last executing test programs: 31m44.579882872s ago: executing program 0 (id=68): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x50) close(0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffe3b, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f3, &(0x7f0000000940)={'syztnl0\x00', &(0x7f0000000140)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x2, {{0x5, 0x4, 0x0, 0x24, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, @multicast1, @empty}}}}) 31m41.144140076s ago: executing program 0 (id=69): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x36) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendto$packet(r2, &(0x7f0000000240)='\x00', 0x1, 0x800, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xfc}}, 0x14) 31m40.935362082s ago: executing program 0 (id=70): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0x9}]}}, 0x0, 0x26}, 0x28) 31m40.654688324s ago: executing program 0 (id=71): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) getpid() r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r1, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400000003"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x800000001fe, 0x82) r5 = dup(r4) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000040)={0x23, 0x3, 0x14, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 30m55.465428899s ago: executing program 32 (id=71): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) getpid() r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r1, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400000003"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x800000001fe, 0x82) r5 = dup(r4) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000040)={0x23, 0x3, 0x14, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 29m25.551852874s ago: executing program 33 (id=112): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00'}) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x8, 0x4203) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x18, &(0x7f00000001c0)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) mincore(&(0x7f0000000000/0x800000)=nil, 0x800000, &(0x7f0000000000)=""/188) ioctl$USBDEVFS_CLEAR_HALT(r5, 0x80045515, &(0x7f0000000240)={0xd}) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[], 0x4c}}, 0x8000002) sched_setaffinity(0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x94) 25m30.272907158s ago: executing program 34 (id=224): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) add_key$fscrypt_v1(0x0, &(0x7f0000000280)={'fscrypt:', @desc2}, 0x0, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) 25m0.393058496s ago: executing program 35 (id=232): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x3, 0x0) r7 = io_uring_setup(0x5f4f, 0x0) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r7, 0xf, &(0x7f0000000540)={0x1002, 0x0, 0x0, 0x0, 0x28}, 0x20) getsockname$packet(r6, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r8, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) 24m34.189753011s ago: executing program 36 (id=236): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000380)=0x202) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x4000000) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x278, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x2d8) prlimit64(0x0, 0x5, 0x0, 0x0) inotify_init() r4 = open(&(0x7f00000001c0)='./file1\x00', 0x14927e, 0x20) fallocate(r4, 0x0, 0x0, 0x1001f0) 21m19.916025563s ago: executing program 37 (id=305): r0 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0xfffffffffffffe3c, 0x0, 0x40f00, 0xaf, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000440)={{0xffbe, 0x5, 0x2, 0x5}, 'syz1\x00', 0x53}) ioctl$UI_SET_EVBIT(r6, 0x40045564, 0x12) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x7, 0x3, 0x1, 0x9}, 0x7, [0x4, 0x6, 0x802, 0xe9a2, 0x1, 0x0, 0xa9ba, 0xc1f, 0x1, 0x7f5b, 0x3, 0x6, 0x5, 0x10000, 0x2, 0x3, 0x0, 0x3, 0xe, 0x3, 0x0, 0x2, 0xd9, 0x2, 0x6, 0x3, 0x3, 0x9, 0xfff, 0x8a0, 0x6, 0x8001, 0x33b5, 0x1, 0xfffffffc, 0x0, 0x9, 0xb, 0xcc, 0x5, 0x80, 0x401, 0x5, 0x5, 0xfffffffd, 0x8, 0xb, 0x3, 0xffff8001, 0x6, 0x3, 0x80000000, 0x1, 0x9, 0x7, 0x0, 0x5, 0xfff, 0x1, 0x7fe, 0x7fff, 0x10000, 0x2, 0x8], [0x2, 0x1, 0x10000, 0x7, 0x9, 0x6, 0x5, 0x4, 0x9, 0x7, 0x5, 0xdd5a, 0x6, 0x5, 0x7, 0x8, 0x5, 0xcc, 0xbc1, 0x80000, 0x0, 0x5e81339d, 0xffffc256, 0x5, 0x80000001, 0x0, 0x0, 0x4, 0x4, 0x7, 0x9, 0x1, 0x1, 0x5, 0x5, 0xfffffb66, 0xfb5, 0x2, 0x4, 0x7, 0x2, 0x8000, 0x7fff, 0x1, 0x9425, 0x4, 0x6f, 0x80b, 0x1, 0x6, 0x525ba681, 0x4f74, 0x7, 0x1, 0x1, 0x8, 0x100, 0x6, 0x10000, 0x1306, 0x8b, 0x10000, 0xfe4, 0x3ff], [0x2, 0x40, 0x4, 0xfffffff9, 0x7aa, 0x10, 0x80, 0x8001, 0x5, 0x0, 0x9, 0x8, 0x7fffffff, 0x1, 0x1, 0x4, 0x8, 0xfffffffa, 0x7, 0x9, 0x6, 0x4, 0x5, 0xa3, 0x3, 0x2, 0x0, 0x3, 0x4c, 0x3, 0x5, 0x2, 0xd21e, 0x9, 0x13, 0x0, 0x2, 0xfff, 0x6, 0x100, 0x7c83, 0xd, 0x1, 0x4, 0xf, 0x81, 0x47, 0x7, 0x0, 0x11, 0x3, 0xffd, 0x7, 0x7, 0x7ffd, 0x7ff, 0x10, 0x2, 0x10001, 0x1, 0x0, 0x6, 0x71c], [0x81, 0x3, 0x10, 0x4e26, 0x3, 0x40, 0xfffffff3, 0x497, 0x4, 0x1, 0x3, 0x5, 0x56, 0xc28, 0x9, 0x5, 0x5, 0xa, 0x79a, 0x40, 0x9, 0x6, 0xc41f, 0x5, 0x8b6, 0xffffffff, 0x0, 0x0, 0x6a, 0x9, 0x0, 0x0, 0x1000, 0x10, 0xd, 0x6, 0x8000, 0x53, 0x78d, 0x4, 0x1, 0xffffb027, 0xfffffff8, 0x9, 0x7, 0x7, 0x101, 0x7, 0x7, 0x4, 0x0, 0xb, 0x400, 0x8, 0x0, 0x8, 0x7, 0x9a33247, 0x8, 0x0, 0x1, 0x8001, 0xfffffff7, 0x5]}, 0x45c) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="ec000000", @ANYRES16, @ANYBLOB="01000000000000000000010000000800050001000000140002007767310000000000000000000000000024000300a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5420800050000000000900008808c"], 0xec}, 0x1, 0x0, 0x0, 0x4084}, 0x20000010) setsockopt$inet6_buf(r0, 0x29, 0x39, 0x0, 0x0) 19m6.693300278s ago: executing program 38 (id=387): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000000"], 0x48) r4 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x19) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r5, r3}, 0xc) socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x8, {0x2, 0x0, @empty}, 'lo\x00'}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 17m27.84007468s ago: executing program 6 (id=430): utimes(0x0, &(0x7f00000000c0)={{0x7, 0xa000000000}, {0x8000000000000000}}) r0 = socket$inet_icmp(0x2, 0x2, 0x1) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@base={0x6, 0x4, 0x8, 0x8}, 0x50) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x3a}, 0xfffffff8}, 0x1c) r6 = syz_open_dev$evdev(&(0x7f0000000000), 0x1, 0x2002) ioctl$EVIOCGRAB(r6, 0x40044590, &(0x7f00000000c0)=0x9) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @dev}, &(0x7f0000000040)=0xc) 17m21.255097727s ago: executing program 6 (id=431): openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x2d41, 0xd5) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x202, 0x0, 0x0, 0x2}}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000004200)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000023000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cb0900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000160000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea2105600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x20, 0x0, 0x0, {0x0, 0x16}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x20000, 0x34) 17m20.386523374s ago: executing program 6 (id=432): r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000740)=ANY=[@ANYBLOB="28010000", @ANYRES16, @ANYBLOB="100025bd7000fddbdf250600000024000180080003000200000008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="6000018008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08000300020000001c000180", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7400018008000300000000001400020076657468305f746f5f626f6e6400000008000300010000001400020070696d36726567000000000000000000080003000200000014000200766c616e30000000000000000000000008000100", @ANYRES32, @ANYBLOB="1400020069703667726530000000000000000000"], 0x128}, 0x1, 0x0, 0x0, 0x800}, 0x4040) 17m20.078516387s ago: executing program 6 (id=433): r0 = epoll_create1(0x80000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xe000001a}) finit_module(r1, 0x0, 0x3) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) 17m19.093261563s ago: executing program 6 (id=434): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x0) rt_sigaction(0x1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x48, 0x37, 0x0, 0x3334}, {0x28, 0x1, 0xf7, 0xfffff038}, {0x6, 0x6, 0x0, 0x57c}]}, 0x10) 17m14.9760276s ago: executing program 39 (id=426): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x3, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_emit_ethernet(0x42, &(0x7f0000000100)={@multicast, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x34, 0xf5, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x1, 0x0, 0x3, 0x61, 0x0, {0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2f, 0x9, @dev={0xac, 0x14, 0x14, 0x10}, @remote, {[@timestamp_addr={0x44, 0x4}]}}}}}}}, 0x0) keyctl$restrict_keyring(0x1d, 0xfffffffffffffffd, &(0x7f0000001900)='keyring\x00', &(0x7f0000001940)='{,:\x00') io_setup(0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f00000010c0)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}]) 17m12.63534265s ago: executing program 6 (id=436): socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) unshare(0x26020480) 16m42.555404993s ago: executing program 9 (id=440): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) timer_settime(0x0, 0x1, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b00000000001b000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000006ffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, 0x0) 16m39.697216743s ago: executing program 9 (id=441): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)='\\\\@[*#)\x00', 0xfffffffffffffffe) 16m38.384061384s ago: executing program 9 (id=442): r0 = socket(0x1e, 0x80004, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xae, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x7, 0x0, 0x1000004}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000700)="8387b0e3a9", 0x5}], 0x1}}], 0x1, 0x9200000000000000) r3 = dup3(r2, r0, 0x0) recvmmsg(r3, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000600)=""/179, 0x3514}], 0x1}, 0xffffffff}], 0x1, 0x40000001, 0x0) 16m37.313861716s ago: executing program 9 (id=443): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x18, 0x14, 0x9535393fea6295b5}, 0x18}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000), 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 16m34.693303367s ago: executing program 9 (id=444): r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000740)=ANY=[@ANYBLOB="28010000", @ANYRES16, @ANYBLOB="100025bd7000fddbdf250600000024000180080003000200000008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="6000018008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08000300020000001c000180", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7400018008000300000000001400020076657468305f746f5f626f6e6400000008000300010000001400020070696d36726567000000000000000000080003000200000014000200766c616e30000000000000000000000008000100", @ANYRES32, @ANYBLOB="1400020069703667726530000000000000000000"], 0x128}, 0x1, 0x0, 0x0, 0x800}, 0x4040) 16m33.62503194s ago: executing program 9 (id=445): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000002380)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="580000001500add427323b470c45b4560a067fffffff81004e22030d00ff0028925aa8002000eaa57b00090080020efffeffe809020000ff0004f03a09000000ffffffffffffffffffffffe7ee0000000000000000020000", 0x58}], 0x1) 16m27.521469409s ago: executing program 40 (id=436): socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) unshare(0x26020480) 15m52.174173737s ago: executing program 0 (id=446): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x24008095) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000500003f9db7648906a870725cbfc200", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00'}, 0x10) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r1, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r1, 0x400, 0x2) 15m51.063693212s ago: executing program 0 (id=447): syz_emit_ethernet(0x7a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "156909", 0x44, 0x2f, 0x0, @private2, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88a8}, {}, {}, {0xa888, 0x88be, 0x81000000, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1900000004000000080000000802000000000000", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000240)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) close(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, 0xffffffffffffffff, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) geteuid() 15m47.739745194s ago: executing program 41 (id=445): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000002380)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="580000001500add427323b470c45b4560a067fffffff81004e22030d00ff0028925aa8002000eaa57b00090080020efffeffe809020000ff0004f03a09000000ffffffffffffffffffffffe7ee0000000000000000020000", 0x58}], 0x1) 15m5.334600247s ago: executing program 42 (id=447): syz_emit_ethernet(0x7a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "156909", 0x44, 0x2f, 0x0, @private2, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88a8}, {}, {}, {0xa888, 0x88be, 0x81000000, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1900000004000000080000000802000000000000", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000240)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) close(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, 0xffffffffffffffff, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) geteuid() 14m49.082019442s ago: executing program 2 (id=457): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000180)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xd1, 0x0, 0x0, 0x10, &(0x7f0000000300), 0x0, 0x0, 0xa3, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100005a6c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0x50, 0x0, 0x0, {0x7, 0x27, 0x0, 0x30000, 0x0, 0x0, 0x8, 0x10000}}, 0x50) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000002100)="0800a9fc0d", 0x5}], 0x1, &(0x7f0000001d00)=ANY=[@ANYBLOB="30000000000000000000000007000000890704"], 0x30}, 0x810) r5 = syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x50) sendmsg$TIPC_NL_PUBL_GET(r5, 0x0, 0x8840) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) timer_create(0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 14m10.219239375s ago: executing program 2 (id=472): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x4001, 0x3, 0x3e8, 0x0, 0x0, 0x148, 0x0, 0x148, 0x350, 0x240, 0x240, 0x350, 0x240, 0x7fffffe, 0x0, {[{{@ip={@private=0xa010102, @local, 0x0, 0x0, 'ip6gretap0\x00', 'nicvf0\x00', {}, {}, 0x88, 0x3, 0x10}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'wg1\x00', {0x0, 0x0, 0x1ff, 0x100000, 0x0, 0xed, 0x7}}}, @common=@unspec=@connmark={{0x30}, {0xfffffff9, 0x8}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x85d, 0xf, [0x10, 0x32, 0x1e, 0x32, 0x2b, 0x25, 0x3f, 0x17, 0x19, 0x22, 0x2c, 0x3d, 0x7, 0x3f, 0x1e, 0x31], 0x0, 0x2, 0x2}}}, {{@ip={@rand_addr=0x64010101, @local, 0xff, 0x0, 'wg0\x00', 'lo\x00', {0xff}, {}, 0x2e, 0x3, 0x4}, 0x0, 0x190, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x8, 0x9, 0x1, 0x1, 'syz1\x00', 0x2}}, @inet=@rpfilter={{0x28}, {0x8}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0xfff, 0x7e, 0x1c, 'netbios-ns\x00', 'syz0\x00', {0x3}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) syz_emit_ethernet(0x82, &(0x7f0000000440)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x1, 0x74, 0x2, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x18, 0x10, 0x0, 0x0, 0xffff, {[@sack={0x5, 0x1e, [0x80000001, 0xffff, 0x71ffdb11, 0x0, 0x800, 0xfffffffa, 0x9]}, @mss={0x2, 0x4, 0x1}, @md5sig={0x13, 0x12, "8863c4997aec68983ce7fcd121c2f8e7"}, @sack_perm={0x4, 0x2}, @fastopen={0x22, 0x6, "f8805baf"}, @timestamp={0x8, 0xa, 0x3, 0xb82}, @window={0x3, 0x3, 0x13}]}}}}}}}, 0x0) 14m9.781668188s ago: executing program 2 (id=473): r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000740)=ANY=[@ANYBLOB="28010000", @ANYRES16, @ANYBLOB="100025bd7000fddbdf250600000024000180080003000200000008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="6000018008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0800030002000000080003000200000014000200776732000000000000000000000000000800", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08000300020000001c000180", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7400018008000300000000001400020076657468305f746f5f626f6e6400000008000300010000001400020070696d36726567000000000000000000080003000200000014000200766c616e30000000000000000000000008000100", @ANYRES32, @ANYBLOB="1400020069703667726530000000000000000000"], 0x128}, 0x1, 0x0, 0x0, 0x800}, 0x4040) 14m9.553871786s ago: executing program 2 (id=474): bpf$PROG_LOAD(0x5, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ff01000000000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) listxattr(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) 14m8.142727463s ago: executing program 2 (id=475): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x9) connect$netlink(r2, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000b00)={{0x14, 0x10, 0x1, 0x0, 0x0, {0xa}}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x28}}, 0x0) 14m7.421762518s ago: executing program 2 (id=476): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) symlink(&(0x7f0000000100)='./file0\x00', 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) sched_setaffinity(r0, 0x8, &(0x7f00000002c0)=0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x1, &(0x7f0000000d00)=""/4096) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') read$FUSE(r4, &(0x7f0000001440)={0x2020}, 0x2020) preadv(r4, &(0x7f00000000c0)=[{&(0x7f0000000400)=""/4108, 0x100c}], 0x1, 0x141, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r4}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00'}, 0x18) 13m21.864614889s ago: executing program 43 (id=476): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) symlink(&(0x7f0000000100)='./file0\x00', 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) sched_setaffinity(r0, 0x8, &(0x7f00000002c0)=0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x1, &(0x7f0000000d00)=""/4096) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') read$FUSE(r4, &(0x7f0000001440)={0x2020}, 0x2020) preadv(r4, &(0x7f00000000c0)=[{&(0x7f0000000400)=""/4108, 0x100c}], 0x1, 0x141, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r4}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00'}, 0x18) 8m54.284978483s ago: executing program 3 (id=557): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$inet6(0xa, 0x80003, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xfffffffffffffffe, 0x0, 0x4}, {0x0, 0x4, 0x0, 0xa78a}, 0xfffffffe, 0x0, 0x1}, {{@in=@private, 0x0, 0x33}, 0x0, @in=@multicast1, 0x3506, 0x3, 0x1, 0x7}}, 0xe8) 8m54.144129374s ago: executing program 3 (id=558): socket$packet(0x11, 0x2, 0x300) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x70, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200407fc, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000001780)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000880)="722abe089bad444a712571d59b002a97046f64a6e9f378fbe2feeec001e4", 0x1e}, {&(0x7f00000008c0)="3c79412e1982c663c230408536db37b8bc008e6bbfec6aa93cba6c477c38e440c1dbcb4e80155f3f9388ec70f454827e62a7a249feff2092ade32b7f3da4bfd132b4ef59b4d4157c24b464dfbd6383b01950d650241163d5fc6b6e90b1d440a017dc84cfec4161d7c33c21eae64d70", 0x6f}, {&(0x7f0000001a40)="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", 0x70c}], 0x3}}], 0x1, 0x4008040) 8m53.764090962s ago: executing program 3 (id=559): r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e880000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000700)={'veth0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x1d, r3}, 0x10, &(0x7f00000003c0)={0x0, 0x10}}, 0x0) 8m53.515152282s ago: executing program 3 (id=560): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) close(0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x659, @empty, 0xff}, 0x1c) r4 = fcntl$dupfd(r0, 0x406, r0) write$cgroup_pid(r4, &(0x7f0000000240), 0xfdef) 8m41.464412387s ago: executing program 3 (id=561): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) syz_clone(0x9004180, 0x0, 0x3b, 0x0, 0x0, 0x0) 8m40.172385925s ago: executing program 3 (id=562): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) request_key(0x0, &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='ib_mad_send_done_handler\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7m55.006311527s ago: executing program 44 (id=562): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) request_key(0x0, &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='ib_mad_send_done_handler\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6m18.387941s ago: executing program 1 (id=588): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) unlinkat(0xffffffffffffffff, 0x0, 0x0) 6m17.296658403s ago: executing program 1 (id=589): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x328000, 0x1000}, 0x20) 5m58.394721779s ago: executing program 4 (id=597): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd608a37f200082c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa2b000005"], 0x0) 5m58.394431419s ago: executing program 4 (id=598): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_io_uring_setup(0x50cf, &(0x7f0000000000)={0x0, 0xfffffffc, 0x40000, 0x2, 0x333}, &(0x7f0000000080), &(0x7f0000ff4000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92344f242b416ae9eeefc0e9c6f203cb1276bfdbb4ddffffff7f82dc2b938189a7ca02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc2880072599456d4c4e6f3fe684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd01008e49f4a94608c9a20819e02fc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b529cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400001000000000ff8d81006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864010067d6bab101446ebfe3fdeed7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab53038010000004abbfc59d6d1b18fe380df4bf024f120bd755d82033f2fb7d8fc9e0de834f7646c8dd27da1297d0c77b294e097e293db7f002c0024ab2fb4d32972cba6f49051cec1ff5d16231bbb90a2d201a500000000000000007700b06fa191ebd3a0c2ef0058ffebd7cc4cf80f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f8107671141ffffffe0c7d8e94a27a06a4e3d9acee835fd0571e5bbb3e6d2b5eba505000000968983811f832dc5390f83e817c602c4f1f0d0504255c22ee8674053d0e160e5255366139bbe5863e23c3dd42d21f542816edf56a93d0a7e6f08f9ffffff64875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430fe77ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b1da97c971c8c84a427edc3492b97e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd194d48e50c84892c97c800d156b059a718f6b10274b077a710f27ab8ee953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b5989543729e3600000000bc86cd51704f309130f534741377ea7b7bea3c46c0c4c4b7c27c5d057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9e45a35adbf0b9312be929863f000000000000004a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb2b5f59dfead7ac6e7fa84746e2e425769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e1878c5295fecc27f9c6d1f62da58c0002ea00000000009aa38a05e70591d5cdab1c488ef3c1984c7c0a566cfc2a080000009ec206a54fb49056a555414178ef00d8b8f3c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8adeaad7d3328fbb6e279f745d2872f0208635e465ca443c3a64c7803760880af23fb3f430a0311fffc96dd13b951642f1433f65b4e170a62a5f7b7d0f9d5cef0d17289c43d4aee0001f7a343899434594cc23e1c864164e130754b337e560f285dc670a31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2c7481ec261c00f725de74e48d9a86f7d4a5d28da3f099ca3e6472b9d7c86d961f525f799b4517141f018af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630e7fa0c2261bc2d5de32ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f297661d3f8ba21c65badf55d1859581f9e7ef3e2693b46a8fc85be061ce79a08002c04dc04de8b6536123b24be2ef80eb06b2db900fb30596c1574b2a31f81d61ccfd58080d2330b9c7b87b5d17d48c32daffead3414b91603e250eeedc7d601000000037426f643797be3e93da96b5643d3feed0b7c885d06006b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167abf5d6685d09945cbc778bcc3e7dcfaee5d9c1689a3bafc0d3b51b5a3bfd6007954c36d532960964183842601e5364ecb6ad9168040388c7640bfa2f88643de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e63daaadd8878ad468eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6f00003a73345b841d04a02bf441955b932c59608a555bc44873272812e0fb874618a0b56b4cf44990f60000000000000000000000b20000da0ca6797590ed13b0bccf71a39e05e877893646d185a77882f866785af6b0149e336c31fb177e3e85f4c60cd4de4ce6ea73a95f434328620fa493937386ad2e2a0d60eb815aa05c33e02c32276dab36d14c63af66a31409ab2a403ec3c7a4e07bd745efa2835a8c932f22aa6da40af9bcdf808b916bc8deb37d5b8c422b65c42d17e61751c561ce775a31b52703d398d52694cfbb7d2b3791b030093b321d9f16b2f06676cf94d75cbba6491ae0b5a16ce92320321314d8d2e88d1cd7e7b1216bdaecba309a38e107103e649d46958cc6ba2d660dd41b78d832beb7206ae01508377273ea96e40760410aeed1866971e04f578e9d856d01000000045aea928f5f669be0636dc3f34f90c34531735f271527412d1ae755a9243da523d713071f9370b509a34eeb46415b2f0d271a7072cbd17e293f20132e6c15756e92776c6a0d7c3a9f512ce17edf3f1ea190853bbf93e220a6ce968b79d504c057000e7d8f8249a8158e68a90bbea8bfab2bd3c067c28e185fe62ce7020f5282cf045b9c790984c6fb65fd3187bd8bfcbe663df6b7770000f58fbad41e6eee5c9595950c4172b9c925403b2f99bbf3cb1981bb0d14bded8eae35e08278020a1ec7f508628056fd3d408a02a1cf8594bcbb21a88f477673442804f714212d000045b9f563b5352fe460a30489b1b6a6d37daead86151492f7fd4b5c64007b68a1b04027eac124478a2ef7f59fe472795785de83578cb96334e0f7c1370dc397d3aa42d937b5718b7610cdcdfe104db7801ec74980b8b111a2748321f81512e4204eb2b024b9fc9e0f257f8c6037b93b2caa236d4354b32434d5a6b01e00000000ee2ea723ea2e1accb97a200609c77e0000000000000000d3a54ccd6e13a966801e9341260d6cbce5fe03999214462cbaa297448677ab659102d0f430fbeae119a7ef2e962d2829d4dd2201c4b30d491269594c88252fbd09aced90609851bd9e5c307e7e0d39e73579c1f3563eff1a6237d3699d61acdc8e36010d76093ddd237df1c4181b0a0c4543b4249e9ff2f5e8b5e0ba2048d542de40f643fda4036124b8feb2dd45d0fa52300518c8052cc09ad73f89734fce82cc627356aa2c651ed2644f34cfbc32e8b29cf29e895e43b473ddb9a43421b4b25f8bbce8e2d7cb8547d156d5972021ae4c9e30f85413276ddebde55999d2ec3c524632b74d703147ba09e0dcb26c4b89636d28428b67e955f53bfd0c9eeb7a9d17000000000096cd8ecf1c511eea07aefa1c5cae1841efa9329d80eafefe00000000000000009111274a44c722ff9f5151aa7cb99ea3e8b2c51eadbd2d0ba1a25b08cc3e67cd186c12ea62a55ff905388bb30d1a63d42593c9aea3a84f5a6fc470d8aaaafeccb373ca26c3685679e6a048af19fca3fc5315a33687"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 