last executing test programs: 4m39.906650057s ago: executing program 2 (id=53): syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000009e602206d0414c340000000000109022400010400"], 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x25dfdbfb, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 4m38.259632773s ago: executing program 2 (id=74): mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x27) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) sendfile(r0, r1, 0x0, 0x20000000000006) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000580)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fff0001}]}) tee(r2, r3, 0x4000, 0x0) 4m38.133238434s ago: executing program 2 (id=77): pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) splice(r3, 0x0, r4, 0x0, 0xf3a, 0x0) tee(r0, r4, 0x8f5, 0x100000000000000) ioctl$sock_inet_sctp_SIOCINQ(r4, 0x541b, 0x0) write(r2, 0x0, 0x0) 4m37.939094486s ago: executing program 2 (id=82): mkdir(&(0x7f0000001a80)='./file0\x00', 0x1cb) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='.\x00', 0x0, 0x8b7840, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) mkdir(&(0x7f0000000140)='./file0/../file0\x00', 0x190) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x2042, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000240), 0x200001, 0x0) 4m37.864067119s ago: executing program 2 (id=84): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x40040, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd0a, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x0, 0x4}, {0xffff, 0xffff}, {0xfff2, 0xfff1}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@newtfilter={0x9c, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {0xb, 0xfff3}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x68, 0x2, [@TCA_MATCHALL_ACT={0x5c, 0x2, [@m_skbedit={0x58, 0x1, 0x0, 0x0, {{0xc}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8, 0x5, 0x2}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x0, 0x8, 0xffffffffffffffff, 0x6, 0x77}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}]}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4814}, 0x0) 4m37.67847798s ago: executing program 2 (id=86): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="7800000010000304000000000000000000007400", @ANYRES32=0x0, @ANYBLOB="00000000600000005800128008000100677470004c00028008000100", @ANYRES32=r1], 0x78}}, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000001a00)={@val={0x8, 0x800}, @val={0x7, 0x0, 0x0, 0x0, 0x14}, @ipv4=@udp={{0x5, 0x4, 0x3, 0x1b, 0x30, 0x66, 0x0, 0x40, 0x11, 0x0, @private=0xa0100ff, @dev={0xac, 0x14, 0x14, 0x12}}, {0x4e24, 0x4e20, 0x1c, 0x0, @gue={{0x2, 0x1, 0x2, 0xaf, 0x0, @val=0x80}, "10cb0039b52162714eff6f6b"}}}}, 0x3e) 4m37.67833432s ago: executing program 32 (id=86): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="7800000010000304000000000000000000007400", @ANYRES32=0x0, @ANYBLOB="00000000600000005800128008000100677470004c00028008000100", @ANYRES32=r1], 0x78}}, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000001a00)={@val={0x8, 0x800}, @val={0x7, 0x0, 0x0, 0x0, 0x14}, @ipv4=@udp={{0x5, 0x4, 0x3, 0x1b, 0x30, 0x66, 0x0, 0x40, 0x11, 0x0, @private=0xa0100ff, @dev={0xac, 0x14, 0x14, 0x12}}, {0x4e24, 0x4e20, 0x1c, 0x0, @gue={{0x2, 0x1, 0x2, 0xaf, 0x0, @val=0x80}, "10cb0039b52162714eff6f6b"}}}}, 0x3e) 4m28.660762429s ago: executing program 5 (id=152): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x5, @local, 0x3b67}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x8848) setresuid(0x0, 0x0, 0x0) set_mempolicy(0x2, 0x0, 0x4) prctl$PR_MCE_KILL(0x4e, 0x1, 0x1000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) 4m26.08151908s ago: executing program 5 (id=183): setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r0 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000000000)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x8001, 0x6) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x8000000000000000, 0xa200, 0xfffffffffffffffc, 0xc, 0x1, 0x10}) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) 4m25.934787325s ago: executing program 5 (id=185): timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f00000002c0)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000000000000) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) 4m25.152949486s ago: executing program 5 (id=196): mkdir(&(0x7f0000001a80)='./file0\x00', 0x1cb) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='.\x00', 0x0, 0x8b7840, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) mkdir(&(0x7f0000000140)='./file0/../file0\x00', 0x190) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x2042, 0x0) mount$bpf(0x200000000000, &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0xb8944e, 0x0) 4m25.085182657s ago: executing program 5 (id=199): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x41, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x2202e}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20048050}, 0x40014) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e00000027f"], 0x14) close(0x3) 4m24.150774044s ago: executing program 5 (id=209): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="020000000000000002000000e0"], 0x190) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="020000000000000002000000e001"], 0x190) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x10000000, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) 4m24.098537652s ago: executing program 33 (id=209): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="020000000000000002000000e0"], 0x190) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="020000000000000002000000e001"], 0x190) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x10000000, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) 3m13.626810603s ago: executing program 0 (id=1049): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0x4, 0x8, 0x9}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r1, r2, 0x4}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r3, r4, 0x26}, 0x10) r5 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r3, &(0x7f0000000240), &(0x7f00000000c0)=@tcp=r5}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000100), &(0x7f00000001c0)=@tcp=r5}, 0x20) close_range(r0, 0xffffffffffffffff, 0x0) 3m13.617628774s ago: executing program 0 (id=1050): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f000068c000/0xc000)=nil, &(0x7f0000817000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0x30bd, 0xc000, 0x8, 0x40000183}) sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20040810) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000100)={0xf, 0x1f, 0x2, 0x2}, 0x51) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) prlimit64(0x0, 0x6, &(0x7f0000000140)={0x0, 0x4}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0208000004"], 0x48) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 3m13.598096538s ago: executing program 0 (id=1051): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_setup(0x1e1e, &(0x7f0000000280)={0x0, 0x86f7, 0x10100}, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c030000160001000000000000000000fc010000000000000000000000000000fe88000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac141400000000000000000000000000000000006c"], 0x34c}}, 0x0) socket(0xa, 0x3, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x91) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2040, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c000280050001000000000024000280140001800800010000000000080002"], 0x64}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 3m13.530071049s ago: executing program 0 (id=1056): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000003c0)='./bus\x00', 0xe, &(0x7f0000000540)={[{@init_itable}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1ff}}, {@stripe}, {@noblock_validity}]}, 0x3, 0x451, &(0x7f0000000f80)="$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") syz_mount_image$vfat(&(0x7f0000000b00), &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x181d011, 0x0, 0x40, 0x0, &(0x7f0000000140)) creat(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000, 0x0) quotactl$Q_SETINFO(0xffffffff80000601, 0x0, 0x0, 0x0) socket(0x400000000010, 0x3, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x8000, 0xa0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0xc, "ef359f413bb9386ff7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e7376b7a5ff537ed73ac58818d78c660e677df8dc905b90242b7c528a076d2f6a00400", "036c5bc6780820d1cbf7966d61fdcf335263bd9b0abdc2542ded71038259ca171ce1a311ef545032d71e14ef3dc177e9b48b001d00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x8]}) rmdir(&(0x7f0000000080)='./file0\x00') 3m13.140898715s ago: executing program 0 (id=1057): prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) setpgid(0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0xf507, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x2, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000400000000000000080003851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50afdff00000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0xa}, 0x94) 3m12.712216286s ago: executing program 0 (id=1066): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200c093, 0x1, @perf_bp={0x0, 0x8}, 0x24, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2982, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x804000, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x4d, 0x1, 0x3, 0xfffe, 0x17, "9d54c717e62ba8bd"}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) pwritev2(r2, 0x0, 0x0, 0x1, 0x6, 0x0) syz_emit_ethernet(0x1de, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd605adf000000000000020000000000000000000000000000fe8000000000000000000000000000aa2234c2"], 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x40200, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000100)=0x13) 3m12.668603883s ago: executing program 34 (id=1066): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200c093, 0x1, @perf_bp={0x0, 0x8}, 0x24, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2982, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x804000, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x4d, 0x1, 0x3, 0xfffe, 0x17, "9d54c717e62ba8bd"}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) pwritev2(r2, 0x0, 0x0, 0x1, 0x6, 0x0) syz_emit_ethernet(0x1de, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd605adf000000000000020000000000000000000000000000fe8000000000000000000000000000aa2234c2"], 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x40200, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000100)=0x13) 2m27.401599847s ago: executing program 1 (id=1452): gettid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a3100000000090003007379"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x40090) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x2af5) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a31000000000c00078008000640000007010500050002000000050004000000000016000300686173683a6e65742c706f7274"], 0x5c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @empty, 0x3}], 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0xa, 0x4e24, 0x7fff, @loopback, 0x6}, 0x1c, &(0x7f0000000440)}, 0x40850) sendmsg$IPSET_CMD_ADD(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000090601020000ffff00000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) 2m26.482049651s ago: executing program 1 (id=1456): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffa3}, 0x48) 2m25.540230059s ago: executing program 1 (id=1457): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="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"], 0x25, 0x359, &(0x7f0000000bc0)="$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") r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newtaction={0xb4, 0x30, 0x1, 0x70bd2b, 0x25dfdbde, {}, [{0xa0, 0x1, [@m_bpf={0x58, 0x1, 0x0, 0x0, {{0x8}, {0x32, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x1}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0xef, 0x1, 0x8000, 0x2}}, @TCA_ACT_BPF_OPS={0xc, 0x4, [{0x16, 0xf2, 0x3, 0x7}]}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_bpf={0x44, 0x2, 0x0, 0x0, {{0x8}, {0x1c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x2, 0x0, 0x6, 0x80}}]}, {0xffffffffffffffe6}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0xc044}, 0x4000814) 2m20.714145707s ago: executing program 1 (id=1470): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000003c0)='./bus\x00', 0xe, &(0x7f0000000540)={[{@init_itable}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1ff}}, {@stripe}, {@noblock_validity}]}, 0x3, 0x451, &(0x7f0000000f80)="$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") syz_mount_image$vfat(&(0x7f0000000b00), &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x181d011, 0x0, 0x40, 0x0, &(0x7f0000000140)) creat(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000, 0x0) quotactl$Q_SETINFO(0xffffffff80000601, 0x0, 0x0, 0x0) socket(0x400000000010, 0x3, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x8000, 0xa0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0xc, "ef359f413bb9386ff7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e7376b7a5ff537ed73ac58818d78c660e677df8dc905b90242b7c528a076d2f6a00400", "036c5bc6780820d1cbf7966d61fdcf335263bd9b0abdc2542ded71038259ca171ce1a311ef545032d71e14ef3dc177e9b48b001d00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x8]}) rmdir(&(0x7f0000000080)='./file0\x00') 2m20.45496834s ago: executing program 1 (id=1471): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) mount$cgroup2(0x0, &(0x7f00000004c0)='.