABLANK(r4, 0x560e, &(0x7f0000000140)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, &(0x7f0000000000)) 3.538422694s ago: executing program 0 (id=1351): socket$inet_udp(0x2, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_MM(0x23, 0x2, &(0x7f00002b4000/0x3000)=nil) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r2, 0x5607, 0x2c) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) ioctl$TIOCL_SETVESABLANK(r4, 0x560e, &(0x7f0000000140)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, &(0x7f0000000000)) 3.380958595s ago: executing program 3 (id=1352): mkdir(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000181100006a5bc9affb83420362b8554ea2768e1c46fc4ab65c0a0347ee506a1a3dee71130c2f79a25f0efb81ad6e0a155585915f09", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r2) syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r2) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000080)) 3.246424116s ago: executing program 1 (id=1354): mkdir(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000181100006a5bc9affb83420362b8554ea2768e1c46fc4ab65c0a0347ee506a1a3dee71130c2f79a25f0efb81ad6e0a155585915f09", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r3) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r3) sendmsg$NL802154_CMD_NEW_INTERFACE(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r4, 0x1, 0x60, 0x0, {0x1e}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan3\x00'}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x8d0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f0000000080)) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000000100)=0xffff0000) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000002540)=0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1451c2, 0x0) ftruncate(r7, 0x2007ffb) sendfile(r7, r7, 0x0, 0x800000009) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = socket$netlink(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWTABLE={0x24, 0x0, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_USERDATA={0x4}]}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x3, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x6c}, 0x1, 0x0, 0x0, 0x840}, 0x20040040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 3.199466196s ago: executing program 3 (id=1355): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000480)={0x1f, 0x0, @any, 0xf5, 0x1}, 0xfe2a) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000400)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 2.703347778s ago: executing program 4 (id=1356): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000102000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r2, 0x0, 0x0) ppoll(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000300)='./file1\x00', 0x10, &(0x7f0000000680), 0x1, 0x254, &(0x7f00000006c0)="$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") openat(0xffffffffffffff9c, 0x0, 0x143042, 0x0) pwritev2(r1, 0x0, 0x0, 0x6e45, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syncfs(0xffffffffffffffff) mknod(0x0, 0x4, 0x7ff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x14a) fallocate(r3, 0x20, 0x0, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) timer_create(0x2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, 0x0, 0x82}], 0x1, 0x0, 0x0, 0x1) syz_clone(0x8105c00, 0x0, 0x0, 0x0, 0x0, 0x0) 2.688676418s ago: executing program 2 (id=1357): creat(&(0x7f0000000940)='./bus\x00', 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, 0x0, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) faccessat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x5) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f00000002c0), 0x1, 0x78e, &(0x7f0000001480)="$eJzs3c1rHOUfAPDvbJKmSfv7JYKg9RQQNFC6MTW2Ch4qHkSwUNCz7bLZhppNtmQ3pQkBW0QQQVDxIOilZ1/qzasvV/0vPEhL1bRY8SCR2eym22Y33bTZ3WA+H5js88zM5nm++8w888zOsBPAnjWW/slEHIqID5OIkdr8JCIGqqn+iBPr691eXcmnUxJra6//nlTXubW6ko+G96QO1DKPR8QP70Yczmwut7y0PJsrFgsLtfxEZe78RHlp+ci5udxMYaYwf2xyauro8eeOH9u5WP/8efng9Y9eefrrE3+/89jVD35M4kQcrC1rjGOnjMVY7TMZSD/Cu7y804X1WNLrCvBA0l2zb30vj0MxEn3VVAtD3awZANApb0fEGgCwxySO/wCwx9S/B7i1upKvT739RqK7brwUEfvX469f31xf0l+7Zre/eh10+FZy15WRJCJGd6D8sYj4/Ns3v0yn6NB1SIBmLl2OiDOjY5v7/2TTPQvb9cxWC9cGqy9j98y+b//3/kNWCtjwXTr+eb7Z+C+zMf6JJuOfwSb77oO4//6fubYDxbSUjv9ebLi37XZD/DWjfbXc/6pjvoHk7LliIe3b/h8R4zEwmOYnq6s2vwtq/OY/N1uV3zj+++Pjt75Iy09f76yRudY/ePd7pnOV3MPGXXfjcsQT/c3iTzbaP2kx/j3VZhmvvvDeZ62WpfGn8danzfF31tqViKeatv+dtky2vD9xoro5TNQ3iia++eXT4VblN7Z/OqXl188FuiFt/+Gt4x9NGu/XLG+/jJ+ujHzfatn942++/e9L3qim99XmXcxVKguTEfuS1zbPP3rnvfV8ff00/vEnm+//W23/6TnhmTbj77/+21cPHn9npfFPb6v9t5+4enu2r1X57bX/VDU1XpvTTv/XbgUf5rMDAAAAAAAAAAAAAAAAAAAAAAAAgHZlIuJgJJnsRjqTyWbXn+H9aAxniqVy5fDZ0uL8dFSflT0aA5n6T12ONPwe6mTt9/Dr+aP35J+NiEci4pPBoWo+my8Vp3sdPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADUHGjx/P/Ur4O9rh0A0DH7W8zv63I9AIDuaXX8BwD+u7Z3/B/qWD0AgO5x/g8Ae0/bx/8zna0HANA9zv8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADosFMnT6bT2l+rK/k0P31haXG2dOHIdKE8m51bzGfzpYXz2ZlSaaZYyOZLcy3/0aX1l2KpdH4q5hcvTlQK5cpEeWn59Fxpcb5y+txcbqZwujDQtcgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoH3lpeXZXLFYWJDYMjG0O6qxaxL9sSuqIdGxRGMvMdS7DgoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgl/s3AAD//4fPK2Y=") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x163042, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./bus\x00', 0x0, 0x1000, 0x0) open(0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') getdents(r2, &(0x7f0000000000)=""/43, 0x72) write$sndseq(0xffffffffffffffff, &(0x7f0000000180)=[{0x0, 0x0, 0x8, 0x0, @tick, {0x4}, {}, @raw32}, {0x0, 0x40, 0x0, 0x0, @time={0x0, 0x4}, {0x0, 0x7f}, {}, @connect={{0xb5, 0xdd}, {0x1, 0x9}}}], 0x38) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x400042, 0x0) write$sndseq(r1, &(0x7f0000000800)=[{0x20, 0x0, 0x0, 0x0, @time={0x10b, 0x3}, {}, {0x0, 0x3}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time={0x2, 0xffbf}}], 0x38) unlink(&(0x7f0000000340)='./bus\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='kfree\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x40) write$UHID_INPUT2(r4, &(0x7f0000000280)={0xc, {0x9d, "18db45551d78b6b148b982e6ddff25abdca14dc4e83f870737b5bce78f26a4f3aeeaa050c546204bb8a42e491bc46c38af57cc958ce7c2cb9597fc061d53651d82e2ca4f0d4f18e6437ffbc532ede561f17f9b67fcf89c6b4ad98d2169fc85611f0c78b5c1d32ba3da26e1b726f8adfdf2d2545c569be1df216672c358b1eb30e8a6b0835f4435646429c45490b710662e4631cfe183c1bce35e32d125"}}, 0xa3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) unshare(0x2a020480) io_uring_setup(0x1691, &(0x7f0000000400)={0x0, 0x631d, 0x2, 0x2, 0x2d8}) 2.619086498s ago: executing program 1 (id=1358): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r0, 0x0, 0x400000000000007}, 0xffffffbb) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x500, 0x40420f00}}}, 0x90) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4ea4, 0x6b3a, @mcast1, 0xf1b7}, r2}}, 0x30) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1fe) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00080005000000020000008400000005000000b571bb", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000020000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(0xffffffffffffffff, 0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000002c0)='./file1\x00', 0x20081e, &(0x7f00000020c0), 0x1, 0x4ef, &(0x7f0000000a00)="$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") r7 = socket$inet6(0xa, 0x80002, 0x88) r8 = mq_open(&(0x7f00005a1ffb)='e\xeeQ\x92o', 0x42, 0x0, 0x0) r9 = dup2(r8, r8) mq_notify(r9, &(0x7f0000000000)={0x20000000, 0x6}) mq_timedsend(r8, 0x0, 0x0, 0x0, 0x0) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) r10 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r10, &(0x7f0000000180)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) inotify_rm_watch(r4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x25, &(0x7f0000002000)={0x1}) fcntl$lock(r11, 0x26, &(0x7f00000031c0)={0x1}) fcntl$lock(r11, 0x26, &(0x7f00000003c0)={0x1, 0x2, 0x1}) fcntl$lock(r11, 0x26, &(0x7f0000000180)) fcntl$lock(r11, 0x6, &(0x7f0000000000)) 2.594020509s ago: executing program 0 (id=1359): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="6c00050000e3afe18bc7c7f00806935485f5b768401527d7f78a6f62cce98d127e44", @ANYRES16=r2, @ANYBLOB="01000000000000000000030000005800018044000400200001000a00ffff000000002e0000000000005f000000000000005f00"], 0x6c}}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) openat$ptmx(0xffffffffffffff9c, 0x0, 0x42, 0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r5) write$P9_RVERSION(r6, &(0x7f0000000300)=ANY=[], 0x15) r7 = dup(r6) write$P9_RLERRORu(r7, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r7, 0x0, 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000002200)='./file0\x00', 0x80) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$F2FS_IOC_SET_COMPRESS_OPTION(0xffffffffffffffff, 0x4002f516, 0x0) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630b00c145f94cd977", 0x18, 0xffffffffffffffff) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0, r8) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r8, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r9, 0x6, 0x23, 0x0, 0x0) 2.548055689s ago: executing program 2 (id=1360): socket$inet6(0xa, 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) writev(r0, &(0x7f0000000880)=[{&(0x7f0000000700)="7b2bae2f9f22", 0x6}, {&(0x7f0000000740)}], 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r2, &(0x7f0000000000), 0x10) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000140)=[{{}, {0x0, 0x1}}, {{}, {0x0, 0x1}}], 0x10) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xa000000a}) finit_module(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r4 = openat$cgroup_devices(r3, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r4, &(0x7f0000000000)={'a', ' *:* ', 'w\x00'}, 0x8) r5 = openat$cgroup_devices(r3, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f00000000c0)={'c', ' *:* ', 'rwm\x00'}, 0xa) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r7 = openat$cgroup_devices(r6, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r7, &(0x7f0000000280)=ANY=[@ANYBLOB='r *:* rm\x00'], 0x9) 2.532056969s ago: executing program 0 (id=1361): mkdir(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000181100006a5bc9affb83420362b8554ea2768e1c46fc4ab65c0a0347ee506a1a3dee71130c2f79a25f0efb81ad6e0a155585915f09", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r1) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r1) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x1, 0x60, 0x0, {0x1e}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan3\x00'}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x8d0}, 0x0) 2.489323549s ago: executing program 2 (id=1362): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000800000001000100ff00000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'ipvlan0\x00'}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32=r4], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x5}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r9 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) readv(r9, &(0x7f0000000340)=[{&(0x7f0000000080)=""/140, 0x8c}, {&(0x7f00000002c0)=""/99, 0x63}], 0x2) ioctl$IMADDTIMER(r9, 0x80044940, &(0x7f0000000000)) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) tgkill(r8, r8, 0xe) tee(r6, r10, 0xfffffffffffffc01, 0x0) tee(r6, r10, 0x60000000000, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x110, r7, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x80, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0x2c, 0x3, "30f02fd00bd2a51c735dfabf13705dec268656565b27a8207f65236b9f02333bf8a032a7cc108483"}, @NFTA_TARGET_NAME={0x9, 0x1, 'DNAT\x00'}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x1}]}}}]}]}], {0x14}}, 0xf4}, 0x1, 0x0, 0x0, 0x50}, 0x4000040) 2.488905369s ago: executing program 0 (id=1363): mkdir(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000181100006a5bc9affb83420362b8554ea2768e1c46fc4ab65c0a0347ee506a1a3dee71130c2f79a25f0efb81ad6e0a155585915f09", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r3) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r3) sendmsg$NL802154_CMD_NEW_INTERFACE(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r4, 0x1, 0x60, 0x0, {0x1e}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan3\x00'}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x8d0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f0000000080)) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000000100)=0xffff0000) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000002540)=0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1451c2, 0x0) ftruncate(r7, 0x2007ffb) sendfile(r7, r7, 0x0, 0x800000009) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = socket$netlink(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWTABLE={0x24, 0x0, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_USERDATA={0x4}]}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x3, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x6c}, 0x1, 0x0, 0x0, 0x840}, 0x20040040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2.475564899s ago: executing program 1 (id=1364): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0a00000002000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x34, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10}, 0x2000, 0xb11d, 0x4, 0x7, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') close_range(r0, 0xffffffffffffffff, 0x0) 2.443197479s ago: executing program 1 (id=1365): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000480)={0x1f, 0x0, @any, 0xf5, 0x1}, 0xfe2a) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000400)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x5411, &(0x7f0000000280)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}, 0xd, 'veth1_to_batadv\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) lseek(0xffffffffffffffff, 0xffffffffffffeffa, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x0, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$P9_RLERRORu(r5, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='devpts\x00', 0x1210, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0/../file0/../file0\x00', 0x0, 0x1210020, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESHEX=0x0, @ANYBLOB='A\x00']) 2.164224871s ago: executing program 3 (id=1366): socket$inet_udp(0x2, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_MM(0x23, 0x2, &(0x7f00002b4000/0x3000)=nil) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x6897b900, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r2, 0x5607, 0x2c) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) ioctl$TIOCL_SETVESABLANK(r4, 0x560e, &(0x7f0000000140)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, &(0x7f0000000000)) 1.823943442s ago: executing program 0 (id=1367): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000400"/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000000691089241ea227d9"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000580)=""/208, 0xd0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) sigaltstack(0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r4, &(0x7f0000000000)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000380)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x28}}], 0x2, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x20, 0xc, &(0x7f0000000800)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x7, 0x1, 0x0, r6}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @map_fd={0x18, 0x5, 0x1, 0x0, r6}, @ldst={0x0, 0x1, 0x6, 0x5, 0x6, 0x30, 0xfffffffffffffff1}, @snprintf, @ldst={0x3, 0x2, 0x0, 0x9, 0xb, 