5m57.738018239s ago: executing program 4 (id=599): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="16000000000000000400000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000100)=@chain) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=@can_newroute={0x2b8, 0x18, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@CGW_MOD_SET={0x15, 0x4, {{{0x854, 0x0, 0x1, 0x1}, 0x3, 0x3, 0x0, 0x0, "f65b5f7042478b15"}, 0x2}}, @CGW_MOD_SET={0x15, 0x4, {{{0x2, 0x1}, 0x0, 0x0, 0x0, 0x0, "f4a51edb26db708b"}, 0x2}}, @CGW_CS_XOR={0x8, 0x5, {0x5, 0x8, 0xfffffffffffffffd, 0x6}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x4, 0x1, 0x1, 0x1}, 0x5, 0x2, 0x0, 0x0, "a910b9a5663c0cd8"}, 0x2}}, @CGW_CS_CRC8={0x11e, 0x6, {0x59, 0x7b, 0x44, 0x8, 0x7, "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", 0x3, "da4412079ffad8c22f60326fad3c5f430cc393d1"}}, @CGW_CS_CRC8={0x11e, 0x6, {0x71, 0x12, 0x15, 0x5, 0x3d, "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", 0x0, "bdeaf1c01de01d81465fa5c4c84cb5f64b4cc50f"}}, @CGW_LIM_HOPS={0x5, 0xd, 0xda}, @CGW_FILTER={0xc, 0xb, {{0x0, 0x1, 0x1}, {0x3, 0x1}}}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x48004}, 0x44085) syz_usb_connect(0x5, 0x35, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x54, 0x5e, 0xd, 0x20, 0x499, 0x6bb7, 0x682f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x23, 0x1, 0x0, 0x0, 0xc0, 0x5, [{{0x9, 0x4, 0x97, 0x0, 0x1, 0xff, 0x70, 0x79, 0x0, [@uac_as={[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x21, 0x1, 0x26, 0xff}]}], [{{0x9, 0x5, 0x85, 0x3, 0x8, 0x2, 0x5, 0x1}}]}}]}}]}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) quotactl_fd$Q_GETNEXTQUOTA(0xffffffffffffffff, 0xffffffff80000900, 0x0, 0x0) 5m57.081437609s ago: executing program 4 (id=600): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) flock(r1, 0x5) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r2, 0x2) dup3(r2, r1, 0x0) 5m56.13912313s ago: executing program 4 (id=601): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) mount_setattr(r0, &(0x7f0000001d80)='.\x00', 0x8800, &(0x7f0000001dc0)={0x0, 0x70, 0x80000}, 0x20) 5m55.832088694s ago: executing program 4 (id=602): socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) unshare(0x26020480) 5m45.87740977s ago: executing program 1 (id=603): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000040)={0x43, 0x1000, 0x1}) 5m45.519009077s ago: executing program 1 (id=604): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r0}, 0x10) pause() 5m42.520564035s ago: executing program 1 (id=605): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x2) r4 = openat$cgroup_subtree(r3, &(0x7f0000000100), 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff8500000004000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r6 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) userfaultfd(0x80001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f0000000180)=0xfffffff9) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r4, &(0x7f00000001c0)={[{0x2b, 'cpu'}]}, 0x5) 5m33.690430646s ago: executing program 1 (id=606): bpf$MAP_CREATE(0x0, 0x0, 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) read$FUSE(r4, &(0x7f00000020c0)={0x2020}, 0x2020) 5m10.175802133s ago: executing program 45 (id=602): socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) unshare(0x26020480) 4m47.826330101s ago: executing program 46 (id=606): bpf$MAP_CREATE(0x0, 0x0, 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) read$FUSE(r4, &(0x7f00000020c0)={0x2020}, 0x2020) 4m16.974799416s ago: executing program 5 (id=611): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) r2 = syz_open_procfs(0x0, &(0x7f0000000480)='ns\x00') getdents64(r2, &(0x7f0000000040)=""/38, 0x26) 4m15.851022471s ago: executing program 5 (id=612): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000003100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000855}, 0x0) 4m15.396026426s ago: executing program 5 (id=613): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffa}, 0x50) syz_emit_ethernet(0x80, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x1, 0x61, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x4e24, 0x4e20, 0x4d, 0x0, @wg=@initiation={0x1, 0x1, "65a252e7cb7a5918c004a9971a46afced2c32642b1ec9fe34818d8ccd82041b7", "c930713c550e74ee13c2638ac75b2a9666efd31a34fce4498df8105d8bd8ed283a220c3a9becd8a70d3607ea8270d351", "ae12e16b560f2f8ac4ca3e745ce285f12f6e8719e7f1e7f286a68f76", {"980aa8fb8f80d69f1fb587086447e93e", "55e824bb69e833bd36300b088233545a"}}}}}}}, 0x0) 4m13.168106385s ago: executing program 5 (id=614): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000180)=0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r0, 0xf9060000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 4m1.416565478s ago: executing program 5 (id=615): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1342, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000540)="89e7ee0c7cdad9b4b47380c988ca", 0xe}, {0x0}], 0x2) 4m0.806165165s ago: executing program 5 (id=616): pipe2$9p(0x0, 0x800) socketpair(0x1, 0x100000005, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x8000000000002) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) lseek(0xffffffffffffffff, 0x104, 0x2) r4 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000a00)={'ip_vti0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x10, 0x7800, 0x0, 0x9, {{0x5, 0x4, 0x3, 0x7, 0x14, 0x64, 0x0, 0xc5, 0x2f, 0x0, @empty, @empty}}}}) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0/file1\x00', 0xe42, 0x1ff) 3m15.015676244s ago: executing program 47 (id=616): pipe2$9p(0x0, 0x800) socketpair(0x1, 0x100000005, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x8000000000002) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) lseek(0xffffffffffffffff, 0x104, 0x2) r4 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000a00)={'ip_vti0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x10, 0x7800, 0x0, 0x9, {{0x5, 0x4, 0x3, 0x7, 0x14, 0x64, 0x0, 0xc5, 0x2f, 0x0, @empty, @empty}}}}) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0/file1\x00', 0xe42, 0x1ff) 1m13.356533689s ago: executing program 7 (id=666): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in6=@loopback, {0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x14}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 39.872805504s ago: executing program 7 (id=674): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000640)=@newlink={0x50, 0x10, 0x503, 0x0, 0x1, {0x0, 0x0, 0x0, 0x0, 0x14615, 0x104aa}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCI={0xc, 0x1, 0x5740}, @IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x0) 39.003962919s ago: executing program 7 (id=675): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_hsr\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) socket$packet(0x11, 0xa, 0x300) sendto$packet(r0, &(0x7f00000000c0)="3f031c000302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) syz_emit_ethernet(0xbe, &(0x7f00000002c0)={@broadcast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x65, 0x0, 0x0, 0x33, 0x0, @private, @broadcast}, {0x4e20, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x4, "59f06ba7965d15fe36011705aeb50d0ef5ecd5266d431bec3d2659fd28810dd0", "1e504ba4a9fe251108f049739ae9498077170148b6cad4501eae15565a6037d8b8bca54950065e6a9c5c66fc7372b5bb", "e8c6ceae03aba0d60e41c8e00004b067530038daa8da18e5a2c30c54", {"8911b17ab08272978d5a77f1981a07af", "0a180c82b0f4774b70bba7ded1d45d73"}}}}}}}, 0x0) 38.622794718s ago: executing program 7 (id=676): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x55) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "a12600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x13}}}}}}}, 0x0) 38.426980773s ago: executing program 7 (id=677): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000200)={'syz0\x00', {}, 0x20, [0xffffffff, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_PHYS(r0, 0x4008556c, 0x0) 38.130212376s ago: executing program 7 (id=678): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) wait4(r0, 0x0, 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) 32.782934893s ago: executing program 8 (id=684): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000d8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(r1, &(0x7f00000000c0)="3f03fe7f0302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c153cfdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) 32.324448948s ago: executing program 8 (id=685): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000008c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000000000000000000000000000000000001ac1414aa00000000000000000000000000000000000000e00a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000c00000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000feffffffff7f400002000000000000080000000000000000010000000000000044000500ac1414aa000000000000000000000000000000003c00000002000000000000000000000000000000000000000600000004"], 0xfc}}, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local, @local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "92c01f", 0x8, 0x2f, 0x0, @remote, @ipv4={'\x00', '\xff\xff', @private}, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21}, {}, {0x8, 0x88be, 0x4305000f}}}}}}}, 0x0) 32.116306453s ago: executing program 8 (id=686): r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x1) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000280)={{0x101, 0x200, 0x4, 0x9}, 'syz1\x00', 0x4c}) ioctl$UI_DEV_CREATE(r1, 0x5501) 31.693953836s ago: executing program 8 (id=687): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x2000000}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r7, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x14, r6, 0x301, 0x0, 0x0, {{0x5}, {@void, @void}}}, 0x14}}, 0x0) close(r0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000280)=[@increfs], 0x0, 0x0, 0x0}) 605.713014ms ago: executing program 8 (id=688): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x4001, 0x3, 0x3e8, 0x0, 0x0, 0x148, 0x0, 0x148, 0x350, 0x240, 0x240, 0x350, 0x240, 0x7fffffe, 0x0, {[{{@ip={@private=0xa010102, @local, 0x0, 0x0, 'ip6gretap0\x00', 'nicvf0\x00', {}, {}, 0x88, 0x3, 0x10}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'wg1\x00', {0x0, 0x0, 0x1ff, 0x100000, 0x0, 0xed, 0x7}}}, @common=@unspec=@connmark={{0x30}, {0xfffffff9, 0x8}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x85d, 0xf, [0x10, 0x32, 0x1e, 0x32, 0x2b, 0x25, 0x3f, 0x17, 0x19, 0x22, 0x2c, 0x3d, 0x7, 0x3f, 0x1e, 0x31], 0x0, 0x2, 0x2}}}, {{@ip={@rand_addr=0x64010101, @local, 0xff, 0x0, 'wg0\x00', 'lo\x00', {0xff}, {}, 0x2e, 0x3, 0x4}, 0x0, 0x190, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x8, 0x9, 0x1, 0x1, 'syz1\x00', 0x2}}, @inet=@rpfilter={{0x28}, {0x8}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0xfff, 0x7e, 0x1c, 'netbios-ns\x00', 'syz0\x00', {0x3}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) syz_emit_ethernet(0x62, &(0x7f0000000440)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x1, 0x54, 0x2, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x10, 0x10, 0x0, 0x0, 0xffff, {[@sack={0x5, 0x1e, [0x80000001, 0xffff, 0x71ffdb11, 0x0, 0x800, 0xfffffffa, 0x9]}, @mss={0x2, 0x4, 0x1}, @sack_perm={0x4, 0x2}, @fastopen={0x22, 0x6, "f8805baf"}]}}}}}}}, 0x0) 0s ago: executing program 8 (id=689): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x40000000000008e, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r3}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) kernel console output (not intermixed with test programs): executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 237.943890][ T4200] veth0_vlan: entered promiscuous mode [ 237.964848][ T4200] veth1_vlan: entered promiscuous mode [ 238.220260][ T4200] veth0_macvtap: entered promiscuous mode [ 238.232066][ T4200] veth1_macvtap: entered promiscuous mode [ 238.272034][ T3794] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 238.272609][ T3794] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 238.272855][ T3794] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 238.273050][ T3794] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.947703][ T31] kauditd_printk_skb: 82 callbacks suppressed [ 245.948012][ T31] audit: type=1400 audit(245.860:288): avc: denied { write } for pid=4661 comm="syz.2.100" name="uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 251.115017][ T31] audit: type=1400 audit(251.020:289): avc: denied { create } for pid=4666 comm="syz.2.102" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 251.433317][ T31] audit: type=1400 audit(251.340:290): avc: denied { unlink } for pid=4200 comm="syz-executor" name="file0" dev="tmpfs" ino=44 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 252.190563][ T31] audit: type=1400 audit(252.100:291): avc: denied { create } for pid=4675 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 252.228032][ T31] audit: type=1400 audit(252.140:292): avc: denied { setopt } for pid=4675 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 252.489839][ T31] audit: type=1400 audit(252.400:293): avc: denied { name_bind } for pid=4677 comm="syz.2.105" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 252.490186][ T31] audit: type=1400 audit(252.400:294): avc: denied { node_bind } for pid=4677 comm="syz.2.105" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 255.705016][ T31] audit: type=1326 audit(255.610:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4682 comm="syz.1.107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 255.710126][ T31] audit: type=1326 audit(255.620:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4682 comm="syz.1.107" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132510 code=0x7ffc0000 [ 255.710477][ T31] audit: type=1326 audit(255.620:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4682 comm="syz.1.107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 255.728426][ T31] audit: type=1326 audit(255.640:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4682 comm="syz.1.107" exe="/syz-executor" sig=0 arch=40000028 syscall=178 compat=0 ip=0x132510 code=0x7ffc0000 [ 256.518617][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 256.518845][ T31] audit: type=1400 audit(256.410:303): avc: denied { create } for pid=4679 comm="syz.2.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 257.265548][ T31] audit: type=1400 audit(257.170:304): avc: denied { block_suspend } for pid=4688 comm="syz.1.109" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 270.171506][ T3797] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 270.176656][ T3797] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 270.180309][ T3797] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 270.199078][ T3797] hid-generic 0003:0004:0000.0002: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 272.039877][ T3794] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 272.105205][ T3794] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 272.226454][ T3794] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 272.309846][ T3794] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 272.800895][ T3794] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 272.818360][ T3794] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 272.822464][ T3794] bond0 (unregistering): Released all slaves [ 272.916628][ T3794] hsr_slave_0: left promiscuous mode [ 272.919394][ T3794] hsr_slave_1: left promiscuous mode [ 272.938128][ T3794] veth1_macvtap: left promiscuous mode [ 272.938422][ T3794] veth0_macvtap: left promiscuous mode [ 272.938835][ T3794] veth1_vlan: left promiscuous mode [ 272.938995][ T3794] veth0_vlan: left promiscuous mode [ 274.672012][ T31] audit: type=1326 audit(274.580:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4707 comm="syz.2.112" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 274.674703][ T31] audit: type=1326 audit(274.580:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4707 comm="syz.2.112" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 274.678892][ T31] audit: type=1326 audit(274.580:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4707 comm="syz.2.112" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 274.686889][ T31] audit: type=1326 audit(274.580:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4707 comm="syz.2.112" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 274.690856][ T31] audit: type=1326 audit(274.580:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4707 comm="syz.2.112" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 274.691186][ T31] audit: type=1326 audit(274.590:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4707 comm="syz.2.112" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 274.691388][ T31] audit: type=1326 audit(274.590:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4707 comm="syz.2.112" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 274.691580][ T31] audit: type=1326 audit(274.590:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4707 comm="syz.2.112" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 274.691802][ T31] audit: type=1326 audit(274.590:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4707 comm="syz.2.112" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 274.691978][ T31] audit: type=1326 audit(274.590:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4707 comm="syz.2.112" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 290.301502][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 290.301720][ T31] audit: type=1400 audit(290.210:349): avc: denied { bind } for pid=4769 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 290.311051][ T31] audit: type=1400 audit(290.220:350): avc: denied { create } for pid=4769 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 290.315951][ T31] audit: type=1400 audit(290.220:351): avc: denied { write } for pid=4769 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 315.771946][ T31] audit: type=1400 audit(315.680:352): avc: denied { execute } for pid=4805 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 315.786904][ T31] audit: type=1400 audit(315.680:353): avc: denied { execute_no_trans } for pid=4805 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 315.851054][ T31] audit: type=1400 audit(315.760:354): avc: denied { read } for pid=4806 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 315.856716][ T31] audit: type=1400 audit(315.760:355): avc: denied { open } for pid=4806 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 315.858920][ T31] audit: type=1400 audit(315.760:356): avc: denied { mounton } for pid=4806 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 318.910037][ T4806] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 318.935416][ T4806] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.967106][ T31] audit: type=1400 audit(319.870:357): avc: denied { write } for pid=5018 comm="syz.1.121" name="ip_tables_targets" dev="proc" ino=4026532695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 320.930569][ T4806] hsr_slave_0: entered promiscuous mode [ 320.942318][ T4806] hsr_slave_1: entered promiscuous mode [ 320.943559][ T4806] debugfs: 'hsr0' already exists in 'hsr' [ 320.944096][ T4806] Cannot create hsr debugfs directory [ 322.261267][ T31] audit: type=1400 audit(322.150:358): avc: denied { create } for pid=4806 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.261911][ T31] audit: type=1400 audit(322.150:359): avc: denied { write } for pid=4806 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.262233][ T31] audit: type=1400 audit(322.150:360): avc: denied { read } for pid=4806 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.281465][ T4806] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 322.357971][ T4806] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 322.395114][ T4806] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 322.431848][ T4806] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 324.524163][ T4806] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.450053][ T31] audit: type=1400 audit(326.360:361): avc: denied { create } for pid=5134 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 326.452999][ T31] audit: type=1400 audit(326.360:362): avc: denied { ioctl } for pid=5134 comm="syz.1.123" path="socket:[5129]" dev="sockfs" ino=5129 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 326.759895][ T31] audit: type=1400 audit(326.670:363): avc: denied { ioctl } for pid=5134 comm="syz.1.123" path="socket:[5157]" dev="sockfs" ino=5157 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 326.842913][ T5142] Device name cannot be null; rc = [-22] [ 328.546657][ T31] audit: type=1400 audit(328.450:364): avc: denied { read } for pid=5157 comm="syz.1.124" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 329.256139][ T31] audit: type=1400 audit(329.160:365): avc: denied { create } for pid=5163 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 331.542092][ T4806] veth0_vlan: entered promiscuous mode [ 331.573501][ T4806] veth1_vlan: entered promiscuous mode [ 331.765581][ T4806] veth0_macvtap: entered promiscuous mode [ 331.809080][ T4806] veth1_macvtap: entered promiscuous mode [ 332.053720][ T1049] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 332.054283][ T1049] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 332.054445][ T1049] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 332.054568][ T1049] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 335.912186][ T31] audit: type=1400 audit(335.820:366): avc: denied { write } for pid=5182 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 336.083094][ T31] audit: type=1400 audit(335.990:367): avc: denied { sqpoll } for pid=5184 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 336.204704][ T31] audit: type=1400 audit(336.110:368): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 339.892126][ T5192] netlink: 296 bytes leftover after parsing attributes in process `syz.1.129'. [ 339.894247][ T31] audit: type=1400 audit(339.800:369): avc: denied { write } for pid=5189 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 339.898994][ T31] audit: type=1400 audit(339.800:370): avc: denied { nlmsg_read } for pid=5189 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 349.864476][ T31] audit: type=1400 audit(349.770:371): avc: denied { setopt } for pid=5203 comm="syz.3.