\x00', &(0x7f0000000480), 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='memory_recursiveprot,memory_recursiveprot,nsdelegate,memory_recursiveprot,nsdelegate,memory_localevents']) timer_create(0x2, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, 0x0) timer_create(0x3, &(0x7f0000533fa0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0d000000040000000400000007"], 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./bus\x00', 0x0, &(0x7f0000000080)={[{@jqfmt_vfsv0}, {@usrquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x100}}, {@resuid}, {@errors_remount}, {@nodiscard}, {@journal_ioprio}]}, 0x3, 0x43a, &(0x7f0000000340)="$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") syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x399446c, 0x0, 0x1, 0x0, &(0x7f0000000080)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000200)='./file0\x00', 0x4) 2m19.679591749s ago: executing program 1 (id=1473): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'caif0\x00', {0x2, 0x4e24, @empty}}) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x18215, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x4, 0x4) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r1, &(0x7f0000004d00)=[{{0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x30000}}], 0x300, 0xf00) 2m19.67944968s ago: executing program 35 (id=1473): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'caif0\x00', {0x2, 0x4e24, @empty}}) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x18215, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x4, 0x4) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r1, &(0x7f0000004d00)=[{{0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x30000}}], 0x300, 0xf00) 3.724155537s ago: executing program 6 (id=3116): r0 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x8) socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0x42795000) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') munmap(&(0x7f0000123000/0x4000)=nil, 0x4000) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000003200)=""/4096, 0x1000}], 0x1, 0x2c2, 0xca) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x12, 0x2, 0x6, 0x9, 0x40, 0x8000}, 0x0, &(0x7f0000000240)={0x1f, 0x112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000004}, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000200), 0x4) pipe2$9p(&(0x7f0000000100), 0x4000) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TCSETSF(r3, 0x5433, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848160000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x80054) 3.249503456s ago: executing program 6 (id=3129): prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x4d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xe723, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x100) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), r4) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r5, 0x5973a3c4219537e5, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4044841}, 0x8000) 2.292050506s ago: executing program 6 (id=3149): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) r5 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5b, 0x4, 0x10000, 0x4, 0xffffffff}, 0x1c) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="350400002f000511d25a80648c63940d0224fc60040006400c0003000200002037153e370c040180060410004500", 0x2e}, {&(0x7f0000000600)="d4fa0c511aad03aa5ed217677bc41c027d9c830c439c7f821ddd78b6915cb170e7603acf9e433c2903bb6773f4b0130668a1e5b5e08d21d0b69c28ca3455aed65855c86f3d1e5789d26375a0d85eaf5e92e19c9affcf76e7a94e76556d2b104ebf645747fadc91460f4b3c94e1a89b51be4a6aa4c65285f988329a8163b69c51b801500a5bacd0463976e2960e2679ef2feee5e6ce6bb78a51fb0e15820d13e4a5aa9e0742a6f8d677ad28fea356657bb550c8311b682d9003c82267a15aa7334bc53b65b9119a1a7d905c7dd365b85c230bbad0d5d0a79819e112637819d9a187cfdf782c6127d2d4281926ab0e22f7346b616fe28ed0b9f4a0c9fdac6d3a90a9c38b5e31448a45546388c95045bc2261c238a5159ea98db9c00aeef644ae98a8cb8da3ff3b7ba14d7971910b559623af829524d83bf19f18628464076329140e0203fc75859185ccd019302afb784e41e16cf2d31db7aba83d0f500ce25fc2d7f524a04cfaa0015ea8a297477a5517f8a4ac167083a321c78070974afc897fb738fbcfeac369844fd7fc11fff502c02b7607007ead2007a18006a6ca8dc2d0119f01d7083c2ab5760ac7b24d7bf26b9030cf455a08385f9e662cbe0c3ca6e6fd4ac0c8566c0fca986c68ef7016a11d3e44253b6f2d07d53505ed58b8ad410f89425046321b4a9b27b5e767bdfa0ebf7abf3d91b319129c48853d8e5cbc4a2c5c560b007eafe03e3332f6017f3164c7f602180aad23dfe5e770fe8855f45925e342b7dfd7ddaa68b65065465cdf4d5b8d995d6e6a7042ebea3d139c6a616232eb4efd1a50d0e6db3188a8e98375fda2a7ebd4cd59b9ea626c13685b05e6cf4d484e32869fd7c7167dbfa48b1529e5dd5f5a02673ccc7dbedfd75e34f3f9eb3c7833734a59acada6dd2ff364475e03f2219deedb5d0c941f2177a23167adcc5a15f4e5441ed537f26a1620df057aeb55b2ad3a00a77e23d304ed6034dd5ec9b2cfe777ca21ec4f48abdafa0d66a78d653068ef871bdc6598fd32edcba60c675a1e8f4e81e83f73414c179bfb7f329d71fe6e291fb2eaa59b9636cb6a74d0deb46a18c77f37abf0894a7083e0e4c237ff7c24872668ac40e307569a975b2765af8d3268d11b473d5d7544edd1ed0e507c319e128daf7e75c349c9b3de603580d52a6c118acf924216130364bfab8d59969e4dbee0a9208adb7bfa855556be06a666334a0612e4ff3fc6f4ddb9a0c209301081f34824496480d688ae9bd0c3c28ea8ecfe01a2b86dcb3750686a89891d9abf0d584c854b4bc6096293fbc8707312f424996361ef9261ef3ba7cd2ddffb0e3c81e6b962d680e02f7a672dc2643cc24ad64d86fb4780827ca784a8af3376c2567bfde74dc50e16c81b71450af026459e2c37d94b8461b56ff944edc1a8cd93d0258fcc2f094615c152be66884103af11ff46315cdc9f", 0x407}], 0x2}, 0x4000014) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 2.107192107s ago: executing program 6 (id=3151): unshare(0x26020480) syz_io_uring_setup(0x10ca, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x1454, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x2, &(0x7f0000006680)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000180)="cf", 0x1}], 0x1) mknod(&(0x7f0000000080)='./bus\x00', 0x1000, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x60102, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) tee(r3, r4, 0x3, 0x0) 2.038610129s ago: executing program 6 (id=3154): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) r5 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5b, 0x4, 0x10000, 0x4, 0xffffffff}, 0x1c) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="350400002f000511d25a80648c63940d0224fc60040006400c0003000200002037153e370c040180060410004500", 0x2e}, {&(0x7f0000000600)="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", 0x407}], 0x2}, 0x4000014) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 1.941739295s ago: executing program 6 (id=3159): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x17440000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@file={0x0, './mnt\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa420, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x8000000004) capset(&(0x7f0000000dc0)={0x20080522}, &(0x7f0000000e00)={0x0, 0x4, 0x4, 0x0, 0x80000, 0x3}) writev(r5, &(0x7f0000000000)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd00000010000100050808004149014006040800", 0x58}], 0x1) 1.702549425s ago: executing program 4 (id=3166): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000811}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newtaction={0x6c, 0x30, 0x871a15abc695fb3f, 0x70bd27, 0x1, {}, [{0x58, 0x1, [@m_nat={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x5c, 0x8001, 0x3, 0x5, 0x752a}, @multicast1, @broadcast, 0xffffff00, 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1}}}}]}]}, 0x6c}}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2b, 0x1, 0xa, 0x0, 0x0, 0x2, 0xf4263, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0x0, 0x3}, 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r1) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000100)=ANY=[], 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x38, r3, 0x601, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x5, 0x1}]}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x2400c005}, 0x40) ioctl$EVIOCRMFF(r1, 0x40095505, &(0x7f0000000500)) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newsa={0x144, 0x10, 0x1, 0xfffffffe, 0x100, {{@in6=@local, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x714, 0x4e23, 0x1, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@remote, {0x0, 0x192, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0xffffffffffffffff, 0x0, 0x9, 0xfffffffffffffffe}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3504, 0xa, 0x1, 0x0, 0x25}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @offload={0xc, 0x1c, {0x0, 0x2}}]}, 0x144}, 0x1, 0x0, 0x0, 0x8801}, 0x0) 1.649197494s ago: executing program 3 (id=3167): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5b, 0x4, 0x10000, 0x4, 0xffffffff}, 0x1c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 1.551254541s ago: executing program 3 (id=3170): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) r5 = socket$kcm(0x10, 0x2, 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5b, 0x4, 0x10000, 0x4, 0xffffffff}, 0x1c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="350400002f000511d25a80648c63940d0224fc60040006400c0003000200002037153e370c040180060410004500", 0x2e}, {&(0x7f0000000600)="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", 0x407}], 0x2}, 0x4000014) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 1.522087665s ago: executing program 3 (id=3172): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) r5 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="350400002f000511d25a80648c63940d0224fc60040006400c0003000200002037153e370c040180060410004500", 0x2e}, {&(0x7f0000000600)="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", 0x407}], 0x2}, 0x4000014) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 1.438857919s ago: executing program 3 (id=3174): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) clock_adjtime(0x0, &(0x7f0000000380)={0x3ff, 0x8, 0x4101, 0x4000000000400b, 0xffffdffffffffffe, 0x9, 0x400000403, 0x80000000000a, 0x100000005, 0x2000, 0x3, 0x0, 0xffffffffffffffff, 0x81, 0x20000000000009f, 0xe, 0xfffffffffffffffc, 0x6, 0x0, 0x8, 0x4000008001, 0x3, 0xb, 0x3, 0x729f, 0xe}) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0xff600000, 0x1000000}], 0x0) syz_emit_ethernet(0x46, &(0x7f0000000800)={@random="61fe71b72b5f", @link_local={0x17, 0x80, 0xc2, 0x2, 0x9}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d23396", 0x10, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}}, 0x0) 1.436270839s ago: executing program 3 (id=3176): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) r5 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="350400002f000511d25a80648c63940d0224fc60040006400c0003000200002037153e370c040180060410004500", 0x2e}, {&(0x7f0000000600)="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", 0x407}], 0x2}, 0x4000014) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 1.420277892s ago: executing program 8 (id=3177): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5b, 0x4, 0x10000, 0x4, 0xffffffff}, 0x1c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 960.537439ms ago: executing program 4 (id=3178): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) unshare(0x6a040000) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x24, 0x68, 0x309, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}, @NHA_ID={0x8, 0x1, 0x1}]}, 0x24}}, 0x0) 959.447849ms ago: executing program 8 (id=3179): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) clock_adjtime(0x0, &(0x7f0000000380)={0x3ff, 0x8, 0x4101, 0x4000000000400b, 0xffffdffffffffffe, 0x9, 0x400000403, 0x80000000000a, 0x100000005, 0x2000, 0x3, 0x0, 0xffffffffffffffff, 0x81, 0x20000000000009f, 0xe, 0xfffffffffffffffc, 0x6, 0x0, 0x8, 0x4000008001, 0x3, 0xb, 0x3, 0x729f, 0xe}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0xff600000, 0x1000000}], 0x0) 957.10901ms ago: executing program 3 (id=3180): r0 = syz_clone(0x2280400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x2000c8c0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) fsopen(&(0x7f0000000040)='cgroup2\x00', 0x1) r4 = socket(0x200000000000011, 0x2, 0x3c644) getsockopt$packet_int(r4, 0x107, 0xa, 0x0, &(0x7f0000000100)) 867.571255ms ago: executing program 8 (id=3182): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 783.809929ms ago: executing program 4 (id=3183): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) r5 = socket$kcm(0x10, 0x2, 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5b, 0x4, 0x10000, 0x4, 0xffffffff}, 0x1c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="350400002f000511d25a80648c63940d0224fc60040006400c0003000200002037153e370c040180060410004500", 0x2e}, {&(0x7f0000000600)="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", 0x407}], 0x2}, 0x4000014) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 747.359955ms ago: executing program 4 (id=3184): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) r5 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5b, 0x4, 0x10000, 0x4, 0xffffffff}, 0x1c) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="350400002f000511d25a80648c63940d0224fc60040006400c0003000200002037153e370c040180060410004500", 0x2e}, {&(0x7f0000000600)="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", 0x407}], 0x2}, 0x4000014) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 623.109456ms ago: executing program 8 (id=3186): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) clock_adjtime(0x0, &(0x7f0000000380)={0x3ff, 0x8, 0x4101, 0x4000000000400b, 0xffffdffffffffffe, 0x9, 0x400000403, 0x80000000000a, 0x100000005, 0x2000, 0x3, 0x0, 0xffffffffffffffff, 0x81, 0x20000000000009f, 0xe, 0xfffffffffffffffc, 0x6, 0x0, 0x8, 0x4000008001, 0x3, 0xb, 0x3, 0x729f, 0xe}) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0xff600000, 0x1000000}], 0x0) syz_emit_ethernet(0x46, &(0x7f0000000800)={@random="61fe71b72b5f", @link_local={0x17, 0x80, 0xc2, 0x2, 0x9}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d23396", 0x10, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}}, 0x0) 606.910028ms ago: executing program 4 (id=3187): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) r5 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="350400002f000511d25a80648c63940d0224fc60040006400c0003000200002037153e370c040180060410004500", 0x2e}, {&(0x7f0000000600)="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", 0x407}], 0x2}, 0x4000014) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 490.868188ms ago: executing program 4 (id=3189): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) socket(0x2, 0x80805, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) recvmmsg(r3, &(0x7f0000007700), 0x318, 0xfc0, 0x0) 481.559489ms ago: executing program 8 (id=3190): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000001100)=ANY=[@ANYBLOB="84000000000801010000000000000000030000020900010073797a31000000000600024088090000540004800800024000000005080005400000000608000940000000020800034000000400080007400000007f08000940000000060800054000000001080001400000000608000440000000020800094000000003050003008400"], 0x84}, 0x1, 0x0, 0x0, 0x20024810}, 0x0) getpid() syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000340)='./file1\x00', 0x200010, &(0x7f0000002f40)={[{@nobarrier}, {@dioread_lock}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@nolazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@errors_remount}, {@stripe={'stripe', 0x3d, 0x10}}, {@bh}, {@init_itable}]}, 0xfc, 0x56f, &(0x7f0000003780)="$eJzs3d9rW1UcAPDvTdPup66DMdQHGezByVy6tv6YIDgfRYcDfZ+hzcpouowmHWsduD24F19kCCIOxD/Adx+H/4B/xUAHQ0bRBxEiN73psjZp2i4z2fL5wG3Pyb23535z7vf2nNyEBDC0jqU/chEvR8Q3ScShlnX5yFYeW9tu9eH1mXRJol7/9M8kkuyx5vZJ9vtAVnkpIn79KuJkbnO71eWV+WK5XFrM6hO1hSsT1eWVU5cWinOludLlqenpM29NT737zts9i/X1839//8ndD898fXz1u5/vH76dxNk4mK1rjeMJ3GitHCv+m5VG4+yGDSd70NggSfp9AOzKSJbno5FeAw7FSJb1wPPvy4ioA0Mqkf8wpJrjgObcvkfz4GfGgw/WJkCN2Mda48+vvTYSextzo/2ryWMzo3S+O96D9tM2fvnjzu10ia1fh9jXpQ6wIzduRsTpfH7z9T/Jrn+7d7rx4vHWNrYxbP9/oJ/upuOfN9qN/3Lr459oM/450CZ3d6N7/ufu96CZjtLx33ttx7/rl67xkaz2QmPMN5pcvFQunY6IFyPiRNS73vo4s3qv3mld6/gvXdL2m2PB7Dju5/c8vs9ssVaMiLFdhvyYBzcjXsm3iz9Z7/+kTf+nz8f5bbZxtHTn1U7rusf/dNV/initbf8/6tZk6/uTE43zYaJ5Vmz2162jv3Vqv9/xp/2/f+v4x5PW+7XVnbfx495/Sp3W7fb8H0s+a5SbSXCtWKstTkaMJR9vfnzq0b7NenP7NP4Tx7e+/rU7/9PJ1+fbjP/WkVsdNx2E/p/dUf/vvHDvoy9+6NT+9vr/zUbpRPZIdv1rLztXtnuAT/r8AQAAAAAAwCDJRcTBSHKF9XIuVyisvb/jSOzPlSvV2smLlaXLs9H4rOx4jOaad7oPtbwfYjJ7P2yzPrWhPh0RhyPi25F9jXphplKe7XfwAAAAAAAAAAAAAAAAAAAAMCAOdPj8f+r3kX4fHfDUNb7YYE+/jwLoh65f+d+Lb3oCBlLX/AeeW/Ifhpf8h+El/2F4yX8YXvIfhpf8h+El/wEAAAAAAAAAAAAAAAAAAAAAAAAAAKCnzp87ly711YfXZ9L67NXlpfnK1VOzpep8YWFppjBTWbxSmKtU5sqlwkxlodvfK1cqVyanYunaRK1UrU1Ul1cuLFSWLtcuXFoozpUulEb/l6gAAAAAAAAAAAAAAAAAAADg2VJdXpkvlsulRYWOhfdjIA7jaQa4Zle75wclCoUOhZtZ9+5srz5elAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgg/8CAAD//4yLMZo=") bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0xa, 