0x18}], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000003c0)='kfree\x00', r7}, 0x10) lsetxattr$security_selinux(&(0x7f0000000000)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000940), &(0x7f0000000980)='system_u:object_r:semanage_exec_t:s0\x00', 0x25, 0x1) 1.783629922s ago: executing program 4 (id=1368): mkdir(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000181100006a5bc9affb83420362b8554ea2768e1c46fc4ab65c0a0347ee506a1a3dee71130c2f79a25f0efb81ad6e0a155585915f09", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r3) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r3) sendmsg$NL802154_CMD_NEW_INTERFACE(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r4, 0x1, 0x60, 0x0, {0x1e}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan3\x00'}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x8d0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f0000000080)) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000000100)=0xffff0000) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000002540)=0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1451c2, 0x0) ftruncate(r7, 0x2007ffb) sendfile(r7, r7, 0x0, 0x800000009) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = socket$netlink(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWTABLE={0x24, 0x0, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_USERDATA={0x4}]}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x3, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x6c}, 0x1, 0x0, 0x0, 0x840}, 0x20040040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.585575403s ago: executing program 2 (id=1369): socket$inet_udp(0x2, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_MM(0x23, 0x2, &(0x7f00002b4000/0x3000)=nil) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r2, 0x5607, 0x2c) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) ioctl$TIOCL_SETVESABLANK(r4, 0x560e, &(0x7f0000000140)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, &(0x7f0000000000)) 651.161827ms ago: executing program 2 (id=1370): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x4000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x1) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = syz_io_uring_setup(0xec5, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x4, 0x321}, &(0x7f0000000500)=0x0, &(0x7f00000001c0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) io_uring_enter(r6, 0x67a9, 0x10a5, 0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x5, &(0x7f0000000600)=[{0x1, 0xf, 0x6, 0xfffffffe}, {0x8, 0x1, 0x2, 0x1179}, {0xd, 0x9, 0xce, 0x8}, {0x3, 0xb, 0x7f, 0x3}, {0x4, 0x0, 0x8, 0x1}]}) setpgid(0x0, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0, @ANYRES32=0x0], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x14200, 0x0) syz_read_part_table(0x59d, &(0x7f0000000000)="$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") syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x40800, &(0x7f0000000680)={[{@nodiscard}, {@nouid32}, {@nodelalloc}]}, 0x1, 0x4c6, &(0x7f0000000bc0)="$eJzs3c1vHOUZAPBnd2PHdtzmo1WVpFITKZXSD8XrD1Wx2156anuIVDVSL62UGntjgtdey7sOsZWDA7ccOCAQSIgDd/4BuJATERLiDHfEAQVBMBIggRbN7G5ir71mBY6XeH4/abzvfOw+7+vV82rmnZmdADLrbPInFzEcEe9FxNHG7NYNzjZeNu7fnEmmXNTrlz/Npdsl861NW+87EhHrETEQEf/+e8QTue1xq6tr89Plcmm5OV+sLSwVq6trF64tTM+V5kqLY5MXp6YmRyfGp/asrbefe+r2pTf/2f/6l8/eu/v8228l1Rpurtvcjr3UaHpfHN+07FBE/PVRBOuBQrM9g72uCD9I8v39IiLOpfl/NArptwlkQb1er39TP9xp9XodOLDy6T5wLj8SEY1yPj8y0tiH/2UM5cuVau2PVysri7ONfeVj0Ze/eq1cGm0eKxyLvlwyP5aWH86Pt81PRKT7wC8UBtP5kZlKeXZ/uzqgzZG2/P+i0Mh/ICMc8kN2yX/ILvkP2SX/IbvkP2SX/Ifskv+QXfIfskv+Q3bJf8gu+Q+Z9K9Ll5Kp3rr/ffb66sp85fqF2VJ1fmRhZWZkprK8NDJXqcyl9+wsfN/nlSuVpbE/xcqNYq1UrRWrq2tXFiori7Ur6X39V0p9+9IqoBvHz9z5IBcR638eTKdEf3OdXIWDrV7PRa/vQQZ6o9DrDgjoGUN/kF2O8YH2n+ht3y8Y6PTGpYfjhcDjJd/rCgA9c/7Uruf/3vi2p7UDHiXj/5Bdxv8hu4z/Azs8om+L3cb/gceT8X/IruEOz//62aZnd41GxM8j4v1C3+HWs76AgyD/ca65/3/+6G+H29f2575KTxH0R8TTr1x+6cZ0rbY8liz/7MHy2svN5eOb3tjxgAHolVaetvIYAMiujfs3Z1rTfsb95G+NixC2xz/UHJscSM9RDm3ktlyrkNujaxfWb0XEyZ3i55rPO28cyAxtFLbFP9F8zTU+Iq3vofS56fsT/9Sm+L/ZFP/0j/6vQDbcSfqf0Z3yL5/mdDzIv9yWk6TDe3TtROf+L/+g/yt06P/OdBnjyVef+ahj/FsRp3eM34o3kMZqj5/U7XyX8e/97z+/6rSu/lrjc3aK35KUirWFpWJ1de1C+jtyc6XFscmLU1OToxPjU8V0jLrYGqne7i8n3727W/uHOsTfrf3Jst932f6vf/3Of8/uEv9353b+/k/sEn8wIv7QZfzPxz/8f6d1SfzZDu3P7xI/WTbRZfzqi/843OWmAMA+qK6uzU+Xy6VlBQWFnhRu/TSq0Vbodc8EPGrV1eTQPEn6XtcEAAAAAAAAAAAA6NZ+XE7c6zYCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwE3wUAAP//CPrWgw==") 650.865547ms ago: executing program 3 (id=1371): creat(&(0x7f0000000940)='./bus\x00', 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, 0x0, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x5}, 0x18) faccessat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x5) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f00000002c0), 0x1, 0x78e, &(0x7f0000001480)="$eJzs3c1rHOUfAPDvbJKmSfv7JYKg9RQQNFC6MTW2Ch4qHkSwUNCz7bLZhppNtmQ3pQkBW0QQQVDxIOilZ1/qzasvV/0vPEhL1bRY8SCR2eym22Y33bTZ3WA+H5js88zM5nm++8w888zOsBPAnjWW/slEHIqID5OIkdr8JCIGqqn+iBPr691eXcmnUxJra6//nlTXubW6ko+G96QO1DKPR8QP70Yczmwut7y0PJsrFgsLtfxEZe78RHlp+ci5udxMYaYwf2xyauro8eeOH9u5WP/8efng9Y9eefrrE3+/89jVD35M4kQcrC1rjGOnjMVY7TMZSD/Cu7y804X1WNLrCvBA0l2zb30vj0MxEn3VVAtD3awZANApb0fEGgCwxySO/wCwx9S/B7i1upKvT739RqK7brwUEfvX469f31xf0l+7Zre/eh10+FZy15WRJCJGd6D8sYj4/Ns3v0yn6NB1SIBmLl2OiDOjY5v7/2TTPQvb9cxWC9cGqy9j98y+b//3/kNWCtjwXTr+eb7Z+C+zMf6JJuOfwSb77oO4//6fubYDxbSUjv9ebLi37XZD/DWjfbXc/6pjvoHk7LliIe3b/h8R4zEwmOYnq6s2vwtq/OY/N1uV3zj+++Pjt75Iy09f76yRudY/ePd7pnOV3MPGXXfjcsQT/c3iTzbaP2kx/j3VZhmvvvDeZ62WpfGn8danzfF31tqViKeatv+dtky2vD9xoro5TNQ3iia++eXT4VblN7Z/OqXl188FuiFt/+Gt4x9NGu/XLG+/jJ+ujHzfatn942++/e9L3qim99XmXcxVKguTEfuS1zbPP3rnvfV8ff00/vEnm+//W23/6TnhmTbj77/+21cPHn9npfFPb6v9t5+4enu2r1X57bX/VDU1XpvTTv/XbgUf5rMDAAAAAAAAAAAAAAAAAAAAAAAAgHZlIuJgJJnsRjqTyWbXn+H9aAxniqVy5fDZ0uL8dFSflT0aA5n6T12ONPwe6mTt9/Dr+aP35J+NiEci4pPBoWo+my8Vp3sdPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADUHGjx/P/Ur4O9rh0A0DH7W8zv63I9AIDuaXX8BwD+u7Z3/B/qWD0AgO5x/g8Ae0/bx/8zna0HANA9zv8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADosFMnT6bT2l+rK/k0P31haXG2dOHIdKE8m51bzGfzpYXz2ZlSaaZYyOZLcy3/0aX1l2KpdH4q5hcvTlQK5cpEeWn59Fxpcb5y+txcbqZwujDQtcgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoH3lpeXZXLFYWJDYMjG0O6qxaxL9sSuqIdGxRGMvMdS7DgoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgl/s3AAD//4fPK2Y=") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x163042, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./bus\x00', 0x0, 0x1000, 0x0) open(0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') getdents(r2, &(0x7f0000000000)=""/43, 0x72) write$sndseq(0xffffffffffffffff, &(0x7f0000000180)=[{0x0, 0x0, 0x8, 0x0, @tick, {0x4}, {}, @raw32}, {0x0, 0x40, 0x0, 0x0, @time={0x0, 0x4}, {0x0, 0x7f}, {}, @connect={{0xb5, 0xdd}, {0x1, 0x9}}}], 0x38) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x400042, 0x0) write$sndseq(r1, &(0x7f0000000800)=[{0x20, 0x0, 0x0, 0x0, @time={0x10b, 0x3}, {}, {0x0, 0x3}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time={0x2, 0xffbf}}], 0x38) unlink(&(0x7f0000000340)='./bus\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='kfree\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x40) write$UHID_INPUT2(r4, &(0x7f0000000280)={0xc, {0x9d, "18db45551d78b6b148b982e6ddff25abdca14dc4e83f870737b5bce78f26a4f3aeeaa050c546204bb8a42e491bc46c38af57cc958ce7c2cb9597fc061d53651d82e2ca4f0d4f18e6437ffbc532ede561f17f9b67fcf89c6b4ad98d2169fc85611f0c78b5c1d32ba3da26e1b726f8adfdf2d2545c569be1df216672c358b1eb30e8a6b0835f4435646429c45490b710662e4631cfe183c1bce35e32d125"}}, 0xa3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) unshare(0x2a020480) io_uring_setup(0x1691, &(0x7f0000000400)={0x0, 0x631d, 0x2, 0x2, 0x2d8}) 647.343637ms ago: executing program 4 (id=1372): socket$inet6(0xa, 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) writev(r0, &(0x7f0000000880)=[{&(0x7f0000000700)="7b2bae2f9f22", 0x6}, {&(0x7f0000000740)}], 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r2, &(0x7f0000000000), 0x10) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000140)=[{{}, {0x0, 0x1}}, {{}, {0x0, 0x1}}], 0x10) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xa000000a}) finit_module(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r4 = openat$cgroup_devices(r3, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r4, &(0x7f0000000000)={'a', ' *:* ', 'w\x00'}, 0x8) r5 = openat$cgroup_devices(r3, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f00000000c0)={'c', ' *:* ', 'rwm\x00'}, 0xa) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r7 = openat$cgroup_devices(r6, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r7, &(0x7f0000000280)=ANY=[@ANYBLOB='r *:* rm\x00'], 0x9) 646.671577ms ago: executing program 0 (id=1380): socket$inet_udp(0x2, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_MM(0x23, 0x2, &(0x7f00002b4000/0x3000)=nil) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x6897b900, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r2, 0x5607, 0x2c) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) ioctl$TIOCL_SETVESABLANK(r4, 0x560e, &(0x7f0000000140)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, &(0x7f0000000000)) 646.262897ms ago: executing program 1 (id=1373): mkdir(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000181100006a5bc9affb83420362b8554ea2768e1c46fc4ab65c0a0347ee506a1a3dee71130c2f79a25f0efb81ad6e0a155585915f09", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r1) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r1) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x1, 0x60, 0x0, {0x1e}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan3\x00'}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x8d0}, 0x0) 597.327668ms ago: executing program 1 (id=1374): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3, 0x40, 0x4, 0x6, 0x0, 0x0, 0x0, 0xf, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0xfff, 0x23}, 0x100a80, 0x2400000000000, 0x33, 0x2, 0x5, 0x7, 0x1ff, 0x0, 0x6, 0x0, 0x40}, 0x0, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x100002, 0x1, 0x0, 0x6, 0x3, 0x3, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r1, 0xa) r2 = mq_open(&(0x7f0000001140)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\xe0\x9d\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xdf\x15\f]\x15\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb', 0x42, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x6, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x8000, 0x0) flistxattr(r3, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$bt_hci(r4, 0x84, 0x14, &(0x7f0000003140)=""/4111, &(0x7f0000000000)=0x4) timer_create(0x3, 0x0, &(0x7f0000000300)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) timer_create(0x3, 0x0, &(0x7f0000000540)=0x0) r7 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r7, &(0x7f00000001c0), 0x10) bind$can_raw(r7, &(0x7f0000000280), 0x10) timer_settime(r6, 0x0, &(0x7f00000002c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) getsockname$inet(r3, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/address_bits', 0x0, 0x9) sendfile(0xffffffffffffffff, r8, 0x0, 0x1c) mq_unlink(&(0x7f0000000000)='eth0\x00') socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000100)=ANY=[@ANYRES64, @ANYRES8=r5, @ANYBLOB="010000000000000000002d00000018000180140002"], 0x2c}}, 0x8000) 549.530008ms ago: executing program 4 (id=1375): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0a00000002000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x34, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10}, 0x2000, 0xb11d, 0x4, 0x7, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') close_range(r0, 0xffffffffffffffff, 0x0) 101.776019ms ago: executing program 3 (id=1376): r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, 0x0, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f0000000780)={[{@dioread_lock}, {@noblock_validity}, {@stripe={'stripe', 0x3d, 0x9}}, {@init_itable}, {@auto_da_alloc}, {@grpjquota, 0x2e}, {@nouid32}, {@errors_remount}, {@jqfmt_vfsv1}, {@grpid}], [], 0x2c}, 0x84, 0x4c2, &(0x7f0000000980)="$eJzs3M1vG0UbAPBnN02afibtW73QD6ihICIKSZMW6IEDIJB6ASHBoRxDGqrStEVNkGhV0YBQOSL+AuCIhMSJCyeQEAIugLjCHSFVqJcWDsho7d3EbmzHTpqY1r+ftPbM7uzOPrM79nrHdgA9q5Q9JBFbI+LXiBiqZusLlKpPN65dmvrr2qWpJMrll/5MKuWuX7s0VRQt1tuSZ0bSiPS9JPY2qHf2wsXTkzMz0+fz/NjcmTfGZi9cfPTUmcmT0yenz04cPXrk8PgTj0881lYcl5dZnsV1fc/b5/btPvbKh89PlePV7z/L9ndrvrw2jqrhtuptpRSlKOcW5w5UHh9c9db/W7bVpJMNXdwROtIXEdnh6q/0/6Hoi8WDNxTPvbuQ+aZLOwismey9aceSuX35c7rw/gXciRJ9HHpU8Y6fff4tpvW8/ui2q09nj9OV+G/k048vVNsmzT7LDlc/sfc1Wf//DeYNLibLQ8vUvzUijs///VE2RcP7EC0kbZcEAFjwVXb980ij67+07tpmez6GMhwRByNiZ0T8LyJ2RbpQ5q6IuLvD+ks35Zde//y8qcNNdiS7/nsyH9sqpuqSIq5kIbetEn9/8tqpmelDeZuMRP/GLD/eoo6vn/3lg2bLSjXXf9mU1V9cC+b78ceGjfXrnJicm1xFyHWuvhOxZ0Oj+JOFkYCsBXZHxJ4VbD9rs1MPf7ovS2/fsnT58vG3cAvGmcqfRDxUPf7zcVP8haRaU7PxybHBmJk+NFacFUv98NOVF2vz/TXpuvgH24tpcKXBNpAd/80Nz/88/qIbFOO1s53XceW395t+pll6/JM4Pl9bIj//Ny02W3b+DyQvV9ID+by3Jufmzo9HDOQz6uZPLG6tyBfls/hHDjTu/zsj/vk4X29vRGQn8T0RcW9E7M/3/b6IuD8iDrSI/7tnHni9dQut8Py/BbL4T7Q6/hHDSe14/QoSfae//bJZ/e29/h2ppEbyOe28/rW7g6tpOwAAALhdpJUx6CQdLdI1N6d2xeZ05tzs3MFSvHn2RHWsejj60+JO11DN/dDx/N5wkZ+4KX84InZUvmm0qZIfnTo3s62bgQOV3+rU9f9I09HR6rLfm33pBbhzdDSOVvuls8+/uPU7A6wrv9eE3qX/Q+/S/6F36f/Quxr1/8sRN7qwK8A68/4PvUv/h96l/0Pv0v+hJy39SXzxdysr+aX/YmLnsVWtvuaJ8tCabHm+87X61ijSqP3TjqaJJCJWVkWkrcsMtFF71xLpsmWeWq5Z+lf1nxhZYn+e2BgR7a51ed1atXiFSPzLJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcFv7NwAA//8Aq+SG") syz_usb_connect(0x0, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000f94f51404919a5853aa3010203010902240001000000000904000002ff5d010009"], 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev, 'veth1_to_batadv\x00'}}, 0x1e) socket$pppoe(0x18, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000001ff00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) fsetxattr$system_posix_acl(r5, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000010"], 0xfe44, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) ustat(0x1, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x1000) r7 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r7, &(0x7f0000000200)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}, 'veth1_to_batadv\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'pim6reg0\x00'}}, 0x1e) io_uring_setup(0x1de0, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @empty}, 0x1, 0x1, 0x1, 0x2}}, 0x26) 0s ago: executing program 4 (id=1377): r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x42, &(0x7f0000000040)=0xf2b, 0x4) getsockopt$inet6_buf(r2, 0x29, 0x6, 0xfffffffffffffffd, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"/3576], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) writev(r5, &(0x7f0000000d00)=[{0x0}, {&(0x7f0000000000)="2303942fe0dfd8", 0x7}], 0x2) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8001000000000000, 0x40, &(0x7f0000002140)=@raw={'raw\x00', 0x8, 0x3, 0x4a0, 0x0, 0x11, 0x148, 0x0, 0x0, 0x408, 0x2a8, 0x2a8, 0x408, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2d0, 0x330, 0x0, {}, [@common=@unspec=@bpf1={{0x230}, @fd={0x2, 0x0, r3}}, @common=@addrtype={{0x30}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r7, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000002000000000004b84ffec850000006d000000040000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) inotify_add_watch(0xffffffffffffffff, 0x0, 0xa4000960) rmdir(0x0) eventfd2(0x0, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)='9', 0x1}, {&(0x7f00000019c0)="b0", 0x1}], 0x2) sysfs$1(0x1, 0x0) kernel console output (not intermixed with test programs): 6.682157][ T29] audit: type=1400 audit(1733392570.552:23369): avc: denied { execmem } for pid=7306 