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 353.227214][ T31] audit: type=1400 audit(353.110:372): avc: denied { bind } for pid=5203 comm="syz.3.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 353.227622][ T31] audit: type=1400 audit(353.120:373): avc: denied { name_bind } for pid=5203 comm="syz.3.133" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 353.227987][ T31] audit: type=1400 audit(353.120:374): avc: denied { node_bind } for pid=5203 comm="syz.3.133" saddr=fe80::aa src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 357.979723][ T31] audit: type=1400 audit(357.890:375): avc: denied { nlmsg_write } for pid=5207 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 359.473500][ T5210] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5210 comm=syz.1.135 [ 360.517664][ T3916] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 360.677000][ T3916] usb 2-1: Using ep0 maxpacket: 16 [ 360.696947][ T3916] usb 2-1: config 1 interface 0 altsetting 93 endpoint 0x81 has an invalid bInterval 60, changing to 9 [ 360.697424][ T3916] usb 2-1: config 1 interface 0 altsetting 93 bulk endpoint 0x3 has invalid maxpacket 1023 [ 360.697657][ T3916] usb 2-1: config 1 interface 0 altsetting 93 has 3 endpoint descriptors, different from the interface descriptor's value: 18 [ 360.697861][ T3916] usb 2-1: config 1 interface 0 has no altsetting 0 [ 360.722675][ T3916] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 360.722986][ T3916] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 360.723214][ T3916] usb 2-1: SerialNumber: syz [ 360.753759][ T5218] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 360.962879][ T5218] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 361.390671][ T3916] cdc_ether 2-1:1.0 usb0: register 'cdc_ether' at usb-dummy_hcd.1-1, CDC Ethernet Device, 42:42:42:42:42:42 [ 361.585190][ T5218] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 361.588374][ T5218] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 361.821830][ T3818] usb 2-1: USB disconnect, device number 5 [ 361.823931][ T3818] cdc_ether 2-1:1.0 usb0: unregister 'cdc_ether' usb-dummy_hcd.1-1, CDC Ethernet Device [ 362.491969][ T31] audit: type=1400 audit(362.400:376): avc: denied { append } for pid=5248 comm="syz.1.140" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 362.510735][ T31] audit: type=1400 audit(362.420:377): avc: denied { map } for pid=5248 comm="syz.1.140" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 375.476868][ T31] audit: type=1400 audit(375.370:378): avc: denied { ioctl } for pid=5278 comm="syz.3.146" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5349 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 376.389927][ T5286] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 376.391890][ T5286] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 377.871023][ T31] audit: type=1400 audit(377.780:379): avc: denied { mounton } for pid=5294 comm="syz.3.150" path="/11/file0" dev="tmpfs" ino=73 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 379.399314][ T3794] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 379.461505][ T3794] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 379.528715][ T3794] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 379.598895][ T3794] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 380.010985][ T3794] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 380.017687][ T3794] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 380.022116][ T3794] bond0 (unregistering): Released all slaves [ 380.095650][ T3794] hsr_slave_0: left promiscuous mode [ 380.107933][ T3794] hsr_slave_1: left promiscuous mode [ 380.120202][ T3794] veth1_macvtap: left promiscuous mode [ 380.120951][ T3794] veth0_macvtap: left promiscuous mode [ 380.121802][ T3794] veth1_vlan: left promiscuous mode [ 380.122468][ T3794] veth0_vlan: left promiscuous mode [ 389.097388][ T31] audit: type=1400 audit(389.010:380): avc: denied { connect } for pid=5372 comm="syz.1.156" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 389.111518][ T31] audit: type=1400 audit(389.020:381): avc: denied { setopt } for pid=5372 comm="syz.1.156" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 389.114445][ T31] audit: type=1400 audit(389.020:382): avc: denied { write } for pid=5372 comm="syz.1.156" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 401.577699][ T5413] input: syz1 as /devices/virtual/input/input5 [ 404.771165][ T31] audit: type=1400 audit(404.680:383): avc: denied { ioctl } for pid=5431 comm="syz.3.166" path="socket:[5432]" dev="sockfs" ino=5432 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 405.473134][ T31] audit: type=1400 audit(405.380:384): avc: denied { audit_write } for pid=5435 comm="syz.3.168" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 405.495091][ T31] audit: type=1107 audit(405.380:385): pid=5435 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='Ýg}Ü:©,' [ 412.866306][ T5447] serio: Serial port ptm0 [ 413.424655][ T5452] fuse: Unknown parameter 'ÿ0xffffffffffffffff' [ 413.578321][ T31] audit: type=1400 audit(413.490:386): avc: denied { unmount } for pid=5449 comm="syz.3.173" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 413.828252][ T5456] netlink: 60 bytes leftover after parsing attributes in process `syz.3.175'. [ 414.053838][ T5459] netlink: 'syz.1.176': attribute type 12 has an invalid length. [ 414.224704][ T31] audit: type=1400 audit(414.130:387): avc: denied { ioctl } for pid=5455 comm="syz.3.175" path="socket:[5026]" dev="sockfs" ino=5026 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 418.267356][ T5472] fuse: Bad value for 'fd' [ 423.412976][ T5487] netlink: 8 bytes leftover after parsing attributes in process `syz.1.182'. [ 436.138315][ T31] audit: type=1400 audit(436.050:388): avc: denied { write } for pid=5523 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 438.752532][ T31] audit: type=1400 audit(438.660:389): avc: denied { create } for pid=5531 comm="syz.3.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 438.771412][ T31] audit: type=1400 audit(438.680:390): avc: denied { write } for pid=5531 comm="syz.3.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 444.208667][ T5541] netlink: 104 bytes leftover after parsing attributes in process `syz.3.196'. [ 444.400362][ T31] audit: type=1400 audit(444.310:391): avc: denied { mount } for pid=5542 comm="syz.3.197" name="/" dev="configfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 444.445632][ T31] audit: type=1400 audit(444.350:392): avc: denied { search } for pid=5542 comm="syz.3.197" name="/" dev="configfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 444.453872][ T31] audit: type=1400 audit(444.360:393): avc: denied { search } for pid=5542 comm="syz.3.197" name="/" dev="configfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 444.454241][ T31] audit: type=1400 audit(444.360:394): avc: denied { read open } for pid=5542 comm="syz.3.197" path="/" dev="configfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 469.501670][ T31] audit: type=1400 audit(469.410:395): avc: denied { wake_alarm } for pid=5562 comm="syz.3.203" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 478.764924][ T31] audit: type=1400 audit(478.670:396): avc: denied { create } for pid=5580 comm="syz.3.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 478.779140][ T31] audit: type=1400 audit(478.690:397): avc: denied { setopt } for pid=5580 comm="syz.3.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 484.981089][ T31] audit: type=1400 audit(484.890:398): avc: denied { bind } for pid=5583 comm="syz.3.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 491.338012][ T5610] vlan0: entered promiscuous mode [ 491.338203][ T5610] syz_tun: entered promiscuous mode [ 497.859779][ T5624] SELinux: policydb string length -1156312056 does not match expected length 8 [ 497.860519][ T5624] SELinux: failed to load policy [ 497.862922][ T31] audit: type=1400 audit(497.770:399): avc: denied { load_policy } for pid=5620 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 509.251128][ T31] audit: type=1400 audit(509.160:400): avc: denied { mount } for pid=5636 comm="syz.1.226" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 538.798529][ T5657] netlink: 24 bytes leftover after parsing attributes in process `syz.1.232'. [ 553.869713][ T5671] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 553.874318][ T5671] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 554.919174][ T5671] hsr_slave_0: entered promiscuous mode [ 554.920757][ T5671] hsr_slave_1: entered promiscuous mode [ 554.927665][ T5671] debugfs: 'hsr0' already exists in 'hsr' [ 554.927968][ T5671] Cannot create hsr debugfs directory [ 555.350135][ T5671] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 555.359617][ T5671] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 555.369082][ T5671] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 555.374870][ T5671] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 556.356867][ T5671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 560.621246][ T5671] veth0_vlan: entered promiscuous mode [ 560.658151][ T5671] veth1_vlan: entered promiscuous mode [ 560.727377][ T5671] veth0_macvtap: entered promiscuous mode [ 560.738818][ T5671] veth1_macvtap: entered promiscuous mode [ 560.807311][ T1049] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 560.807907][ T1049] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 560.808254][ T1049] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 560.808478][ T1049] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 561.092441][ T31] audit: type=1400 audit(561.000:401): avc: denied { mount } for pid=6023 comm="syz.4.233" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 561.324026][ T31] audit: type=1326 audit(561.230:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6025 comm="syz.4.234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.324314][ T31] audit: type=1326 audit(561.230:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6025 comm="syz.4.234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.324545][ T31] audit: type=1326 audit(561.230:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6025 comm="syz.4.234" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.324636][ T31] audit: type=1326 audit(561.230:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6025 comm="syz.4.234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.324667][ T31] audit: type=1326 audit(561.230:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6025 comm="syz.4.234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.334306][ T31] audit: type=1326 audit(561.240:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6025 comm="syz.4.234" exe="/syz-executor" sig=0 arch=40000028 syscall=161 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.334527][ T31] audit: type=1326 audit(561.240:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6025 comm="syz.4.234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.337464][ T31] audit: type=1326 audit(561.240:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6025 comm="syz.4.234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 585.369636][ T6034] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 585.375620][ T6034] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 587.107344][ T6034] hsr_slave_0: entered promiscuous mode [ 587.109009][ T6034] hsr_slave_1: entered promiscuous mode [ 587.113062][ T6034] debugfs: 'hsr0' already exists in 'hsr' [ 587.115352][ T6034] Cannot create hsr debugfs directory [ 587.711641][ T6034] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 587.729485][ T6034] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 587.749385][ T6034] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 587.780573][ T6034] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 589.104700][ T6034] 8021q: adding VLAN 0 to HW filter on device bond0 [ 593.867963][ T6034] veth0_vlan: entered promiscuous mode [ 593.889572][ T6034] veth1_vlan: entered promiscuous mode [ 593.977999][ T6034] veth0_macvtap: entered promiscuous mode [ 593.990904][ T6034] veth1_macvtap: entered promiscuous mode [ 594.091571][ T1049] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 594.093241][ T1049] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 594.094572][ T1049] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 594.095534][ T1049] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 594.596874][ T6386] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 594.598197][ T6386] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 595.053785][ T3794] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.117652][ T3794] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.181875][ T3794] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.234247][ T3794] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.478771][ T3794] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 595.488656][ T3794] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 595.500621][ T3794] bond0 (unregistering): Released all slaves [ 595.571052][ T3794] hsr_slave_0: left promiscuous mode [ 595.572625][ T3794] hsr_slave_1: left promiscuous mode [ 595.598350][ T3794] veth1_macvtap: left promiscuous mode [ 595.598711][ T3794] veth0_macvtap: left promiscuous mode [ 595.599198][ T3794] veth1_vlan: left promiscuous mode [ 595.599297][ T3794] veth0_vlan: left promiscuous mode [ 597.860094][ T6421] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 597.960838][ T6421] Zero length message leads to an empty skb [ 611.830081][ T6450] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 611.832967][ T6450] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 614.148367][ T6450] hsr_slave_0: entered promiscuous mode [ 614.149920][ T6450] hsr_slave_1: entered promiscuous mode [ 614.155092][ T6450] debugfs: 'hsr0' already exists in 'hsr' [ 614.159336][ T6450] Cannot create hsr debugfs directory [ 615.109228][ T6450] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 615.179199][ T6450] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 615.191136][ T6450] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 615.210266][ T6450] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 616.945669][ T6450] 8021q: adding VLAN 0 to HW filter on device bond0 [ 622.521290][ T6450] veth0_vlan: entered promiscuous mode [ 622.551468][ T6450] veth1_vlan: entered promiscuous mode [ 622.672092][ T6450] veth0_macvtap: entered promiscuous mode [ 622.692808][ T6450] veth1_macvtap: entered promiscuous mode [ 622.810267][ T1049] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 622.810773][ T1049] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 622.823157][ T1049] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 622.824950][ T1049] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 622.845746][ T6835] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=6835 comm=syz.5.245 [ 624.238833][ T6847] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=6847 comm=syz.5.249 [ 640.589009][ T1049] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 640.765785][ T1049] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 640.959461][ T1049] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 641.068891][ T1049] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 641.657119][ T1049] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 641.664547][ T1049] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 641.667350][ T1049] bond0 (unregistering): Released all slaves [ 641.839018][ T1049] hsr_slave_0: left promiscuous mode [ 641.841524][ T1049] hsr_slave_1: left promiscuous mode [ 641.870988][ T1049] veth1_macvtap: left promiscuous mode [ 641.871329][ T1049] veth0_macvtap: left promiscuous mode [ 641.871718][ T1049] veth1_vlan: left promiscuous mode [ 641.877960][ T1049] veth0_vlan: left promiscuous mode [ 656.838321][ T6912] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=6912 comm=syz.6.254 [ 678.405035][ T31] audit: type=1326 audit(678.310:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6978 comm="syz.6.261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 678.405226][ T31] audit: type=1326 audit(678.310:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6978 comm="syz.6.261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 678.412595][ T31] audit: type=1326 audit(678.320:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6978 comm="syz.6.261" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 678.423547][ T31] audit: type=1326 audit(678.330:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6978 comm="syz.6.261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 678.429528][ T31] audit: type=1326 audit(678.340:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6978 comm="syz.6.261" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 678.429908][ T31] audit: type=1326 audit(678.340:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6978 comm="syz.6.261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 678.430307][ T31] audit: type=1326 audit(678.340:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6978 comm="syz.6.261" exe="/syz-executor" sig=0 arch=40000028 syscall=363 compat=0 ip=0x132510 code=0x7ffc0000 [ 678.434803][ T31] audit: type=1326 audit(678.340:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6978 comm="syz.6.261" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef5d8 code=0x7ffc0000 [ 678.435286][ T31] audit: type=1326 audit(678.340:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6978 comm="syz.6.261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 678.441034][ T31] audit: type=1326 audit(678.350:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6978 comm="syz.6.261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 695.018924][ T1049] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 695.097538][ T1049] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 695.183286][ T1049] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 695.267666][ T1049] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 695.853999][ T1049] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 695.870525][ T1049] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 695.878961][ T1049] bond0 (unregistering): Released all slaves [ 695.949724][ T1049] hsr_slave_0: left promiscuous mode [ 695.951944][ T1049] hsr_slave_1: left promiscuous mode [ 695.978118][ T1049] veth1_macvtap: left promiscuous mode [ 695.979034][ T1049] veth0_macvtap: left promiscuous mode [ 695.979955][ T1049] veth1_vlan: left promiscuous mode [ 695.980779][ T1049] veth0_vlan: left promiscuous mode [ 701.972163][ T7061] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7061 comm=syz.6.266 [ 718.498159][ T7107] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 718.500368][ T7107] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 718.685790][ T7112] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7112 comm=syz.5.272 [ 720.160792][ T7131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7131 comm=syz.5.277 [ 720.386958][ T31] audit: type=1400 audit(720.290:420): avc: denied { create } for pid=7132 comm="syz.5.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 722.642906][ T31] audit: type=1400 audit(722.550:421): avc: denied { connect } for pid=7135 comm="syz.6.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 725.715895][ T7148] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7148 comm=syz.6.282 [ 726.660329][ T31] audit: type=1400 audit(726.570:422): avc: denied { execute } for pid=7155 comm="syz.6.285" dev="tmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 726.720957][ T31] audit: type=1400 audit(726.590:423): avc: denied { execute_no_trans } for pid=7155 comm="syz.6.285" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 727.519420][ T31] audit: type=1400 audit(727.420:424): avc: denied { read } for pid=7152 comm="syz.5.284" name="binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 727.520098][ T31] audit: type=1400 audit(727.430:425): avc: denied { open } for pid=7152 comm="syz.5.284" path="/dev/binderfs/binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 727.616687][ T31] audit: type=1400 audit(727.510:426): avc: denied { ioctl } for pid=7152 comm="syz.5.284" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 729.310381][ T31] audit: type=1107 audit(729.220:427): pid=7159 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 729.500435][ T7162] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7162 comm=syz.6.287 [ 730.990121][ T7176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7176 comm=syz.6.292 [ 734.419504][ T7187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7187 comm=syz.6.297 [ 747.416635][ T31] audit: type=1400 audit(747.310:428): avc: denied { create } for pid=7204 comm="syz.5.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 747.420461][ T31] audit: type=1400 audit(747.330:429): avc: denied { write } for pid=7204 comm="syz.5.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 748.009636][ T31] audit: type=1400 audit(747.920:430): avc: denied { name_bind } for pid=7204 comm="syz.5.301" src=1024 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 748.048265][ T7209] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 748.050906][ T7209] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 756.017334][ T7275] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7275 comm=syz.5.302 [ 759.081309][ T7299] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7299 comm=syz.6.307 [ 759.781848][ T7307] netlink: 28 bytes leftover after parsing attributes in process `syz.6.311'. [ 760.061178][ T7309] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7309 comm=syz.6.312 [ 760.573525][ T31] audit: type=1400 audit(760.480:431): avc: denied { bind } for pid=7313 comm="syz.6.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 760.577724][ T31] audit: type=1400 audit(760.490:432): avc: denied { listen } for pid=7313 comm="syz.6.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 764.877084][ T31] audit: type=1400 audit(764.770:433): avc: denied { write } for pid=7313 comm="syz.6.314" path="socket:[9339]" dev="sockfs" ino=9339 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 764.877524][ T31] audit: type=1400 audit(764.780:434): avc: denied { accept } for pid=7313 comm="syz.6.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 767.193527][ T7326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7326 comm=syz.6.317 [ 769.071985][ T31] audit: type=1326 audit(768.980:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7334 comm="syz.6.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 769.074229][ T31] audit: type=1326 audit(768.980:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7334 comm="syz.6.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 769.105738][ T31] audit: type=1326 audit(768.980:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7334 comm="syz.6.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 769.146789][ T31] audit: type=1326 audit(768.980:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7334 comm="syz.6.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 769.146914][ T31] audit: type=1326 audit(768.980:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7334 comm="syz.6.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 769.146960][ T31] audit: type=1326 audit(768.980:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7334 comm="syz.6.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 769.212062][ T31] audit: type=1326 audit(769.120:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7334 comm="syz.6.