0x3, 0x0, 0x92bd, 0x585c, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x4, @perf_config_ext={0x0, 0x3ad6}, 0x40, 0x0, 0x7, 0x6, 0x0, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x4000020000000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) fallocate(r2, 0x0, 0x0, 0x8ffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0xc41, 0x20) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2141, 0x59) pwrite64(r4, &(0x7f0000000140)="f6", 0xffffff07, 0x8000c61) fallocate(r3, 0x20, 0x4000, 0x3000000) 473.43602ms ago: executing program 7 (id=3191): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() mount$9p_virtio(0x0, &(0x7f0000001000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000003c0), 0x840020, &(0x7f0000000580)={'trans=virtio,', {[{@cachetag}, {@version_9p2000}, {@aname={'aname', 0x3d, '{(\'(%{&+'}}]}}) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000032) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r4, &(0x7f00000029c0), 0x400006d, 0x20000004) 370.403288ms ago: executing program 7 (id=3192): socket$xdp(0x2c, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000140)=0x40, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00', 0x0}) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000300)=0x2, 0x4) bind$xdp(r4, &(0x7f0000000100)={0x2c, 0x0, r6}, 0x10) socket$nl_route(0x10, 0x3, 0x0) bind$xdp(r1, &(0x7f0000000240)={0x2c, 0x1, r6, 0x0, r4}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xe}, {}, {0x7, 0xd}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) 328.197185ms ago: executing program 7 (id=3193): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) clock_adjtime(0x0, &(0x7f0000000380)={0x3ff, 0x8, 0x4101, 0x4000000000400b, 0xffffdffffffffffe, 0x9, 0x400000403, 0x80000000000a, 0x100000005, 0x2000, 0x3, 0x0, 0xffffffffffffffff, 0x81, 0x20000000000009f, 0xe, 0xfffffffffffffffc, 0x6, 0x0, 0x8, 0x4000008001, 0x3, 0xb, 0x3, 0x729f, 0xe}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0xff600000, 0x1000000}], 0x0) 281.134323ms ago: executing program 7 (id=3194): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20022, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_config_ext={0x8000000000000000, 0xf794}, 0x0, 0x400000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = syz_open_procfs(0x0, &(0x7f00000193c0)='net/igmp6\x00') pread64(r2, &(0x7f0000019400)=""/102344, 0xfffffcbb, 0x1c2a) r3 = socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) io_uring_register$IORING_REGISTER_RESIZE_RINGS(0xffffffffffffffff, 0x21, &(0x7f00000000c0)={0x0, 0x62c4, 0x200, 0x1, 0x7}, 0x1) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) pipe2(&(0x7f0000000100), 0x84800) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000500), 0x8, 0x0) r5 = syz_io_uring_setup(0x2, &(0x7f0000000580)={0x0, 0x8b2, 0x13500, 0x0, 0x304}, &(0x7f0000000240), 0x0, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r5, 0x21, &(0x7f0000000440)=r4, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0xc5ec3, 0x0) 193.264018ms ago: executing program 7 (id=3195): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) r5 = socket$kcm(0x10, 0x2, 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5b, 0x4, 0x10000, 0x4, 0xffffffff}, 0x1c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="350400002f000511d25a80648c63940d0224fc60040006400c0003000200002037153e370c040180060410004500", 0x2e}, {&(0x7f0000000600)="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", 0x407}], 0x2}, 0x4000014) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 599.8µs ago: executing program 8 (id=3196): socket$netlink(0x10, 0x3, 0x0) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r0 = creat(0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x51, 0xd, &(0x7f0000000380)) dup2(r2, r1) write$cgroup_int(r0, &(0x7f0000000540), 0xfffffdd8) madvise(&(0x7f0000000000/0x400000)=nil, 0x40001e, 0x15) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) socket$xdp(0x2c, 0x3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r3, &(0x7f0000000300)=ANY=[], 0xff2e) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000140)={0x8001, 0x7, 0x0, 0xffffffff, 0x15, "2ea98072973aefba56a9f8e8f77f20fbf5974a"}) 0s ago: executing program 7 (id=3206): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) socket$netlink(0x10, 0x3, 0xc) socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_pidfd_open(r0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0xff01, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, 0x0, 0x0}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x111, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180), 0x2, 0x4}}, 0xe) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) kernel console output (not intermixed with test programs): 963][ T9128] IPVS: using max 1872 ests per chain, 93600 per kthread [ 209.311198][ T9146] syzkaller0: entered promiscuous mode [ 209.317162][ T9146] syzkaller0: entered allmulticast mode [ 209.600463][ T9153] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1807'. [ 209.971872][ T9167] netlink: 'syz.7.1811': attribute type 1 has an invalid length. [ 209.992181][ T9167] 8021q: adding VLAN 0 to HW filter on device bond4 [ 210.127978][ T9178] syzkaller0: entered promiscuous mode [ 210.143280][ T9178] syzkaller0: entered allmulticast mode [ 210.425840][ T9185] IPVS: fo: FWM 3 0x00000003 - no destination available [ 210.665855][ T9191] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1821'. [ 210.680950][ T9191] netlink: 12 bytes leftover after parsing attributes in process `syz.8.1821'. [ 210.719048][ T9191] vlan3: entered promiscuous mode [ 210.724612][ T9191] bridge1: entered promiscuous mode [ 210.732556][ T9191] vlan3: entered allmulticast mode [ 210.743590][ T9191] bridge1: entered allmulticast mode [ 211.316506][ T9201] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 211.651157][ T9207] x_tables: duplicate entry at hook 2 [ 211.896821][ T9236] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1838'. [ 211.939798][ T9236] bond8 (unregistering): Released all slaves [ 211.959368][ T9240] syzkaller0: entered promiscuous mode [ 211.965227][ T9240] syzkaller0: entered allmulticast mode [ 212.003871][ T9245] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1843'. [ 212.096784][ T9245] netlink: 'syz.7.1843': attribute type 1 has an invalid length. [ 212.134100][ T9259] syzkaller0: entered promiscuous mode [ 212.139896][ T9259] syzkaller0: entered allmulticast mode [ 212.195323][ T9266] bridge0: port 4(gretap0) entered blocking state [ 212.202395][ T9266] bridge0: port 4(gretap0) entered disabled state [ 212.209972][ T9266] gretap0: entered allmulticast mode [ 212.221502][ T9266] gretap0: entered promiscuous mode [ 212.421864][ T9286] syzkaller0: entered promiscuous mode [ 212.433028][ T9286] syzkaller0: entered allmulticast mode [ 212.444854][ T9288] dummy0: entered promiscuous mode [ 212.450860][ T9288] dummy0: left promiscuous mode [ 212.782257][ T9303] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1868'. [ 212.802406][ T9303] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9303 comm=syz.4.1868 [ 213.148665][ T10] IPVS: starting estimator thread 0... [ 213.215824][ T9338] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1883'. [ 213.253255][ T9333] IPVS: using max 1728 ests per chain, 86400 per kthread [ 213.300134][ T28] kauditd_printk_skb: 500 callbacks suppressed [ 213.300229][ T28] audit: type=1400 audit(1776110404.032:18691): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 213.391305][ T28] audit: type=1400 audit(1776110404.126:18693): avc: denied { read write } for pid=6815 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 213.422938][ T28] audit: type=1326 audit(1776110404.126:18692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9340 comm="syz.4.1885" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec6fc819 code=0x7ffc0000 [ 213.449809][ T28] audit: type=1326 audit(1776110404.126:18694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9340 comm="syz.4.1885" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec6fc819 code=0x7ffc0000 [ 213.478899][ T28] audit: type=1326 audit(1776110404.126:18695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9340 comm="syz.4.1885" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec6fc819 code=0x7ffc0000 [ 213.506481][ T28] audit: type=1326 audit(1776110404.126:18696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9340 comm="syz.4.1885" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec6fc819 code=0x7ffc0000 [ 213.535310][ T28] audit: type=1326 audit(1776110404.126:18697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9340 comm="syz.4.1885" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fb8ec6fc819 code=0x7ffc0000 [ 213.575024][ T28] audit: type=1400 audit(1776110404.126:18698): avc: denied { open } for pid=9340 comm="syz.4.1885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 213.595017][ T28] audit: type=1326 audit(1776110404.126:18699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9340 comm="syz.4.1885" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec6fc819 code=0x7ffc0000 [ 213.634692][ T28] audit: type=1326 audit(1776110404.126:18700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9340 comm="syz.4.1885" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec6fc819 code=0x7ffc0000 [ 213.775781][ T9351] bridge_slave_0: left allmulticast mode [ 213.820187][ T9360] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1888'. [ 213.829425][ T9351] bridge_slave_0: left promiscuous mode [ 213.835247][ T9351] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.844729][ T9351] bridge_slave_1: left allmulticast mode [ 213.850684][ T9351] bridge_slave_1: left promiscuous mode [ 213.857226][ T9351] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.867812][ T9351] bond0: (slave bond_slave_0): Releasing backup interface [ 213.889387][ T9351] bond0: (slave bond_slave_1): Releasing backup interface [ 213.920747][ T9351] team0: Port device team_slave_0 removed [ 213.942457][ T9351] team0: Port device team_slave_1 removed [ 213.962767][ T9351] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 213.988797][ T9351] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 214.009585][ T9351] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 214.020501][ T9351] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 214.038209][ T9351] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 214.200618][ T9379] netlink: 12 bytes leftover after parsing attributes in process `syz.6.1898'. [ 214.232335][ T9379] veth3: entered allmulticast mode [ 214.625935][ T9391] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1902'. [ 214.660577][ T9391] netlink: 20 bytes leftover after parsing attributes in process `syz.7.1902'. [ 214.695576][ T9393] netlink: 'syz.3.1905': attribute type 21 has an invalid length. [ 214.722755][ T9393] netlink: 128 bytes leftover after parsing attributes in process `syz.3.1905'. [ 214.734290][ T9393] netlink: 'syz.3.1905': attribute type 4 has an invalid length. [ 214.745701][ T9393] netlink: 'syz.3.1905': attribute type 3 has an invalid length. [ 214.763358][ T9393] netlink: 3 bytes leftover after parsing attributes in process `syz.3.1905'. [ 214.960589][ T9403] netlink: 28 bytes leftover after parsing attributes in process `syz.7.1909'. [ 216.120379][ T9439] netlink: 'syz.3.1921': attribute type 16 has an invalid length. [ 216.128405][ T9439] netlink: 'syz.3.1921': attribute type 17 has an invalid length. [ 216.155621][ T9439] bridge0: port 4(gretap0) entered blocking state [ 216.162161][ T9439] bridge0: port 4(gretap0) entered forwarding state [ 216.174186][ T9439] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.185553][ T9439] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 216.281355][ T9447] syzkaller0: entered promiscuous mode [ 216.293131][ T9447] syzkaller0: entered allmulticast mode [ 216.434950][ T9457] netlink: 24 bytes leftover after parsing attributes in process `syz.6.1929'. [ 216.464469][ T9457] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1929'. [ 217.071111][ T9493] netlink: 12 bytes leftover after parsing attributes in process `syz.6.1944'. [ 217.088269][ T9493] bond3 (unregistering): Released all slaves [ 217.182624][ T9502] netlink: 24 bytes leftover after parsing attributes in process `syz.7.1946'. [ 218.075869][ T28] kauditd_printk_skb: 470 callbacks suppressed [ 218.075892][ T28] audit: type=1400 audit(1776110409.050:19171): avc: denied { read write } for pid=8033 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 218.116069][ T28] audit: type=1400 audit(1776110409.092:19172): avc: denied { prog_load } for pid=9537 comm="syz.6.1960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 218.172712][ T28] audit: type=1400 audit(1776110409.145:19173): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 218.231456][ T28] audit: type=1400 audit(1776110409.145:19174): avc: denied { read write } for pid=6815 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 218.276951][ T28] audit: type=1400 audit(1776110409.176:19175): avc: denied { open } for pid=9539 comm="syz.8.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 218.306909][ T28] audit: type=1400 audit(1776110409.197:19176): avc: denied { map_create } for pid=9541 comm="syz.7.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 218.328307][ T28] audit: type=1400 audit(1776110409.197:19177): avc: denied { prog_load } for pid=9541 comm="syz.7.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 218.358257][ T28] audit: type=1400 audit(1776110409.197:19178): avc: denied { create } for pid=9541 comm="syz.7.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 218.365786][ T9547] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1963'. [ 218.389097][ T28] audit: type=1400 audit(1776110409.197:19179): avc: denied { create } for pid=9541 comm="syz.7.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 218.736742][ T28] audit: type=1400 audit(1776110409.197:19180): avc: denied { prog_load } for pid=9541 comm="syz.7.