comm="syz.4.1001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 136.705365][ T29] audit: type=1400 audit(1733392570.580:23370): avc: denied { accept } for pid=7308 comm="syz.0.1000" lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 136.989783][ T7327] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 136.989783][ T7327] program syz.1.1007 not setting count and/or reply_len properly [ 137.035632][ T7330] rdma_rxe: rxe_newlink: failed to add bond_slave_1 [ 137.557257][ T7344] pim6reg1: entered promiscuous mode [ 137.562621][ T7344] pim6reg1: entered allmulticast mode [ 137.838561][ T7363] xt_hashlimit: max too large, truncated to 1048576 [ 137.856752][ T7363] lo speed is unknown, defaulting to 1000 [ 137.888175][ T7363] lo speed is unknown, defaulting to 1000 [ 137.894311][ T7363] lo speed is unknown, defaulting to 1000 [ 137.943116][ T7365] netlink: 'syz.1.1018': attribute type 10 has an invalid length. [ 137.966265][ T7365] netdevsim netdevsim1 netdevsim1: entered promiscuous mode [ 137.974600][ T7365] team0: Port device netdevsim1 added [ 137.984448][ T7369] x_tables: duplicate underflow at hook 2 [ 138.034578][ T7376] rdma_rxe: rxe_newlink: failed to add bond_slave_1 [ 138.042080][ T7376] 9pnet_fd: Insufficient options for proto=fd [ 138.659267][ T7390] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 138.669934][ T7390] netlink: 'syz.4.1025': attribute type 29 has an invalid length. [ 138.866368][ T7404] tipc: Enabling of bearer rejected, failed to enable media [ 139.101065][ T7426] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 139.101065][ T7426] program syz.1.1030 not setting count and/or reply_len properly [ 139.999171][ T7461] lo speed is unknown, defaulting to 1000 [ 140.037257][ T7461] lo speed is unknown, defaulting to 1000 [ 140.043959][ T7461] lo speed is unknown, defaulting to 1000 [ 140.078900][ T7464] __nla_validate_parse: 19 callbacks suppressed [ 140.078912][ T7464] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1039'. [ 140.094678][ T7464] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1039'. [ 140.119865][ T7466] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1036'. [ 140.135225][ T7458] netlink: 16402 bytes leftover after parsing attributes in process `‡&/ç'. [ 140.200759][ T7468] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1040'. [ 140.233437][ T7468] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1040'. [ 141.029492][ T7487] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1044'. [ 141.076219][ T7483] @: renamed from bond0 [ 141.213646][ T7498] xt_hashlimit: max too large, truncated to 1048576 [ 141.232354][ T7498] lo speed is unknown, defaulting to 1000 [ 141.267256][ T7498] lo speed is unknown, defaulting to 1000 [ 141.274264][ T7498] lo speed is unknown, defaulting to 1000 [ 141.305075][ T7499] netlink: 36 bytes leftover after parsing attributes in process `syz.2.1047'. [ 141.314078][ T7499] netlink: 36 bytes leftover after parsing attributes in process `syz.2.1047'. [ 141.325374][ T7499] netlink: 36 bytes leftover after parsing attributes in process `syz.2.1047'. [ 141.387397][ T7498] netlink: 'syz.2.1047': attribute type 10 has an invalid length. [ 142.112067][ T29] kauditd_printk_skb: 480 callbacks suppressed [ 142.112083][ T29] audit: type=1400 audit(1733392575.645:23851): avc: denied { create } for pid=7523 comm="syz.3.1055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 142.148815][ T7527] netlink: 'syz.4.1056': attribute type 4 has an invalid length. [ 142.149287][ T29] audit: type=1400 audit(1733392575.673:23852): avc: denied { write } for pid=7526 comm="syz.4.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 142.177144][ T29] audit: type=1400 audit(1733392575.673:23853): avc: denied { read } for pid=7526 comm="syz.4.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 142.217934][ T29] audit: type=1400 audit(1733392575.692:23854): avc: denied { read } for pid=7526 comm="syz.4.1056" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 142.240807][ T29] audit: type=1400 audit(1733392575.692:23855): avc: denied { open } for pid=7526 comm="syz.4.1056" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 142.264091][ T29] audit: type=1400 audit(1733392575.692:23856): avc: denied { ioctl } for pid=7526 comm="syz.4.1056" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 142.351673][ T29] audit: type=1400 audit(1733392575.870:23857): avc: denied { create } for pid=7529 comm="syz.1.1057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 142.410585][ T29] audit: type=1400 audit(1733392575.870:23858): avc: denied { sys_admin } for pid=7529 comm="syz.1.1057" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 142.431759][ T29] audit: type=1400 audit(1733392575.870:23859): avc: denied { checkpoint_restore } for pid=7529 comm="syz.1.1057" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 142.453743][ T29] audit: type=1400 audit(1733392575.907:23860): avc: denied { bind } for pid=7529 comm="syz.1.1057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 142.776366][ T7546] netlink: 'syz.4.1063': attribute type 4 has an invalid length. [ 142.799107][ T7548] netlink: 'syz.1.1064': attribute type 4 has an invalid length. [ 143.362445][ T7562] hub 6-0:1.0: USB hub found [ 143.367175][ T7562] hub 6-0:1.0: 8 ports detected [ 144.294471][ T7578] lo speed is unknown, defaulting to 1000 [ 144.414478][ T7567] syz.2.1070 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), order=0, oom_score_adj=1000 [ 144.428647][ T7567] CPU: 1 UID: 0 PID: 7567 Comm: syz.2.1070 Tainted: G W 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 [ 144.439035][ T7578] lo speed is unknown, defaulting to 1000 [ 144.440813][ T7567] Tainted: [W]=WARN [ 144.440821][ T7567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 144.440836][ T7567] Call Trace: [ 144.440843][ T7567] [ 144.451244][ T7578] lo speed is unknown, defaulting to 1000 [ 144.460354][ T7567] dump_stack_lvl+0xf2/0x150 [ 144.476978][ T7567] dump_stack+0x15/0x1a [ 144.481268][ T7567] dump_header+0x83/0x2d0 [ 144.485657][ T7567] oom_kill_process+0x341/0x4c0 [ 144.490526][ T7567] out_of_memory+0x9af/0xbe0 [ 144.495120][ T7567] ? css_next_descendant_pre+0x11c/0x140 [ 144.500771][ T7567] mem_cgroup_out_of_memory+0x13e/0x190 [ 144.506373][ T7567] try_charge_memcg+0x508/0x7f0 [ 144.511433][ T7567] obj_cgroup_charge_pages+0xbd/0x1a0 [ 144.516836][ T7567] __memcg_kmem_charge_page+0x9d/0x170 [ 144.522370][ T7567] __alloc_pages_noprof+0x1bc/0x340 [ 144.527639][ T7567] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 144.533019][ T7567] alloc_pages_noprof+0xe1/0x100 [ 144.537977][ T7567] __vmalloc_node_range_noprof+0x6eb/0xe80 [ 144.543914][ T7567] __kvmalloc_node_noprof+0x121/0x170 [ 144.549395][ T7567] ? ip_set_alloc+0x1f/0x30 [ 144.553915][ T7567] ip_set_alloc+0x1f/0x30 [ 144.558252][ T7567] hash_netiface_create+0x273/0x730 [ 144.563541][ T7567] ? __nla_parse+0x40/0x60 [ 144.567963][ T7567] ? __pfx_hash_netiface_create+0x10/0x10 [ 144.573744][ T7567] ip_set_create+0x359/0x8a0 [ 144.578350][ T7567] ? memchr+0x1/0x50 [ 144.582292][ T7567] ? __nla_parse+0x40/0x60 [ 144.586712][ T7567] nfnetlink_rcv_msg+0x4a9/0x570 [ 144.591773][ T7567] netlink_rcv_skb+0x12c/0x230 [ 144.596538][ T7567] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 144.602059][ T7567] nfnetlink_rcv+0x16c/0x15d0 [ 144.606740][ T7567] ? fixup_exception+0x7c0/0xca0 [ 144.611762][ T7567] ? arch_scale_cpu_capacity+0x15/0x70 [ 144.617222][ T7567] ? sched_balance_rq+0x58c/0x1bb0 [ 144.622464][ T7567] ? kernelmode_fixup_or_oops+0x58/0xb0 [ 144.628105][ T7567] ? exc_page_fault+0x4fc/0x650 [ 144.632963][ T7567] ? kernelmode_fixup_or_oops+0x58/0xb0 [ 144.638597][ T7567] ? __check_object_size+0x74/0x520 [ 144.643929][ T7567] ? __check_object_size+0x8b/0x520 [ 144.649206][ T7567] ? rep_movs_alternative+0x22/0x70 [ 144.654475][ T7567] ? should_fail_ex+0x31/0x230 [ 144.659240][ T7567] ? selinux_nlmsg_lookup+0x119/0x8c0 [ 144.664663][ T7567] ? __rcu_read_unlock+0x34/0x70 [ 144.669610][ T7567] ? __netlink_lookup+0x253/0x290 [ 144.674641][ T7567] netlink_unicast+0x599/0x670 [ 144.679454][ T7567] netlink_sendmsg+0x5cc/0x6e0 [ 144.684292][ T7567] ? __pfx_netlink_sendmsg+0x10/0x10 [ 144.689582][ T7567] __sock_sendmsg+0x140/0x180 [ 144.694266][ T7567] ____sys_sendmsg+0x312/0x410 [ 144.699033][ T7567] __sys_sendmsg+0x19d/0x230 [ 144.703717][ T7567] __x64_sys_sendmsg+0x46/0x50 [ 144.708485][ T7567] x64_sys_call+0x2734/0x2dc0 [ 144.713161][ T7567] do_syscall_64+0xc9/0x1c0 [ 144.717660][ T7567] ? clear_bhb_loop+0x55/0xb0 [ 144.722335][ T7567] ? clear_bhb_loop+0x55/0xb0 [ 144.727008][ T7567] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 144.732944][ T7567] RIP: 0033:0x7fb6576dff19 [ 144.737352][ T7567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.757069][ T7567] RSP: 002b:00007fb655d57058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 144.765529][ T7567] RAX: ffffffffffffffda RBX: 00007fb6578a5fa0 RCX: 00007fb6576dff19 [ 144.773500][ T7567] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 144.781584][ T7567] RBP: 00007fb657753986 R08: 0000000000000000 R09: 0000000000000000 [ 144.789550][ T7567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 144.797592][ T7567] R13: 0000000000000000 R14: 00007fb6578a5fa0 R15: 00007ffe29d78f48 [ 144.805574][ T7567] [ 144.808701][ T7567] memory: usage 307200kB, limit 307200kB, failcnt 2781 [ 144.815666][ T7567] memory+swap: usage 307616kB, limit 9007199254740988kB, failcnt 0 [ 144.823633][ T7567] kmem: usage 307180kB, limit 9007199254740988kB, failcnt 0 [ 144.830986][ T7567] Memory cgroup stats for /syz2: [ 144.873104][ T7567] cache 0 [ 144.881106][ T7567] rss 0 [ 144.883906][ T7567] shmem 0 [ 144.886839][ T7567] mapped_file 0 [ 144.888406][ T7605] lo speed is unknown, defaulting to 1000 [ 144.890341][ T7567] dirty 0 [ 144.899000][ T7567] writeback 0 [ 144.902298][ T7567] workingset_refault_anon 206 [ 144.906973][ T7567] workingset_refault_file 613 [ 144.911695][ T7567] swap 425984 [ 144.915057][ T7567] swapcached 20480 [ 144.918775][ T7567] pgpgin 150982 [ 144.922259][ T7567] pgpgout 150977 [ 144.925826][ T7567] pgfault 153373 [ 144.929407][ T7567] pgmajfault 151 [ 144.933056][ T7567] inactive_anon 0 [ 144.936688][ T7567] active_anon 20480 [ 144.940490][ T7567] inactive_file 0 [ 144.944150][ T7567] active_file 0 [ 144.947640][ T7567] unevictable 0 [ 144.947648][ T7567] hierarchical_memory_limit 314572800 [ 144.947657][ T7567] hierarchical_memsw_limit 9223372036854771712 [ 144.947717][ T7567] total_cache 0 [ 144.947724][ T7567] total_rss 0 [ 144.947730][ T7567] total_shmem 0 [ 144.947737][ T7567] total_mapped_file 0 [ 144.947801][ T7567] total_dirty 0 [ 144.947807][ T7567] total_writeback 0 [ 144.947814][ T7567] total_workingset_refault_anon 206 [ 144.947822][ T7567] total_workingset_refault_file 613 [ 144.947829][ T7567] total_swap 425984 [ 144.947836][ T7567] total_swapcached 20480 [ 144.947891][ T7567] total_pgpgin 150984 [ 144.947897][ T7567] total_pgpgout 150979 [ 144.947905][ T7567] total_pgfault 153392 [ 144.947911][ T7567] total_pgmajfault 151 [ 144.947919][ T7567] total_inactive_anon 0 [ 144.947927][ T7567] total_active_anon 20480 [ 144.947934][ T7567] total_inactive_file 0 [ 144.947941][ T7567] total_active_file 0 [ 144.947948][ T7567] total_unevictable 0 [ 144.947955][ T7567] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.1070,pid=7566,uid=0 [ 144.948085][ T7567] Memory cgroup out of memory: Killed process 7566 (syz.2.1070) total-vm:87412kB, anon-rss:620kB, file-rss:26540kB, shmem-rss:0kB, UID:0 pgtables:144kB oom_score_adj:1000 [ 144.972127][ T7605] lo speed is unknown, defaulting to 1000 [ 145.104748][ T7605] lo speed is unknown, defaulting to 1000 [ 145.128072][ T7615] netlink: 'syz.3.1077': attribute type 4 has an invalid length. [ 145.822162][ T7629] __nla_validate_parse: 13 callbacks suppressed [ 145.822181][ T7629] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1078'. [ 145.837430][ T7629] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1078'. [ 146.104683][ T7640] IPVS: persistence engine module ip_vs_pe_@ not found [ 146.134285][ T7640] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 146.174089][ T7640] 9pnet: Could not find request transport: fdº€Œ>pµfOPQ±}àvÄ9P v<™ýe"÷vµŒ}}«ôc‰nÏgû9'óêˆèkRL#"ÈàUkp*ßU8½cŠª…9ŽKSWî¼j [ 146.174089][ T7640] ®Ç¯/T…0kcõ"¹•{¿4°ËÍ8©°vKÚn©XAîFééz67VxJ<<}òûæTkëKñ„šDûá'§(^€cáÈèˆ]ö®[ތϵ$B ÌŸ [ 146.174089][ T7640] pùý [ 146.320156][ T7646] tipc: Started in network mode [ 146.325677][ T7646] tipc: Node identity 00000000000000000000000000000001, cluster identity 4711 [ 146.335012][ T7646] tipc: Enabling of bearer rejected, failed to enable media [ 146.412983][ T7655] Process accounting resumed [ 146.435314][ T7655] serio: Serial port ptm0 [ 146.513696][ T7666] IPVS: set_ctl: invalid protocol: 255 224.0.0.1:2 [ 146.522929][ T7666] rdma_rxe: rxe_newlink: failed to add lo [ 146.547545][ T7672] ebt_among: src integrity fail: 100 [ 146.571358][ T7668] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 146.571358][ T7668] program syz.0.1100 not setting count and/or reply_len properly [ 146.610280][ T7679] netlink: 108 bytes leftover after parsing attributes in process `syz.0.1094'. [ 146.619667][ T7679] netlink: 108 bytes leftover after parsing attributes in process `syz.0.1094'. [ 146.628737][ T7679] netlink: 84 bytes leftover after parsing attributes in process `syz.0.1094'. [ 146.639091][ T7679] sch_tbf: burst 0 is lower than device lo mtu (14) ! [ 146.647312][ T7679] netlink: 'syz.0.1094': attribute type 29 has an invalid length. [ 146.658392][ T7677] pim6reg1: entered promiscuous mode [ 146.663768][ T7677] pim6reg1: entered allmulticast mode [ 146.713381][ T7683] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1095'. [ 146.790459][ T3475] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 146.798667][ T3475] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 146.948700][ T7700] syzkaller0: entered allmulticast mode [ 147.019496][ T7699] syzkaller0: left allmulticast mode [ 147.191202][ T7710] netlink: 256 bytes leftover after parsing attributes in process `syz.0.1106'. [ 147.360271][ T7721] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1109'. [ 147.380324][ T7723] xt_hashlimit: max too large, truncated to 1048576 [ 147.391912][ T7721] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1109'. [ 147.503089][ T29] kauditd_printk_skb: 486 callbacks suppressed [ 147.503104][ T29] audit: type=1400 audit(1733392580.682:24347): avc: denied { write } for pid=7713 comm="syz.0.1107" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 147.562136][ T7724] sch_tbf: burst 0 is lower than device lo mtu (14) ! [ 147.577089][ T7723] lo speed is unknown, defaulting to 1000 [ 147.601541][ T29] audit: type=1400 audit(1733392580.785:24348): avc: denied { connect } for pid=7722 comm="syz.3.1110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 147.630647][ T7725] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1110'. [ 147.718022][ T29] audit: type=1400 audit(1733392580.804:24349): avc: denied { write } for pid=7722 comm="syz.3.1110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 147.741816][ T7726] netlink: 'syz.3.1110': attribute type 10 has an invalid length. [ 147.911231][ T7723] lo speed is unknown, defaulting to 1000 [ 147.917421][ T7723] lo speed is unknown, defaulting to 1000 [ 148.030224][ T29] audit: type=1400 audit(1733392581.178:24350): avc: denied { mounton } for pid=7737 comm="syz.2.1113" path="/syzcgroup/cpu/syz2/cgroup.procs" dev="cgroup" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:semanage_exec_t:s0" [ 148.059343][ T29] audit: type=1326 audit(1733392581.188:24351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7737 