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 769.237305][ T31] audit: type=1326 audit(769.140:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7334 comm="syz.6.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 769.237800][ T31] audit: type=1326 audit(769.140:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7334 comm="syz.6.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 769.238022][ T31] audit: type=1326 audit(769.140:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7334 comm="syz.6.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 769.849128][ T7341] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7341 comm=syz.6.322 [ 779.537652][ T7353] netlink: 24 bytes leftover after parsing attributes in process `syz.6.326'. [ 788.371546][ T7355] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7355 comm=syz.6.327 [ 788.954390][ T7386] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7386 comm=syz.6.332 [ 790.749151][ T7399] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7399 comm=syz.6.337 [ 795.024488][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 795.024748][ T31] audit: type=1326 audit(794.930:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7406 comm="syz.6.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.030896][ T31] audit: type=1326 audit(794.940:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7406 comm="syz.6.340" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.035800][ T31] audit: type=1326 audit(794.940:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7406 comm="syz.6.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.039908][ T31] audit: type=1326 audit(794.950:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7406 comm="syz.6.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.057869][ T31] audit: type=1326 audit(794.950:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7406 comm="syz.6.340" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.058121][ T31] audit: type=1326 audit(794.960:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7406 comm="syz.6.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.058283][ T31] audit: type=1326 audit(794.960:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7406 comm="syz.6.340" exe="/syz-executor" sig=0 arch=40000028 syscall=97 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.058396][ T31] audit: type=1326 audit(794.960:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7406 comm="syz.6.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.070552][ T31] audit: type=1326 audit(794.960:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7406 comm="syz.6.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.302729][ T7411] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7411 comm=syz.6.342 [ 795.436578][ T31] audit: type=1400 audit(795.340:459): avc: denied { map } for pid=7412 comm="syz.6.343" path="socket:[9499]" dev="sockfs" ino=9499 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 795.715354][ T7417] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 795.717190][ T7417] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 796.164246][ T7427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7427 comm=syz.6.347 [ 800.576400][ T31] audit: type=1400 audit(800.470:460): avc: denied { mounton } for pid=7428 comm="syz.6.348" path="/syzcgroup/unified/syz6" dev="cgroup2" ino=231 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 800.653920][ T31] audit: type=1400 audit(800.560:461): avc: denied { bind } for pid=7428 comm="syz.6.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 806.452948][ T7433] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 806.528092][ T7433] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 809.060212][ T7433] hsr_slave_0: entered promiscuous mode [ 809.062033][ T7433] hsr_slave_1: entered promiscuous mode [ 809.571658][ T7433] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 809.583180][ T7433] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 809.594717][ T7433] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 809.605167][ T7433] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 810.790042][ T7433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 814.111841][ T31] audit: type=1326 audit(814.020:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 814.112180][ T31] audit: type=1326 audit(814.020:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 814.138211][ T31] audit: type=1326 audit(814.050:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.350" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 814.143059][ T31] audit: type=1326 audit(814.050:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 814.148778][ T31] audit: type=1326 audit(814.060:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 814.160679][ T31] audit: type=1326 audit(814.070:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.350" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 814.164436][ T31] audit: type=1326 audit(814.070:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 814.171189][ T31] audit: type=1326 audit(814.080:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.350" exe="/syz-executor" sig=0 arch=40000028 syscall=287 compat=0 ip=0x132510 code=0x7ffc0000 [ 814.172969][ T31] audit: type=1326 audit(814.080:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 814.188211][ T31] audit: type=1326 audit(814.100:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 816.643710][ T7433] veth0_vlan: entered promiscuous mode [ 816.680130][ T7433] veth1_vlan: entered promiscuous mode [ 816.928574][ T7433] veth0_macvtap: entered promiscuous mode [ 816.971679][ T7433] veth1_macvtap: entered promiscuous mode [ 817.091502][ T3794] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 817.091762][ T3794] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 817.091959][ T3794] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 817.092011][ T3794] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 818.515786][ T7796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7796 comm=syz.7.352 [ 823.847563][ T7806] netlink: 12 bytes leftover after parsing attributes in process `syz.7.356'. [ 825.545231][ T7808] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7808 comm=syz.7.357 [ 825.864717][ T31] audit: type=1400 audit(825.770:472): avc: denied { bind } for pid=7809 comm="syz.7.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 840.858230][ T7823] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 841.228163][ T7825] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7825 comm=syz.6.362 [ 849.547895][ T7836] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7836 comm=syz.7.367 [ 853.151676][ T7841] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 855.974478][ T31] audit: type=1326 audit(855.880:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7842 comm="syz.6.370" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 855.975679][ T31] audit: type=1326 audit(855.880:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7842 comm="syz.6.370" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 855.987826][ T31] audit: type=1326 audit(855.900:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7842 comm="syz.6.370" exe="/syz-executor" sig=0 arch=40000028 syscall=177 compat=0 ip=0x132510 code=0x7ffc0000 [ 855.989161][ T31] audit: type=1326 audit(855.900:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7842 comm="syz.6.370" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 856.358962][ T31] audit: type=1400 audit(856.270:477): avc: denied { getopt } for pid=7837 comm="syz.7.368" lport=37153 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 856.407156][ T31] audit: type=1400 audit(856.310:478): avc: denied { getopt } for pid=7837 comm="syz.7.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 856.767431][ T7849] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7849 comm=syz.6.372 [ 856.911471][ T31] audit: type=1400 audit(856.820:479): avc: denied { mounton } for pid=7850 comm="syz.6.373" path="/94/file0" dev="tmpfs" ino=495 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 859.949754][ T7855] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 859.950487][ T7855] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 860.630425][ T7861] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7861 comm=syz.7.377 [ 864.926544][ T7869] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 864.927502][ T7869] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 876.474084][ T7881] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7881 comm=syz.6.383 [ 877.109869][ T7885] binder: 7884:7885 ioctl 4018620d 0 returned -22 [ 877.152922][ T7885] binder: 7884:7885 ioctl c0306201 20000240 returned -11 [ 879.728371][ T1049] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 879.892821][ T1049] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 880.167978][ T1049] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 880.882412][ T1049] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 881.578748][ T1049] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 881.618184][ T1049] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 881.624862][ T1049] bond0 (unregistering): Released all slaves [ 881.802553][ T1049] hsr_slave_0: left promiscuous mode [ 881.804862][ T1049] hsr_slave_1: left promiscuous mode [ 881.817162][ T1049] veth1_macvtap: left promiscuous mode [ 881.817600][ T1049] veth0_macvtap: left promiscuous mode [ 881.818183][ T1049] veth1_vlan: left promiscuous mode [ 881.818342][ T1049] veth0_vlan: left promiscuous mode [ 893.328821][ T7928] netlink: 'syz.7.387': attribute type 4 has an invalid length. [ 903.627007][ T7949] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7949 comm=syz.6.388 [ 924.641721][ T7993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7993 comm=syz.6.393 [ 937.196831][ T8010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8010 comm=syz.6.398 [ 937.808034][ T8016] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 937.810952][ T8016] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 942.299434][ T8001] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 942.318347][ T8001] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 945.818199][ T8001] hsr_slave_0: entered promiscuous mode [ 945.837714][ T8001] hsr_slave_1: entered promiscuous mode [ 945.839685][ T8001] debugfs: 'hsr0' already exists in 'hsr' [ 945.846516][ T8001] Cannot create hsr debugfs directory [ 946.681135][ T8001] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 946.715207][ T8001] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 946.809684][ T8001] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 946.886839][ T8001] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 950.003931][ T8001] 8021q: adding VLAN 0 to HW filter on device bond0 [ 960.261200][ T8001] veth0_vlan: entered promiscuous mode [ 960.360390][ T8001] veth1_vlan: entered promiscuous mode [ 960.782426][ T8001] veth0_macvtap: entered promiscuous mode [ 960.830531][ T8001] veth1_macvtap: entered promiscuous mode [ 961.061380][ T3794] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.077495][ T3794] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.077809][ T3794] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.078421][ T3794] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 963.724231][ T8372] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 963.728849][ T8372] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 964.105046][ T8376] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8376 comm=syz.8.402 [ 964.488824][ T31] audit: type=1326 audit(964.400:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8377 comm="syz.8.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 964.489972][ T31] audit: type=1326 audit(964.400:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8377 comm="syz.8.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 964.504445][ T31] audit: type=1326 audit(964.410:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8377 comm="syz.8.403" exe="/syz-executor" sig=0 arch=40000028 syscall=151 compat=0 ip=0x132510 code=0x7ffc0000 [ 964.505823][ T31] audit: type=1326 audit(964.410:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8377 comm="syz.8.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 967.281039][ T8387] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8387 comm=syz.6.407 [ 969.289633][ T8400] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8400 comm=syz.6.412 [ 973.456960][ T8412] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8412 comm=syz.6.417 [ 993.533014][ T8453] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8453 comm=syz.8.422 [ 993.790404][ T8455] syzkaller1: entered promiscuous mode [ 994.042099][ T31] audit: type=1326 audit(993.950:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8460 comm="syz.8.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 994.047924][ T31] audit: type=1326 audit(993.960:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8460 comm="syz.8.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 994.051982][ T31] audit: type=1326 audit(993.960:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8460 comm="syz.8.424" exe="/syz-executor" sig=0 arch=40000028 syscall=434 compat=0 ip=0x132510 code=0x7ffc0000 [ 994.066736][ T31] audit: type=1326 audit(993.970:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8460 comm="syz.8.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 994.069369][ T31] audit: type=1326 audit(993.980:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8460 comm="syz.8.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1002.036410][ T31] audit: type=1400 audit(1001.940:489): avc: denied { setattr } for pid=8468 comm="syz.8.426" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1003.582113][ T8473] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8473 comm=syz.6.427 [ 1003.836743][ T8475] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1003.848116][ T8475] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1030.208417][ T3794] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.264100][ T3794] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.342237][ T3794] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.412896][ T3794] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.864901][ T3794] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1030.882895][ T3794] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1030.891939][ T3794] bond0 (unregistering): Released all slaves [ 1031.029884][ T3794] hsr_slave_0: left promiscuous mode [ 1031.033765][ T3794] hsr_slave_1: left promiscuous mode [ 1031.061877][ T3794] veth1_macvtap: left promiscuous mode [ 1031.062357][ T3794] veth0_macvtap: left promiscuous mode [ 1031.067159][ T3794] veth1_vlan: left promiscuous mode [ 1031.067691][ T3794] veth0_vlan: left promiscuous mode [ 1041.169128][ T8540] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8540 comm=syz.6.432 [ 1041.531013][ T31] audit: type=1400 audit(1041.440:490): avc: denied { module_load } for pid=8541 comm="syz.6.433" path="/sys/power/wakeup_count" dev="sysfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 1055.239780][ T8555] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1055.245672][ T8555] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1059.399884][ T8555] hsr_slave_0: entered promiscuous mode [ 1059.425371][ T8555] hsr_slave_1: entered promiscuous mode [ 1060.723192][ T8555] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 1060.769266][ T8555] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 1060.835263][ T8555] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 1060.909598][ T8555] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 1062.880968][ T8555] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1073.609819][ T8555] veth0_vlan: entered promiscuous mode [ 1073.660873][ T8555] veth1_vlan: entered promiscuous mode [ 1073.815139][ T8555] veth0_macvtap: entered promiscuous mode [ 1073.827232][ T8555] veth1_macvtap: entered promiscuous mode [ 1073.971803][ T3794] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1073.973382][ T3794] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1073.981867][ T3794] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1073.983864][ T3794] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1075.168616][ T8939] fuse: Invalid rootmode [ 1078.076730][ T8943] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8943 comm=syz.9.438 [ 1078.612490][ T8945] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1083.102605][ T31] audit: type=1400 audit(1083.010:491): avc: denied { create } for pid=8952 comm="syz.9.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1087.454591][ T8960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8960 comm=syz.9.444 [ 1102.840575][ T8965] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1102.878500][ T8965] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1106.468105][ T8965] hsr_slave_0: entered promiscuous mode [ 1106.470626][ T8965] hsr_slave_1: entered promiscuous mode [ 1106.473950][ T8965] debugfs: 'hsr0' already exists in 'hsr' [ 1106.474927][ T8965] Cannot create hsr debugfs directory [ 1107.722967][ T8965] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1107.762478][ T8965] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1107.810987][ T8965] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1107.843205][ T8965] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1111.303339][ T8965] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1127.359453][ T8965] veth0_vlan: entered promiscuous mode [ 1127.443852][ T8965] veth1_vlan: entered promiscuous mode [ 1127.700041][ T8965] veth0_macvtap: entered promiscuous mode [ 1127.751240][ T8965] veth1_macvtap: entered promiscuous mode [ 1128.291243][ T1049] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1128.291954][ T1049] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1128.292366][ T1049] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1128.292669][ T1049] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1143.915052][ T9368] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1143.953319][ T9368] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1148.609310][ T9368] hsr_slave_0: entered promiscuous mode [ 1148.610470][ T9368] hsr_slave_1: entered promiscuous mode [ 1148.618896][ T9368] debugfs: 'hsr0' already exists in 'hsr' [ 1148.619110][ T9368] Cannot create hsr debugfs directory [ 1150.914684][ T9368] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1150.975232][ T9368] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1151.048691][ T9368] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1151.063717][ T9368] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1154.682043][ T9368] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1171.088698][ T9368] veth0_vlan: entered promiscuous mode [ 1171.291303][ T9368] veth1_vlan: entered promiscuous mode [ 1171.484572][ T9368] veth0_macvtap: entered promiscuous mode [ 1171.529628][ T9368] veth1_macvtap: entered promiscuous mode [ 1171.761219][ T3794] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1171.761689][ T3794] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1171.762056][ T3794] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1171.762310][ T3794] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1176.381736][ T3794] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1176.589914][ T3794] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1177.498299][ T3794] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1178.140620][ T3794] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1179.023890][ T3794] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1179.032227][ T3794] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1179.068651][ T3794] bond0 (unregistering): Released all slaves [ 1179.249909][ T3794] hsr_slave_0: left promiscuous mode [ 1179.256357][ T3794] hsr_slave_1: left promiscuous mode [ 1179.288507][ T3794] veth1_macvtap: left promiscuous mode [ 1179.289508][ T3794] veth0_macvtap: left promiscuous mode [ 1179.292398][ T3794] veth1_vlan: left promiscuous mode [ 1179.295059][ T3794] veth0_vlan: left promiscuous mode [ 1188.598477][ T9965] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=9965 comm=syz.2.454 [ 1189.507961][ T9971] netlink: 4 bytes leftover after parsing attributes in process `syz.2.455'. [ 1189.547154][ T9971] netlink: 12 bytes leftover after parsing attributes in process `syz.2.455'. [ 1190.795293][ T9800] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1190.841493][ T9800] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1191.135461][ T31] audit: type=1326 audit(1191.040:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10013 comm="syz.2.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1191.158514][ T31] audit: type=1326 audit(1191.060:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10013 comm="syz.2.456" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132510 code=0x7ffc0000 [ 1191.184079][ T31] audit: type=1326 audit(1191.090:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10013 comm="syz.2.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1191.184412][ T31] audit: type=1326 audit(1191.090:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10013 comm="syz.2.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1191.184793][ T31] audit: type=1326 audit(1191.090:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10013 comm="syz.2.456" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x134bcc code=0x7ffc0000 [ 1191.184999][ T31] audit: type=1326 audit(1191.090:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10013 comm="syz.2.456" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x1349a8 code=0x7ffc0000 [ 1191.408558][ T3794] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1191.503666][ T31] audit: type=1326 audit(1191.410:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10013 comm="syz.2.456" exe="/syz-executor" sig=0 arch=40000028 syscall=291 compat=0 ip=0x1348c8 code=0x7ffc0000 [ 1191.504320][ T31] audit: type=1326 audit(1191.410:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10013 comm="syz.2.456" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x130a24 code=0x7ffc0000 [ 1191.512413][ T31] audit: type=1326 audit(1191.420:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10013 comm="syz.2.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1191.549266][ T31] audit: type=1326 audit(1191.450:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10013 comm="syz.2.456" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132510 code=0x7ffc0000 [ 1191.550208][ T3794] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1191.818456][ T3794] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1191.907683][ T3794] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1192.990285][ T3794] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1193.210431][ T3794] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1193.221307][ T3794] bond0 (unregistering): Released all slaves [ 1193.646716][ T3794] hsr_slave_0: left promiscuous mode [ 1193.657361][ T3794] hsr_slave_1: left promiscuous mode [ 1193.677292][ T3794] veth1_macvtap: left promiscuous mode [ 1193.677784][ T3794] veth0_macvtap: left promiscuous mode [ 1193.678290][ T3794] veth1_vlan: left promiscuous mode [ 1193.678444][ T3794] veth0_vlan: left promiscuous mode [ 1198.855448][ T9800] hsr_slave_0: entered promiscuous mode [ 1198.887689][ T9800] hsr_slave_1: entered promiscuous mode [ 1198.888440][ T9800] debugfs: 'hsr0' already exists in 'hsr' [ 1198.888585][ T9800] Cannot create hsr debugfs directory [ 1201.303233][ T9800] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1201.336966][ T9800] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1201.383077][ T9800] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1201.417927][ T9800] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1204.981219][ T9800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1216.228883][ T9800] veth0_vlan: entered promiscuous mode [ 1216.307346][ T9800] veth1_vlan: entered promiscuous mode [ 1216.620833][ T9800] veth0_macvtap: entered promiscuous mode [ 1216.682802][ T9800] veth1_macvtap: entered promiscuous mode [ 1217.066616][ T3794] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1217.071103][ T3794] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1217.073188][ T3794] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1217.176520][ T3794] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1218.368046][T10302] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10302 comm=syz.3.458 [ 1218.790595][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 1218.815343][ T31] audit: type=1326 audit(1218.700:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10303 comm="syz.3.459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1218.857379][ T31] audit: type=1326 audit(1218.700:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10303 comm="syz.3.459" exe="/syz-executor" sig=0 arch=40000028 syscall=122 compat=0 ip=0x132510 code=0x7ffc0000 [ 1218.861042][ T31] audit: type=1326 audit(1218.700:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10303 comm="syz.3.459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1218.864526][ T31] audit: type=1326 audit(1218.720:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10303 comm="syz.3.459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1220.321583][ T31] audit: type=1326 audit(1220.230:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10309 comm="syz.3.