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 219.090898][ T9580] netlink: 'syz.3.1976': attribute type 10 has an invalid length. [ 219.135153][ T9580] dummy0: entered promiscuous mode [ 219.154357][ T9581] netlink: 'syz.3.1976': attribute type 10 has an invalid length. [ 219.175461][ T9580] dummy0: entered allmulticast mode [ 219.189368][ T9580] team0: Port device dummy0 added [ 219.203800][ T50] bridge0: port 3(team0) entered blocking state [ 219.210251][ T50] bridge0: port 3(team0) entered forwarding state [ 219.239272][ T9581] dummy0: left promiscuous mode [ 219.257187][ T9581] dummy0: left allmulticast mode [ 219.272735][ T9581] team0: Port device dummy0 removed [ 219.282373][ T9581] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 219.304997][ T307] bridge0: port 3(team0) entered disabled state [ 219.597449][ T9599] syzkaller0: entered promiscuous mode [ 219.608179][ T9599] syzkaller0: entered allmulticast mode [ 219.743593][ T9606] syzkaller0: entered promiscuous mode [ 219.756710][ T9606] syzkaller0: entered allmulticast mode [ 219.865872][ T9609] x_tables: duplicate entry at hook 2 [ 220.006381][ T9615] netlink: 'syz.8.1990': attribute type 10 has an invalid length. [ 220.020148][ T9615] team0: Port device dummy0 added [ 220.030824][ T9615] netlink: 'syz.8.1990': attribute type 10 has an invalid length. [ 220.042685][ T9615] team0: Port device dummy0 removed [ 220.078331][ T9615] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 220.503005][ T9645] dummy0: entered promiscuous mode [ 220.508510][ T9645] dummy0: left promiscuous mode [ 220.535420][ T9647] netlink: 'syz.7.2001': attribute type 1 has an invalid length. [ 220.745551][ T9650] bond5: (slave vxcan3): The slave device specified does not support setting the MAC address [ 220.845491][ T9650] bond5: (slave vxcan3): Error -95 calling set_mac_address [ 220.894211][ T9647] bond5: (slave bridge3): Enslaving as an active interface with a down link [ 220.988876][ T9651] macvlan2: entered promiscuous mode [ 220.995012][ T9651] macvlan2: entered allmulticast mode [ 221.007849][ T9651] bond5: entered promiscuous mode [ 221.020877][ T9651] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 221.059824][ T9651] bond5: left promiscuous mode [ 221.216766][ T9653] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 221.272737][ T9658] syzkaller0: entered promiscuous mode [ 221.288865][ T9658] syzkaller0: entered allmulticast mode [ 221.397899][ T9660] netlink: 'syz.7.2006': attribute type 10 has an invalid length. [ 221.410360][ T9660] team0: Port device dummy0 added [ 221.428622][ T9660] netlink: 'syz.7.2006': attribute type 10 has an invalid length. [ 221.453277][ T9660] team0: Port device dummy0 removed [ 221.466480][ T9660] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 221.625022][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 221.653645][ T9673] __nla_validate_parse: 2 callbacks suppressed [ 221.653664][ T9673] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2012'. [ 221.715685][ T9673] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9673 comm=syz.7.2012 [ 222.017755][ T9688] bond1: left promiscuous mode [ 222.096669][ T9688] bridge1: left promiscuous mode [ 222.104740][ T9691] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2020'. [ 222.118432][ T9688] ip6erspan0: left promiscuous mode [ 222.643559][ T9706] syzkaller0: entered promiscuous mode [ 222.658732][ T9706] syzkaller0: entered allmulticast mode [ 222.714685][ T9708] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2025'. [ 222.761602][ T9708] geneve2: entered promiscuous mode [ 222.767437][ T9708] macvlan2: entered promiscuous mode [ 222.774942][ T9708] bond0: entered promiscuous mode [ 222.783315][ T9708] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 222.907946][ T28] kauditd_printk_skb: 261 callbacks suppressed [ 222.907966][ T28] audit: type=1400 audit(1776143188.119:19442): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.030445][ T28] audit: type=1400 audit(1776143188.245:19443): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.078205][ T28] audit: type=1400 audit(1776143188.276:19444): avc: denied { read write } for pid=9714 comm="syz.3.2029" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.142990][ T28] audit: type=1400 audit(1776143188.350:19445): avc: denied { create } for pid=9714 comm="syz.3.2029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 223.209297][ T28] audit: type=1400 audit(1776143188.371:19446): avc: denied { read write } for pid=8033 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.254301][ T28] audit: type=1400 audit(1776143188.465:19447): avc: denied { read write } for pid=6815 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.280219][ T28] audit: type=1400 audit(1776143188.486:19448): avc: denied { create } for pid=9719 comm="syz.7.2031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 223.303970][ T28] audit: type=1400 audit(1776143188.518:19449): avc: denied { open } for pid=9717 comm="syz.6.2030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 223.324169][ T28] audit: type=1400 audit(1776143188.518:19450): avc: denied { read } for pid=9717 comm="syz.6.2030" dev="nsfs" ino=4026533700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 223.345912][ T28] audit: type=1400 audit(1776143188.518:19451): avc: denied { create } for pid=9719 comm="syz.7.2031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 224.390852][ T9751] syzkaller0: entered promiscuous mode [ 224.406171][ T9751] syzkaller0: entered allmulticast mode [ 225.293875][ T9771] netlink: 'syz.4.2049': attribute type 13 has an invalid length. [ 225.330594][ T9771] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 225.721525][ T9803] netlink: 'syz.8.2062': attribute type 13 has an invalid length. [ 225.740980][ T9803] netlink: 'syz.8.2062': attribute type 17 has an invalid length. [ 225.889664][ T9803] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 226.166883][ T9815] bond1: (slave bond0): Releasing active interface [ 226.181369][ T9816] netlink: 4 bytes leftover after parsing attributes in process `syz.8.2067'. [ 226.271812][ T9815] bond0: (slave dummy0): Releasing backup interface [ 226.328600][ T9815] bridge_slave_0: left allmulticast mode [ 226.358640][ T9815] bridge_slave_0: left promiscuous mode [ 226.364522][ T9815] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.394312][ T9815] bridge_slave_1: left allmulticast mode [ 226.400101][ T9815] bridge_slave_1: left promiscuous mode [ 226.425430][ T9815] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.449999][ T9815] bond0: (slave bond_slave_0): Releasing backup interface [ 226.468294][ T9815] bond0: (slave bond_slave_1): Releasing backup interface [ 226.621121][ T9815] team0: Port device team_slave_0 removed [ 226.631732][ T9815] team0: Port device team_slave_1 removed [ 226.648235][ T9815] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 226.679516][ T9815] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 226.713209][ T9815] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 226.749243][ T9815] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 226.781042][ T9815] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 226.953403][ T9830] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2071'. [ 227.060096][ T9830] veth0_macvtap: left promiscuous mode [ 227.682788][ T28] kauditd_printk_skb: 238 callbacks suppressed [ 227.682810][ T28] audit: type=1400 audit(1776143193.127:19690): avc: denied { create } for pid=9856 comm="syz.8.2081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 227.730953][ T28] audit: type=1400 audit(1776143193.169:19691): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 227.768371][ T28] audit: type=1400 audit(1776143193.179:19692): avc: denied { open } for pid=9863 comm="syz.8.2084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 227.815117][ T28] audit: type=1400 audit(1776143193.232:19693): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 227.871673][ T28] audit: type=1400 audit(1776143193.253:19694): avc: denied { read write } for pid=6815 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 227.919408][ T9870] netlink: 830 bytes leftover after parsing attributes in process `syz.4.2087'. [ 227.948937][ T28] audit: type=1400 audit(1776143193.263:19695): avc: denied { read } for pid=9865 comm="syz.8.2085" dev="nsfs" ino=4026533622 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 227.996724][ T28] audit: type=1400 audit(1776143193.263:19696): avc: denied { create } for pid=9865 comm="syz.8.2085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 228.044548][ T28] audit: type=1400 audit(1776143193.305:19697): avc: denied { read write } for pid=9865 comm="syz.8.2085" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 228.101733][ T28] audit: type=1400 audit(1776143193.316:19698): avc: denied { create } for pid=9867 comm="syz.7.2086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 228.163319][ T28] audit: type=1400 audit(1776143193.316:19699): avc: denied { create } for pid=9867 comm="syz.7.2086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 228.299561][ T9886] netlink: 'syz.8.2094': attribute type 4 has an invalid length. [ 228.325011][ T9887] gretap0: left allmulticast mode [ 228.330431][ T9887] gretap0: left promiscuous mode [ 228.335608][ T9887] bridge0: port 4(gretap0) entered disabled state [ 228.362446][ T9887] team0: left allmulticast mode [ 228.367512][ T9887] team_slave_0: left allmulticast mode [ 228.382321][ T9887] team_slave_1: left allmulticast mode [ 228.403265][ T9894] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2093'. [ 228.412461][ T9887] netdevsim netdevsim3 netdevsim1: left allmulticast mode [ 228.419897][ T9887] team0: left promiscuous mode [ 228.427945][ T9887] team_slave_0: left promiscuous mode [ 228.433483][ T9887] team_slave_1: left promiscuous mode [ 228.453720][ T9887] bridge1: left promiscuous mode [ 228.472308][ T9887] netdevsim netdevsim3 netdevsim1: left promiscuous mode [ 228.504494][ T9887] bridge0: port 3(team0) entered disabled state [ 228.527235][ T9887] bond0: (slave dummy0): Releasing backup interface [ 228.543460][ T9887] bridge_slave_0: left allmulticast mode [ 228.555999][ T9887] bridge_slave_0: left promiscuous mode [ 228.571499][ T9887] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.826431][ T9887] bridge_slave_1: left allmulticast mode [ 228.836526][ T9887] bridge_slave_1: left promiscuous mode [ 228.858120][ T9887] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.020980][ T9887] bond0: (slave bond_slave_0): Releasing backup interface [ 229.034221][ T9887] bond0: (slave bond_slave_1): Releasing backup interface [ 229.061536][ T9887] team0: Port device team_slave_0 removed [ 229.092394][ T9887] team0: Port device team_slave_1 removed [ 229.246848][ T9887] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 229.266038][ T9887] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 229.286932][ T9887] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 229.464088][ T9904] netlink: 72 bytes leftover after parsing attributes in process `syz.7.2098'. [ 229.489271][ T9906] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2099'. [ 229.622328][ T9914] macsec1: entered promiscuous mode [ 229.627835][ T9914] bridge0: entered promiscuous mode [ 230.135809][ T9912] syz.6.2102 invoked oom-killer: gfp_mask=0x402d02(GFP_NOIO|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN|__GFP_ACCOUNT), order=0, oom_score_adj=1000 [ 230.216163][ T9912] CPU: 0 UID: 0 PID: 9912 Comm: syz.6.2102 Tainted: G W syzkaller #0 PREEMPT(full) [ 230.216220][ T9912] Tainted: [W]=WARN [ 230.216229][ T9912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 230.216247][ T9912] Call Trace: [ 230.216256][ T9912] [ 230.216266][ T9912] __dump_stack+0x1d/0x30 [ 230.216347][ T9912] dump_stack_lvl+0x95/0xd0 [ 230.216375][ T9912] dump_stack+0x15/0x1b [ 230.216397][ T9912] dump_header+0x80/0x240 [ 230.216447][ T9912] oom_kill_process+0x295/0x350 [ 230.216481][ T9912] out_of_memory+0x97d/0xb80 [ 230.216512][ T9912] try_charge_memcg+0x62e/0xa10 [ 230.216556][ T9912] obj_cgroup_charge_pages+0x23/0xc0 [ 230.216603][ T9912] __memcg_kmem_charge_page+0x9e/0x170 [ 230.216635][ T9912] __alloc_frozen_pages_noprof+0x18a/0x360 [ 230.216676][ T9912] alloc_pages_mpol+0xb3/0x260 [ 230.216716][ T9912] alloc_pages_noprof+0x8f/0x140 [ 230.216801][ T9912] __vmalloc_node_range_noprof+0xa46/0x12b0 [ 230.216863][ T9912] __kvmalloc_node_noprof+0x3d4/0x650 [ 230.216891][ T9912] ? futex_hash_allocate+0x190/0x9d0 [ 230.216931][ T9912] ? futex_hash_allocate+0x190/0x9d0 [ 230.217047][ T9912] futex_hash_allocate+0x190/0x9d0 [ 230.217090][ T9912] ? cap_task_prctl+0x13f/0x6e0 [ 230.217140][ T9912] futex_hash_prctl+0xd8/0xf0 [ 230.217177][ T9912] __se_sys_prctl+0x4f4/0x1400 [ 230.217294][ T9912] __x64_sys_prctl+0x67/0x80 [ 230.217330][ T9912] x64_sys_call+0x2533/0x3020 [ 230.217370][ T9912] do_syscall_64+0x12c/0x370 [ 230.217412][ T9912] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 230.217497][ T9912] RIP: 0033:0x7fc32b5bc819 [ 230.217525][ T9912] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 230.217550][ T9912] RSP: 002b:00007fc32a017028 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 230.217644][ T9912] RAX: ffffffffffffffda RBX: 00007fc32b835fa0 RCX: 00007fc32b5bc819 [ 230.217664][ T9912] RDX: 0000000001000000 RSI: 0000000000000001 RDI: 000000000000004e [ 230.217681][ T9912] RBP: 00007fc32b652c91 R08: 0000000000000000 R09: 0000000000000000 [ 230.217716][ T9912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 230.217732][ T9912] R13: 00007fc32b836038 R14: 00007fc32b835fa0 R15: 00007ffde3c81758 [ 230.217752][ T9912] [ 230.217819][ T9912] memory: usage 255028kB, limit 307200kB, failcnt 82 [ 230.472843][ T9912] memory+swap: usage 177548kB, limit 9007199254740988kB, failcnt 0 [ 230.483081][ T9912] kmem: usage 172788kB, limit 9007199254740988kB, failcnt 0 [ 230.491380][ T9912] Memory cgroup stats for /syz6: [ 230.499607][ T9912] cache 16384 [ 230.508096][ T9912] rss 192512 [ 230.511459][ T9912] shmem 16384 [ 230.606346][ T9912] mapped_file 12288 [ 230.610344][ T9912] dirty 0 [ 230.614536][ T9912] writeback 0 [ 230.626957][ T9912] workingset_refault_anon 2050 [ 230.631783][ T9912] workingset_refault_file 0 [ 230.693528][ T9912] swap 0 [ 230.696490][ T9912] swapcached 9433088 [ 230.700414][ T9912] pgpgin 121575 [ 230.704291][ T9912] pgpgout 121523 [ 230.707906][ T9912] pgfault 158158 [ 230.711859][ T9912] pgmajfault 259 [ 230.715551][ T9912] inactive_anon 208896 [ 230.719714][ T9912] active_anon 0 [ 230.723575][ T9912] inactive_file 0 [ 230.727337][ T9912] active_file 4096 [ 230.731317][ T9912] unevictable 0 [ 230.734825][ T9912] hierarchical_memory_limit 314572800 [ 230.740660][ T9912] hierarchical_memsw_limit 9223372036854771712 [ 230.746906][ T9912] total_cache 16384 [ 230.751333][ T9912] total_rss 192512 [ 230.755546][ T9912] total_shmem 16384 [ 230.760057][ T9912] total_mapped_file 12288 [ 230.766321][ T9912] total_dirty 0 [ 230.786319][ T9912] total_writeback 0 [ 230.790407][ T9912] total_workingset_refault_anon 2050 [ 230.795722][ T9912] total_workingset_refault_file 0 [ 230.801685][ T9912] total_swap 0 [ 230.805185][ T9912] total_swapcached 9433088 [ 230.813193][ T9912] total_pgpgin 121575 [ 230.817662][ T9912] total_pgpgout 121523 [ 230.821757][ T9912] total_pgfault 158158 [ 230.826486][ T9912] total_pgmajfault 259 [ 230.830627][ T9912] total_inactive_anon 208896 [ 230.835629][ T9912] total_active_anon 0 [ 230.839924][ T9912] total_inactive_file 0 [ 230.844172][ T9912] total_active_file 4096 [ 230.848857][ T9912] total_unevictable 0 [ 230.853052][ T9912] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz6,task_memcg=/syz6,task=syz.6.2102,pid=9911,uid=0 [ 230.868333][ T9912] Memory cgroup out of memory: Killed process 9912 (syz.6.2102) total-vm:96212kB, anon-rss:1408kB, file-rss:22252kB, shmem-rss:12kB, UID:0 pgtables:136kB oom_score_adj:1000 [ 231.016179][ T307] bond1: (slave batadv0): link status up again after 0 ms [ 231.023368][ T307] bond1: (slave batadv0): failed to get link speed/duplex [ 231.051808][ T9936] netlink: 'syz.4.2112': attribute type 16 has an invalid length. [ 231.077752][ T9936] netlink: 'syz.4.2112': attribute type 17 has an invalid length. [ 231.096224][ T9936] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 231.123072][ T4190] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 231.159003][ T50] bond1: (slave batadv0): failed to get link speed/duplex [ 231.173743][ T9949] syzkaller0: entered promiscuous mode [ 231.179444][ T9949] syzkaller0: entered allmulticast mode [ 231.262559][ T9955] bond1: (slave batadv0): Removing an active aggregator [ 231.269827][ T50] bond1: Warning: Found an uninitialized port [ 231.282799][ T9] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 231.296471][ T9955] bond1: (slave batadv0): Releasing backup interface [ 231.306868][ T9959] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2119'. [ 231.340822][ T9955] bridge_slave_0: left allmulticast mode [ 231.346671][ T9955] bridge_slave_0: left promiscuous mode [ 231.355052][ T9955] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.363488][ T9955] bridge_slave_1: left allmulticast mode [ 231.369323][ T9955] bridge_slave_1: left promiscuous mode [ 231.375138][ T9955] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.386502][ T9955] team0: Port device team_slave_0 removed [ 231.396638][ T9955] team0: Port device team_slave_1 removed [ 231.405268][ T9955] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 231.413849][ T9955] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 231.591150][ T9960] syzkaller0: entered promiscuous mode [ 231.599022][ T9960] syzkaller0: entered allmulticast mode [ 231.701694][ T9] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 231.943901][ T9970] syzkaller0: entered promiscuous mode [ 231.949596][ T9970] syzkaller0: entered allmulticast mode [ 232.256960][ T9979] netlink: 'syz.8.2127': attribute type 1 has an invalid length. [ 232.431500][ T9979] 8021q: adding VLAN 0 to HW filter on device bond3 [ 232.473185][ T9980] vlan5: entered promiscuous mode [ 232.656559][ T9980] bond3: entered promiscuous mode [ 232.664966][ T28] kauditd_printk_skb: 163 callbacks suppressed [ 232.664980][ T28] audit: type=1400 audit(1776143198.366:19863): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 232.711343][ T9980] vlan5: entered allmulticast mode [ 232.720920][ T9980] bond3: entered allmulticast mode [ 232.730346][ T28] audit: type=1400 audit(1776143198.408:19864): avc: denied { prog_load } for pid=9983 comm="syz.3.2128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.776947][ T9982] bond3: (slave bridge2): making interface the new active one [ 232.791138][ T28] audit: type=1400 audit(1776143198.408:19865): avc: denied { open } for pid=9983 comm="syz.3.2128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 232.821906][ T9982] bridge2: entered promiscuous mode [ 232.838993][ T9982] bridge2: entered allmulticast mode [ 232.846654][ T28] audit: type=1400 audit(1776143198.408:19866): avc: denied { prog_load } for pid=9983 comm="syz.3.2128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.877982][ T9982] bond3: (slave bridge2): Enslaving as an active interface with an up link [ 232.917420][ T9984] bridge0: entered allmulticast mode [ 232.931413][ T28] audit: type=1400 audit(1776143198.408:19867): avc: denied { bpf } for pid=9983 comm="syz.3.2128" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 232.997133][ T28] audit: type=1400 audit(1776143198.408:19868): avc: denied { open } for pid=9983 comm="syz.3.2128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 233.044934][ T28] audit: type=1400 audit(1776143198.524:19869): avc: denied { prog_load } for pid=9983 comm="syz.3.2128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 233.083068][ T28] audit: type=1400 audit(1776143198.576:19870): avc: denied { map_create } for pid=9983 comm="syz.3.2128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 233.130659][ T28] audit: type=1400 audit(1776143198.692:19871): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 233.207387][ T28] audit: type=1400 audit(1776143198.692:19872): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 233.387083][ T9996] vlan3: left promiscuous mode [ 233.394337][ T9996] bridge1: left promiscuous mode [ 233.400118][ T9996] vlan3: left allmulticast mode [ 233.405191][ T9996] bridge1: left allmulticast mode [ 233.413053][ T9996] vlan5: left promiscuous mode [ 233.418853][ T9996] bond3: left promiscuous mode [ 233.423798][ T9996] bridge2: left promiscuous mode [ 233.432164][ T9996] vlan5: left allmulticast mode [ 233.437525][ T9996] bond3: left allmulticast mode [ 233.442582][ T9996] bridge2: left allmulticast mode [ 233.450168][ T3969] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 233.469242][ T3969] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 233.489337][ T3969] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 233.514469][ T3969] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 234.149173][T10016] bond0: (slave dummy0): Releasing backup interface [ 234.177207][T10016] bond0: (slave batadv0): Releasing backup interface [ 234.199081][T10020] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2136'. [ 234.207994][T10016] bridge_slave_0: left allmulticast mode [ 234.224092][T10016] bridge_slave_0: left promiscuous mode [ 234.242308][T10016] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.257520][T10016] bridge_slave_1: left allmulticast mode [ 234.263580][T10016] bridge_slave_1: left promiscuous mode [ 234.270209][T10016] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.281284][T10016] bond0: (slave bond_slave_0): Releasing backup interface [ 234.293228][T10016] bond0: (slave bond_slave_1): Releasing backup interface [ 234.305463][T10016] team0: Port device team_slave_0 removed [ 234.315791][T10016] team0: Port device team_slave_1 removed [ 234.323222][T10016] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 234.331359][T10016] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 234.341629][T10016] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 234.349147][T10016] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 234.364906][T10016] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 234.403444][T10026] 8021q: adding VLAN 0 to HW filter on device bond8 [ 234.591417][T10031] bond8: (slave ip6gretap1): making interface the new active one [ 234.636911][T10031] bond8: (slave ip6gretap1): Enslaving as an active interface with an up link [ 234.834387][T10046] netlink: 'syz.8.2147': attribute type 1 has an invalid length. [ 234.884197][T10046] bond4: (slave vxcan3): The slave device specified does not support setting the MAC address [ 234.895302][T10046] bond4: (slave vxcan3): Error -95 calling set_mac_address [ 235.108209][T10046] macvlan2: entered promiscuous mode [ 235.150322][T10046] macvlan2: entered allmulticast mode [ 235.159532][T10046] bond4: entered promiscuous mode [ 235.255321][T10046] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 235.301383][T10069] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2155'. [ 235.319522][T10046] bond4: left promiscuous mode [ 235.362627][T10069] macvlan2: entered promiscuous mode [ 235.380400][T10069] bond0: entered promiscuous mode [ 236.293380][T10104] bridge0: left allmulticast mode [ 236.412284][T10104] bridge1: left allmulticast mode [ 236.441897][T10104] vlan2: left allmulticast mode [ 236.466429][T10104] bond3: left allmulticast mode [ 236.495063][T10104] geneve3: left allmulticast mode [ 236.520850][T10104] bond0: left promiscuous mode [ 236.530737][T10104] macvlan2: left promiscuous mode [ 236.677616][T10111] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 237.456574][ T28] kauditd_printk_skb: 303 callbacks suppressed [ 237.456595][ T28] audit: type=1400 audit(1776143203.395:20176): avc: denied { read write } for pid=10115 comm="syz.7.2182" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 237.523320][ T28] audit: type=1400 audit(1776143203.427:20177): avc: denied { map_create } for pid=10115 comm="syz.7.2182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.832373][ T28] audit: type=1400 audit(1776143203.721:20178): avc: denied { read write } for pid=6815 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 237.916676][ T28] audit: type=1400 audit(1776143203.742:20179): avc: denied { open } for pid=10138 comm="syz.7.2177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 237.978138][ T28] audit: type=1400 audit(1776143203.752:20180): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 238.011935][T10154] audit: audit_backlog=65 > audit_backlog_limit=64 [ 238.026051][T10154] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 238.033990][ T8033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 238.044912][ T8033] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 238.054480][T10154] audit: backlog limit exceeded [ 238.294495][T10178] netlink: 'syz.7.2196': attribute type 1 has an invalid length. [ 238.325940][T10178] veth9: entered allmulticast mode [ 238.334114][T10178] bond6: (slave veth9): Enslaving as a backup interface with a down link [ 238.422649][T10190] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2199'. [ 238.466719][T10190] 8021q: VLANs not supported on ip6_vti0 [ 239.023751][T10208] lo: Caught tx_queue_len zero misconfig [ 239.032777][T10208] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2207'. [ 239.140704][T10218] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=10218 comm=syz.7.2211 [ 239.524484][T10234] tunl0: Caught tx_queue_len zero misconfig [ 239.687540][T10248] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2223'. [ 239.780033][T10253] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2227'. [ 239.822212][T10257] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2225'. [ 239.840579][T10257] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2225'. [ 239.853424][T10253] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=10253 comm=syz.4.2227 [ 240.051221][T10268] netlink: 'syz.4.2231': attribute type 13 has an invalid length. [ 240.175619][T10268] bond0: left promiscuous mode [ 240.180789][T10268] geneve2: left promiscuous mode [ 240.194811][ T50] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 240.218305][ T50] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 240.235932][ T50] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 240.273997][ T50] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 240.476021][T10282] syzkaller0: entered promiscuous mode [ 240.481657][T10282] syzkaller0: entered allmulticast mode [ 241.124073][T10308] syzkaller0: entered promiscuous mode [ 241.137606][T10308] syzkaller0: entered allmulticast mode [ 241.246859][T10314] netlink: 'syz.3.2250': attribute type 4 has an invalid length. [ 241.278369][T10314] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2250'. [ 241.312712][T10314] .`: renamed from bond0 [ 241.374533][T10321] bond0: (slave dummy0): Releasing backup interface [ 241.399090][T10323] netlink: 'syz.3.2253': attribute type 1 has an invalid length. [ 241.454687][T10321] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 241.476093][T10328] sit1: entered allmulticast mode [ 241.496978][T10323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.523653][T10329] ipvlan2: entered allmulticast mode [ 241.529118][T10329] bond0: entered allmulticast mode [ 241.551748][T10332] bond0: (slave bridge5): making interface the new active one [ 241.585406][T10332] bridge5: entered allmulticast mode [ 241.592089][T10332] bond0: (slave bridge5): Enslaving as an active interface with an up link [ 241.679800][ T3422] IPVS: starting estimator thread 0... [ 241.778827][T10342] IPVS: using max 1824 ests per chain, 91200 per kthread [ 241.918866][T10356] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 241.931056][T10353] netlink: 28 bytes leftover after parsing attributes in process `syz.7.2261'. [ 241.941745][T10353] netlink: 2 bytes leftover after parsing attributes in process `syz.7.2261'. [ 241.978912][T10353] netlink: 28 bytes leftover after parsing attributes in process `syz.7.2261'. [ 242.002723][T10353] netlink: 28 bytes leftover after parsing attributes in process `syz.7.2261'. [ 242.564596][ T28] kauditd_printk_skb: 538 callbacks suppressed [ 242.564619][ T28] audit: type=1400 audit(1776143208.761:20718): avc: denied { read write } for pid=8033 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 242.640514][ T28] audit: type=1400 audit(1776143208.834:20719): avc: denied { create } for pid=10361 comm="syz.6.2264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 242.740234][ T28] audit: type=1400 audit(1776143208.834:20720): avc: denied { open } for pid=10361 comm="syz.6.2264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 242.836011][ T28] audit: type=1400 audit(1776143208.834:20721): avc: denied { create } for pid=10361 comm="syz.6.2264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 242.908249][ T28] audit: type=1400 audit(1776143208.834:20722): avc: denied { create } for pid=10361 comm="syz.6.2264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 242.948790][ T28] audit: type=1400 audit(1776143208.866:20723): avc: denied { read write } for pid=8033 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 243.022361][ T28] audit: type=1400 audit(1776143208.876:20724): avc: denied { open } for pid=10363 comm="syz.6.2265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 243.073785][ T28] audit: type=1400 audit(1776143208.929:20725): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 243.137403][ T28] audit: type=1400 audit(1776143208.939:20726): avc: denied { open } for pid=10365 comm="syz.3.2266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 243.188060][ T28] audit: type=1400 audit(1776143209.002:20727): avc: denied { prog_load } for pid=10363 comm="syz.6.2265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 244.183154][T10393] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 244.871137][T10410] syzkaller0: entered promiscuous mode [ 244.954403][T10410] syzkaller0: entered allmulticast mode [ 245.805564][T10427] __nla_validate_parse: 26 callbacks suppressed [ 245.805595][T10427] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2287'. [ 245.856065][T10428] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2287'. [ 245.932543][T10422] syzkaller0: entered promiscuous mode [ 246.031030][T10343] syz.4.2254 (10343) used greatest stack depth: 6456 bytes left [ 246.244876][T10447] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2294'. [ 247.332977][ T28] kauditd_printk_skb: 195 callbacks suppressed [ 247.332994][ T28] audit: type=1400 audit(1776143213.769:20923): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 