comm="syz.2.1113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6576dff19 code=0x7ffc0000 [ 148.091247][ T29] audit: type=1326 audit(1733392581.235:24352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7737 comm="syz.2.1113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=447 compat=0 ip=0x7fb6576dff19 code=0x7ffc0000 [ 148.114795][ T29] audit: type=1326 audit(1733392581.235:24353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7737 comm="syz.2.1113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6576dff19 code=0x7ffc0000 [ 148.138267][ T29] audit: type=1326 audit(1733392581.235:24354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7737 comm="syz.2.1113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb6576de880 code=0x7ffc0000 [ 148.155399][ T7735] Set syz1 is full, maxelem 65536 reached [ 148.161734][ T29] audit: type=1326 audit(1733392581.235:24355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7737 comm="syz.2.1113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6576dff19 code=0x7ffc0000 [ 148.161767][ T29] audit: type=1326 audit(1733392581.235:24356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7737 comm="syz.2.1113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7fb6576dff19 code=0x7ffc0000 [ 148.237395][ T7713] delete_channel: no stack [ 148.364311][ T7746] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 148.386586][ T7746] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 149.100908][ T7767] infiniband sy{0: RDMA CMA: cma_listen_on_dev, error -98 [ 149.603887][ T7780] IPVS: persistence engine module ip_vs_pe_@ not found [ 149.629996][ T7780] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 149.652774][ T7780] 9pnet: Could not find request transport: fdº€Œ>pµfOPQ±}àvÄ9P v<™ýe"÷vµŒ}}«ôc‰nÏgû9'óêˆèkRL#"ÈàUkp*ßU8½cŠª…9ŽKSWî¼j [ 149.652774][ T7780] ®Ç¯/T…0kcõ"¹•{¿4°ËÍ8©°vKÚn©XAîFééz67VxJ<<}òûæTkëKñ„šDûá'§(^€cáÈèˆ]ö®[ތϵ$B ÌŸ [ 149.652774][ T7780] pùý [ 149.856272][ T7798] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 149.856272][ T7798] program syz.2.1131 not setting count and/or reply_len properly [ 150.580725][ T35] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 150.588938][ T35] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 150.975885][ T7827] syzkaller0: entered allmulticast mode [ 151.082194][ T7832] IPVS: persistence engine module ip_vs_pe_@ not found [ 151.096657][ T7832] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 151.100568][ T7825] syzkaller0: left allmulticast mode [ 151.114517][ T7832] 9pnet: Could not find request transport: fdº€Œ>pµfOPQ±}àvÄ9P v<™ýe"÷vµŒ}}«ôc‰nÏgû9'óêˆèkRL#"ÈàUkp*ßU8½cŠª…9ŽKSWî¼j [ 151.114517][ T7832] ®Ç¯/T…0kcõ"¹•{¿4°ËÍ8©°vKÚn©XAîFééz67VxJ<<}òûæTkëKñ„šDûá'§(^€cáÈèˆ]ö®[ތϵ$B ÌŸ [ 151.114517][ T7832] pùý [ 151.268671][ T7842] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 151.268671][ T7842] program syz.3.1144 not setting count and/or reply_len properly [ 152.167608][ T7866] __nla_validate_parse: 16 callbacks suppressed [ 152.167627][ T7866] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1152'. [ 152.190801][ T7866] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1152'. [ 152.449963][ T7873] netlink: 'syz.2.1154': attribute type 4 has an invalid length. [ 152.700430][ T7871] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1153'. [ 152.709370][ T7871] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1153'. [ 152.847873][ T7886] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 152.847873][ T7886] program syz.3.1158 not setting count and/or reply_len properly [ 152.999715][ T29] kauditd_printk_skb: 667 callbacks suppressed [ 152.999728][ T29] audit: type=1400 audit(1733392585.832:25024): avc: denied { write } for pid=7887 comm="syz.3.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.026224][ T29] audit: type=1400 audit(1733392585.832:25025): avc: denied { nlmsg_write } for pid=7887 comm="syz.3.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.047001][ T29] audit: type=1400 audit(1733392585.832:25026): avc: denied { write } for pid=7887 comm="syz.3.1160" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 153.141429][ T7898] netlink: 'syz.1.1163': attribute type 4 has an invalid length. [ 153.332180][ T29] audit: type=1400 audit(1733392586.150:25027): avc: denied { read } for pid=7903 comm="syz.3.1166" name="ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 153.355405][ T29] audit: type=1400 audit(1733392586.150:25028): avc: denied { open } for pid=7903 comm="syz.3.1166" path="/dev/ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 153.412173][ T29] audit: type=1400 audit(1733392586.206:25029): avc: denied { ioctl } for pid=7903 comm="syz.3.1166" path="/dev/ptp0" dev="devtmpfs" ino=246 ioctlcmd=0x3d02 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 153.437391][ T29] audit: type=1400 audit(1733392586.206:25030): avc: denied { mounton } for pid=7903 comm="syz.3.1166" path="/226/file0" dev="tmpfs" ino=1297 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 153.461316][ T29] audit: type=1400 audit(1733392586.206:25031): avc: denied { mount } for pid=7903 comm="syz.3.1166" name="/" dev="rpc_pipefs" ino=19965 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:rpc_pipefs_t tclass=filesystem permissive=1 [ 153.488514][ T29] audit: type=1400 audit(1733392586.262:25032): avc: denied { read } for pid=7903 comm="syz.3.1166" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 153.511884][ T29] audit: type=1400 audit(1733392586.272:25033): avc: denied { open } for pid=7903 comm="syz.3.1166" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 153.737278][ T7918] lo speed is unknown, defaulting to 1000 [ 153.777756][ T7918] lo speed is unknown, defaulting to 1000 [ 153.785071][ T7918] lo speed is unknown, defaulting to 1000 [ 153.839721][ T7920] syz.1.1169[7920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.952542][ T7923] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 153.952542][ T7923] program syz.1.1170 not setting count and/or reply_len properly [ 154.053329][ T7927] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1172'. [ 154.085136][ T7927] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1172'. [ 154.294258][ T7936] netlink: 'syz.4.1176': attribute type 4 has an invalid length. [ 154.393604][ T7904] syz.3.1166 (7904) used greatest stack depth: 6288 bytes left [ 154.487435][ T7915] Set syz1 is full, maxelem 65536 reached [ 154.527294][ T7944] Process accounting resumed [ 154.571157][ T7941] serio: Serial port ptm1 [ 155.244386][ T7934] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1174'. [ 155.253302][ T7934] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1174'. [ 155.278352][ T7956] netlink: 'syz.1.1181': attribute type 4 has an invalid length. [ 155.474086][ T7965] netlink: 'syz.2.1185': attribute type 4 has an invalid length. [ 155.552527][ T7969] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 155.552527][ T7969] program syz.4.1182 not setting count and/or reply_len properly [ 155.777065][ T7976] lo speed is unknown, defaulting to 1000 [ 155.835378][ T7976] lo speed is unknown, defaulting to 1000 [ 155.849543][ T7976] lo speed is unknown, defaulting to 1000 [ 156.264786][ T7986] netlink: 'syz.4.1191': attribute type 10 has an invalid length. [ 156.272025][ T7985] lo speed is unknown, defaulting to 1000 [ 156.284421][ T7986] netlink: 'syz.4.1191': attribute type 10 has an invalid length. [ 156.305524][ T7985] lo speed is unknown, defaulting to 1000 [ 156.311583][ T7985] lo speed is unknown, defaulting to 1000 [ 156.320215][ T7980] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1190'. [ 156.338435][ T7980] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1190'. [ 156.383640][ T7986] siw: device registration error -23 [ 156.425376][ T7991] netlink: 'syz.0.1192': attribute type 4 has an invalid length. [ 157.415147][ T8009] netlink: 'syz.3.1197': attribute type 10 has an invalid length. [ 157.432239][ T8007] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 157.432239][ T8007] program syz.4.1196 not setting count and/or reply_len properly [ 157.491999][ T8009] @: (slave dummy0): Enslaving as an active interface with an up link [ 157.533814][ T8012] syzkaller0: entered promiscuous mode [ 157.539393][ T8012] syzkaller0: entered allmulticast mode [ 157.569916][ T8014] __nla_validate_parse: 1 callbacks suppressed [ 157.569932][ T8014] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1200'. [ 157.602767][ T8014] netlink: 'syz.3.1200': attribute type 10 has an invalid length. [ 157.789443][ T8023] siw: device registration error -23 [ 157.811995][ T8026] netlink: 'syz.2.1203': attribute type 4 has an invalid length. [ 157.917671][ T8035] ip6gre1: entered allmulticast mode [ 157.925628][ T8035] futex_wake_op: syz.4.1206 tries to shift op by 144; fix this program [ 157.949968][ T8035] xt_hashlimit: max too large, truncated to 1048576 [ 158.352259][ T29] kauditd_printk_skb: 546 callbacks suppressed [ 158.352275][ T29] audit: type=1326 audit(1733392590.850:25580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8038 comm="syz.4.1207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb7292c6ee7 code=0x7ffc0000 [ 158.385415][ T29] audit: type=1326 audit(1733392590.878:25581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8038 comm="syz.4.1207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb72926c129 code=0x7ffc0000 [ 158.408918][ T29] audit: type=1326 audit(1733392590.878:25582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8038 comm="syz.4.1207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb7292c6ee7 code=0x7ffc0000 [ 158.432457][ T29] audit: type=1326 audit(1733392590.878:25583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8038 comm="syz.4.1207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb72926c129 code=0x7ffc0000 [ 158.455865][ T29] audit: type=1326 audit(1733392590.878:25584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8038 comm="syz.4.1207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb7292cff19 code=0x7ffc0000 [ 158.479389][ T29] audit: type=1326 audit(1733392590.878:25585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8028 comm="syz.2.1204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb6576d6ee7 code=0x7ffc0000 [ 158.502818][ T29] audit: type=1326 audit(1733392590.878:25586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8028 comm="syz.2.1204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb65767c129 code=0x7ffc0000 [ 158.526218][ T29] audit: type=1326 audit(1733392590.878:25587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8028 comm="syz.2.1204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb6576dff19 code=0x7ffc0000 [ 158.549855][ T29] audit: type=1326 audit(1733392590.878:25588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8038 comm="syz.4.1207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb7292c6ee7 code=0x7ffc0000 [ 158.573273][ T29] audit: type=1326 audit(1733392590.878:25589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8038 comm="syz.4.1207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb72926c129 code=0x7ffc0000 [ 158.714513][ T8051] syzkaller0: entered promiscuous mode [ 158.720175][ T8051] syzkaller0: entered allmulticast mode [ 158.730782][ T8049] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 158.730782][ T8049] program syz.3.1209 not setting count and/or reply_len properly [ 158.791099][ T8057] netlink: 'syz.3.1214': attribute type 4 has an invalid length. [ 159.304684][ T8062] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1213'. [ 159.313868][ T8062] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1213'. [ 160.828983][ T8096] syzkaller0: entered promiscuous mode [ 160.834574][ T8096] syzkaller0: entered allmulticast mode [ 161.125404][ T8107] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 161.125404][ T8107] program syz.2.1224 not setting count and/or reply_len properly [ 161.194801][ T8131] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1227'. [ 161.256830][ T8137] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1238'. [ 161.783972][ T8143] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1228'. [ 161.792902][ T8143] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1228'. [ 161.947327][ T8152] lo speed is unknown, defaulting to 1000 [ 161.969851][ T8158] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1234'. [ 161.983046][ T8152] lo speed is unknown, defaulting to 1000 [ 161.989167][ T8158] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1234'. [ 161.999599][ T8152] lo speed is unknown, defaulting to 1000 [ 162.649303][ T8174] veth0_to_team: left promiscuous mode [ 162.655319][ T8174] veth0_to_team: left allmulticast mode [ 162.661000][ T8174] batadv_slave_0: left promiscuous mode [ 162.677799][ T8177] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1240'. [ 162.691669][ T8174] wireguard0: left promiscuous mode [ 162.697124][ T8174] wireguard0: left allmulticast mode [ 162.726607][ T8179] netlink: 'syz.3.1241': attribute type 4 has an invalid length. [ 162.743091][ T8181] netlink: 'syz.0.1242': attribute type 4 has an invalid length. [ 163.673905][ T8211] wireguard0: entered promiscuous mode [ 163.679570][ T8211] wireguard0: entered allmulticast mode [ 163.717368][ T8216] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1253'. [ 163.730921][ T29] kauditd_printk_skb: 455 callbacks suppressed [ 163.730933][ T29] audit: type=1400 audit(1733392595.877:26045): avc: denied { read } for pid=8210 comm="syz.4.1251" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 163.761369][ T29] audit: type=1400 audit(1733392595.877:26046): avc: denied { open } for pid=8210 comm="syz.4.1251" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 163.786128][ T29] audit: type=1400 audit(1733392595.877:26047): avc: denied { ioctl } for pid=8210 comm="syz.4.1251" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 163.922351][ T8218] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 163.922351][ T8218] program syz.0.1252 not setting count and/or reply_len properly [ 163.968558][ T8221] netlink: 'syz.2.1255': attribute type 4 has an invalid length. [ 163.985539][ T8223] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1256'. [ 164.009732][ T8187] syz.3.1245 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), order=0, oom_score_adj=1000 [ 164.024002][ T8187] CPU: 1 UID: 0 PID: 8187 Comm: syz.3.1245 Tainted: G W 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 [ 164.036244][ T8187] Tainted: [W]=WARN [ 164.040052][ T8187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 164.050134][ T8187] Call Trace: [ 164.053412][ T8187] [ 164.056352][ T8187] dump_stack_lvl+0xf2/0x150 [ 164.060974][ T8187] dump_stack+0x15/0x1a [ 164.065244][ T8187] dump_header+0x83/0x2d0 [ 164.069598][ T8187] oom_kill_process+0x341/0x4c0 [ 164.074469][ T8187] out_of_memory+0x9af/0xbe0 [ 164.079110][ T8187] ? css_next_descendant_pre+0x11c/0x140 [ 164.084770][ T8187] mem_cgroup_out_of_memory+0x13e/0x190 [ 164.090336][ T8187] try_charge_memcg+0x508/0x7f0 [ 164.095201][ T8187] obj_cgroup_charge_pages+0xbd/0x1a0 [ 164.100598][ T8187] __memcg_kmem_charge_page+0x9d/0x170 [ 164.106159][ T8187] __alloc_pages_noprof+0x1bc/0x340 [ 164.111417][ T8187] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 164.116806][ T8187] alloc_pages_noprof+0xe1/0x100 [ 164.121799][ T8187] __vmalloc_node_range_noprof+0x6eb/0xe80 [ 164.127633][ T8187] __kvmalloc_node_noprof+0x121/0x170 [ 164.133175][ T8187] ? ip_set_alloc+0x1f/0x30 [ 164.137699][ T8187] ip_set_alloc+0x1f/0x30 [ 164.142122][ T8187] hash_netiface_create+0x273/0x730 [ 164.147388][ T8187] ? __nla_parse+0x40/0x60 [ 