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1220.331018][ T31] audit: type=1326 audit(1220.240:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10309 comm="syz.3.461" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1220.339528][ T31] audit: type=1326 audit(1220.250:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10309 comm="syz.3.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1220.345649][ T31] audit: type=1326 audit(1220.250:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10309 comm="syz.3.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1220.452267][ T31] audit: type=1326 audit(1220.360:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10309 comm="syz.3.461" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1220.471614][ T31] audit: type=1326 audit(1220.380:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10309 comm="syz.3.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1220.958750][T10313] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1220.960930][T10313] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1221.545013][T10318] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10318 comm=syz.3.463 [ 1223.967180][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 1224.047016][ T31] audit: type=1326 audit(1223.830:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10328 comm="syz.3.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1224.047383][ T31] audit: type=1326 audit(1223.830:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10328 comm="syz.3.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1224.047588][ T31] audit: type=1326 audit(1223.830:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10328 comm="syz.3.465" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1224.047661][ T31] audit: type=1326 audit(1223.830:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10328 comm="syz.3.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1224.047707][ T31] audit: type=1326 audit(1223.830:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10328 comm="syz.3.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1224.136725][ T31] audit: type=1326 audit(1223.880:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10328 comm="syz.3.465" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1224.464594][ T31] audit: type=1326 audit(1224.360:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10328 comm="syz.3.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1224.465202][ T31] audit: type=1326 audit(1224.360:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10328 comm="syz.3.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1224.465614][ T31] audit: type=1326 audit(1224.370:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10328 comm="syz.3.465" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1224.496570][ T31] audit: type=1326 audit(1224.400:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10328 comm="syz.3.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1226.450376][T10341] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10341 comm=syz.3.468 [ 1231.659057][T10364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10364 comm=syz.2.473 [ 1232.847392][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 1232.847826][ T31] audit: type=1326 audit(1232.710:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10365 comm="syz.2.474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1232.848202][ T31] audit: type=1326 audit(1232.750:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10365 comm="syz.2.474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1232.862252][ T31] audit: type=1326 audit(1232.770:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10365 comm="syz.2.474" exe="/syz-executor" sig=0 arch=40000028 syscall=232 compat=0 ip=0x132510 code=0x7ffc0000 [ 1232.866714][ T31] audit: type=1326 audit(1232.770:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10365 comm="syz.2.474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1232.991958][ T31] audit: type=1326 audit(1232.900:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10365 comm="syz.2.474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1233.738201][T10372] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=10372 comm=syz.2.475 [ 1233.758137][T10372] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=10372 comm=syz.2.475 [ 1269.312193][ T31] audit: type=1326 audit(1269.220:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10435 comm="syz.3.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1269.314371][ T31] audit: type=1326 audit(1269.220:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10435 comm="syz.3.477" exe="/syz-executor" sig=0 arch=40000028 syscall=152 compat=0 ip=0x132510 code=0x7ffc0000 [ 1269.322059][ T31] audit: type=1326 audit(1269.230:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10435 comm="syz.3.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1269.325310][ T31] audit: type=1326 audit(1269.230:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10435 comm="syz.3.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1270.692168][ T31] audit: type=1326 audit(1270.570:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10435 comm="syz.3.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7fc00000 [ 1271.186454][T10445] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10445 comm=syz.3.478 [ 1283.690237][T10523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10523 comm=syz.3.483 [ 1284.057836][T10561] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1284.063712][T10561] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1284.167620][T10561] wireguard0: entered promiscuous mode [ 1284.169515][T10561] wireguard0: entered allmulticast mode [ 1284.324605][T10561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10561 comm=syz.3.484 [ 1286.396768][ T31] audit: type=1326 audit(1286.300:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10636 comm="syz.3.486" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1286.400952][ T31] audit: type=1326 audit(1286.310:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10636 comm="syz.3.486" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1286.401608][ T31] audit: type=1326 audit(1286.310:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10636 comm="syz.3.486" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x132510 code=0x7ffc0000 [ 1286.401859][ T31] audit: type=1326 audit(1286.310:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10636 comm="syz.3.486" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1286.402074][ T31] audit: type=1326 audit(1286.310:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10636 comm="syz.3.486" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1286.426985][ T31] audit: type=1326 audit(1286.330:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10636 comm="syz.3.486" exe="/syz-executor" sig=0 arch=40000028 syscall=429 compat=0 ip=0x132510 code=0x7ffc0000 [ 1286.430888][ T31] audit: type=1326 audit(1286.340:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10636 comm="syz.3.486" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1286.448706][ T31] audit: type=1326 audit(1286.360:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10636 comm="syz.3.486" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1287.570865][T10655] binfmt_misc: register: failed to install interpreter file ./file2 [ 1287.642678][T10469] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1287.670096][T10469] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1291.359540][T10469] hsr_slave_0: entered promiscuous mode [ 1291.373741][T10469] hsr_slave_1: entered promiscuous mode [ 1291.377100][T10469] debugfs: 'hsr0' already exists in 'hsr' [ 1291.379668][T10469] Cannot create hsr debugfs directory [ 1293.254924][T10469] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1293.293925][T10469] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1293.341925][T10469] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1293.365002][T10469] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1296.110223][T10469] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1305.665187][ T31] audit: type=1400 audit(1305.570:571): avc: denied { watch_reads } for pid=10932 comm="syz.3.497" path="/34/file0" dev="tmpfs" ino=192 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1311.789064][T10469] veth0_vlan: entered promiscuous mode [ 1311.881487][T10469] veth1_vlan: entered promiscuous mode [ 1312.111702][T10469] veth0_macvtap: entered promiscuous mode [ 1312.143573][T10469] veth1_macvtap: entered promiscuous mode [ 1312.299855][ T3794] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1312.301256][ T3794] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1312.301573][ T3794] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1312.301826][ T3794] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1363.367903][ T31] audit: type=1400 audit(1363.270:572): avc: denied { create } for pid=11100 comm="syz.3.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1398.125773][ T31] audit: type=1400 audit(1398.030:573): avc: denied { name_bind } for pid=11185 comm="syz.3.516" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1398.502877][ T31] audit: type=1400 audit(1398.410:574): avc: denied { watch watch_reads } for pid=11188 comm="syz.3.517" path="/50/file0" dev="tmpfs" ino=275 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1453.777612][ T8936] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1453.901866][ T8936] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1453.988870][ T8936] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1454.072651][ T8936] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1454.649601][ T8936] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1454.669388][ T8936] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1454.707169][ T8936] bond0 (unregistering): Released all slaves [ 1454.833518][ T8936] hsr_slave_0: left promiscuous mode [ 1454.845074][ T8936] hsr_slave_1: left promiscuous mode [ 1454.875003][ T8936] veth1_macvtap: left promiscuous mode [ 1454.888611][ T8936] veth0_macvtap: left promiscuous mode [ 1454.890099][ T8936] veth1_vlan: left promiscuous mode [ 1454.891325][ T8936] veth0_vlan: left promiscuous mode [ 1475.786582][T11307] block device autoloading is deprecated and will be removed. [ 1478.874906][ T31] audit: type=1400 audit(1478.780:575): avc: denied { set_context_mgr } for pid=11312 comm="syz.3.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1478.910142][ T31] audit: type=1400 audit(1478.820:576): avc: denied { map } for pid=11312 comm="syz.3.528" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1478.941500][ T31] audit: type=1400 audit(1478.850:577): avc: denied { call } for pid=11312 comm="syz.3.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1484.405269][ T31] audit: type=1326 audit(1484.310:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11331 comm="syz.3.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1484.428444][ T31] audit: type=1326 audit(1484.340:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11331 comm="syz.3.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1484.432710][ T31] audit: type=1326 audit(1484.340:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11331 comm="syz.3.532" exe="/syz-executor" sig=0 arch=40000028 syscall=245 compat=0 ip=0x132510 code=0x7ffc0000 [ 1484.432922][ T31] audit: type=1326 audit(1484.340:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11331 comm="syz.3.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1484.433026][ T31] audit: type=1326 audit(1484.340:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11331 comm="syz.3.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1509.895457][ T31] audit: type=1400 audit(1509.800:583): avc: denied { write } for pid=11372 comm="syz.1.540" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1515.457805][T11382] netlink: 20 bytes leftover after parsing attributes in process `syz.1.541'. [ 1515.906368][T11176] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 1516.492634][T11176] usb 2-1: unable to get BOS descriptor or descriptor too short [ 1516.890655][T11176] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1516.893711][T11176] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1517.181099][T11176] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1517.181414][T11176] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1517.181556][T11176] usb 2-1: Product: syz [ 1517.181664][T11176] usb 2-1: Manufacturer: syz [ 1517.181859][T11176] usb 2-1: SerialNumber: syz [ 1519.307102][ T31] audit: type=1400 audit(1519.210:584): avc: denied { connect } for pid=11380 comm="syz.3.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1521.196225][ T31] audit: type=1326 audit(1521.090:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11389 comm="syz.3.544" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1521.217039][ T31] audit: type=1326 audit(1521.100:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11389 comm="syz.3.544" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1521.217537][ T31] audit: type=1326 audit(1521.100:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11389 comm="syz.3.544" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1521.217796][ T31] audit: type=1326 audit(1521.100:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11389 comm="syz.3.544" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1521.218075][ T31] audit: type=1326 audit(1521.100:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11389 comm="syz.3.544" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1521.218311][ T31] audit: type=1326 audit(1521.100:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11389 comm="syz.3.544" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1521.218518][ T31] audit: type=1326 audit(1521.100:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11389 comm="syz.3.544" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1521.218770][ T31] audit: type=1326 audit(1521.110:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11389 comm="syz.3.544" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1521.219066][ T31] audit: type=1326 audit(1521.120:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11389 comm="syz.3.544" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1522.517163][T11176] usb 2-1: 0:2 : does not exist [ 1525.433135][T11182] usb 2-1: USB disconnect, device number 6 [ 1527.749639][T11415] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1538.888019][T11420] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 1539.446426][T11182] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 1539.604140][T11182] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1539.604538][T11182] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1539.604910][T11182] usb 2-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.00 [ 1539.605090][T11182] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1539.620651][T11182] usb 2-1: config 0 descriptor?? [ 1540.182593][T11182] cm6533_jd 0003:0D8C:0022.0003: unknown main item tag 0x0 [ 1540.182992][T11182] cm6533_jd 0003:0D8C:0022.0003: unknown main item tag 0x0 [ 1540.183365][T11182] cm6533_jd 0003:0D8C:0022.0003: unknown main item tag 0x0 [ 1540.183622][T11182] cm6533_jd 0003:0D8C:0022.0003: unknown main item tag 0x0 [ 1540.183738][T11182] cm6533_jd 0003:0D8C:0022.0003: unknown main item tag 0x0 [ 1540.208757][T11182] cm6533_jd 0003:0D8C:0022.0003: hiddev0,hidraw0: USB HID v0.00 Device [HID 0d8c:0022] on usb-dummy_hcd.1-1/input0 [ 1540.471139][T11182] usb 2-1: USB disconnect, device number 7 [ 1547.648863][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 1547.649301][ T31] audit: type=1400 audit(1547.550:608): avc: denied { ioctl } for pid=11467 comm="syz.3.559" path="socket:[14683]" dev="sockfs" ino=14683 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1611.562349][T11515] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1611.579695][T11515] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1614.808995][T11515] hsr_slave_0: entered promiscuous mode [ 1614.810439][T11515] hsr_slave_1: entered promiscuous mode [ 1614.811039][T11515] debugfs: 'hsr0' already exists in 'hsr' [ 1614.811307][T11515] Cannot create hsr debugfs directory [ 1617.132628][T11515] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1617.151272][T11515] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1617.171157][T11515] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1617.181937][T11515] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1620.771964][T11515] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1630.540291][ T31] audit: type=1326 audit(1630.440:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11901 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1630.540731][ T31] audit: type=1326 audit(1630.440:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11901 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1630.571489][ T31] audit: type=1326 audit(1630.470:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11901 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132510 code=0x7ffc0000 [ 1630.600385][ T31] audit: type=1326 audit(1630.510:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11901 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132548 code=0x7ffc0000 [ 1630.716608][ T31] audit: type=1326 audit(1630.610:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11901 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132548 code=0x7ffc0000 [ 1630.749916][ T31] audit: type=1326 audit(1630.650:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11901 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1630.796418][ T31] audit: type=1326 audit(1630.700:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11901 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1635.746844][T11515] veth0_vlan: entered promiscuous mode [ 1636.027080][T11515] veth1_vlan: entered promiscuous mode [ 1637.195210][T11515] veth0_macvtap: entered promiscuous mode [ 1637.238745][T11515] veth1_macvtap: entered promiscuous mode [ 1637.457453][ T1049] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1637.458389][ T1049] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1637.473416][ T1049] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1637.473941][ T1049] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1643.716524][ T31] audit: type=1326 audit(1643.610:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11949 comm="syz.4.577" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1643.756558][ T31] audit: type=1326 audit(1643.630:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11949 comm="syz.4.577" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x132510 code=0x7ffc0000 [ 1643.776227][ T31] audit: type=1326 audit(1643.630:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11949 comm="syz.4.577" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1643.777850][ T31] audit: type=1326 audit(1643.650:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11949 comm="syz.4.577" exe="/syz-executor" sig=0 arch=40000028 syscall=261 compat=0 ip=0x132510 code=0x7ffc0000 [ 1643.782752][ T31] audit: type=1326 audit(1643.650:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11949 comm="syz.4.577" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1644.432591][ T31] audit: type=1326 audit(1644.340:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11953 comm="syz.4.578" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x0 [ 1647.192416][ T31] audit: type=1326 audit(1647.100:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11960 comm="syz.4.579" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1647.209240][ T31] audit: type=1326 audit(1647.120:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11960 comm="syz.4.579" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1647.209655][ T31] audit: type=1326 audit(1647.120:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11960 comm="syz.4.579" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1647.209954][ T31] audit: type=1326 audit(1647.120:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11960 comm="syz.4.579" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1648.297252][T11968] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1648.298491][T11968] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1651.152210][T11999] netlink: 200 bytes leftover after parsing attributes in process `syz.4.583'. [ 1703.582122][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 1703.582535][ T31] audit: type=1326 audit(1703.929:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12036 comm="syz.1.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1703.588073][ T31] audit: type=1326 audit(1703.929:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12036 comm="syz.1.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1703.595368][ T31] audit: type=1326 audit(1703.939:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12036 comm="syz.1.588" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1703.597428][ T31] audit: type=1326 audit(1703.939:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12036 comm="syz.1.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1703.599226][ T31] audit: type=1326 audit(1703.939:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12036 comm="syz.1.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1703.688259][ T31] audit: type=1326 audit(1704.030:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12036 comm="syz.1.588" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1703.692109][ T31] audit: type=1326 audit(1704.030:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12036 comm="syz.1.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1703.693816][ T31] audit: type=1326 audit(1704.030:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12036 comm="syz.1.588" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1703.695423][ T31] audit: type=1326 audit(1704.030:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12036 comm="syz.1.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1703.772647][ T31] audit: type=1326 audit(1704.110:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12036 comm="syz.1.588" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1715.645104][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 1715.646293][ T31] audit: type=1326 audit(1716.020:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12042 comm="syz.4.