247.387860][ T28] audit: type=1400 audit(1776143213.800:20924): avc: denied { execmem } for pid=10473 comm="syz.7.2304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 247.440843][ T28] audit: type=1400 audit(1776143213.874:20925): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 247.626819][T10480] netlink: 'syz.3.2308': attribute type 1 has an invalid length. [ 247.681845][T10482] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2308'. [ 247.697973][T10482] bond6: (slave bridge6): making interface the new active one [ 247.716226][T10482] bond6: (slave bridge6): Enslaving as an active interface with an up link [ 247.728521][ T28] audit: type=1400 audit(1776143214.178:20926): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 247.753120][ T28] audit: type=1400 audit(1776143214.189:20927): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 247.779832][ T28] audit: type=1400 audit(1776143214.241:20928): avc: denied { open } for pid=10483 comm="syz.8.2307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 247.818431][T10480] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2308'. [ 247.827067][ T28] audit: type=1400 audit(1776143214.283:20929): avc: denied { create } for pid=10479 comm="syz.3.2308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 247.863071][ T28] audit: type=1400 audit(1776143214.304:20930): avc: denied { mount } for pid=10485 comm="syz.4.2309" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=0 [ 247.929108][ T28] audit: type=1400 audit(1776143214.315:20931): avc: denied { create } for pid=10483 comm="syz.8.2307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 247.964271][ T28] audit: type=1400 audit(1776143214.315:20932): avc: denied { create } for pid=10483 comm="syz.8.2307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 248.528265][T10506] netlink: 'syz.8.2316': attribute type 13 has an invalid length. [ 248.684079][T10513] netlink: 'syz.7.2318': attribute type 1 has an invalid length. [ 248.723934][T10513] bond7: entered promiscuous mode [ 248.758676][T10513] 8021q: adding VLAN 0 to HW filter on device bond7 [ 248.798431][T10517] bond7: (slave bridge4): making interface the new active one [ 248.856776][T10517] bridge4: entered promiscuous mode [ 248.886285][T10517] bond7: (slave bridge4): Enslaving as an active interface with an up link [ 249.545147][T10539] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2328'. [ 249.593668][T10541] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2328'. [ 249.610358][T10539] 8021q: adding VLAN 0 to HW filter on device bond3 [ 249.630943][T10541] bond3: (slave bridge2): Enslaving as an active interface with an up link [ 249.702174][T10539] macvlan0: entered promiscuous mode [ 249.707677][T10539] macvlan0: entered allmulticast mode [ 249.713867][T10539] bond3: entered promiscuous mode [ 249.719063][T10539] bridge2: entered promiscuous mode [ 249.724933][T10539] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 249.733189][T10539] bond3: left promiscuous mode [ 249.751852][T10539] bridge2: left promiscuous mode [ 249.766168][T10543] netlink: 'syz.3.2329': attribute type 13 has an invalid length. [ 250.038784][T10563] netlink: 'syz.8.2336': attribute type 1 has an invalid length. [ 250.213620][T10563] 8021q: adding VLAN 0 to HW filter on device bond5 [ 250.410493][T10567] ipvlan2: entered allmulticast mode [ 250.416085][T10567] bond5: entered allmulticast mode [ 250.452212][T10570] bond5: (slave bridge3): making interface the new active one [ 250.472656][T10570] bridge3: entered allmulticast mode [ 250.485303][T10570] bond5: (slave bridge3): Enslaving as an active interface with an up link [ 250.831945][T10594] netlink: 8 bytes leftover after parsing attributes in process `syz.8.2345'. [ 250.841128][T10594] netlink: 12 bytes leftover after parsing attributes in process `syz.8.2345'. [ 250.933840][T10589] 8021q: VLANs not supported on ip6_vti0 [ 250.952160][T10601] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2349'. [ 251.140357][T10622] netlink: 52 bytes leftover after parsing attributes in process `syz.4.2355'. [ 251.181184][T10622] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10622 comm=syz.4.2355 [ 251.641068][T10643] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2364'. [ 251.656457][T10643] bond4: option lacp_active: invalid value (5) [ 251.776467][T10643] bond4 (unregistering): Released all slaves [ 252.043112][T10662] netlink: 12 bytes leftover after parsing attributes in process `syz.8.2371'. [ 252.058790][T10662] bond6: entered promiscuous mode [ 252.064035][T10662] bond6: entered allmulticast mode [ 252.103655][ T28] kauditd_printk_skb: 382 callbacks suppressed [ 252.103676][ T28] audit: type=1400 audit(1776151410.759:21315): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 252.168748][ T28] audit: type=1400 audit(1776151410.801:21316): avc: denied { allowed } for pid=10646 comm="syz.3.2365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 252.188542][ T28] audit: type=1400 audit(1776151410.853:21317): avc: denied { create } for pid=10665 comm="syz.8.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 252.208627][ T28] audit: type=1400 audit(1776151410.853:21318): avc: denied { create } for pid=10665 comm="syz.8.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 252.228532][ T28] audit: type=1400 audit(1776151410.874:21319): avc: denied { open } for pid=10665 comm="syz.8.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 252.248051][ T28] audit: type=1400 audit(1776151410.874:21320): avc: denied { open } for pid=10665 comm="syz.8.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 252.396725][ T28] audit: type=1400 audit(1776151410.874:21321): avc: denied { read write } for pid=8033 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 252.461510][ T28] audit: type=1400 audit(1776151410.874:21322): avc: denied { prog_load } for pid=10665 comm="syz.8.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 252.504517][ T28] audit: type=1400 audit(1776151410.948:21323): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 252.558558][ T28] audit: type=1400 audit(1776151410.969:21324): avc: denied { read write } for pid=10667 comm="syz.8.2374" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 253.110053][T10712] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 253.607740][T10725] netlink: 'syz.6.2396': attribute type 4 has an invalid length. [ 253.653367][T10725] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2396'. [ 253.719115][T10725] .`: renamed from bond0 (while UP) [ 254.181733][T10755] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2408'. [ 254.787855][T10750] syz.7.2407 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 254.827450][T10750] CPU: 0 UID: 0 PID: 10750 Comm: syz.7.2407 Tainted: G W syzkaller #0 PREEMPT(full) [ 254.827562][T10750] Tainted: [W]=WARN [ 254.827571][T10750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 254.827592][T10750] Call Trace: [ 254.827601][T10750] [ 254.827611][T10750] __dump_stack+0x1d/0x30 [ 254.827642][T10750] dump_stack_lvl+0x95/0xd0 [ 254.827675][T10750] dump_stack+0x15/0x1b [ 254.827725][T10750] dump_header+0x80/0x240 [ 254.827756][T10750] oom_kill_process+0x295/0x350 [ 254.827781][T10750] out_of_memory+0x97d/0xb80 [ 254.827876][T10750] try_charge_memcg+0x62e/0xa10 [ 254.827932][T10750] obj_cgroup_charge_pages+0x23/0xc0 [ 254.827969][T10750] __memcg_kmem_charge_page+0x9e/0x170 [ 254.828035][T10750] __alloc_frozen_pages_noprof+0x18a/0x360 [ 254.828122][T10750] alloc_pages_mpol+0xb3/0x260 [ 254.828163][T10750] alloc_pages_noprof+0x8f/0x140 [ 254.828204][T10750] __vmalloc_node_range_noprof+0xa46/0x12b0 [ 254.828265][T10750] __kvmalloc_node_noprof+0x3d4/0x650 [ 254.828327][T10750] ? futex_hash_allocate+0x190/0x9d0 [ 254.828366][T10750] ? futex_hash_allocate+0x190/0x9d0 [ 254.828408][T10750] futex_hash_allocate+0x190/0x9d0 [ 254.828500][T10750] ? cap_task_prctl+0x13f/0x6e0 [ 254.828536][T10750] futex_hash_prctl+0xd8/0xf0 [ 254.828570][T10750] __se_sys_prctl+0x4f4/0x1400 [ 254.828607][T10750] __x64_sys_prctl+0x67/0x80 [ 254.828718][T10750] x64_sys_call+0x2533/0x3020 [ 254.828756][T10750] do_syscall_64+0x12c/0x370 [ 254.828843][T10750] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 254.828872][T10750] RIP: 0033:0x7f29a9e6c819 [ 254.828894][T10750] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 254.829001][T10750] RSP: 002b:00007f29a88bf028 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 254.829035][T10750] RAX: ffffffffffffffda RBX: 00007f29aa0e5fa0 RCX: 00007f29a9e6c819 [ 254.829051][T10750] RDX: 0000000001000000 RSI: 0000000000000001 RDI: 000000000000004e [ 254.829066][T10750] RBP: 00007f29a9f02c91 R08: 0000000000000000 R09: 0000000000000000 [ 254.829083][T10750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 254.829099][T10750] R13: 00007f29aa0e6038 R14: 00007f29aa0e5fa0 R15: 00007ffd4c8c2588 [ 254.829187][T10750] [ 254.832517][T10750] memory: usage 307200kB, limit 307200kB, failcnt 262 [ 255.069453][T10750] memory+swap: usage 307568kB, limit 9007199254740988kB, failcnt 0 [ 255.077502][T10750] kmem: usage 307200kB, limit 9007199254740988kB, failcnt 0 [ 255.085109][T10750] Memory cgroup stats for /syz7: [ 255.085448][T10750] cache 0 [ 255.093608][T10750] rss 0 [ 255.096512][T10750] shmem 0 [ 255.099563][T10750] mapped_file 0 [ 255.103083][T10750] dirty 0 [ 255.106176][T10750] writeback 0 [ 255.109560][T10750] workingset_refault_anon 41 [ 255.114332][T10750] workingset_refault_file 0 [ 255.118983][T10750] swap 376832 [ 255.127015][T10750] swapcached 4259840 [ 255.133375][T10750] pgpgin 130985 [ 255.138310][T10750] pgpgout 130985 [ 255.144350][T10750] pgfault 166099 [ 255.149269][T10750] pgmajfault 19 [ 255.156686][T10750] inactive_anon 0 [ 255.162549][T10750] active_anon 0 [ 255.168368][T10750] inactive_file 0 [ 255.175548][T10750] active_file 0 [ 255.181222][T10750] unevictable 0 [ 255.187025][T10750] hierarchical_memory_limit 314572800 [ 255.196859][T10750] hierarchical_memsw_limit 9223372036854771712 [ 255.216508][T10750] total_cache 0 [ 255.221303][T10750] total_rss 0 [ 255.230858][T10750] total_shmem 0 [ 255.238002][T10750] total_mapped_file 0 [ 255.244408][T10750] total_dirty 0 [ 255.251339][T10750] total_writeback 0 [ 255.257450][T10750] total_workingset_refault_anon 41 [ 255.265970][T10750] total_workingset_refault_file 0 [ 255.274970][T10750] total_swap 376832 [ 255.290755][T10750] total_swapcached 4259840 [ 255.299850][T10750] total_pgpgin 130985 [ 255.313418][T10750] total_pgpgout 130985 [ 255.317577][T10750] total_pgfault 166099 [ 255.321765][T10750] total_pgmajfault 19 [ 255.332563][T10750] total_inactive_anon 0 [ 255.336946][T10750] total_active_anon 0 [ 255.340962][T10750] total_inactive_file 0 [ 255.360880][T10750] total_active_file 0 [ 255.364947][T10750] total_unevictable 0 [ 255.379034][T10750] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz7,task_memcg=/syz7,task=syz.7.2407,pid=10748,uid=0 [ 255.404004][T10750] Memory cgroup out of memory: Killed process 10748 (syz.7.2407) total-vm:94164kB, anon-rss:1228kB, file-rss:22220kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 255.590584][T10773] netlink: 'syz.7.2414': attribute type 4 has an invalid length. [ 255.598650][T10773] netlink: 152 bytes leftover after parsing attributes in process `syz.7.2414'. [ 255.622597][T10773] .`: renamed from bond0 (while UP) [ 256.305259][T10793] netlink: 'syz.7.2420': attribute type 13 has an invalid length. [ 256.713434][ T5770] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 256.730817][ T5770] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 256.740241][ T5770] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 256.749938][ T5770] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 256.806309][T10804] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=10804 comm=syz.7.2426 [ 256.897132][ T28] kauditd_printk_skb: 1021 callbacks suppressed [ 256.897157][ T28] audit: type=1326 audit(1776151415.756:22346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10784 comm="syz.6.2418" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc32b57d04e code=0x7ffc0000 [ 256.927791][ T28] audit: type=1326 audit(1776151415.756:22347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10784 comm="syz.6.2418" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc32b57d04e code=0x7ffc0000 [ 257.034481][ T28] audit: type=1326 audit(1776151415.756:22348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10784 comm="syz.6.2418" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc32b57d04e code=0x7ffc0000 [ 257.112994][ T8089] audit: audit_backlog=65 > audit_backlog_limit=64 [ 257.123933][T10811] syzkaller0: entered promiscuous mode [ 257.140417][T10811] audit: audit_backlog=65 > audit_backlog_limit=64 [ 257.147974][ T28] audit: type=1326 audit(1776151415.756:22349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10784 comm="syz.6.2418" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc32b57d04e code=0x7ffc0000 [ 257.180505][T10811] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 257.190316][T10811] audit: backlog limit exceeded [ 257.199298][ T28] audit: type=1326 audit(1776151415.756:22350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10784 comm="syz.6.2418" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc32b57d04e code=0x7ffc0000 [ 257.219223][ T8089] audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 [ 257.616236][T10817] syzkaller0: entered promiscuous mode [ 257.623912][T10817] syzkaller0: entered allmulticast mode [ 258.767556][T10849] netlink: 12 bytes leftover after parsing attributes in process `syz.8.2445'. [ 259.062719][T10858] netlink: 4 bytes leftover after parsing attributes in process `syz.8.2448'. [ 259.146781][T10858] netlink: 4 bytes leftover after parsing attributes in process `syz.8.2448'. [ 260.538148][T10896] syzkaller0: entered promiscuous mode [ 260.553548][T10896] syzkaller0: entered allmulticast mode [ 260.688934][T10905] 8021q: VLANs not supported on ip_vti0 [ 260.695310][T10906] syzkaller0: entered promiscuous mode [ 260.701001][T10906] syzkaller0: entered allmulticast mode [ 260.774592][T10910] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2469'. [ 261.113236][T10927] netlink: 'syz.6.2476': attribute type 4 has an invalid length. [ 261.238403][T10931] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=10931 comm=syz.8.2477 [ 261.671665][ T28] kauditd_printk_skb: 354 callbacks suppressed [ 261.671708][ T28] audit: type=1400 audit(1776151420.816:22704): avc: denied { prog_load } for pid=10947 comm="syz.4.2484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.715101][ T28] audit: type=1400 audit(1776151420.847:22705): avc: denied { allowed } for pid=10947 comm="syz.4.2484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 261.848546][ T28] audit: type=1400 audit(1776151420.847:22706): avc: denied { create } for pid=10947 comm="syz.4.2484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 261.995048][ T28] audit: type=1400 audit(1776151421.162:22707): avc: denied { read write } for pid=8033 