164.151870][ T8187] ? __pfx_hash_netiface_create+0x10/0x10 [ 164.157601][ T8187] ip_set_create+0x359/0x8a0 [ 164.162203][ T8187] ? memchr+0x1/0x50 [ 164.166110][ T8187] ? __nla_parse+0x40/0x60 [ 164.170534][ T8187] nfnetlink_rcv_msg+0x4a9/0x570 [ 164.175494][ T8187] netlink_rcv_skb+0x12c/0x230 [ 164.180258][ T8187] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 164.185860][ T8187] nfnetlink_rcv+0x16c/0x15d0 [ 164.190538][ T8187] ? fixup_exception+0x7c0/0xca0 [ 164.195538][ T8187] ? kernelmode_fixup_or_oops+0x58/0xb0 [ 164.201162][ T8187] ? exc_page_fault+0x4fc/0x650 [ 164.206133][ T8187] ? kernelmode_fixup_or_oops+0x58/0xb0 [ 164.211708][ T8187] ? __check_object_size+0x74/0x520 [ 164.216937][ T8187] ? __check_object_size+0x8b/0x520 [ 164.222223][ T8187] ? should_fail_ex+0x31/0x230 [ 164.227032][ T8187] ? selinux_nlmsg_lookup+0x119/0x8c0 [ 164.232492][ T8187] ? __rcu_read_unlock+0x34/0x70 [ 164.237491][ T8187] ? __netlink_lookup+0x253/0x290 [ 164.242562][ T8187] netlink_unicast+0x599/0x670 [ 164.247328][ T8187] netlink_sendmsg+0x5cc/0x6e0 [ 164.252132][ T8187] ? __pfx_netlink_sendmsg+0x10/0x10 [ 164.257468][ T8187] __sock_sendmsg+0x140/0x180 [ 164.262277][ T8187] ____sys_sendmsg+0x312/0x410 [ 164.267042][ T8187] __sys_sendmsg+0x19d/0x230 [ 164.271660][ T8187] __x64_sys_sendmsg+0x46/0x50 [ 164.276533][ T8187] x64_sys_call+0x2734/0x2dc0 [ 164.281209][ T8187] do_syscall_64+0xc9/0x1c0 [ 164.285737][ T8187] ? clear_bhb_loop+0x55/0xb0 [ 164.290414][ T8187] ? clear_bhb_loop+0x55/0xb0 [ 164.295182][ T8187] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 164.301169][ T8187] RIP: 0033:0x7f24a0dcff19 [ 164.305591][ T8187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 164.325295][ T8187] RSP: 002b:00007f249f447058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 164.333715][ T8187] RAX: ffffffffffffffda RBX: 00007f24a0f95fa0 RCX: 00007f24a0dcff19 [ 164.341686][ T8187] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 164.349686][ T8187] RBP: 00007f24a0e43986 R08: 0000000000000000 R09: 0000000000000000 [ 164.357661][ T8187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 164.365645][ T8187] R13: 0000000000000000 R14: 00007f24a0f95fa0 R15: 00007ffd7c8cdd58 [ 164.373682][ T8187] [ 164.376866][ T8187] memory: usage 307200kB, limit 307200kB, failcnt 2896 [ 164.383779][ T8187] memory+swap: usage 307960kB, limit 9007199254740988kB, failcnt 0 [ 164.391698][ T8187] kmem: usage 307196kB, limit 9007199254740988kB, failcnt 0 [ 164.399069][ T8187] Memory cgroup stats for /syz3: [ 164.399600][ T29] audit: type=1400 audit(1733392596.271:26048): avc: denied { create } for pid=8210 comm="syz.4.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 164.424082][ T29] audit: type=1326 audit(1733392596.514:26049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 164.434573][ T8228] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1256'. [ 164.447049][ T29] audit: type=1326 audit(1733392596.514:26050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 164.466827][ T8187] cache 4096 [ 164.479212][ T29] audit: type=1326 audit(1733392596.514:26051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=36 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 164.482377][ T8187] rss 0 [ 164.482389][ T8187] shmem 0 [ 164.505204][ T29] audit: type=1326 audit(1733392596.514:26052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 164.508045][ T8187] mapped_file 0 [ 164.510926][ T29] audit: type=1326 audit(1733392596.514:26053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=43 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 164.533861][ T8187] dirty 0 [ 164.537337][ T29] audit: type=1326 audit(1733392596.514:26054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 164.560297][ T8187] writeback 0 [ 164.589510][ T8187] workingset_refault_anon 1558 [ 164.594275][ T8187] workingset_refault_file 959 [ 164.599151][ T8187] swap 778240 [ 164.602471][ T8187] swapcached 0 [ 164.605883][ T8187] pgpgin 219823 [ 164.609347][ T8187] pgpgout 219822 [ 164.613048][ T8187] pgfault 217749 [ 164.616660][ T8187] pgmajfault 351 [ 164.620280][ T8187] inactive_anon 0 [ 164.623941][ T8187] active_anon 0 [ 164.627465][ T8187] inactive_file 0 [ 164.631105][ T8187] active_file 4096 [ 164.634863][ T8187] unevictable 0 [ 164.638349][ T8187] hierarchical_memory_limit 314572800 [ 164.643760][ T8187] hierarchical_memsw_limit 9223372036854771712 [ 164.650004][ T8187] total_cache 4096 [ 164.653721][ T8187] total_rss 0 [ 164.656996][ T8187] total_shmem 0 [ 164.660510][ T8187] total_mapped_file 0 [ 164.664527][ T8187] total_dirty 0 [ 164.667986][ T8187] total_writeback 0 [ 164.671884][ T8187] total_workingset_refault_anon 1558 [ 164.677158][ T8187] total_workingset_refault_file 959 [ 164.682407][ T8187] total_swap 778240 [ 164.686232][ T8187] total_swapcached 0 [ 164.690124][ T8187] total_pgpgin 219823 [ 164.694291][ T8187] total_pgpgout 219822 [ 164.698356][ T8187] total_pgfault 217749 [ 164.702484][ T8187] total_pgmajfault 351 [ 164.706564][ T8187] total_inactive_anon 0 [ 164.710731][ T8187] total_active_anon 0 [ 164.714770][ T8187] total_inactive_file 0 [ 164.718947][ T8187] total_active_file 4096 [ 164.723216][ T8187] total_unevictable 0 [ 164.727194][ T8187] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.1245,pid=8186,uid=0 [ 164.741902][ T8187] Memory cgroup out of memory: Killed process 8186 (syz.3.1245) total-vm:87412kB, anon-rss:616kB, file-rss:26680kB, shmem-rss:4kB, UID:0 pgtables:140kB oom_score_adj:1000 [ 165.013262][ T8235] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1259'. [ 165.023460][ T8235] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1259'. [ 165.046338][ T8230] netlink: 'syz.1.1257': attribute type 4 has an invalid length. [ 165.227669][ T8187] syz.3.1245 (8187) used greatest stack depth: 6264 bytes left [ 165.616109][ T8248] IPVS: set_ctl: invalid protocol: 47 172.30.4.2:20001 [ 166.185329][ T8266] siw: device registration error -23 [ 166.219101][ T8269] syz.2.1269[8269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.219385][ T8269] syz.2.1269[8269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.231118][ T8269] syz.2.1269[8269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.651587][ T8276] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 167.651587][ T8276] program syz.1.1270 not setting count and/or reply_len properly [ 167.897609][ T8279] netlink: 'syz.2.1271': attribute type 4 has an invalid length. [ 168.122586][ T8286] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1274'. [ 168.236281][ T8286] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1274'. [ 168.849407][ T8302] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1278'. [ 168.880643][ T8302] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1278'. [ 169.115576][ T29] kauditd_printk_skb: 262 callbacks suppressed [ 169.115590][ T29] audit: type=1400 audit(1733392600.924:26317): avc: denied { bind } for pid=8307 comm="syz.4.1280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 169.145788][ T8308] netlink: 100 bytes leftover after parsing attributes in process `syz.4.1280'. [ 169.171432][ T8310] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1281'. [ 169.177244][ T29] audit: type=1400 audit(1733392600.942:26318): avc: denied { write } for pid=8307 comm="syz.4.1280" path="socket:[20891]" dev="sockfs" ino=20891 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 169.220930][ T8310] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1281'. [ 169.244684][ T8313] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1283'. [ 169.273565][ T8313] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1283'. [ 169.286139][ T8315] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1282'. [ 169.349326][ T8315] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1282'. [ 170.568813][ T29] audit: type=1400 audit(1733392602.291:26319): avc: denied { create } for pid=8328 comm="syz.4.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 170.589594][ T29] audit: type=1326 audit(1733392602.291:26320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8329 comm="syz.1.1286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 170.613227][ T29] audit: type=1326 audit(1733392602.291:26321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8329 comm="syz.1.1286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 170.636696][ T29] audit: type=1326 audit(1733392602.291:26322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8329 comm="syz.1.1286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 170.660285][ T29] audit: type=1326 audit(1733392602.291:26323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8329 comm="syz.1.1286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 170.683864][ T29] audit: type=1326 audit(1733392602.291:26324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8329 comm="syz.1.1286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 170.707373][ T29] audit: type=1326 audit(1733392602.291:26325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8329 comm="syz.1.1286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 170.730887][ T29] audit: type=1326 audit(1733392602.291:26326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8329 comm="syz.1.1286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f077517ff19 code=0x7ffc0000 [ 170.781385][ T8330] hub 1-0:1.0: USB hub found [ 170.806341][ T8330] hub 1-0:1.0: 8 ports detected [ 170.809005][ T8336] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1288'. [ 170.812426][ T8338] xt_TPROXY: Can be used only with -p tcp or -p udp [ 170.839016][ T8336] netlink: 'syz.1.1288': attribute type 10 has an invalid length. [ 170.935410][ T8349] netlink: 'syz.0.1292': attribute type 4 has an invalid length. [ 170.990459][ T8355] lo speed is unknown, defaulting to 1000 [ 171.056108][ T8355] lo speed is unknown, defaulting to 1000 [ 171.062520][ T8355] lo speed is unknown, defaulting to 1000 [ 171.444489][ T8374] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1296'. [ 171.500144][ T8374] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1296'. [ 171.857395][ T8387] siw: device registration error -23 [ 172.414782][ T8396] netlink: 'syz.3.1302': attribute type 1 has an invalid length. [ 172.746574][ T8410] infiniband sy{0: RDMA CMA: cma_listen_on_dev, error -98 [ 173.495605][ T8419] netlink: 'syz.3.1309': attribute type 4 has an invalid length. [ 173.608290][ T8421] bond0: entered promiscuous mode [ 173.613393][ T8421] bond0: entered allmulticast mode [ 173.628530][ T8421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.647688][ T8421] bond0 (unregistering): Released all slaves [ 174.208099][ T8433] netlink: 'syz.0.1313': attribute type 4 has an invalid length. [ 174.929927][ T8443] netlink: 'syz.2.1317': attribute type 4 has an invalid length. [ 175.113314][ T29] kauditd_printk_skb: 285 callbacks suppressed [ 175.113329][ T29] audit: type=1326 audit(1733392606.535:26612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8450 comm="syz.3.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24a0dcff19 code=0x7ffc0000 [ 175.143345][ T29] audit: type=1326 audit(1733392606.535:26613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8450 comm="syz.3.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24a0dcff19 code=0x7ffc0000 [ 175.166893][ T29] audit: type=1326 audit(1733392606.535:26614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8450 comm="syz.3.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f24a0dce880 code=0x7ffc0000 [ 175.167291][ T8447] __nla_validate_parse: 3 callbacks suppressed [ 175.167304][ T8447] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1318'. [ 175.190363][ T29] audit: type=1326 audit(1733392606.535:26615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8450 comm="syz.3.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f24a0dd1747 code=0x7ffc0000 [ 175.190393][ T29] audit: type=1326 audit(1733392606.535:26616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8450 comm="syz.3.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f24a0dcff19 code=0x7ffc0000 [ 175.252380][ T29] audit: type=1326 audit(1733392606.535:26617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8450 comm="syz.3.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f24a0dd1747 code=0x7ffc0000 [ 175.275860][ T29] audit: type=1326 audit(1733392606.535:26618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8450 comm="syz.3.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f24a0dceb7a code=0x7ffc0000 [ 175.299280][ T29] audit: type=1326 audit(1733392606.535:26619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8450 comm="syz.3.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24a0dcff19 code=0x7ffc0000 [ 175.322803][ T29] audit: type=1326 audit(1733392606.535:26620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8450 comm="syz.3.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f24a0dcff19 code=0x7ffc0000 [ 175.346263][ T29] audit: type=1326 audit(1733392606.535:26621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8450 comm="syz.3.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24a0dcff19 code=0x7ffc0000 [ 175.381776][ T8447] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1318'. [ 175.502904][ T8459] netlink: 'syz.2.1322': attribute type 4 has an invalid length. [ 176.896400][ T8486] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 176.896400][ T8486] program syz.0.1330 not setting count and/or reply_len properly [ 177.038840][ T8492] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1332'. [ 177.119088][ T8500] netlink: 'syz.3.1336': attribute type 4 has an invalid length. [ 177.432510][ T8507] siw: device registration error -23 [ 178.342442][ T8535] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 178.342442][ T8535] program syz.4.1341 not setting count and/or reply_len properly [ 178.478818][ T8542] netlink: 'syz.3.1344': attribute type 4 has an invalid length. [ 178.499139][ T8517] can0: slcan on ttyS3. [ 178.561900][ T8517] can0 (unregistered): slcan off ttyS3. [ 178.576671][ T8517] Falling back ldisc for ttyS3. [ 178.601604][ T8552] siw: device registration error -23 [ 178.951977][ T8560] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1348'. [ 179.000629][ T8560] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1348'. [ 179.013149][ T8564] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1349'. [ 179.022218][ T8564] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1349'. [ 179.463334][ T8588] netlink: 'syz.1.1354': attribute type 4 has an invalid length. [ 180.112202][ T8597] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 180.112202][ T8597] program syz.2.1357 not setting count and/or reply_len properly [ 180.181346][ T8605] netlink: 'syz.0.1361': attribute type 4 has an invalid length. [ 180.213915][ T8611] netlink: 'syz.0.1363': attribute type 4 has an invalid length. [ 180.387013][ T8620] x_tables: (null)_tables: DNAT target: only valid in nat table, not syz0 [ 180.465750][ T29] kauditd_printk_skb: 253 callbacks suppressed [ 180.465766][ T29] audit: type=1326 audit(1733392611.549:26875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8606 comm="syz.2.1362" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb6576d6ee7 code=0x7ffc0000 [ 180.607142][ T29] audit: type=1326 audit(1733392611.568:26876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8606 comm="syz.2.1362" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb65767c129 code=0x7ffc0000 [ 180.630692][ T29] audit: type=1326 audit(1733392611.568:26877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8606 comm="syz.2.1362" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb6576d6ee7 