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1715.651869][ T31] audit: type=1326 audit(1716.020:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12042 comm="syz.4.590" exe="/syz-executor" sig=0 arch=40000028 syscall=164 compat=0 ip=0x132510 code=0x7ffc0000 [ 1715.652195][ T31] audit: type=1326 audit(1716.030:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12042 comm="syz.4.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1715.680509][ T31] audit: type=1326 audit(1716.040:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12042 comm="syz.4.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1716.814184][ T3794] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1717.128046][ T3794] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1717.263556][ T3794] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1717.326634][ T3794] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1719.232581][ T3794] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1719.258866][ T3794] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1719.262920][ T3794] bond0 (unregistering): Released all slaves [ 1719.368616][ T3794] hsr_slave_0: left promiscuous mode [ 1719.382680][ T3794] hsr_slave_1: left promiscuous mode [ 1719.445250][ T3794] veth1_macvtap: left promiscuous mode [ 1719.445682][ T3794] veth0_macvtap: left promiscuous mode [ 1719.446214][ T3794] veth1_vlan: left promiscuous mode [ 1719.446612][ T3794] veth0_vlan: left promiscuous mode [ 1720.036814][ T31] audit: type=1400 audit(1720.416:669): avc: denied { mounton } for pid=12067 comm="syz.4.596" path="/proc/47/net/netfilter" dev="proc" ino=4026533281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=dir permissive=1 [ 1723.935965][ T31] audit: type=1326 audit(1724.310:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12078 comm="syz.4.599" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1723.961369][ T31] audit: type=1326 audit(1724.340:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12078 comm="syz.4.599" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1723.964392][ T31] audit: type=1326 audit(1724.340:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12078 comm="syz.4.599" exe="/syz-executor" sig=0 arch=40000028 syscall=443 compat=0 ip=0x132510 code=0x7ffc0000 [ 1723.964528][ T31] audit: type=1326 audit(1724.340:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12078 comm="syz.4.599" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1723.964570][ T31] audit: type=1326 audit(1724.340:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12078 comm="syz.4.599" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1779.639461][T12167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1779.700982][T12167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1783.857426][T12167] hsr_slave_0: entered promiscuous mode [ 1783.866403][T12167] hsr_slave_1: entered promiscuous mode [ 1783.869035][T12167] debugfs: 'hsr0' already exists in 'hsr' [ 1783.870723][T12167] Cannot create hsr debugfs directory [ 1785.653573][T12167] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1785.698172][T12167] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1785.737217][T12167] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1785.758024][T12167] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1788.823206][T12167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1804.018830][T12523] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1804.088460][T12523] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1806.107879][T12167] veth0_vlan: entered promiscuous mode [ 1806.189834][T12167] veth1_vlan: entered promiscuous mode [ 1806.557773][T12167] veth0_macvtap: entered promiscuous mode [ 1806.643666][T12167] veth1_macvtap: entered promiscuous mode [ 1807.025240][ T3794] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1807.027349][ T3794] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1807.039175][ T3794] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1807.041720][ T3794] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1809.609735][T12523] hsr_slave_0: entered promiscuous mode [ 1809.645987][T12523] hsr_slave_1: entered promiscuous mode [ 1809.657277][T12523] debugfs: 'hsr0' already exists in 'hsr' [ 1809.658856][T12523] Cannot create hsr debugfs directory [ 1811.838736][T12875] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1814.020406][T12523] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1814.046414][T12523] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1814.083486][T12523] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1814.138726][T12523] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1821.787064][T12523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1824.627237][ T31] audit: type=1326 audit(1825.025:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12928 comm="syz.5.611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1824.662131][ T31] audit: type=1326 audit(1825.055:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12928 comm="syz.5.611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1824.662654][ T31] audit: type=1326 audit(1825.055:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12928 comm="syz.5.611" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x130198 code=0x7ffc0000 [ 1824.663108][ T31] audit: type=1326 audit(1825.055:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12928 comm="syz.5.611" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x130198 code=0x7ffc0000 [ 1824.663370][ T31] audit: type=1326 audit(1825.055:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12928 comm="syz.5.611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1824.699541][ T31] audit: type=1326 audit(1825.095:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12928 comm="syz.5.611" exe="/syz-executor" sig=0 arch=40000028 syscall=217 compat=0 ip=0x132510 code=0x7ffc0000 [ 1824.706035][ T31] audit: type=1326 audit(1825.095:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12928 comm="syz.5.611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1828.394878][ T31] audit: type=1400 audit(1828.785:682): avc: denied { write } for pid=12947 comm="syz.5.614" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1842.145244][T12523] veth0_vlan: entered promiscuous mode [ 1842.182797][T12523] veth1_vlan: entered promiscuous mode [ 1842.362686][T12523] veth0_macvtap: entered promiscuous mode [ 1842.444891][T12523] veth1_macvtap: entered promiscuous mode [ 1842.634644][ T3794] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1842.635000][ T3794] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1842.635400][ T3794] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1842.635593][ T3794] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1861.155764][T13045] binder: 13042:13045 ioctl c0306201 200004c0 returned -14 [ 1863.142819][ T31] audit: type=1326 audit(1863.535:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13050 comm="syz.7.624" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1863.156326][ T31] audit: type=1326 audit(1863.555:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13050 comm="syz.7.624" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1863.258821][ T31] audit: type=1326 audit(1863.655:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13050 comm="syz.7.624" exe="/syz-executor" sig=0 arch=40000028 syscall=152 compat=0 ip=0x132510 code=0x7ffc0000 [ 1863.286811][ T31] audit: type=1326 audit(1863.655:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13050 comm="syz.7.624" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1863.287041][ T31] audit: type=1326 audit(1863.685:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13050 comm="syz.7.624" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1891.836488][ T3794] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1892.165475][ T3794] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1892.378968][ T3794] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1892.746373][ T3794] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1893.836246][ T3794] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1893.886334][ T3794] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1893.891167][ T3794] bond0 (unregistering): Released all slaves [ 1894.135223][ T3794] hsr_slave_0: left promiscuous mode [ 1894.155639][ T3794] hsr_slave_1: left promiscuous mode [ 1894.235414][ T3794] veth1_macvtap: left promiscuous mode [ 1894.235849][ T3794] veth0_macvtap: left promiscuous mode [ 1894.236389][ T3794] veth1_vlan: left promiscuous mode [ 1894.236772][ T3794] veth0_vlan: left promiscuous mode [ 1899.966183][T13111] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1899.977648][T13111] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1903.146723][T13111] hsr_slave_0: entered promiscuous mode [ 1903.158010][T13111] hsr_slave_1: entered promiscuous mode [ 1903.175439][T13111] debugfs: 'hsr0' already exists in 'hsr' [ 1903.175731][T13111] Cannot create hsr debugfs directory [ 1905.330428][T13111] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1905.506198][T13111] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1905.546165][T13111] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1905.622149][T13111] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1909.652913][T13111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1915.437395][ T31] audit: type=1400 audit(1915.825:688): avc: denied { mounton } for pid=13490 comm="syz.7.633" path="/proc/41/task" dev="proc" ino=17977 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1919.215714][T13534] netlink: 'syz.7.635': attribute type 12 has an invalid length. [ 1930.789435][T13111] veth0_vlan: entered promiscuous mode [ 1930.921858][T13111] veth1_vlan: entered promiscuous mode [ 1931.419904][T13111] veth0_macvtap: entered promiscuous mode [ 1931.478844][T13111] veth1_macvtap: entered promiscuous mode [ 1931.838594][ T3794] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1931.838984][ T3794] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1931.839352][ T3794] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1931.839973][ T3794] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1941.222575][ T31] audit: type=1400 audit(1941.605:689): avc: denied { setopt } for pid=13628 comm="syz.8.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1944.594222][ T31] audit: type=1326 audit(1944.975:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13642 comm="syz.8.643" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1944.606967][ T31] audit: type=1326 audit(1945.005:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13642 comm="syz.8.643" exe="/syz-executor" sig=0 arch=40000028 syscall=184 compat=0 ip=0x132510 code=0x7ffc0000 [ 1944.617890][T13643] capability: warning: `syz.8.643' uses 32-bit capabilities (legacy support in use) [ 1944.619951][ T31] audit: type=1326 audit(1945.015:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13642 comm="syz.8.643" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1944.621736][ T31] audit: type=1326 audit(1945.015:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13642 comm="syz.8.643" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1945.899455][T13647] netlink: 4 bytes leftover after parsing attributes in process `syz.8.644'. [ 1972.782800][ T31] audit: type=1326 audit(1973.155:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13717 comm="syz.8.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1972.814650][ T31] audit: type=1326 audit(1973.155:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13717 comm="syz.8.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1972.815227][ T31] audit: type=1326 audit(1973.175:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13717 comm="syz.8.653" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1972.815514][ T31] audit: type=1326 audit(1973.175:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13717 comm="syz.8.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1972.815736][ T31] audit: type=1326 audit(1973.175:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13717 comm="syz.8.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1972.815952][ T31] audit: type=1326 audit(1973.195:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13717 comm="syz.8.653" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 1972.816222][ T31] audit: type=1326 audit(1973.195:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13717 comm="syz.8.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1972.816463][ T31] audit: type=1326 audit(1973.195:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13717 comm="syz.8.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1972.845064][ T31] audit: type=1326 audit(1973.225:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13717 comm="syz.8.653" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132510 code=0x7ffc0000 [ 1972.845575][ T31] audit: type=1326 audit(1973.225:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13717 comm="syz.8.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1975.005198][T13728] netlink: 4 bytes leftover after parsing attributes in process `syz.8.654'. [ 1983.416993][ T3794] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1983.515947][ T3794] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1983.663291][ T3794] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1984.361407][ T3794] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1985.319357][ T3794] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1985.344770][ T3794] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1985.443010][ T3794] bond0 (unregistering): Released all slaves [ 1985.595440][ T3794] hsr_slave_0: left promiscuous mode [ 1985.613807][ T3794] hsr_slave_1: left promiscuous mode [ 1985.660327][ T3794] veth1_macvtap: left promiscuous mode [ 1985.661608][ T3794] veth0_macvtap: left promiscuous mode [ 1985.666824][ T3794] veth1_vlan: left promiscuous mode [ 1985.699436][ T3794] veth0_vlan: left promiscuous mode [ 2001.876950][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 2001.877504][ T31] audit: type=1326 audit(2002.255:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13830 comm="syz.7.661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2001.884457][ T31] audit: type=1326 audit(2002.275:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13830 comm="syz.7.661" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 2001.918831][ T31] audit: type=1326 audit(2002.295:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13830 comm="syz.7.661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2001.922244][ T31] audit: type=1326 audit(2002.305:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13830 comm="syz.7.661" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 2001.954751][ T31] audit: type=1326 audit(2002.305:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13830 comm="syz.7.661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2001.961023][ T31] audit: type=1326 audit(2002.315:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13830 comm="syz.7.661" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 2002.034896][ T31] audit: type=1326 audit(2002.315:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13830 comm="syz.7.661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2002.038737][ T31] audit: type=1326 audit(2002.345:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13830 comm="syz.7.661" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132510 code=0x7ffc0000 [ 2002.043451][ T31] audit: type=1326 audit(2002.345:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13830 comm="syz.7.661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2002.046863][ T31] audit: type=1326 audit(2002.355:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13830 comm="syz.7.661" exe="/syz-executor" sig=0 arch=40000028 syscall=391 compat=0 ip=0x132510 code=0x7ffc0000 [ 2007.378297][T13852] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13852 comm=syz.7.664 [ 2011.507755][ T3794] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2011.971928][ T3794] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2012.118539][ T3794] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2012.189162][ T3794] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2013.133307][ T3794] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2013.161800][ T3794] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2013.197216][ T3794] bond0 (unregistering): Released all slaves [ 2013.553653][ T3794] hsr_slave_0: left promiscuous mode [ 2013.560856][ T3794] hsr_slave_1: left promiscuous mode [ 2013.606063][ T3794] veth1_macvtap: left promiscuous mode [ 2013.607065][ T3794] veth0_macvtap: left promiscuous mode [ 2013.611159][ T3794] veth1_vlan: left promiscuous mode [ 2013.612600][ T3794] veth0_vlan: left promiscuous mode [ 2026.898359][T13952] serio: Serial port ptm0 [ 2042.992602][T14015] input: syz0 as /devices/virtual/input/input12 [ 2047.431742][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 2047.432179][ T31] audit: type=1326 audit(2047.825:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14034 comm="syz.8.681" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2047.464195][ T31] audit: type=1326 audit(2047.855:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14034 comm="syz.8.681" exe="/syz-executor" sig=0 arch=40000028 syscall=70 compat=0 ip=0x132510 code=0x7ffc0000 [ 2047.515167][ T31] audit: type=1326 audit(2047.895:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14034 comm="syz.8.681" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2047.515585][ T31] audit: type=1326 audit(2047.895:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14034 comm="syz.8.681" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2049.414783][T14051] input: syz1 as /devices/virtual/input/input13 [ 2088.406331][ T32] INFO: task kworker/0:11:3927 blocked for more than 430 seconds. [ 2088.407104][ T32] Not tainted syzkaller #0 [ 2088.407494][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2088.407893][ T32] task:kworker/0:11 state:D stack:0 pid:3927 tgid:3927 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2088.408696][ T32] Workqueue: events bpf_prog_free_deferred [ 2088.410049][ T32] Call trace: [ 2088.410633][ T32] [<81a39174>] (__schedule) from [<81a3a108>] (schedule+0x2c/0x130) [ 2088.411250][ T32] r10:dfa15d84 r9:00000002 r8:60000113 r7:82917120 r6:dfa15d8c r5:84158000 [ 2088.411517][ T32] r4:84158000 [ 2088.411737][ T32] [<81a3a0dc>] (schedule) from [<81a3a4f0>] (schedule_preempt_disabled+0x18/0x24) [ 2088.411955][ T32] r5:84158000 r4:8291711c [ 2088.412094][ T32] [<81a3a4d8>] (schedule_preempt_disabled) from [<81a3d0a0>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2088.412348][ T32] [<81a3cd50>] (__mutex_lock.constprop.0) from [<81a3d848>] (__mutex_lock_slowpath+0x14/0x18) [ 2088.412577][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 [ 2088.412803][ T32] r4:00000000 [ 2088.413058][ T32] [<81a3d834>] (__mutex_lock_slowpath) from [<81a3d888>] (mutex_lock+0x3c/0x40) [ 2088.413422][ T32] [<81a3d84c>] (mutex_lock) from [<804e9568>] (_vm_unmap_aliases+0x68/0x240) [ 2088.413670][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2088.484214][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dab400 [ 2088.537723][ T32] r4:00000000 [ 2088.537974][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2088.538152][ T32] r9:83018405 r8:84158000 r7:00000000 r6:83018400 r5:00001000 r4:7f2b8000 [ 2088.538278][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2088.538471][ T32] r5:00001000 r4:dfc2f000 [ 2088.538607][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2088.538803][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2088.538983][ T32] r5:84d7178c r4:85973780 [ 2088.539062][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2088.539174][ T32] r7:dddcfd80 r6:83018400 r5:84d7178c r4:85973780 [ 2088.539239][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2088.539370][ T32] r10:61c88647 r9:84158000 r8:859737ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2088.539534][ T32] r4:85973780 [ 2088.539671][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2088.539832][ T32] r10:00000000 r9:85973780 r8:80278fe0 r7:dfc11e60 r6:85973c80 r5:84158000 [ 2088.539938][ T32] r4:00000001 [ 2088.540046][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2088.540377][ T32] Exception stack(0xdfa15fb0 to 0xdfa15ff8) [ 2088.540620][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2088.540827][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2088.540963][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2088.541122][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2088.541235][ T32] r4:859574c0 [ 2088.541913][ T32] INFO: task kworker/0:11:3927 is blocked on a mutex likely owned by task kworker/1:54:11122. [ 2088.542113][ T32] task:kworker/1:54 state:R running task stack:0 pid:11122 tgid:11122 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2088.542631][ T32] Workqueue: events bpf_prog_free_deferred [ 2088.542838][ T32] Call trace: [ 2088.543026][ T32] [<81a39174>] (__schedule) from [<81a3a53c>] (preempt_schedule_irq+0x40/0xa8) [ 2088.543201][ T32] r10:8280c9b4 r9:86713c00 r8:80200c04 r7:dfd9dd54 r6:ffffffff r5:86713c00 [ 2088.543277][ T32] r4:00000000 [ 2088.543405][ T32] [<81a3a4fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2088.543535][ T32] Exception stack(0xdfd9dd20 to 0xdfd9dd68) [ 2088.543623][ T32] dd20: cc69b000 e0673000 00000001 80239bf8 7f270000 00000001 82aca1c4 82ac95a0 [ 2088.685160][ T32] dd40: 7f270000 e0673000 8280c9b4 dfd9dd9c dfd9dda0 dfd9dd70 80230af0 80239c10 [ 2088.685455][ T32] dd60: 80030013 ffffffff [ 2088.685603][ T32] r5:80030013 r4:80239c10 [ 2088.685726][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e932c>] (__purge_vmap_area_lazy+0x284/0x458) [ 2088.685927][ T32] r4:82aca1e4 [ 2088.686040][ T32] [<804e90a8>] (__purge_vmap_area_lazy) from [<804e96e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 2088.686239][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd9ddc0 r5:dfd9de08 [ 2088.686384][ T32] r4:dfd9ddc0 [ 2088.686501][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2088.686698][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dda80 [ 2088.686822][ T32] r4:00000000 [ 2088.686935][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2088.687136][ T32] r9:83018605 r8:86713c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2a6000 [ 2088.687250][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2088.687433][ T32] r5:00001000 r4:df9d7000 [ 2088.687545][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2088.687720][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2088.687898][ T32] r5:879d6b8c r4:85db4580 [ 2088.688008][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2088.688196][ T32] r7:ddde3d80 r6:83018600 r5:879d6b8c r4:85db4580 [ 2088.688307][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2088.688497][ T32] r10:61c88647 r9:86713c00 r8:85db45ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2088.688658][ T32] r4:85db4580 [ 2088.688782][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2088.688968][ T32] r10:00000000 r9:85db4580 r8:80278fe0 r7:dfc51e60 r6:85cb6700 r5:86713c00 [ 2088.689088][ T32] r4:00000001 [ 2088.689214][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2088.689422][ T32] Exception stack(0xdfd9dfb0 to 0xdfd9dff8) [ 2088.689586][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2088.689730][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2088.689861][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2088.690009][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2088.690129][ T32] r4:84939b80 [ 2088.690564][ T32] INFO: task kworker/0:43:10953 blocked for more than 430 seconds. [ 2088.690765][ T32] Not tainted syzkaller #0 [ 2088.690940][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2088.691121][ T32] task:kworker/0:43 state:D stack:0 pid:10953 tgid:10953 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2088.691621][ T32] Workqueue: events bpf_prog_free_deferred [ 2088.692076][ T32] Call trace: [ 2088.692451][ T32] [<81a39174>] (__schedule) from [<81a3a108>] (schedule+0x2c/0x130) [ 2088.692727][ T32] r10:e0629d84 r9:00000002 r8:60000113 r7:82917120 r6:e0629d8c r5:838abc00 [ 2088.692863][ T32] r4:838abc00 [ 2088.693018][ T32] [<81a3a0dc>] (schedule) from [<81a3a4f0>] (schedule_preempt_disabled+0x18/0x24) [ 2088.693262][ T32] r5:838abc00 r4:8291711c [ 2088.693473][ T32] [<81a3a4d8>] (schedule_preempt_disabled) from [<81a3d0a0>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2088.693702][ T32] [<81a3cd50>] (__mutex_lock.constprop.0) from [<81a3d848>] (__mutex_lock_slowpath+0x14/0x18) [ 2088.729146][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08 [ 2088.730866][ T32] r4:00000000 [ 2088.731711][ T32] [<81a3d834>] (__mutex_lock_slowpath) from [<81a3d888>] (mutex_lock+0x3c/0x40) [ 2088.733157][ T32] [<81a3d84c>] (mutex_lock) from [<804e9568>] (_vm_unmap_aliases+0x68/0x240) [ 2088.744470][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2088.746227][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dab200 [ 2088.747861][ T32] r4:00000000 [ 2088.748775][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2088.750342][ T32] r9:83018405 r8:838abc00 r7:00000000 r6:83018400 r5:00001000 r4:7f2c0000 [ 2088.751819][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2088.753573][ T32] r5:00001000 r4:dfc73000 [ 2088.758513][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2088.760547][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2088.762655][ T32] r5:84d7238c r4:86585380 [ 2088.763367][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2088.765575][ T32] r7:dddcfd80 r6:83018400 r5:84d7238c r4:86585380 [ 2088.766786][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2088.768315][ T32] r10:61c88647 r9:838abc00 r8:865853ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2088.769615][ T32] r4:86585380 [ 2088.770398][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2088.772081][ T32] r10:00000000 r9:86585380 r8:80278fe0 r7:e4685e60 r6:86585400 r5:838abc00 [ 2088.773518][ T32] r4:00000001 [ 2088.774577][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2088.776097][ T32] Exception stack(0xe0629fb0 to 0xe0629ff8) [ 2088.777371][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2088.778476][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2088.779302][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2088.780038][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2088.780900][ T32] r4:85e5db80 [ 2088.781972][ T32] INFO: task kworker/0:43:10953 is blocked on a mutex likely owned by task kworker/1:54:11122. [ 2088.782852][ T32] task:kworker/1:54 state:R running task stack:0 pid:11122 tgid:11122 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2088.784844][ T32] Workqueue: events bpf_prog_free_deferred [ 2088.786629][ T32] Call trace: [ 2088.787857][ T32] [<81a39174>] (__schedule) from [<81a3a53c>] (preempt_schedule_irq+0x40/0xa8) [ 2088.794339][ T32] r10:8280c9b4 r9:86713c00 r8:80200c04 r7:dfd9dd54 r6:ffffffff r5:86713c00 [ 2088.796128][ T32] r4:00000000 [ 2088.797124][ T32] [<81a3a4fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2088.798064][ T32] Exception stack(0xdfd9dd20 to 0xdfd9dd68) [ 2088.799884][ T32] dd20: ce23c000 e0673000 00000001 80239bf8 7f270000 00000001 82aca1c4 82ac95a0 [ 2088.801747][ T32] dd40: 7f270000 e0673000 8280c9b4 dfd9dd9c dfd9dda0 dfd9dd70 80230af0 80239c10 [ 2088.804154][ T32] dd60: 80030013 ffffffff [ 2088.804663][ T32] r5:80030013 r4:80239c10 [ 2088.805610][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e932c>] (__purge_vmap_area_lazy+0x284/0x458) [ 2088.806934][ T32] r4:82aca1e4 [ 2088.807716][ T32] [<804e90a8>] (__purge_vmap_area_lazy) from [<804e96e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 2088.809035][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd9ddc0 r5:dfd9de08 [ 2088.810259][ T32] r4:dfd9ddc0 [ 2088.810827][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2088.812515][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dda80 [ 2088.814097][ T32] r4:00000000 [ 2088.814567][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2088.815545][ T32] r9:83018605 r8:86713c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2a6000 [ 2088.817683][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2088.824232][ T32] r5:00001000 r4:df9d7000 [ 2088.825023][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2088.827733][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2088.829019][ T32] r5:879d6b8c r4:85db4580 [ 2088.830036][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2088.831121][ T32] r7:ddde3d80 r6:83018600 r5:879d6b8c r4:85db4580 [ 2088.831677][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2088.832391][ T32] r10:61c88647 r9:86713c00 r8:85db45ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2088.833026][ T32] r4:85db4580 [ 2088.836780][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2088.894547][ T32] r10:00000000 r9:85db4580 r8:80278fe0 r7:dfc51e60 r6:85cb6700 r5:86713c00 [ 2088.894718][ T32] r4:00000001 [ 2088.894800][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2088.894982][ T32] Exception stack(0xdfd9dfb0 to 0xdfd9dff8) [ 2088.895082][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2088.895174][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2088.895260][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2088.895350][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2088.895427][ T32] r4:84939b80 [ 2088.895542][ T32] INFO: task kworker/0:49:10995 blocked for more than 430 seconds. [ 2088.895625][ T32] Not tainted syzkaller #0 [ 2088.895716][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2088.895812][ T32] task:kworker/0:49 state:D stack:0 pid:10995 tgid:10995 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2088.896101][ T32] Workqueue: events bpf_prog_free_deferred [ 2088.896258][ T32] Call trace: [ 2088.896381][ T32] [<81a39174>] (__schedule) from [<81a3a108>] (schedule+0x2c/0x130) [ 2088.896502][ T32] r10:e0305d84 r9:00000002 r8:60000113 r7:82917120 r6:e0305d8c r5:83316c00 [ 2088.896573][ T32] r4:83316c00 [ 2088.896637][ T32] [<81a3a0dc>] (schedule) from [<81a3a4f0>] (schedule_preempt_disabled+0x18/0x24) [ 2088.896753][ T32] r5:83316c00 r4:8291711c [ 2088.896818][ T32] [<81a3a4d8>] (schedule_preempt_disabled) from [<81a3d0a0>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2088.896914][ T32] [<81a3cd50>] (__mutex_lock.constprop.0) from [<81a3d848>] (__mutex_lock_slowpath+0x14/0x18) [ 2088.897020][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0305e08 [ 2088.897088][ T32] r4:00000000 [ 2088.897150][ T32] [<81a3d834>] (__mutex_lock_slowpath) from [<81a3d888>] (mutex_lock+0x3c/0x40) [ 2088.897244][ T32] [<81a3d84c>] (mutex_lock) from [<804e9568>] (_vm_unmap_aliases+0x68/0x240) [ 2088.897389][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2088.897516][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ddfc0 [ 2088.897585][ T32] r4:00000000 [ 2088.897648][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2088.897759][ T32] r9:83018405 r8:83316c00 r7:00000000 r6:83018400 r5:00001000 r4:7f2aa000 [ 2088.897887][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2088.897995][ T32] r5:00001000 r4:dfab1000 [ 2088.898059][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2088.898155][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2088.898256][ T32] r5:87fb338c r4:85e31e80 [ 2088.898387][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2088.898558][ T32] r7:dddcfd80 r6:83018400 r5:87fb338c r4:85e31e80 [ 2088.898675][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2088.898859][ T32] r10:61c88647 r9:83316c00 r8:85e31eac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2088.898929][ T32] r4:85e31e80 [ 2088.898993][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2088.899156][ T32] r10:00000000 r9:85e31e80 r8:80278fe0 r7:e0301e60 r6:85e31f00 r5:83316c00 [ 2088.899225][ T32] r4:00000001 [ 2088.899291][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2088.920395][ T31] audit: type=1400 audit(2089.235:729): avc: denied { write } for pid=3095 comm="syz-executor" path="pipe:[601]" dev="pipefs" ino=601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2088.951220][ T32] Exception stack(0xe0305fb0 to 0xe0305ff8) [ 2088.952701][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2088.952812][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2088.952837][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2088.952861][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2088.952919][ T32] r4:84fc7640 [ 2088.953321][ T32] INFO: task kworker/0:49:10995 is blocked on a mutex likely owned by task kworker/1:54:11122. [ 2088.953405][ T32] task:kworker/1:54 state:R running task stack:0 pid:11122 tgid:11122 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2088.953518][ T32] Workqueue: events bpf_prog_free_deferred [ 2088.953609][ T32] Call trace: [ 2088.953679][ T32] [<81a39174>] (__schedule) from [<81a3a53c>] (preempt_schedule_irq+0x40/0xa8) [ 2088.953763][ T32] r10:8280c9b4 r9:86713c00 r8:80200c04 r7:dfd9dd54 r6:ffffffff r5:86713c00 [ 2088.953864][ T32] r4:00000000 [ 2088.977556][ T32] [<81a3a4fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2088.977716][ T32] Exception stack(0xdfd9dd20 to 0xdfd9dd68) [ 2088.977752][ T32] dd20: d014f000 e0673000 00000001 80239bf8 7f270000 00000001 82aca1c4 82ac95a0 [ 2088.977769][ T32] dd40: 7f270000 e0673000 8280c9b4 dfd9dd9c dfd9dda0 dfd9dd70 80230af0 80239c10 [ 2088.977779][ T32] dd60: 80030013 ffffffff [ 2088.977793][ T32] r5:80030013 r4:80239c10 [ 2088.977802][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e932c>] (__purge_vmap_area_lazy+0x284/0x458) [ 2088.977873][ T32] r4:82aca1e4 [ 2088.977892][ T32] [<804e90a8>] (__purge_vmap_area_lazy) from [<804e96e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 2088.977955][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd9ddc0 r5:dfd9de08 [ 2088.977965][ T32] r4:dfd9ddc0 [ 2088.977972][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2088.978003][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dda80 [ 2088.978060][ T32] r4:00000000 [ 2088.978079][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2088.978144][ T32] r9:83018605 r8:86713c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2a6000 [ 2088.978163][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2088.978219][ T32] r5:00001000 r4:df9d7000 [ 2088.978235][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2088.978288][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2088.978348][ T32] r5:879d6b8c r4:85db4580 [ 2088.978363][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2088.978404][ T32] r7:ddde3d80 r6:83018600 r5:879d6b8c r4:85db4580 [ 2088.978412][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2088.978494][ T32] r10:61c88647 r9:86713c00 r8:85db45ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2088.978505][ T32] r4:85db4580 [ 2088.978514][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2088.978548][ T32] r10:00000000 r9:85db4580 r8:80278fe0 r7:dfc51e60 r6:85cb6700 r5:86713c00 [ 2088.978556][ T32] r4:00000001 [ 2088.978563][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2088.978592][ T32] Exception stack(0xdfd9dfb0 to 0xdfd9dff8) [ 2088.978636][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2088.978693][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2088.978767][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2088.978826][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2088.978836][ T32] r4:84939b80 [ 2088.978881][ T32] INFO: task kworker/0:50:11001 blocked for more than 430 seconds. [ 2088.979001][ T32] Not tainted syzkaller #0 [ 2088.979130][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2088.979141][ T32] task:kworker/0:50 state:D stack:0 pid:11001 tgid:11001 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2088.979181][ T32] Workqueue: events bpf_prog_free_deferred [ 2088.979207][ T32] Call trace: [ 2088.979339][ T32] [<81a39174>] (__schedule) from [<81a3a108>] (schedule+0x2c/0x130) [ 2088.979377][ T32] r10:e0315d84 r9:00000002 r8:600f0113 r7:82917120 r6:e0315d8c r5:83aa6000 [ 2088.979386][ T32] r4:83aa6000 [ 2088.979393][ T32] [<81a3a0dc>] (schedule) from [<81a3a4f0>] (schedule_preempt_disabled+0x18/0x24) [ 2088.979444][ T32] r5:83aa6000 r4:8291711c [ 2088.979460][ T32] [<81a3a4d8>] (schedule_preempt_disabled) from [<81a3d0a0>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2088.979551][ T32] [<81a3cd50>] (__mutex_lock.constprop.0) from [<81a3d848>] (__mutex_lock_slowpath+0x14/0x18) [ 2088.979640][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0315e08 [ 2088.979651][ T32] r4:00000000 [ 2088.979657][ T32] [<81a3d834>] (__mutex_lock_slowpath) from [<81a3d888>] (mutex_lock+0x3c/0x40) [ 2088.979689][ T32] [<81a3d84c>] (mutex_lock) from [<804e9568>] (_vm_unmap_aliases+0x68/0x240) [ 2088.979713][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2088.979741][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8656edc0 [ 2088.979771][ T32] r4:00000000 [ 2088.979813][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2088.979844][ T32] r9:83018405 r8:83aa6000 r7:00000000 r6:83018400 r5:00001000 r4:7f2b0000 [ 2088.979853][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2088.979892][ T32] r5:00001000 r4:dfca7000 [ 2088.979900][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2088.979927][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2088.979957][ T32] r5:87fb038c r4:87c3f280 [ 2088.979963][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2088.980018][ T32] r7:dddcfd80 r6:83018400 r5:87fb038c r4:87c3f280 [ 2088.980027][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2088.980060][ T32] r10:61c88647 r9:83aa6000 r8:87c3f2ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2088.980098][ T32] r4:87c3f280 [ 2088.980106][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2088.980138][ T32] r10:00000000 r9:87c3f280 r8:80278fe0 r7:e0301e60 r6:87c3f300 r5:83aa6000 [ 2088.980146][ T32] r4:00000001 [ 2088.980152][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2088.980175][ T32] Exception stack(0xe0315fb0 to 0xe0315ff8) [ 2088.980188][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2088.980202][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2088.980215][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2088.980246][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2088.980264][ T32] r4:85db9dc0 [ 2088.980521][ T32] INFO: task kworker/0:50:11001 is blocked on a mutex likely owned by task kworker/1:54:11122. [ 2088.980541][ T32] task:kworker/1:54 state:R running task stack:0 pid:11122 tgid:11122 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2088.980614][ T32] Workqueue: events bpf_prog_free_deferred [ 2088.980699][ T32] Call trace: [ 2088.980748][ T32] [<81a39174>] (__schedule) from [<81a3a53c>] (preempt_schedule_irq+0x40/0xa8) [ 2088.980788][ T32] r10:8280c9b4 r9:86713c00 r8:80200c04 r7:dfd9dd54 r6:ffffffff r5:86713c00 [ 2088.980867][ T32] r4:00000000 [ 2088.980876][ T32] [<81a3a4fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2088.981024][ T32] Exception stack(0xdfd9dd20 to 0xdfd9dd68) [ 2088.981150][ T32] dd20: d014f000 e0673000 00000001 80239bf8 7f270000 00000001 82aca1c4 82ac95a0 [ 2088.981167][ T32] dd40: 7f270000 e0673000 8280c9b4 dfd9dd9c dfd9dda0 dfd9dd70 80230af0 80239c10 [ 2088.981232][ T32] dd60: 80030013 ffffffff [ 2088.981244][ T32] r5:80030013 r4:80239c10 [ 2088.981251][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e932c>] (__purge_vmap_area_lazy+0x284/0x458) [ 2088.981279][ T32] r4:82aca1e4 [ 2088.981319][ T32] [<804e90a8>] (__purge_vmap_area_lazy) from [<804e96e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 2088.981403][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd9ddc0 r5:dfd9de08 [ 2088.981440][ T32] r4:dfd9ddc0 [ 2088.981506][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2088.981575][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dda80 [ 2088.981621][ T32] r4:00000000 [ 2088.981691][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2088.981739][ T32] r9:83018605 r8:86713c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2a6000 [ 2088.981770][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2088.981802][ T32] r5:00001000 r4:df9d7000 [ 2088.981811][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2088.981837][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2088.981944][ T32] r5:879d6b8c r4:85db4580 [ 2088.981953][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2088.981990][ T32] r7:ddde3d80 r6:83018600 r5:879d6b8c r4:85db4580 [ 2088.981998][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2088.982068][ T32] r10:61c88647 r9:86713c00 r8:85db45ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2088.982078][ T32] r4:85db4580 [ 2088.982119][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2088.982154][ T32] r10:00000000 r9:85db4580 r8:80278fe0 r7:dfc51e60 r6:85cb6700 r5:86713c00 [ 2088.982176][ T32] r4:00000001 [ 2088.982184][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2088.982208][ T32] Exception stack(0xdfd9dfb0 to 0xdfd9dff8) [ 2088.982221][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2088.982235][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2088.982248][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2088.982268][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2088.982277][ T32] r4:84939b80 [ 2088.982312][ T32] INFO: task kworker/1:47:11046 blocked for more than 430 seconds. [ 2088.982337][ T32] Not tainted syzkaller #0 [ 2088.982384][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2088.982435][ T32] task:kworker/1:47 state:D stack:0 pid:11046 tgid:11046 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2088.982472][ T32] Workqueue: events bpf_prog_free_deferred [ 2088.982566][ T32] Call trace: [ 2088.982580][ T32] [<81a39174>] (__schedule) from [<81a3a108>] (schedule+0x2c/0x130) [ 2088.982687][ T32] r10:dfbf9d84 r9:00000002 r8:60000013 r7:82917120 r6:dfbf9d8c r5:85fce000 [ 2088.982698][ T32] r4:85fce000 [ 2088.982823][ T32] [<81a3a0dc>] (schedule) from [<81a3a4f0>] (schedule_preempt_disabled+0x18/0x24) [ 2088.982857][ T32] r5:85fce000 r4:8291711c [ 2088.982864][ T32] [<81a3a4d8>] (schedule_preempt_disabled) from [<81a3d0a0>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2088.982891][ T32] [<81a3cd50>] (__mutex_lock.constprop.0) from [<81a3d848>] (__mutex_lock_slowpath+0x14/0x18) [ 2088.982925][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 [ 2088.982933][ T32] r4:00000000 [ 2088.982939][ T32] [<81a3d834>] (__mutex_lock_slowpath) from [<81a3d888>] (mutex_lock+0x3c/0x40) [ 2088.982988][ T32] [<81a3d84c>] (mutex_lock) from [<804e9568>] (_vm_unmap_aliases+0x68/0x240) [ 2088.983015][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2088.983051][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dab100 [ 2088.983141][ T32] r4:00000000 [ 2088.983231][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2088.983357][ T32] r9:83018605 r8:85fce000 r7:00000000 r6:83018600 r5:00001000 r4:7f2c2000 [ 2088.983380][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2088.983483][ T32] r5:00001000 r4:dfc75000 [ 2088.983507][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2088.983587][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2088.983664][ T32] r5:84d73f8c r4:86640c80 [ 2088.983682][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2088.983888][ T32] r7:ddde3d80 r6:83018600 r5:84d73f8c r4:86640c80 [ 2089.019230][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2089.019376][ T32] r10:61c88647 r9:85fce000 r8:86640cac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2089.019503][ T32] r4:86640c80 [ 2089.019612][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2089.019686][ T32] r10:00000000 r9:86640c80 r8:80278fe0 r7:e0625e60 r6:85cb6180 r5:85fce000 [ 2089.019801][ T32] r4:00000001 [ 2089.020009][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.020119][ T32] Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) [ 2089.020215][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2089.020250][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.020278][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.020311][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.020429][ T32] r4:8664fd40 [ 2089.020865][ T32] INFO: task kworker/1:47:11046 is blocked on a mutex likely owned by task kworker/1:54:11122. [ 2089.020901][ T32] task:kworker/1:54 state:R running task stack:0 pid:11122 tgid:11122 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2089.021022][ T32] Workqueue: events bpf_prog_free_deferred [ 2089.021126][ T32] Call trace: [ 2089.021246][ T32] [<81a39174>] (__schedule) from [<81a3a53c>] (preempt_schedule_irq+0x40/0xa8) [ 2089.021323][ T32] r10:8280c9b4 r9:86713c00 r8:80200c04 r7:dfd9dd54 r6:ffffffff r5:86713c00 [ 2089.021361][ T32] r4:00000000 [ 2089.021377][ T32] [<81a3a4fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2089.021429][ T32] Exception stack(0xdfd9dd20 to 0xdfd9dd68) [ 2089.021481][ T32] dd20: d014f000 e0673000 00000001 80239bf8 7f270000 00000001 82aca1c4 82ac95a0 [ 2089.021526][ T32] dd40: 7f270000 e0673000 8280c9b4 dfd9dd9c dfd9dda0 dfd9dd70 80230af0 80239c10 [ 2089.021547][ T32] dd60: 80030013 ffffffff [ 2089.021569][ T32] r5:80030013 r4:80239c10 [ 2089.021724][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e932c>] (__purge_vmap_area_lazy+0x284/0x458) [ 2089.021906][ T32] r4:82aca1e4 [ 2089.021953][ T32] [<804e90a8>] (__purge_vmap_area_lazy) from [<804e96e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 2089.022019][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd9ddc0 r5:dfd9de08 [ 2089.022135][ T32] r4:dfd9ddc0 [ 2089.022152][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2089.022227][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dda80 [ 2089.022392][ T32] r4:00000000 [ 2089.022544][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2089.022613][ T32] r9:83018605 r8:86713c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2a6000 [ 2089.022631][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2089.022687][ T32] r5:00001000 r4:df9d7000 [ 2089.022710][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2089.022802][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2089.022865][ T32] r5:879d6b8c r4:85db4580 [ 2089.022882][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2089.022947][ T32] r7:ddde3d80 r6:83018600 r5:879d6b8c r4:85db4580 [ 2089.023082][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2089.023153][ T32] r10:61c88647 r9:86713c00 r8:85db45ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2089.023191][ T32] r4:85db4580 [ 2089.023207][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2089.023273][ T32] r10:00000000 r9:85db4580 r8:80278fe0 r7:dfc51e60 r6:85cb6700 r5:86713c00 [ 2089.023291][ T32] r4:00000001 [ 2089.023304][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.023353][ T32] Exception stack(0xdfd9dfb0 to 0xdfd9dff8) [ 2089.023382][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2089.023415][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.023443][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.023477][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.023497][ T32] r4:84939b80 [ 2089.060581][ T32] INFO: task kworker/1:48:11067 blocked for more than 430 seconds. [ 2089.060680][ T32] Not tainted syzkaller #0 [ 2089.060703][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2089.060736][ T32] task:kworker/1:48 state:D stack:0 pid:11067 tgid:11067 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2089.060945][ T32] Workqueue: events bpf_prog_free_deferred [ 2089.061045][ T32] Call trace: [ 2089.061437][ T32] [<81a39174>] (__schedule) from [<81a3a108>] (schedule+0x2c/0x130) [ 2089.061531][ T32] r10:dfe81d84 r9:00000002 r8:60000013 r7:82917120 r6:dfe81d8c r5:85fcec00 [ 2089.061551][ T32] r4:85fcec00 [ 2089.061566][ T32] [<81a3a0dc>] (schedule) from [<81a3a4f0>] (schedule_preempt_disabled+0x18/0x24) [ 2089.061625][ T32] r5:85fcec00 r4:8291711c [ 2089.061655][ T32] [<81a3a4d8>] (schedule_preempt_disabled) from [<81a3d0a0>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2089.061722][ T32] [<81a3cd50>] (__mutex_lock.constprop.0) from [<81a3d848>] (__mutex_lock_slowpath+0x14/0x18) [ 2089.061792][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe81e08 [ 2089.061929][ T32] r4:00000000 [ 2089.061951][ T32] [<81a3d834>] (__mutex_lock_slowpath) from [<81a3d888>] (mutex_lock+0x3c/0x40) [ 2089.062028][ T32] [<81a3d84c>] (mutex_lock) from [<804e9568>] (_vm_unmap_aliases+0x68/0x240) [ 2089.062087][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2089.062309][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dde80 [ 2089.062630][ T32] r4:00000000 [ 2089.062736][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2089.062843][ T32] r9:83018605 r8:85fcec00 r7:00000000 r6:83018600 r5:00001000 r4:7f2ac000 [ 2089.062986][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2089.063048][ T32] r5:00001000 r4:dfb42000 [ 2089.063065][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2089.063121][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2089.063198][ T32] r5:879d438c r4:85db4080 [ 2089.063383][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2089.063462][ T32] r7:ddde3d80 r6:83018600 r5:879d438c r4:85db4080 [ 2089.063482][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2089.063689][ T32] r10:61c88647 r9:85fcec00 r8:85db40ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2089.063731][ T32] r4:85db4080 [ 2089.063752][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2089.063899][ T32] r10:00000000 r9:85db4080 r8:80278fe0 r7:e030de60 r6:85cb6080 r5:85fcec00 [ 2089.081197][ T32] r4:00000001 [ 2089.081253][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.081364][ T32] Exception stack(0xdfe81fb0 to 0xdfe81ff8) [ 2089.081401][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2089.081542][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.081733][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.081932][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.081956][ T32] r4:86654f80 [ 2089.082395][ T32] INFO: task kworker/1:48:11067 is blocked on a mutex likely owned by task kworker/1:54:11122. [ 2089.082500][ T32] task:kworker/1:54 state:R running task stack:0 pid:11122 tgid:11122 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2089.082586][ T32] Workqueue: events bpf_prog_free_deferred [ 2089.082676][ T32] Call trace: [ 2089.082725][ T32] [<81a39174>] (__schedule) from [<81a3a53c>] (preempt_schedule_irq+0x40/0xa8) [ 2089.082807][ T32] r10:8280c9b4 r9:86713c00 r8:80200c04 r7:dfd9dd54 r6:ffffffff r5:86713c00 [ 2089.082827][ T32] r4:00000000 [ 2089.082841][ T32] [<81a3a4fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2089.082948][ T32] Exception stack(0xdfd9dd20 to 0xdfd9dd68) [ 2089.083056][ T32] dd20: d014f000 e0673000 00000001 80239bf8 7f270000 00000001 82aca1c4 82ac95a0 [ 2089.083091][ T32] dd40: 7f270000 e0673000 8280c9b4 dfd9dd9c dfd9dda0 dfd9dd70 80230af0 80239c10 [ 2089.083284][ T32] dd60: 80030013 ffffffff [ 2089.083311][ T32] r5:80030013 r4:80239c10 [ 2089.083456][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e932c>] (__purge_vmap_area_lazy+0x284/0x458) [ 2089.083615][ T32] r4:82aca1e4 [ 2089.083647][ T32] [<804e90a8>] (__purge_vmap_area_lazy) from [<804e96e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 2089.083743][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd9ddc0 r5:dfd9de08 [ 2089.083872][ T32] r4:dfd9ddc0 [ 2089.105460][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2089.105608][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dda80 [ 2089.105631][ T32] r4:00000000 [ 2089.105647][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2089.105719][ T32] r9:83018605 r8:86713c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2a6000 [ 2089.105736][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2089.105814][ T32] r5:00001000 r4:df9d7000 [ 2089.105833][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2089.106101][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2089.106202][ T32] r5:879d6b8c r4:85db4580 [ 2089.106222][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2089.106347][ T32] r7:ddde3d80 r6:83018600 r5:879d6b8c r4:85db4580 [ 2089.106456][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2089.106673][ T32] r10:61c88647 r9:86713c00 r8:85db45ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2089.106697][ T32] r4:85db4580 [ 2089.106718][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2089.106789][ T32] r10:00000000 r9:85db4580 r8:80278fe0 r7:dfc51e60 r6:85cb6700 r5:86713c00 [ 2089.106806][ T32] r4:00000001 [ 2089.106821][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.106872][ T32] Exception stack(0xdfd9dfb0 to 0xdfd9dff8) [ 2089.106907][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2089.106938][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.107037][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.107171][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.107193][ T32] r4:84939b80 [ 2089.107237][ T32] INFO: task kworker/0:52:11087 blocked for more than 430 seconds. [ 2089.107273][ T32] Not tainted syzkaller #0 [ 2089.107342][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2089.107364][ T32] task:kworker/0:52 state:D stack:0 pid:11087 tgid:11087 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2089.107633][ T32] Workqueue: events bpf_prog_free_deferred [ 2089.107687][ T32] Call trace: [ 2089.107745][ T32] [<81a39174>] (__schedule) from [<81a3a108>] (schedule+0x2c/0x130) [ 2089.107821][ T32] r10:dfbe5d84 r9:00000002 r8:60000113 r7:82917120 r6:dfbe5d8c r5:86710c00 [ 2089.107839][ T32] r4:86710c00 [ 2089.107853][ T32] [<81a3a0dc>] (schedule) from [<81a3a4f0>] (schedule_preempt_disabled+0x18/0x24) [ 2089.107910][ T32] r5:86710c00 r4:8291711c [ 2089.107995][ T32] [<81a3a4d8>] (schedule_preempt_disabled) from [<81a3d0a0>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2089.108059][ T32] [<81a3cd50>] (__mutex_lock.constprop.0) from [<81a3d848>] (__mutex_lock_slowpath+0x14/0x18) [ 2089.108430][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 [ 2089.108456][ T32] r4:00000000 [ 2089.108472][ T32] [<81a3d834>] (__mutex_lock_slowpath) from [<81a3d888>] (mutex_lock+0x3c/0x40) [ 2089.108532][ T32] [<81a3d84c>] (mutex_lock) from [<804e9568>] (_vm_unmap_aliases+0x68/0x240) [ 2089.108607][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2089.108691][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8656ed40 [ 2089.108718][ T32] r4:00000000 [ 2089.108937][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2089.109075][ T32] r9:83018405 r8:86710c00 r7:00000000 r6:83018400 r5:00001000 r4:7f2ae000 [ 2089.109095][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2089.109208][ T32] r5:00001000 r4:dfbed000 [ 2089.109228][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2089.109290][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2089.109374][ T32] r5:87fb1b8c r4:85cb6580 [ 2089.109459][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2089.109604][ T32] r7:dddcfd80 r6:83018400 r5:87fb1b8c r4:85cb6580 [ 2089.109623][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2089.109690][ T32] r10:61c88647 r9:86710c00 r8:85cb65ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2089.109935][ T32] r4:85cb6580 [ 2089.109953][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2089.110020][ T32] r10:00000000 r9:85cb6580 r8:80278fe0 r7:e0301e60 r6:85cb6500 r5:86710c00 [ 2089.110039][ T32] r4:00000001 [ 2089.110052][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.110101][ T32] Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) [ 2089.110127][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2089.110160][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.110187][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.110239][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.110261][ T32] r4:8664fb80 [ 2089.110693][ T32] INFO: task kworker/0:52:11087 is blocked on a mutex likely owned by task kworker/1:54:11122. [ 2089.110738][ T32] task:kworker/1:54 state:R running task stack:0 pid:11122 tgid:11122 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2089.110824][ T32] Workqueue: events bpf_prog_free_deferred [ 2089.110951][ T32] Call trace: [ 2089.110990][ T32] [<81a39174>] (__schedule) from [<81a3a53c>] (preempt_schedule_irq+0x40/0xa8) [ 2089.111068][ T32] r10:8280c9b4 r9:86713c00 r8:80200c04 r7:dfd9dd54 r6:ffffffff r5:86713c00 [ 2089.111456][ T32] r4:00000000 [ 2089.111510][ T32] [<81a3a4fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2089.111568][ T32] Exception stack(0xdfd9dd20 to 0xdfd9dd68) [ 2089.111691][ T32] dd20: d014f000 e0673000 00000001 80239bf8 7f270000 00000001 82aca1c4 82ac95a0 [ 2089.111753][ T32] dd40: 7f270000 e0673000 8280c9b4 dfd9dd9c dfd9dda0 dfd9dd70 80230af0 80239c10 [ 2089.111775][ T32] dd60: 80030013 ffffffff [ 2089.111798][ T32] r5:80030013 r4:80239c10 [ 2089.111856][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e932c>] (__purge_vmap_area_lazy+0x284/0x458) [ 2089.111919][ T32] r4:82aca1e4 [ 2089.111935][ T32] [<804e90a8>] (__purge_vmap_area_lazy) from [<804e96e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 2089.111998][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd9ddc0 r5:dfd9de08 [ 2089.112017][ T32] r4:dfd9ddc0 [ 2089.112032][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2089.112141][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dda80 [ 2089.112264][ T32] r4:00000000 [ 2089.112282][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2089.112357][ T32] r9:83018605 r8:86713c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2a6000 [ 2089.112544][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2089.112693][ T32] r5:00001000 r4:df9d7000 [ 2089.112969][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2089.113073][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2089.113411][ T32] r5:879d6b8c r4:85db4580 [ 2089.113450][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2089.113627][ T32] r7:ddde3d80 r6:83018600 r5:879d6b8c r4:85db4580 [ 2089.113650][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2089.113727][ T32] r10:61c88647 r9:86713c00 r8:85db45ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2089.113745][ T32] r4:85db4580 [ 2089.113758][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2089.158153][ T32] r10:00000000 r9:85db4580 r8:80278fe0 r7:dfc51e60 r6:85cb6700 r5:86713c00 [ 2089.158221][ T32] r4:00000001 [ 2089.158242][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.158360][ T32] Exception stack(0xdfd9dfb0 to 0xdfd9dff8) [ 2089.158443][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2089.158494][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.158526][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.158562][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.158606][ T32] r4:84939b80 [ 2089.158652][ T32] INFO: task kworker/0:53:11127 blocked for more than 430 seconds. [ 2089.158689][ T32] Not tainted syzkaller #0 [ 2089.158718][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2089.158799][ T32] task:kworker/0:53 state:D stack:0 pid:11127 tgid:11127 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2089.158875][ T32] Workqueue: events bpf_prog_free_deferred [ 2089.159120][ T32] Call trace: [ 2089.159151][ T32] [<81a39174>] (__schedule) from [<81a3a108>] (schedule+0x2c/0x130) [ 2089.159226][ T32] r10:dfd8dd84 r9:00000002 r8:600f0013 r7:82917120 r6:dfd8dd8c r5:86716000 [ 2089.159268][ T32] r4:86716000 [ 2089.159286][ T32] [<81a3a0dc>] (schedule) from [<81a3a4f0>] (schedule_preempt_disabled+0x18/0x24) [ 2089.159347][ T32] r5:86716000 r4:8291711c [ 2089.159533][ T32] [<81a3a4d8>] (schedule_preempt_disabled) from [<81a3d0a0>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2089.159598][ T32] [<81a3cd50>] (__mutex_lock.constprop.0) from [<81a3d848>] (__mutex_lock_slowpath+0x14/0x18) [ 2089.159668][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd8de08 [ 2089.159878][ T32] r4:00000000 [ 2089.159960][ T32] [<81a3d834>] (__mutex_lock_slowpath) from [<81a3d888>] (mutex_lock+0x3c/0x40) [ 2089.160017][ T32] [<81a3d84c>] (mutex_lock) from [<804e9568>] (_vm_unmap_aliases+0x68/0x240) [ 2089.160072][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2089.160341][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dab700 [ 2089.160476][ T32] r4:00000000 [ 2089.160582][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2089.160653][ T32] r9:83018405 r8:86716000 r7:00000000 r6:83018400 r5:00001000 r4:7f2ba000 [ 2089.160830][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2089.160946][ T32] r5:00001000 r4:dfc31000 [ 2089.161092][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2089.161151][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2089.161210][ T32] r5:84d72f8c r4:85cb6780 [ 2089.161226][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2089.161291][ T32] r7:dddcfd80 r6:83018400 r5:84d72f8c r4:85cb6780 [ 2089.161362][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2089.161437][ T32] r10:61c88647 r9:86716000 r8:85cb67ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2089.161459][ T32] r4:85cb6780 [ 2089.161493][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2089.161654][ T32] r10:00000000 r9:85cb6780 r8:80278fe0 r7:df841e60 r6:85cb6800 r5:86716000 [ 2089.161678][ T32] r4:00000001 [ 2089.161692][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.161746][ T32] Exception stack(0xdfd8dfb0 to 0xdfd8dff8) [ 2089.161773][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2089.161895][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.161951][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.161989][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.162015][ T32] r4:84995680 [ 2089.162449][ T32] INFO: task kworker/0:53:11127 is blocked on a mutex likely owned by task kworker/1:54:11122. [ 2089.162488][ T32] task:kworker/1:54 state:R running task stack:0 pid:11122 tgid:11122 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2089.162653][ T32] Workqueue: events bpf_prog_free_deferred [ 2089.162736][ T32] Call trace: [ 2089.162766][ T32] [<81a39174>] (__schedule) from [<81a3a53c>] (preempt_schedule_irq+0x40/0xa8) [ 2089.162841][ T32] r10:8280c9b4 r9:86713c00 r8:80200c04 r7:dfd9dd54 r6:ffffffff r5:86713c00 [ 2089.162861][ T32] r4:00000000 [ 2089.162875][ T32] [<81a3a4fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2089.162969][ T32] Exception stack(0xdfd9dd20 to 0xdfd9dd68) [ 2089.163214][ T32] dd20: d014f000 e0673000 00000001 80239bf8 7f270000 00000001 82aca1c4 82ac95a0 [ 2089.163250][ T32] dd40: 7f270000 e0673000 8280c9b4 dfd9dd9c dfd9dda0 dfd9dd70 80230af0 80239c10 [ 2089.163276][ T32] dd60: 80030013 ffffffff [ 2089.163403][ T32] r5:80030013 r4:80239c10 [ 2089.163422][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e932c>] (__purge_vmap_area_lazy+0x284/0x458) [ 2089.163481][ T32] r4:82aca1e4 [ 2089.163557][ T32] [<804e90a8>] (__purge_vmap_area_lazy) from [<804e96e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 2089.163637][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd9ddc0 r5:dfd9de08 [ 2089.163660][ T32] r4:dfd9ddc0 [ 2089.163779][ T32] [<804e9500>] (_vm_unmap_aliases) from [<804ed348>] (vfree+0x16c/0x210) [ 2089.204884][ T32] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dda80 [ 2089.204949][ T32] r4:00000000 [ 2089.205005][ T32] [<804ed1dc>] (vfree) from [<80557f48>] (execmem_free+0x30/0x50) [ 2089.205141][ T32] r9:83018605 r8:86713c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2a6000 [ 2089.205161][ T32] [<80557f18>] (execmem_free) from [<803c5740>] (bpf_jit_free_exec+0x10/0x14) [ 2089.205274][ T32] r5:00001000 r4:df9d7000 [ 2089.205357][ T32] [<803c5730>] (bpf_jit_free_exec) from [<803c5b20>] (bpf_jit_free+0x68/0xe4) [ 2089.205424][ T32] [<803c5ab8>] (bpf_jit_free) from [<803c6bc8>] (bpf_prog_free_deferred+0x140/0x158) [ 2089.205534][ T32] r5:879d6b8c r4:85db4580 [ 2089.205554][ T32] [<803c6a88>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 2089.205625][ T32] r7:ddde3d80 r6:83018600 r5:879d6b8c r4:85db4580 [ 2089.205641][ T32] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 2089.205776][ T32] r10:61c88647 r9:86713c00 r8:85db45ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2089.205799][ T32] r4:85db4580 [ 2089.205861][ T32] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 2089.205933][ T32] r10:00000000 r9:85db4580 r8:80278fe0 r7:dfc51e60 r6:85cb6700 r5:86713c00 [ 2089.205952][ T32] r4:00000001 [ 2089.205983][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.206036][ T32] Exception stack(0xdfd9dfb0 to 0xdfd9dff8) [ 2089.206069][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2089.206103][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.206234][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.206272][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.206352][ T32] r4:84939b80 [ 2089.207286][ T32] NMI backtrace for cpu 0 [ 2089.207672][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 2089.207818][ T32] Hardware name: ARM-Versatile Express [ 2089.207898][ T32] Call trace: [ 2089.208004][ T32] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2089.208083][ T32] r7:00000000 r6:00070013 r5:60070093 r4:8224dfec [ 2089.208111][ T32] [<80201b08>] (show_stack) from [<8021f924>] (dump_stack_lvl+0x70/0x7c) [ 2089.208167][ T32] [<8021f8b4>] (dump_stack_lvl) from [<8021f948>] (dump_stack+0x18/0x1c) [ 2089.208221][ T32] r5:00000000 r4:00000001 [ 2089.208235][ T32] [<8021f930>] (dump_stack) from [<81a22d8c>] (nmi_cpu_backtrace+0x160/0x17c) [ 2089.208294][ T32] [<81a22c2c>] (nmi_cpu_backtrace) from [<81a22ed8>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 2089.208363][ T32] r7:00000000 r6:8280c690 r5:8281ae00 r4:ffffffff [ 2089.208378][ T32] [<81a22da8>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 2089.208483][ T32] r9:8281b9e8 r8:8280c810 r7:0002bb11 r6:00007e5d r5:82abe7d4 r4:8381480c [ 2089.208502][ T32] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037f2b4>] (watchdog+0x5d0/0x850) [ 2089.208567][ T32] [<8037ece4>] (watchdog) from [<80280200>] (kthread+0x12c/0x280) [ 2089.208847][ T32] r10:00000000 r9:00000000 r8:8037ece4 r7:8334a780 r6:8334a780 r5:83399800 [ 2089.208923][ T32] r4:00000001 [ 2089.208941][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.208989][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 2089.209015][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2089.209044][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.209069][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.209099][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.209116][ T32] r4:83348f00 [ 2089.209383][ T32] Sending NMI from CPU 0 to CPUs 1: [ 2089.210607][ C1] NMI backtrace for cpu 1 [ 2089.210750][ C1] CPU: 1 UID: 0 PID: 2820 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 2089.210788][ C1] Hardware name: ARM-Versatile Express [ 2089.210828][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 2089.210887][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 2089.210941][ C1] pc : [<81a4313c>] lr : [<80a8d9c8>] psr: 60010013 [ 2089.210973][ C1] sp : eb84deb0 ip : eb84dec0 fp : eb84debc [ 2089.211001][ C1] r10: 829594d4 r9 : 00000001 r8 : 00000000 [ 2089.211035][ C1] r7 : 00000117 r6 : 82959438 r5 : 00000000 r4 : 00000001 [ 2089.211068][ C1] r3 : 00000fdb r2 : 00000000 r1 : 60010013 r0 : 84ae1c40 [ 2089.211176][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 2089.211247][ C1] Control: 30c5387d Table: 8494c6c0 DAC: 00000000 [ 2089.211297][ C1] Call trace: [ 2089.211322][ C1] [<81a43114>] (_raw_spin_unlock_irqrestore) from [<80a8d9c8>] (pl011_console_device_unlock+0x20/0x24) [ 2089.211375][ C1] [<80a8d9a8>] (pl011_console_device_unlock) from [<802e3090>] (nbcon_emit_one+0x88/0x100) [ 2089.211428][ C1] [<802e3008>] (nbcon_emit_one) from [<802e32b0>] (nbcon_kthread_func+0x1a8/0x2a4) [ 2089.211490][ C1] r6:8280c690 r5:8416c800 r4:82959438 [ 2089.211502][ C1] [<802e3108>] (nbcon_kthread_func) from [<80280200>] (kthread+0x12c/0x280) [ 2089.211561][ C1] r10:00000000 r9:82959438 r8:802e3108 r7:84b70c80 r6:84b70c80 r5:8416c800 [ 2089.211576][ C1] r4:00000001 [ 2089.211588][ C1] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.211626][ C1] Exception stack(0xeb84dfb0 to 0xeb84dff8) [ 2089.211650][ C1] dfa0: 00000000 00000000 00000000 00000000 [ 2089.211676][ C1] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.211699][ C1] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.211727][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.211742][ C1] r4:83370900 [ 2089.212674][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 2089.243530][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 2089.244313][ T32] Hardware name: ARM-Versatile Express [ 2089.244682][ T32] Call trace: [ 2089.245039][ T32] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2089.245531][ T32] r7:8224ed10 r6:83399800 r5:00000000 r4:8224dfec [ 2089.245899][ T32] [<80201b08>] (show_stack) from [<8021f908>] (dump_stack_lvl+0x54/0x7c) [ 2089.246343][ T32] [<8021f8b4>] (dump_stack_lvl) from [<8021f948>] (dump_stack+0x18/0x1c) [ 2089.246715][ T32] r5:00000000 r4:82a77d18 [ 2089.247835][ T32] [<8021f930>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 2089.250731][ T32] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 2089.252807][ T32] r7:0002bb11 [ 2089.253913][ T32] [<80202800>] (panic) from [<8037f0f4>] (watchdog+0x410/0x850) [ 2089.254233][ T32] r3:00000001 r2:00000000 r1:00000001 r0:8224ed10 [ 2089.254673][ T32] [<8037ece4>] (watchdog) from [<80280200>] (kthread+0x12c/0x280) [ 2089.254939][ T32] r10:00000000 r9:00000000 r8:8037ece4 r7:8334a780 r6:8334a780 r5:83399800 [ 2089.255155][ T32] r4:00000001 [ 2089.255252][ T32] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2089.255508][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 2089.255667][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2089.255872][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2089.256087][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2089.256387][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 2089.256621][ T32] r4:83348f00 [ 2089.258402][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:37:16 Registers: info registers vcpu 0 CPU#0 R00=829c8a50 R01=823fe264 R02=fdbdee1e R03=81a36e50 R04=82abc340 R05=267f9000 R06=00065ae4 R07=000001e6 R08=dddc7000 R09=fdbdee1e R10=dddc7000 R11=df801d6c R12=df801d70 R13=df801d60 R14=81308ba8 R15=81a36e60 PSR=60000093 -ZC- A S svc32 s00=10000000 s01=00000000 d00=0000000010000000 s02=6c000000 s03=00076b8e d01=00076b8e6c000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=01186daa s09=0045d9b4 d04=0045d9b401186daa s10=00000000 s11=00000000 d05=0000000000000000 s12=018bff6c s13=00ff0167 d06=00ff0167018bff6c s14=00000000 s15=00000000 d07=0000000000000000 s16=fe000000 s17=edbdebf6 d08=edbdebf6fe000000 s18=ce000000 s19=0001e53e d09=0001e53ece000000 s20=fec1797c s21=00ff0170 d10=00ff0170fec1797c s22=ffffffff s23=00000000 d11=00000000ffffffff s24=13186daa s25=00000000 d12=0000000013186daa s26=6c000000 s27=00076b8e d13=00076b8e6c000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=00ad33be s33=00f8d29a d16=00f8d29a00ad33be s34=00000000 s35=00000000 d17=0000000000000000 s36=fe68ff1e s37=fff0e878 d18=fff0e878fe68ff1e s38=ffffffff s39=ffffffff d19=ffffffffffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=02d7de35 s43=00000000 d21=0000000002d7de35 s44=00000004 s45=00000000 d22=0000000000000004 s46=00f29f67 s47=00000000 d23=0000000000f29f67 s48=ff50a27a s49=edbdebf6 d24=edbdebf6ff50a27a s50=1201d4a5 s51=00000000 d25=000000001201d4a5 s52=00a18f91 s53=0165769a d26=0165769a00a18f91 s54=00d68a31 s55=0168563a d27=0168563a00d68a31 s56=01db6116 s57=0061a35e d28=0061a35e01db6116 s58=0030d1af s59=00d68a31 d29=00d68a310030d1af s60=5ceb425c s61=00076b8e d30=00076b8e5ceb425c s62=6f169905 s63=0013dbdb d31=0013dbdb6f169905 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83099b18 R01=5b722000 R02=8416c800 R03=df80a000 R04=83099b18 R05=00000003 R06=81d0ef64 R07=00000013 R08=00000001 R09=8416c800 R10=829594d4 R11=df805f64 R12=df805f68 R13=df805f50 R14=802ecef8 R15=80991c34 PSR=200f0193 --C- A S svc32 s00=000000ff s01=00000000 d00=00000000000000ff s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=63538263 s11=37010135 d05=3701013563538263 s12=0379010e s13=1a0f0c06 d06=1a0f0c060379010e s14=3633211c s15=39773b3a d07=39773b3a3633211c s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 80000010