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.066787][ T28] audit: type=1400 audit(1776151421.194:22708): avc: denied { create } for pid=10951 comm="syz.6.2485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 262.114722][ T28] audit: type=1400 audit(1776151421.194:22709): avc: denied { create } for pid=10951 comm="syz.6.2485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 262.129698][T10957] netlink: 'syz.6.2487': attribute type 4 has an invalid length. [ 262.162218][T10957] netlink: 'syz.6.2487': attribute type 4 has an invalid length. [ 262.170544][ T28] audit: type=1400 audit(1776151421.194:22710): avc: denied { map_create } for pid=10951 comm="syz.6.2485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.198986][T10957] netlink: 'syz.6.2487': attribute type 4 has an invalid length. [ 262.200811][T10960] netlink: 76 bytes leftover after parsing attributes in process `syz.3.2489'. [ 262.216228][ T28] audit: type=1400 audit(1776151421.194:22711): avc: denied { mounton } for pid=10951 comm="syz.6.2485" path="/210/file0" dev="tmpfs" ino=1107 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 262.256914][T10960] syzkaller0: entered promiscuous mode [ 262.266912][ T28] audit: type=1400 audit(1776151421.194:22712): avc: denied { prog_load } for pid=10951 comm="syz.6.2485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.286478][T10960] syzkaller0: entered allmulticast mode [ 262.323828][ T28] audit: type=1400 audit(1776151421.194:22713): avc: denied { prog_load } for pid=10951 comm="syz.6.2485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.670319][T10973] sch_tbf: burst 555 is lower than device syzkaller0 mtu (1500) ! [ 262.680518][T10963] syz.6.2490 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 262.716198][T10972] syzkaller0: entered promiscuous mode [ 262.721768][T10972] syzkaller0: entered allmulticast mode [ 262.771986][T10963] CPU: 1 UID: 0 PID: 10963 Comm: syz.6.2490 Tainted: G W syzkaller #0 PREEMPT(full) [ 262.772031][T10963] Tainted: [W]=WARN [ 262.772038][T10963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 262.772051][T10963] Call Trace: [ 262.772060][T10963] [ 262.772070][T10963] __dump_stack+0x1d/0x30 [ 262.772108][T10963] dump_stack_lvl+0x95/0xd0 [ 262.772132][T10963] dump_stack+0x15/0x1b [ 262.772159][T10963] dump_header+0x80/0x240 [ 262.772189][T10963] oom_kill_process+0x295/0x350 [ 262.772256][T10963] out_of_memory+0x97d/0xb80 [ 262.772281][T10963] try_charge_memcg+0x62e/0xa10 [ 262.772340][T10963] mem_cgroup_swapin_charge_folio+0x103/0x1f0 [ 262.772388][T10963] __swap_cache_prepare_and_add+0x67/0x460 [ 262.772431][T10963] ? alloc_pages_mpol+0x217/0x260 [ 262.772469][T10963] swap_cache_alloc_folio+0xa2/0x120 [ 262.772568][T10963] swap_cluster_readahead+0x26e/0x3d0 [ 262.772672][T10963] swapin_readahead+0xde/0x840 [ 262.772751][T10963] ? _raw_spin_unlock+0x9/0x30 [ 262.772791][T10963] ? swap_put_entries_cluster+0x385/0x3a0 [ 262.772850][T10963] ? swap_put_entries_cluster+0x111/0x3a0 [ 262.772891][T10963] ? __rcu_read_unlock+0x4e/0x70 [ 262.772920][T10963] ? swap_cache_get_folio+0x26f/0x280 [ 262.772958][T10963] do_swap_page+0x2fe/0x21e0 [ 262.773048][T10963] ? css_rstat_updated+0xbb/0x280 [ 262.773086][T10963] ? __rcu_read_lock+0x36/0x50 [ 262.773226][T10963] ? pte_offset_map_rw_nolock+0x19e/0x200 [ 262.773255][T10963] handle_mm_fault+0xb46/0x3020 [ 262.773370][T10963] ? vma_start_read+0x1c7/0x2c0 [ 262.773441][T10963] do_user_addr_fault+0x62f/0x1050 [ 262.773475][T10963] ? arch_exit_to_user_mode_prepare+0x26/0x80 [ 262.773540][T10963] ? trace_page_fault_user+0x1f/0xe0 [ 262.773579][T10963] exc_page_fault+0x62/0xa0 [ 262.773636][T10963] asm_exc_page_fault+0x26/0x30 [ 262.773657][T10963] RIP: 0033:0x7fc32b48a1cc [ 262.773754][T10963] Code: 8a 31 13 00 eb 24 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 81 c3 f0 00 00 00 48 39 dd 74 24 <80> 7b 20 00 74 ee 8b 43 0c 85 c0 74 e7 48 89 df 48 81 c3 f0 00 00 [ 262.773774][T10963] RSP: 002b:00007ffde3c818c0 EFLAGS: 00010202 [ 262.773792][T10963] RAX: 0000000000000000 RBX: 00007fc32b837080 RCX: 000055556b56b808 [ 262.773806][T10963] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 262.773821][T10963] RBP: 00007fc32b837da0 R08: 0000000000000000 R09: 0000000000000000 [ 262.773834][T10963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000040fc7 [ 262.773850][T10963] R13: 00007fc32b83609c R14: 0000000000040d15 R15: 00007fc32b836090 [ 262.773935][T10963] [ 262.773943][T10963] memory: usage 253340kB, limit 307200kB, failcnt 243 [ 263.095872][T10963] memory+swap: usage 203712kB, limit 9007199254740988kB, failcnt 0 [ 263.124649][T10963] kmem: usage 158212kB, limit 9007199254740988kB, failcnt 0 [ 263.183270][T10963] Memory cgroup stats for /syz6: [ 263.183679][T10963] cache 0 [ 263.220017][T10963] rss 8192 [ 263.238609][T10963] shmem 0 [ 263.241633][T10963] mapped_file 0 [ 263.271639][T10963] dirty 0 [ 263.274647][T10963] writeback 0 [ 263.311311][T10963] workingset_refault_anon 4125 [ 263.346110][T10963] workingset_refault_file 0 [ 263.350684][T10963] swap 200704 [ 263.385258][T10963] swapcached 18604032 [ 263.395064][T10963] pgpgin 158643 [ 263.398577][T10963] pgpgout 158639 [ 263.424630][T10963] pgfault 218642 [ 263.428248][T10963] pgmajfault 573 [ 263.446795][T10979] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2496'. [ 263.456154][T10963] inactive_anon 0 [ 263.486403][T10963] active_anon 12288 [ 263.490493][T10963] inactive_file 0 [ 263.494326][T10963] active_file 4096 [ 263.546195][T10963] unevictable 0 [ 263.562293][T10963] hierarchical_memory_limit 314572800 [ 263.599081][T10963] hierarchical_memsw_limit 9223372036854771712 [ 263.629797][T10963] total_cache 0 [ 263.633436][T10963] total_rss 8192 [ 263.637177][T10963] total_shmem 0 [ 263.670070][T10963] total_mapped_file 0 [ 263.674131][T10963] total_dirty 0 [ 263.705167][T10963] total_writeback 0 [ 263.741127][T10963] total_workingset_refault_anon 4125 [ 263.991282][T10963] total_workingset_refault_file 0 [ 263.996566][T10963] total_swap 200704 [ 264.000479][T10963] total_swapcached 18604032 [ 264.029171][T10963] total_pgpgin 158643 [ 264.044244][T10963] total_pgpgout 158639 [ 264.063551][T10963] total_pgfault 218642 [ 264.086317][T10963] total_pgmajfault 573 [ 264.090441][T10963] total_inactive_anon 0 [ 264.114919][T10963] total_active_anon 12288 [ 264.119349][T10963] total_inactive_file 0 [ 264.123613][T10963] total_active_file 4096 [ 264.181602][T10963] total_unevictable 0 [ 264.185645][T10963] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz6,task_memcg=/syz6,task=syz.6.2490,pid=10963,uid=0 [ 264.256144][T10963] Memory cgroup out of memory: Killed process 10963 (syz.6.2490) total-vm:94164kB, anon-rss:1228kB, file-rss:22156kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 264.440873][T10992] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2501'. [ 264.496213][T10992] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2501'. [ 264.658742][T10994] syzkaller0: entered promiscuous mode [ 264.684569][T10994] syzkaller0: entered allmulticast mode [ 265.628588][T11004] netlink: 'syz.6.2505': attribute type 39 has an invalid length. [ 266.095935][T11016] syzkaller0: entered promiscuous mode [ 266.117192][T11016] syzkaller0: entered allmulticast mode [ 266.463946][ T28] kauditd_printk_skb: 196 callbacks suppressed [ 266.464018][ T28] audit: type=1400 audit(1776151425.844:22910): avc: denied { open } for pid=11024 comm="syz.6.2514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 266.563329][ T28] audit: type=1400 audit(1776151425.886:22911): avc: denied { create } for pid=11024 comm="syz.6.2514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 266.621821][ T28] audit: type=1400 audit(1776151425.886:22912): avc: denied { prog_load } for pid=11024 comm="syz.6.2514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.818721][ T28] audit: type=1400 audit(1776151426.222:22913): avc: denied { read write } for pid=6815 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.844033][T11032] 8021q: VLANs not supported on ip6gre0 [ 266.892846][ T28] audit: type=1400 audit(1776151426.222:22914): avc: denied { create } for pid=11031 comm="syz.7.2517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 266.931800][ T28] audit: type=1400 audit(1776151426.222:22915): avc: denied { create } for pid=11031 comm="syz.7.2517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 266.952356][ T28] audit: type=1400 audit(1776151426.222:22916): avc: denied { open } for pid=11031 comm="syz.7.2517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 266.974307][ T28] audit: type=1400 audit(1776151426.222:22917): avc: denied { create } for pid=11031 comm="syz.7.2517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.001968][T11038] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 267.009272][T11038] IPv6: NLM_F_CREATE should be set when creating new route [ 267.016686][T11038] IPv6: NLM_F_CREATE should be set when creating new route [ 267.023941][T11038] IPv6: NLM_F_CREATE should be set when creating new route [ 267.039413][ T28] audit: type=1400 audit(1776151426.222:22918): avc: denied { create } for pid=11031 comm="syz.7.2517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 267.070547][ T28] audit: type=1400 audit(1776151426.222:22919): avc: denied { read } for pid=11031 comm="syz.7.2517" dev="nsfs" ino=4026533026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 267.269817][T11057] syzkaller0: entered promiscuous mode [ 267.275356][T11057] syzkaller0: entered allmulticast mode [ 267.640520][T11070] syzkaller0: entered promiscuous mode [ 267.878500][T11103] netlink: 'syz.7.2544': attribute type 10 has an invalid length. [ 267.898292][T11103] team0: Port device vxcan1 added [ 269.415568][T11140] netlink: 'syz.4.2559': attribute type 4 has an invalid length. [ 269.448707][T11140] netlink: 152 bytes leftover after parsing attributes in process `syz.4.2559'. [ 271.453322][ T28] kauditd_printk_skb: 336 callbacks suppressed [ 271.453341][ T28] audit: type=1400 audit(1776151431.093:23256): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.513528][ T28] audit: type=1400 audit(1776151431.125:23257): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.564229][ T28] audit: type=1400 audit(1776151431.135:23258): avc: denied { open } for pid=11186 comm="syz.4.2579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 271.602599][T11191] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 271.638881][ T28] audit: type=1400 audit(1776151431.135:23259): avc: denied { create } for pid=11186 comm="syz.4.2579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 271.697385][ T28] audit: type=1400 audit(1776151431.146:23260): avc: denied { create } for pid=11186 comm="syz.4.2579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 271.742387][ T28] audit: type=1400 audit(1776151431.146:23261): avc: denied { read } for pid=11186 comm="syz.4.2579" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 271.797341][ T28] audit: type=1400 audit(1776151431.177:23262): avc: denied { read write } for pid=11186 comm="syz.4.2579" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.826213][T11199] netlink: 'syz.7.2584': attribute type 1 has an invalid length. [ 271.868822][ T28] audit: type=1400 audit(1776151431.177:23263): avc: denied { prog_load } for pid=11186 comm="syz.4.2579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.945284][T11199] netlink: 20 bytes leftover after parsing attributes in process `syz.7.2584'. [ 271.954889][ T28] audit: type=1400 audit(1776151431.177:23264): avc: denied { open } for pid=11186 comm="syz.4.2579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 271.972832][T11203] bond0: (slave vxcan3): The slave device specified does not support setting the MAC address [ 271.976054][ T28] audit: type=1400 audit(1776151431.188:23265): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.012788][T11203] bond0: (slave vxcan3): Error -95 calling set_mac_address [ 272.158228][T11210] netlink: 28 bytes leftover after parsing attributes in process `syz.7.2584'. [ 272.213924][T11199] bond0: (slave bridge5): Enslaving as an active interface with a down link [ 272.646643][T11226] syzkaller0: entered promiscuous mode [ 272.665649][T11226] syzkaller0: entered allmulticast mode [ 273.565380][T11268] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11268 comm=syz.4.2609 [ 273.979126][T11277] netlink: 'syz.3.2611': attribute type 1 has an invalid length. [ 274.010837][T11277] 8021q: adding VLAN 0 to HW filter on device bond7 [ 274.038247][T11277] bond7: (slave gretap2): making interface the new active one [ 274.070162][T11277] bond7: (slave gretap2): Enslaving as an active interface with an up link [ 274.104643][T11283] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11283 comm=syz.3.2611 [ 276.163411][T11341] syzkaller0: entered promiscuous mode [ 276.240192][T11341] syzkaller0: entered allmulticast mode [ 276.247702][ T28] kauditd_printk_skb: 432 callbacks suppressed [ 276.247719][ T28] audit: type=1400 audit(1776151436.122:23698): avc: denied { read write } for pid=11342 comm="syz.7.2635" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.325920][ T28] audit: type=1400 audit(1776151436.164:23699): avc: denied { create } for pid=11342 comm="syz.7.2635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 276.376375][ T28] audit: type=1400 audit(1776151436.164:23700): avc: denied { execmem } for pid=11342 comm="syz.7.2635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 276.396354][ T28] audit: type=1400 audit(1776151436.164:23701): avc: denied { execmem } for pid=11342 comm="syz.7.2635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 276.438512][ T28] audit: type=1400 audit(1776151436.322:23702): avc: denied { prog_load } for pid=11332 comm="syz.4.2632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.438654][ T28] audit: type=1400 audit(1776151436.322:23703): avc: denied { prog_load } for pid=11332 comm="syz.4.2632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.438684][ T28] audit: type=1400 audit(1776151436.322:23704): avc: denied { open } for pid=11332 comm="syz.4.2632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 276.439535][ T28] audit: type=1400 audit(1776151436.322:23705): avc: denied { read write } for pid=11332 comm="syz.4.2632" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.507492][ T28] audit: type=1400 audit(1776151436.385:23706): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.516715][ T28] audit: type=1400 audit(1776151436.395:23707): avc: denied { prog_load } for pid=11347 comm="syz.3.2636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.771277][T11365] syzkaller0: entered promiscuous mode [ 276.783947][T11365] syzkaller0: entered allmulticast mode [ 278.313220][T11396] netlink: 'syz.3.2655': attribute type 1 has an invalid length. [ 278.531749][T11403] netlink: 14 bytes leftover after parsing attributes in process `syz.3.2658'. [ 278.563339][T11403] .