code=0x7ffc0000 [ 180.654072][ T29] audit: type=1326 audit(1733392611.577:26878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8606 comm="syz.2.1362" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb65767c129 code=0x7ffc0000 [ 180.677542][ T29] audit: type=1326 audit(1733392611.577:26879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8606 comm="syz.2.1362" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb6576dff19 code=0x7ffc0000 [ 180.701054][ T29] audit: type=1326 audit(1733392611.577:26880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8606 comm="syz.2.1362" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb6576d6ee7 code=0x7ffc0000 [ 180.724432][ T29] audit: type=1326 audit(1733392611.577:26881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8606 comm="syz.2.1362" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb65767c129 code=0x7ffc0000 [ 180.747865][ T29] audit: type=1326 audit(1733392611.577:26882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8606 comm="syz.2.1362" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb6576dff19 code=0x7ffc0000 [ 180.771390][ T29] audit: type=1326 audit(1733392611.577:26883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8606 comm="syz.2.1362" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6576dff19 code=0x7ffc0000 [ 180.794982][ T29] audit: type=1326 audit(1733392611.577:26884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8606 comm="syz.2.1362" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6576dff19 code=0x7ffc0000 [ 180.931230][ T8625] netlink: 'syz.4.1368': attribute type 4 has an invalid length. [ 180.987433][ T8627] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1367'. [ 180.997196][ T8627] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1367'. [ 182.059822][ T8644] netlink: 'syz.1.1373': attribute type 4 has an invalid length. [ 182.126756][ T8650] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 182.126756][ T8650] program syz.3.1371 not setting count and/or reply_len properly [ 182.614526][ T8661] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 182.632751][ T8661] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 182.717568][ T8648] sctp: [Deprecated]: syz.1.1374 (pid 8648) Use of int in max_burst socket option. [ 182.717568][ T8648] Use struct sctp_assoc_value instead [ 182.877385][ T8667] x_tables: unsorted entry at hook 3 [ 186.234505][ T29] kauditd_printk_skb: 291 callbacks suppressed [ 186.234517][ T29] audit: type=1400 audit(1733392616.937:27176): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 186.265876][ T29] audit: type=1400 audit(1733392616.946:27177): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 09:56:56 [ 186.288448][ T29] audit: type=1400 audit(1733392616.993:27178): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 186.312078][ T29] audit: type=1400 audit(1733392617.012:27179): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 186.335147][ T29] audit: type=1400 audit(1733392617.012:27180): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 86.234505][ T2[ 186.344862][ T29] audit: type=1400 audit(1733392617.049:27181): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 9] kauditd_print[ 186.385781][ T29] audit: type=1400 audit(1733392617.087:27182): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 291 callb[ 186.408500][ T29] audit: type=1400 audit(1733392617.087:27183): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed[ 186.408527][ T29] audit: type=1400 audit(1733392617.087:27184): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 09:56:56[ 186.455854][ T29] audit: type=1400 audit(1733392617.152:27185): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 186.234517][ T29] audit: type=1400 audit(1733392616.937:27176): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tconte Dec 5 09:56:56 syzkaller kern.notice kernel: [ 186.265876][ T29] audit: type=1400 audit(1733392616.946:27177): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:56:57 syzkaller kern.notice kernel: [ 186.288448][ T29] audit: type=1400 audit(1733392616.993:27178): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:56:57 syzkaller kern.notice kernel: [ 186.312078][ T29] audit: type=1400 audit(1733392617.012:27179): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:56:57 syzkaller kern.notice kernel: [ 186.335147][ T29] audit: type=1400 audit(1733392617.012:27180): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:56:57 syzkaller kern.notice kernel: [ 186.344862][ T29] audit: type=1400 audit(1733392617.049:27181): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tconte Dec 5 09:56:57 syzkaller kern.notice kernel: [ 186.385781][ T29] audit: type=1400 audit(1733392617.087:27182): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:56:57 syzkaller kern.notice kernel: [ 186.408500][ T29] audit: type=1400 audit(1733392617.087:27183): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:56:57 syzkaller kern.notice kernel: [ 186.408527][ T29] audit: type=1400 audit(1733392617.087:27184): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:56:57 syzkaller kern.notice kernel: [ 186.455854][ T29] audit: type=1400 audit(1733392617.152:27185): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 197.805729][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 197.805742][ T29] audit: type=1400 audit(1733392627.769:27192): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Dec 5 09:57:07 [ 197.837505][ T29] audit: type=1400 audit(1733392627.797:27193): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 197.860941][ T29] audit: type=1400 audit(1733392627.797:27194): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 197.884229][ T29] audit: type=1400 audit(1733392627.825:27195): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 97.805729][ T2[ 197.907740][ T29] audit: type=1400 audit(1733392627.834:27196): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 197.931209][ T29] audit: type=1400 audit(1733392627.872:27197): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 6 callbac[ 197.954727][ T29] audit: type=1400 audit(1733392627.909:27198): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 197.978166][ T29] audit: type=1400 audit(1733392627.928:27199): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 5 09:57:07 s[ 198.001381][ T29] audit: type=1400 audit(1733392627.928:27200): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 198.009197][ T29] audit: type=1400 audit(1733392627.947:27201): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 tice kernel: [ 197.805742][ T29] audit: type=1400 audit(1733392627.769:27192): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tconte Dec 5 09:57:07 syzkaller kern.notice kernel: [ 197.837505][ T29] audit: type=1400 audit(1733392627.797:27193): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:07 syzkaller kern.notice kernel: [ 197.860941][ T29] audit: type=1400 audit(1733392627.797:27194): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:07 syzkaller kern.notice kernel: [ 197.884229][ T29] audit: type=1400 audit(1733392627.825:27195): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:07 syzkaller kern.notice kernel: [ 197.907740][ T29] audit: type=1400 audit(1733392627.834:27196): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:07 syzkaller kern.notice kernel: [ 197.931209][ T29] audit: type=1400 audit(1733392627.872:27197): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:07 syzkaller kern.notice kernel: [ 197.954727][ T29] audit: type=1400 audit(1733392627.909:27198): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:07 syzkaller kern.notice kernel: [ 197.978166][ T29] audit: type=1400 audit(1733392627.928:27199): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:07 syzkaller kern.notice kernel: [ 198.001381][ T29] audit: type=1400 audit(1733392627.928:27200): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:07 syzkaller kern.notice kernel: [ 198.009197][ T29] audit: type=1400 audit(1733392627.947:27201): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tconte [ 205.572833][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 205.572848][ T29] audit: type=1400 audit(1733392635.028:27205): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 09:57:15 [ 205.601240][ T29] audit: type=1400 audit(1733392635.056:27206): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemon[ 205.625058][ T29] audit: type=1400 audit(1733392635.084:27207): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[8695[ 205.648803][ T29] audit: type=1400 audit(1733392635.102:27208): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_bpf_start_[ 205.671429][ T29] audit: type=1400 audit(1733392635.102:27209): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 bpf: bpf_open: I[ 205.695307][ T29] audit: type=1400 audit(1733392635.149:27210): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nvalid argument[ 205.718282][ T29] audit: type=1400 audit(1733392635.149:27211): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 09:57:15[ 205.742313][ T29] audit: type=1400 audit(1733392635.187:27212): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemo[ 205.765162][ T29] audit: type=1400 audit(1733392635.187:27213): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.err dhcpcd[869[ 205.765238][ T29] audit: type=1400 audit(1733392635.187:27214): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 5]: ps_root_recvmsg: Invalid argument Dec 5 09:57:15 syzkaller kern.warn kernel: [ 205.572833][ T29] kauditd_printk_skb: 3 callbacks suppressed Dec 5 09:57:15 syzkaller kern.notice kernel: [ 205.572848][ T29] audit: type=1400 audit(1733392635.028:27205): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:15 syzkaller kern.notice kernel: [ 205.601240][ T29] audit: type=1400 audit(1733392635.056:27206): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:15 syzkaller kern.notice kernel: [ 205.625058][ T29] audit: type=1400 audit(1733392635.084:27207): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:15 syzkaller kern.notice kernel: [ 205.648803][ T29] audit: type=1400 audit(1733392635.102:27208): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:15 syzkaller kern.notice kernel: [ 205.671429][ T29] audit: type=1400 audit(1733392635.102:27209): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:15 syzkaller kern.notice kernel: [ 205.695307][ T29] audit: type=1400 audit(1733392635.149:27210): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:15 syzkaller kern.notice kernel: [ 205.718282][ T29] audit: type=1400 audit(1733392635.149:27211): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:15 syzkaller kern.notice kernel: [ 205.742313][ T29] audit: type=1400 audit(1733392635.187:27212): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:15 syzkaller kern.notice kernel: [ 205.765162][ T29] audit: type=1400 audit(1733392635.187:27213): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:15 syzkaller kern.notice kernel: [ 205.765238][ T29] audit: type=1400 audit(1733392635.187:27214): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:15 syzkaller daemon.err dhcpcd[8696]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 5 09:57:15 syzkaller daemon.err dhcpcd[8696]: ps_root_recvmsg: Invalid argument Dec 5 09:57:16 syzkaller daemon.err dhcpcd[8697]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 5 09:57:16 syzkaller daemon.err dhcpcd[8697]: ps_root_recvmsg: Invalid argument [ 211.320316][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 211.320328][ T29] audit: type=1400 audit(1733392640.406:27222): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 211.351620][ T29] audit: type=1400 audit(1733392640.434:27223): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 09:57:20 [ 211.374221][ T29] audit: type=1400 audit(1733392640.462:27224): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 211.397855][ T29] audit: type=1400 audit(1733392640.481:27225): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 211.420650][ T29] audit: type=1400 audit(1733392640.481:27226): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 11.320316][ T2[ 211.444603][ T29] audit: type=1400 audit(1733392640.528:27227): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 211.467480][ T29] audit: type=1400 audit(1733392640.528:27228): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 7 callbac[ 211.491159][ T29] audit: type=1400 audit(1733392640.565:27229): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 211.514738][ T29] audit: type=1400 audit(1733392640.593:27230): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 5 09:57:20 s[ 211.537833][ T29] audit: type=1400 audit(1733392640.593:27231): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 211.320328][ T29] audit: type=1400 audit(1733392640.406:27222): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tconte Dec 5 09:57:20 syzkaller kern.notice kernel: [ 211.351620][ T29] audit: type=1400 audit(1733392640.434:27223): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:20 syzkaller kern.notice kernel: [ 211.374221][ T29] audit: type=1400 audit(1733392640.462:27224): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:20 syzkaller kern.notice kernel: [ 211.397855][ T29] audit: type=1400 audit(1733392640.481:27225): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:20 syzkaller kern.notice kernel: [ 211.420650][ T29] audit: type=1400 audit(1733392640.481:27226): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:20 syzkaller kern.notice kernel: [ 211.444603][ T29] audit: type=1400 audit(1733392640.528:27227): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:20 syzkaller kern.notice kernel: [ 211.467480][ T29] audit: type=1400 audit(1733392640.528:27228): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:20 syzkaller kern.notice kernel: [ 211.491159][ T29] audit: type=1400 audit(1733392640.565:27229): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:20 syzkaller kern.notice kernel: [ 211.514738][ T29] audit: type=1400 audit(1733392640.593:27230): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:20 syzkaller kern.notice kernel: [ 211.537833][ T29] audit: type=1400 audit(1733392640.593:27231): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 239.478249][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 239.478260][ T29] audit: type=1400 audit(1733392666.747:27235): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 239.509662][ T29] audit: type=1400 audit(1733392666.775:27236): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 09:57:46 [ 239.532556][ T29] audit: type=1400 audit(1733392666.794:27237): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 239.555260][ T29] audit: type=1400 audit(1733392666.794:27238): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 239.579068][ T29] audit: type=1400 audit(1733392666.841:27239): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 39.478249][ T2[ 239.602337][ T29] audit: type=1400 audit(1733392666.859:27240): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 239.626076][ T29] audit: type=1400 audit(1733392666.887:27241): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 3 callbac[ 239.649030][ T29] audit: type=1400 audit(1733392666.887:27242): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 239.672559][ T29] audit: type=1400 audit(1733392666.925:27243): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 5 09:57:46 s[ 239.696126][ T29] audit: type=1400 audit(1733392666.953:27244): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 239.478260][ T29] audit: type=1400 audit(1733392666.747:27235): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tconte Dec 5 09:57:46 syzkaller kern.notice kernel: [ 239.509662][ T29] audit: type=1400 audit(1733392666.775:27236): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:46 syzkaller kern.notice kernel: [ 239.532556][ T29] audit: type=1400 audit(1733392666.794:27237): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:46 syzkaller kern.notice kernel: [ 239.555260][ T29] audit: type=1400 audit(1733392666.794:27238): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:46 syzkaller kern.notice kernel: [ 239.579068][ T29] audit: type=1400 audit(1733392666.841:27239): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:46 syzkaller kern.notice kernel: [ 239.602337][ T29] audit: type=1400 audit(1733392666.859:27240): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:46 syzkaller kern.notice kernel: [ 239.626076][ T29] audit: type=1400 audit(1733392666.887:27241): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:46 syzkaller kern.notice kernel: [ 239.649030][ T29] audit: type=1400 audit(1733392666.887:27242): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:46 syzkaller kern.notice kernel: [ 239.672559][ T29] audit: type=1400 audit(1733392666.925:27243): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:57:46 syzkaller kern.notice kernel: [ 239.696126][ T29] audit: type=1400 audit(1733392666.953:27244): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 273.180301][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 273.180328][ T29] audit: type=1400 audit(1733392698.270:27248): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 09:58:18 [ 273.209226][ T29] audit: type=1400 audit(1733392698.298:27249): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemon[ 273.232061][ T29] audit: type=1400 audit(1733392698.298:27250): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3036[ 273.255517][ T29] audit: type=1400 audit(1733392698.298:27251): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_sendpsmmsg[ 273.279052][ T29] audit: type=1400 audit(1733392698.336:27252): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : Connection ref[ 273.302365][ T29] audit: type=1400 audit(1733392698.354:27253): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 used Dec 5 09:[ 273.325793][ T29] audit: type=1400 audit(1733392698.382:27254): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 58:18 syzkaller [ 273.349189][ T29] audit: type=1400 audit(1733392698.410:27255): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpc[ 273.373061][ T29] audit: type=1400 audit(1733392698.448:27256): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3036]: ps_root[ 273.395932][ T29] audit: type=1400 audit(1733392698.448:27257): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _recvmsgcb: failed to send message to pid 8695: Connection refused Dec 5 09:58:18 syzkaller kern.warn kernel: [ 273.180301][ T29] kauditd_printk_skb: 3 callbacks suppressed Dec 5 09:58:18 syzkaller kern.notice kernel: [ 273.180328][ T29] audit: type=1400 audit(1733392698.270:27248): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:18 syzkaller kern.notice kernel: [ 273.209226][ T29] audit: type=1400 audit(1733392698.298:27249): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:18 syzkaller kern.notice kernel: [ 273.232061][ T29] audit: type=1400 audit(1733392698.298:27250): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:18 syzkaller kern.notice kernel: [ 273.255517][ T29] audit: type=1400 audit(1733392698.298:27251): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:18 syzkaller kern.notice kernel: [ 273.279052][ T29] audit: type=1400 audit(1733392698.336:27252): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:18 syzkaller kern.notice kernel: [ 273.302365][ T29] audit: type=1400 audit(1733392698.354:27253): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:18 syzkaller kern.notice kernel: [ 273.325793][ T29] audit: type=1400 audit(1733392698.382:27254): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:18 syzkaller kern.notice kernel: [ 273.349189][ T29] audit: type=1400 audit(1733392698.410:27255): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:18 syzkaller kern.notice kernel: [ 273.373061][ T29] audit: type=1400 audit(1733392698.448:27256): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:18 syzkaller kern.notice kernel: [ 273.395932][ T29] audit: type=1400 audit(1733392698.448:27257): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:18 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 5 09:58:18 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 8696: Connection refused Dec 5 09:58:20 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 5 09:58:20 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 8697: Connection refused [ 292.720492][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 292.720506][ T29] audit: type=1400 audit(1733392716.548:27265): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Dec 5 09:58:36 [ 292.752392][ T29] audit: type=1400 audit(1733392716.576:27266): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 292.775708][ T29] audit: type=1400 audit(1733392716.576:27267): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 292.799480][ T29] audit: type=1400 audit(1733392716.613:27268): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 92.720492][ T2[ 292.822568][ T29] audit: type=1400 audit(1733392716.613:27269): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 292.846299][ T29] audit: type=1400 audit(1733392716.669:27270): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 7 callbac[ 292.869428][ T29] audit: type=1400 audit(1733392716.669:27271): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 292.893338][ T29] audit: type=1400 audit(1733392716.707:27272): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 5 09:58:36 s[ 292.916457][ T29] audit: type=1400 audit(1733392716.735:27273): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 292.939950][ T29] audit: type=1400 audit(1733392716.754:27274): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 292.720506][ T29] audit: type=1400 audit(1733392716.548:27265): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tconte Dec 5 09:58:36 syzkaller kern.notice kernel: [ 292.752392][ T29] audit: type=1400 audit(1733392716.576:27266): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:36 syzkaller kern.notice kernel: [ 292.775708][ T29] audit: type=1400 audit(1733392716.576:27267): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:36 syzkaller kern.notice kernel: [ 292.799480][ T29] audit: type=1400 audit(1733392716.613:27268): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:36 syzkaller kern.notice kernel: [ 292.822568][ T29] audit: type=1400 audit(1733392716.613:27269): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:36 syzkaller kern.notice kernel: [ 292.846299][ T29] audit: type=1400 audit(1733392716.669:27270): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:36 syzkaller kern.notice kernel: [ 292.869428][ T29] audit: type=1400 audit(1733392716.669:27271): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:36 syzkaller kern.notice kernel: [ 292.893338][ T29] audit: type=1400 audit(1733392716.707:27272): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:36 syzkaller kern.notice kernel: [ 292.916457][ T29] audit: type=1400 audit(1733392716.735:27273): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:36 syzkaller kern.notice kernel: [ 292.939950][ T29] audit: type=1400 audit(1733392716.754:27274): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 305.226463][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 305.226474][ T29] audit: type=1400 audit(1733392728.250:27277): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Dec 5 09:58:48 [ 305.258255][ T29] audit: type=1400 audit(1733392728.278:27278): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 305.281518][ T29] audit: type=1400 audit(1733392728.278:27279): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 305.305751][ T29] audit: type=1400 audit(1733392728.324:27280): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 05.226463][ T2[ 305.328415][ T29] audit: type=1400 audit(1733392728.324:27281): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 305.352166][ T29] audit: type=1400 audit(1733392728.353:27282): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbac[ 305.375137][ T29] audit: type=1400 audit(1733392728.353:27283): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 305.399032][ T29] audit: type=1400 audit(1733392728.409:27284): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 5 09:58:48 s[ 305.422006][ T29] audit: type=1400 audit(1733392728.409:27285): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 305.445642][ T29] audit: type=1400 audit(1733392728.455:27286): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 305.226474][ T29] audit: type=1400 audit(1733392728.250:27277): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.121 dest=55996 netif=eth0 scontext=root:sysadm_r:sysadm_t tconte Dec 5 09:58:48 syzkaller kern.notice kernel: [ 305.258255][ T29] audit: type=1400 audit(1733392728.278:27278): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:48 syzkaller kern.notice kernel: [ 305.281518][ T29] audit: type=1400 audit(1733392728.278:27279): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:48 syzkaller kern.notice kernel: [ 305.305751][ T29] audit: type=1400 audit(1733392728.324:27280): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:48 syzkaller kern.notice kernel: [ 305.328415][ T29] audit: type=1400 audit(1733392728.324:27281): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:48 syzkaller kern.notice kernel: [ 305.352166][ T29] audit: type=1400 audit(1733392728.353:27282): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:48 syzkaller kern.notice kernel: [ 305.375137][ T29] audit: type=1400 audit(1733392728.353:27283): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:48 syzkaller kern.notice kernel: [ 305.399032][ T29] audit: type=1400 audit(1733392728.409:27284): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:48 syzkaller kern.notice kernel: [ 305.422006][ T29] audit: type=1400 audit(1733392728.409:27285): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:58:48 syzkaller kern.notice kernel: [ 305.445642][ T29] audit: type=1400 audit(1733392728.455:27286): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 322.153098][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 322.153111][ T29] audit: type=1400 audit(1733392744.077:27289): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=47468 daddr=10.128.0.121 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 322.184165][ T29] audit: type=1400 audit(1733392744.086:27290): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 09:59:04 [ 322.206835][ T29] audit: type=1400 audit(1733392744.133:27291): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 322.229866][ T29] audit: type=1400 audit(1733392744.133:27292): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 322.253669][ T29] audit: type=1400 audit(1733392744.179:27293): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 22.153098][ T2[ 322.277078][ T29] audit: type=1400 audit(1733392744.198:27294): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 322.300176][ T29] audit: type=1400 audit(1733392744.198:27295): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbac[ 322.323806][ T29] audit: type=1400 audit(1733392744.236:27296): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 322.347299][ T29] audit: type=1400 audit(1733392744.254:27297): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 5 09:59:04 s[ 322.370372][ T29] audit: type=1400 audit(1733392744.254:27298): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 322.153111][ T29] audit: type=1400 audit(1733392744.077:27289): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=47468 daddr=10.128.0.121 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontex Dec 5 09:59:04 syzkaller kern.notice kernel: [ 322.184165][ T29] audit: type=1400 audit(1733392744.086:27290): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:04 syzkaller kern.notice kernel: [ 322.206835][ T29] audit: type=1400 audit(1733392744.133:27291): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:04 syzkaller kern.notice kernel: [ 322.229866][ T29] audit: type=1400 audit(1733392744.133:27292): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:04 syzkaller kern.notice kernel: [ 322.253669][ T29] audit: type=1400 audit(1733392744.179:27293): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:04 syzkaller kern.notice kernel: [ 322.277078][ T29] audit: type=1400 audit(1733392744.198:27294): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:04 syzkaller kern.notice kernel: [ 322.300176][ T29] audit: type=1400 audit(1733392744.198:27295): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:04 syzkaller kern.notice kernel: [ 322.323806][ T29] audit: type=1400 audit(1733392744.236:27296): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:04 syzkaller kern.notice kernel: [ 322.347299][ T29] audit: type=1400 audit(1733392744.254:27297): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:04 syzkaller kern.notice kernel: [ 322.370372][ T29] audit: type=1400 audit(1733392744.254:27298): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 329.323441][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 329.323453][ T29] audit: type=1400 audit(1733392750.783:27306): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=47468 daddr=10.128.0.121 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Dec 5 09:59:10 [ 329.355155][ T29] audit: type=1400 audit(1733392750.821:27307): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 329.378415][ T29] audit: type=1400 audit(1733392750.821:27308): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 329.402181][ T29] audit: type=1400 audit(1733392750.858:27309): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 29.323441][ T2[ 329.425430][ T29] audit: type=1400 audit(1733392750.886:27310): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 329.449117][ T29] audit: type=1400 audit(1733392750.905:27311): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 7 callbac[ 329.472624][ T29] audit: type=1400 audit(1733392750.924:27312): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 329.496241][ T29] audit: type=1400 audit(1733392750.952:27313): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 5 09:59:10 s[ 329.519245][ T29] audit: type=1400 audit(1733392750.952:27314): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 329.542697][ T29] audit: type=1400 audit(1733392750.970:27315): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 329.323453][ T29] audit: type=1400 audit(1733392750.783:27306): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=47468 daddr=10.128.0.121 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontex Dec 5 09:59:10 syzkaller kern.notice kernel: [ 329.355155][ T29] audit: type=1400 audit(1733392750.821:27307): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:10 syzkaller kern.notice kernel: [ 329.378415][ T29] audit: type=1400 audit(1733392750.821:27308): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:10 syzkaller kern.notice kernel: [ 329.402181][ T29] audit: type=1400 audit(1733392750.858:27309): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:10 syzkaller kern.notice kernel: [ 329.425430][ T29] audit: type=1400 audit(1733392750.886:27310): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:10 syzkaller kern.notice kernel: [ 329.449117][ T29] audit: type=1400 audit(1733392750.905:27311): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:10 syzkaller kern.notice kernel: [ 329.472624][ T29] audit: type=1400 audit(1733392750.924:27312): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:10 syzkaller kern.notice kernel: [ 329.496241][ T29] audit: type=1400 audit(1733392750.952:27313): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:10 syzkaller kern.notice kernel: [ 329.519245][ T29] audit: type=1400 audit(1733392750.952:27314): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:10 syzkaller kern.notice kernel: [ 329.542697][ T29] audit: type=1400 audit(1733392750.970:27315): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 336.491692][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 336.491704][ T29] audit: type=1400 audit(1733392757.490:27318): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=47468 daddr=10.128.0.121 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 336.522958][ T29] audit: type=1400 audit(1733392757.500:27319): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 09:59:17 [ 336.545681][ T29] audit: type=1400 audit(1733392757.546:27320): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 336.568790][ T29] audit: type=1400 audit(1733392757.546:27321): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 336.568851][ T29] audit: type=1400 audit(1733392757.556:27322): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 36.491692][ T29] kauditd_print[ 336.617561][ T29] audit: type=1400 audit(1733392757.612:27323): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbac[ 336.640559][ T29] audit: type=1400 audit(1733392757.631:27324): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 336.664069][ T29] audit: type=1400 audit(1733392757.649:27325): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 5 09:59:17 s[ 336.687691][ T29] audit: type=1400 audit(1733392757.677:27326): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 336.711130][ T29] audit: type=1400 audit(1733392757.696:27327): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 336.491704][ T29] audit: type=1400 audit(1733392757.490:27318): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=47468 daddr=10.128.0.121 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontex Dec 5 09:59:17 syzkaller kern.notice kernel: [ 336.522958][ T29] audit: type=1400 audit(1733392757.500:27319): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:17 syzkaller kern.notice kernel: [ 336.545681][ T29] audit: type=1400 audit(1733392757.546:27320): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:17 syzkaller kern.notice kernel: [ 336.568790][ T29] audit: type=1400 audit(1733392757.546:27321): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:17 syzkaller kern.notice kernel: [ 336.568851][ T29] audit: type=1400 audit(1733392757.556:27322): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:17 syzkaller kern.notice kernel: [ 336.617561][ T29] audit: type=1400 audit(1733392757.612:27323): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:17 syzkaller kern.notice kernel: [ 336.640559][ T29] audit: type=1400 audit(1733392757.631:27324): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:17 syzkaller kern.notice kernel: [ 336.664069][ T29] audit: type=1400 audit(1733392757.649:27325): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:17 syzkaller kern.notice kernel: [ 336.687691][ T29] audit: type=1400 audit(1733392757.677:27326): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:17 syzkaller kern.notice kernel: [ 336.711130][ T29] audit: type=1400 audit(1733392757.696:27327): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:22 syzkaller daemon.err dhcpcd[8698]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 5 09:59:22 syzkaller daemon.err dhcpcd[8698]: ps_root_recvmsg: Invalid argument Dec 5 09:59:23 [ 342.781106][ T29] kauditd_printk_skb: 4 callbacks suppressed syzkaller daemon[ 342.781122][ T29] audit: type=1400 audit(1733392763.374:27332): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[8699[ 342.812327][ T29] audit: type=1400 audit(1733392763.402:27333): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_bpf_start_[ 342.835783][ T29] audit: type=1400 audit(1733392763.430:27334): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 bpf: bpf_open: I[ 342.858936][ T29] audit: type=1400 audit(1733392763.430:27335): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nvalid argument[ 342.882619][ T29] audit: type=1400 audit(1733392763.467:27336): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 09:59:23[ 342.906060][ T29] audit: type=1400 audit(1733392763.467:27337): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemo[ 342.929289][ T29] audit: type=1400 audit(1733392763.495:27338): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.err dhcpcd[869[ 342.952870][ T29] audit: type=1400 audit(1733392763.495:27339): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9]: ps_root_recv[ 342.976819][ T29] audit: type=1400 audit(1733392763.561:27340): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 msg: Invalid arg[ 342.999592][ T29] audit: type=1400 audit(1733392763.561:27341): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ument Dec 5 09:59:23 syzkaller kern.warn kernel: [ 342.781106][ T29] kauditd_printk_skb: 4 callbacks suppressed Dec 5 09:59:23 syzkaller kern.notice kernel: [ 342.781122][ T29] audit: type=1400 audit(1733392763.374:27332): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:23 syzkaller kern.notice kernel: [ 342.812327][ T29] audit: type=1400 audit(1733392763.402:27333): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:23 syzkaller kern.notice kernel: [ 342.835783][ T29] audit: type=1400 audit(1733392763.430:27334): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:23 syzkaller kern.notice kernel: [ 342.858936][ T29] audit: type=1400 audit(1733392763.430:27335): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:23 syzkaller kern.notice kernel: [ 342.882619][ T29] audit: type=1400 audit(1733392763.467:27336): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:23 syzkaller kern.notice kernel: [ 342.906060][ T29] audit: type=1400 audit(1733392763.467:27337): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:23 syzkaller kern.notice kernel: [ 342.929289][ T29] audit: type=1400 audit(1733392763.495:27338): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:23 syzkaller kern.notice kernel: [ 342.952870][ T29] audit: type=1400 audit(1733392763.495:27339): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:23 syzkaller kern.notice kernel: [ 342.976819][ T29] audit: type=1400 audit(1733392763.561:27340): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:23 syzkaller kern.notice kernel: [ 342.999592][ T29] audit: type=1400 audit(1733392763.561:27341): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:24 syzkaller daemon.err dhcpcd[8700]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 5 09:59:24 syzkaller daemon.err dhcpcd[8700]: ps_root_recvmsg: Invalid argument [ 350.570066][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 350.570078][ T29] audit: type=1400 audit(1733392770.661:27347): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=47468 daddr=10.128.0.121 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Dec 5 09:59:30 [ 350.601124][ T29] audit: type=1400 audit(1733392770.670:27348): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 350.601330][ T29] audit: type=1400 audit(1733392770.689:27349): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 350.648670][ T29] audit: type=1400 audit(1733392770.735:27350): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 50.570066][ T2[ 350.671473][ T29] audit: type=1400 audit(1733392770.735:27351): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 350.695682][ T29] audit: type=1400 audit(1733392770.782:27352): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 5 callbac[ 350.718469][ T29] audit: type=1400 audit(1733392770.782:27353): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 350.742577][ T29] audit: type=1400 audit(1733392770.820:27354): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 5 09:59:30 s[ 350.765337][ T29] audit: type=1400 audit(1733392770.820:27355): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 350.789093][ T29] audit: type=1400 audit(1733392770.866:27356): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 350.570078][ T29] audit: type=1400 audit(1733392770.661:27347): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=47468 daddr=10.128.0.121 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontex Dec 5 09:59:30 syzkaller kern.notice kernel: [ 350.601124][ T29] audit: type=1400 audit(1733392770.670:27348): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:30 syzkaller kern.notice kernel: [ 350.601330][ T29] audit: type=1400 audit(1733392770.689:27349): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:30 syzkaller kern.notice kernel: [ 350.648670][ T29] audit: type=1400 audit(1733392770.735:27350): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:30 syzkaller kern.notice kernel: [ 350.671473][ T29] audit: type=1400 audit(1733392770.735:27351): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:30 syzkaller kern.notice kernel: [ 350.695682][ T29] audit: type=1400 audit(1733392770.782:27352): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:30 syzkaller kern.notice kernel: [ 350.718469][ T29] audit: type=1400 audit(1733392770.782:27353): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:30 syzkaller kern.notice kernel: [ 350.742577][ T29] audit: type=1400 audit(1733392770.820:27354): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:30 syzkaller kern.notice kernel: [ 350.765337][ T29] audit: type=1400 audit(1733392770.820:27355): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 5 09:59:30 syzkaller kern.notice kernel: [ 350.789093][ T29] audit: type=1400 audit(1733392770.866:27356): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 355.159995][ C0] ================================================================== [ 355.168077][ C0] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote [ 355.176232][ C0] [ 355.178540][ C0] write to 0xffff888237d205dc of 1 bytes by task 0 on cpu 1: [ 355.185889][ C0] __tmigr_cpu_activate+0x55/0x200 [ 355.190994][ C0] tmigr_cpu_activate+0x8a/0xc0 [ 355.195835][ C0] timer_clear_idle+0x28/0x100 [ 355.200609][ C0] tick_nohz_restart_sched_tick+0x22/0x110 [ 355.206424][ C0] tick_nohz_idle_exit+0xfe/0x1d0 [ 355.211441][ C0] do_idle+0x1eb/0x230 [ 355.215535][ C0] cpu_startup_entry+0x25/0x30 [ 355.220316][ C0] start_secondary+0x96/0xa0 [ 355.224893][ C0] common_startup_64+0x12c/0x137 [ 355.229824][ C0] [ 355.232132][ C0] read to 0xffff888237d205dc of 1 bytes by interrupt on cpu 0: [ 355.239746][ C0] tmigr_handle_remote+0x26e/0x940 [ 355.244846][ C0] run_timer_softirq+0x5f/0x70 [ 355.249598][ C0] handle_softirqs+0xbf/0x280 [ 355.254270][ C0] __irq_exit_rcu+0x3a/0xc0 [ 355.258773][ C0] sysvec_apic_timer_interrupt+0x73/0x80 [ 355.264408][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 355.270392][ C0] acpi_safe_halt+0x21/0x30 [ 355.274885][ C0] acpi_idle_do_entry+0x1d/0x30 [ 355.279740][ C0] acpi_idle_enter+0x96/0xb0 [ 355.284345][ C0] cpuidle_enter_state+0xc5/0x260 [ 355.289364][ C0] cpuidle_enter+0x40/0x70 [ 355.293771][ C0] do_idle+0x192/0x230 [ 355.297839][ C0] cpu_startup_entry+0x25/0x30 [ 355.302592][ C0] rest_init+0xef/0xf0 [ 355.306643][ C0] start_kernel+0x586/0x5e0 [ 355.311134][ C0] x86_64_start_reservations+0x2a/0x30 [ 355.316581][ C0] x86_64_start_kernel+0x9a/0xa0 [ 355.321517][ C0] common_startup_64+0x12c/0x137 [ 355.326461][ C0] [ 355.328766][ C0] value changed: 0x00 -> 0x01 [ 355.333435][ C0] [ 355.335758][ C0] Reported by Kernel Concurrency Sanitizer on: [ 355.341913][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G W 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 [ 355.353743][ C0] Tainted: [W]=WARN [ 355.357577][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 355.367633][ C0] ================================================================== Dec 5 09:59:35 syzkaller kern.err kernel: [ 355.159995][ C0] ================================================================== Dec 5 09:59:35 syzkaller kern.err kernel: [ 355.168077][ C0] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote Dec 5 09:59:35 syzkaller kern.err kernel: [ 355.176232][ C0] Dec 5 09:59:35 syzkaller kern.err kernel: [ 355.178540][ C0] write to 0xffff888237d205dc of 1 bytes by task 0 on cpu 1: Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.185889][ C0] __tmigr_cpu_activate+0x55/0x200 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.190994][ C0] tmigr_cpu_activate+0x8a/0xc0 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.195835][ C0] timer_clear_idle+0x28/0x100 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.200609][ C0] tick_nohz_restart_sched_tick+0x22/0x110 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.206424][ C0] tick_nohz_idle_exit+0xfe/0x1d0 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.211441][ C0] do_idle+0x1eb/0x230 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.215535][ C0] cpu_startup_entry+0x25/0x30 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.220316][ C0] start_secondary+0x96/0xa0 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.224893][ C0] common_startup_64+0x12c/0x137 Dec 5 09:59:35 syzkaller kern.err kernel: [ 355.229824][ C0] Dec 5 09:59:35 syzkaller kern.err kernel: [ 355.232132][ C0] read to 0xffff888237d205dc of 1 bytes by interrupt on cpu 0: Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.239746][ C0] tmigr_handle_remote+0x26e/0x940 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.244846][ C0] run_timer_softirq+0x5f/0x70 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.249598][ C0] handle_softirqs+0xbf/0x280 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.254270][ C0] __irq_exit_rcu+0x3a/0xc0 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.258773][ C0] sysvec_apic_timer_interrupt+0x73/0x80 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.264408][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.270392][ C0] acpi_safe_halt+0x21/0x30 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.274885][ C0] acpi_idle_do_entry+0x1d/0x30 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.279740][ C0] acpi_idle_enter+0x96/0xb0 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.284345][ C0] cpuidle_enter_state+0xc5/0x260 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.289364][ C0] cpuidle_enter+0x40/0x70 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.293771][ C0] do_idle+0x192/0x230 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.297839][ C0] cpu_startup_entry+0x25/0x30 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.302592][ C0] rest_init+0xef/0xf0 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.306643][ C0] start_kernel+0x586/0x5e0 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.311134][ C0] x86_64_start_reservations+0x2a/0x30 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.316581][ C0] x86_64_start_kernel+0x9a/0xa0 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.321517][ C0] common_startup_64+0x12c/0x137 Dec 5 09:59:35 syzkaller kern.err kernel: [ 355.326461][ C0] Dec 5 09:59:35 syzkaller kern.err kernel: [ 355.328766][ C0] value changed: 0x00 -> 0x01 Dec 5 09:59:35 syzkaller kern.err kernel: [ 355.333435][ C0] Dec 5 09:59:35 syzkaller kern.err kernel: [ 355.335758][ C0] Reported by Kernel Concurrency Sanitizer on: Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.341913][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G W 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.353743][ C0] Tainted: [W]=WARN Dec 5 09:59:35 syzkaller kern.warn kernel: [ 355.357577][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024