` (unregistering): Released all slaves [ 279.217470][T11419] syzkaller0: entered promiscuous mode [ 279.232127][T11419] syzkaller0: entered allmulticast mode [ 279.311964][T11425] 8021q: adding VLAN 0 to HW filter on device bond8 [ 280.506532][T11480] syzkaller0: entered promiscuous mode [ 280.512336][T11480] syzkaller0: entered allmulticast mode [ 281.097155][ T28] kauditd_printk_skb: 779 callbacks suppressed [ 281.097173][ T28] audit: type=1400 audit(1776151441.204:24487): avc: denied { create } for pid=11488 comm="syz.3.2694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 281.206248][ T28] audit: type=1400 audit(1776151441.235:24488): avc: denied { create } for pid=11488 comm="syz.3.2694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 281.270549][ T28] audit: type=1400 audit(1776151441.267:24489): avc: denied { read write } for pid=8033 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 281.320182][T11501] netlink: 'syz.6.2696': attribute type 10 has an invalid length. [ 281.377435][ T28] audit: type=1400 audit(1776151441.424:24490): avc: denied { read write } for pid=6815 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 281.664157][T11501] team0: Port device netdevsim1 added [ 281.670058][T11507] netlink: 40 bytes leftover after parsing attributes in process `syz.8.2699'. [ 281.711388][ T28] audit: type=1400 audit(1776151441.445:24491): avc: denied { allowed } for pid=11497 comm="syz.6.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 281.751381][T11514] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2702'. [ 281.770635][ T28] audit: type=1400 audit(1776151441.445:24492): avc: denied { prog_load } for pid=11497 comm="syz.6.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.847028][ T28] audit: type=1400 audit(1776151441.445:24493): avc: denied { create } for pid=11497 comm="syz.6.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 281.897648][ T28] audit: type=1400 audit(1776151441.456:24494): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.285425][ T28] audit: type=1400 audit(1776151441.477:24495): avc: denied { prog_load } for pid=11502 comm="syz.8.2698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.334313][ T28] audit: type=1400 audit(1776151441.477:24496): avc: denied { prog_load } for pid=11502 comm="syz.8.2698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 283.427315][T11548] netlink: 'syz.3.2712': attribute type 10 has an invalid length. [ 283.446424][T11548] geneve1: entered promiscuous mode [ 284.181994][T11572] syzkaller0: entered promiscuous mode [ 284.214136][T11572] syzkaller0: entered allmulticast mode [ 284.243434][ T50] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 285.268512][T11613] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2739'. [ 285.336814][T11613] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11613 comm=syz.7.2739 [ 285.867140][ T28] kauditd_printk_skb: 270 callbacks suppressed [ 285.867158][ T28] audit: type=1400 audit(1776151446.222:24767): avc: denied { create } for pid=11629 comm="syz.3.2746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 285.913626][ T28] audit: type=1400 audit(1776151446.253:24768): avc: denied { read append } for pid=11629 comm="syz.3.2746" name="ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 286.024082][ T28] audit: type=1400 audit(1776151446.253:24769): avc: denied { prog_load } for pid=11628 comm="syz.7.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.045905][T11634] netlink: 'syz.3.2747': attribute type 4 has an invalid length. [ 286.081189][ T28] audit: type=1400 audit(1776151446.253:24770): avc: denied { create } for pid=11629 comm="syz.3.2746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 286.134173][ T28] audit: type=1400 audit(1776151446.264:24771): avc: denied { create } for pid=11628 comm="syz.7.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 286.202578][ T28] audit: type=1400 audit(1776151446.264:24772): avc: denied { create } for pid=11628 comm="syz.7.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 286.262312][ T28] audit: type=1400 audit(1776151446.264:24773): avc: denied { prog_load } for pid=11628 comm="syz.7.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.310705][ T28] audit: type=1400 audit(1776151446.264:24774): avc: denied { open } for pid=11628 comm="syz.7.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 286.367070][ T28] audit: type=1400 audit(1776151446.264:24775): avc: denied { map_create } for pid=11628 comm="syz.7.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.410264][ T28] audit: type=1400 audit(1776151446.295:24776): avc: denied { create } for pid=11628 comm="syz.7.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 286.697462][T11656] netlink: 'syz.8.2754': attribute type 1 has an invalid length. [ 286.806507][T11661] netlink: 20 bytes leftover after parsing attributes in process `syz.8.2754'. [ 286.856223][T11663] netlink: 28 bytes leftover after parsing attributes in process `syz.8.2754'. [ 287.419036][T11674] ipip0: entered promiscuous mode [ 287.473538][T11678] netlink: 8 bytes leftover after parsing attributes in process `syz.8.2761'. [ 287.486054][T11678] vlan6: entered promiscuous mode [ 287.491307][T11678] ip6gretap0: entered promiscuous mode [ 287.520753][T11680] geneve1: left promiscuous mode [ 287.548113][T11680] ipvlan2: left allmulticast mode [ 287.573137][T11680] bond0: left allmulticast mode [ 287.597058][T11680] bridge5: left allmulticast mode [ 287.633940][T11680] ipip0: left promiscuous mode [ 289.217120][T11731] netlink: 'syz.3.2777': attribute type 2 has an invalid length. [ 289.225402][T11731] netlink: 14 bytes leftover after parsing attributes in process `syz.3.2777'. [ 290.643976][ T28] kauditd_printk_skb: 381 callbacks suppressed [ 290.643995][ T28] audit: type=1400 audit(1776151451.240:25158): avc: denied { prog_load } for pid=11750 comm="syz.3.2785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 291.400533][ T28] audit: type=1400 audit(1776151452.017:25159): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 291.450742][ T28] audit: type=1400 audit(1776151452.059:25160): avc: denied { read write } for pid=11754 comm="syz.8.2786" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 291.568062][ T28] audit: type=1400 audit(1776151452.059:25161): avc: denied { read } for pid=11754 comm="syz.8.2786" dev="nsfs" ino=4026533622 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 292.163369][ T28] audit: type=1400 audit(1776151452.825:25162): avc: denied { read write } for pid=6815 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 292.225131][ T28] audit: type=1400 audit(1776151452.877:25163): avc: denied { execmem } for pid=11757 comm="syz.7.2787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 292.264637][ T28] audit: type=1400 audit(1776151452.940:25164): avc: denied { create } for pid=11757 comm="syz.7.2787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=0 [ 293.029400][ T28] audit: type=1400 audit(1776151453.738:25165): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 293.111067][ T28] audit: type=1400 audit(1776151453.770:25166): avc: denied { execmem } for pid=11760 comm="syz.4.2788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 293.153637][ T28] audit: type=1400 audit(1776151453.770:25167): avc: denied { prog_load } for pid=11760 comm="syz.4.2788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 293.218014][T11763] 8021q: adding VLAN 0 to HW filter on device bond9 [ 293.396629][ T6347] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 293.728506][T11789] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2798'. [ 293.918367][T11789] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2798'. [ 294.013254][T11794] netlink: 4 bytes leftover after parsing attributes in process `syz.8.2810'. [ 294.814468][T11822] netlink: 'syz.3.2813': attribute type 1 has an invalid length. [ 294.864098][T11822] 8021q: adding VLAN 0 to HW filter on device bond8 [ 294.883787][T11822] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2813'. [ 294.932822][T11822] bond8: (slave bridge8): making interface the new active one [ 294.956996][T11822] bond8: (slave bridge8): Enslaving as an active interface with an up link [ 294.991283][T11833] macvlan2: entered promiscuous mode [ 294.996645][T11833] macvlan2: entered allmulticast mode [ 295.036569][T11833] bond8: entered promiscuous mode [ 295.041669][T11833] bridge8: entered promiscuous mode [ 295.090352][T11833] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 295.111600][T11833] bond8: (slave macvlan2): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 295.159254][T11833] bond8: left promiscuous mode [ 295.164164][T11833] bridge8: left promiscuous mode [ 295.390223][T11844] netlink: 'syz.8.2820': attribute type 10 has an invalid length. [ 295.416120][T11844] geneve1: entered promiscuous mode [ 295.433031][T11844] bond0: (slave geneve1): Enslaving as an active interface with an up link [ 295.461847][ T50] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.473047][ T28] kauditd_printk_skb: 265 callbacks suppressed [ 295.473067][ T28] audit: type=1400 audit(1776151456.310:25433): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 295.475378][ T50] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.517153][ T50] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.526291][ T50] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.539250][ T28] audit: type=1400 audit(1776151456.373:25434): avc: denied { map_create } for pid=11847 comm="syz.3.2831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.563427][T11850] batadv_slave_0: left promiscuous mode [ 295.570252][T11850] bond2: left promiscuous mode [ 295.582924][T11850] bridge2: left promiscuous mode [ 295.594878][ T28] audit: type=1400 audit(1776151456.373:25435): avc: denied { prog_load } for pid=11847 comm="syz.3.2831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.603815][T11850] vlan2: left allmulticast mode [ 295.624475][T11850] bond0: left allmulticast mode [ 295.631737][T11850] geneve2: left allmulticast mode [ 295.653351][T11850] macvlan2: left promiscuous mode [ 295.659136][T11850] macsec1: left promiscuous mode [ 295.663806][ T28] audit: type=1400 audit(1776151456.394:25436): avc: denied { create } for pid=11849 comm="syz.4.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 295.717050][ T28] audit: type=1400 audit(1776151456.415:25437): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 295.769678][ T28] audit: type=1400 audit(1776151456.426:25438): avc: denied { execmem } for pid=11851 comm="syz.8.2822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 295.790053][ T28] audit: type=1400 audit(1776151456.426:25439): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 295.866798][ T28] audit: type=1400 audit(1776151456.468:25440): avc: denied { map_create } for pid=11849 comm="syz.4.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.895887][ T28] audit: type=1400 audit(1776151456.468:25441): avc: denied { read } for pid=11849 comm="syz.4.2821" dev="nsfs" ino=4026532625 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 295.918066][ T28] audit: type=1400 audit(1776151456.468:25442): avc: denied { create } for pid=11849 comm="syz.4.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 295.959295][T11867] syzkaller0: entered promiscuous mode [ 295.964906][T11867] syzkaller0: entered allmulticast mode [ 296.239383][T11856] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2823'. [ 296.249078][T11856] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2823'. [ 296.258333][T11856] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2823'. [ 296.267762][T11856] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2823'. [ 296.277189][T11856] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2823'. [ 296.287367][T11856] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2823'. [ 296.397358][T11875] netlink: 'syz.4.2830': attribute type 39 has an invalid length. [ 296.520016][T11880] netlink: 'syz.4.2834': attribute type 10 has an invalid length. [ 296.535755][T11880] geneve1: entered promiscuous mode [ 298.033645][T11945] syzkaller0: entered promiscuous mode [ 298.055306][T11945] syzkaller0: entered allmulticast mode [ 299.230380][T11996] __nla_validate_parse: 19 callbacks suppressed [ 299.230448][T11996] netlink: 24 bytes leftover after parsing attributes in process `syz.6.2882'. [ 299.306924][T12003] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2885'. [ 299.318152][T11996] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11996 comm=syz.6.2882 [ 299.345683][T12007] netlink: 8 bytes leftover after parsing attributes in process `syz.8.2883'. [ 299.368336][T12007] netlink: 8 bytes leftover after parsing attributes in process `syz.8.2883'. [ 299.416522][T12007] netlink: 8 bytes leftover after parsing attributes in process `syz.8.2883'. [ 299.437383][T12007] netlink: 8 bytes leftover after parsing attributes in process `syz.8.2883'. [ 299.477070][T12015] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2891'. [ 299.527804][T12007] netlink: 8 bytes leftover after parsing attributes in process `syz.8.2883'. [ 300.376903][ T28] kauditd_printk_skb: 543 callbacks suppressed [ 300.376924][ T28] audit: type=1400 audit(1776167845.447:25986): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 300.646869][ T28] audit: type=1400 audit(1776167845.741:25987): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 300.734973][ T28] audit: type=1400 audit(1776167845.825:25988): avc: denied { read write } for pid=8033 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 300.769564][ T28] audit: type=1400 audit(1776167845.856:25989): avc: denied { execmem } for pid=12035 comm="syz.6.2896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 300.838575][ T28] audit: type=1400 audit(1776167845.856:25990): avc: denied { open } for pid=12035 comm="syz.6.2896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 300.884149][ T28] audit: type=1400 audit(1776167845.856:25991): avc: denied { allowed } for pid=12035 comm="syz.6.2896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 300.904880][T12056] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 300.917062][T12056] sch_tbf: burst 6281 is lower than device lo mtu (11337746) ! [ 300.945337][ T28] audit: type=1400 audit(1776167845.856:25992): avc: denied { create } for pid=12035 comm="syz.6.2896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 300.960216][T12058] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2905'. [ 300.987401][ T28] audit: type=1400 audit(1776167845.856:25993): avc: denied { map_create } for pid=12038 comm="syz.7.2906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 301.027723][ T28] audit: type=1400 audit(1776167845.888:25994): avc: denied { read write } for pid=8033 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 301.077527][ T28] audit: type=1400 audit(1776167845.898:25995): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 301.201388][T12064] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2908'. [ 301.417447][T12073] IPVS: sed: UDP 224.0.0.2:0 - no destination available [ 301.594259][T12082] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12082 comm=syz.7.2915 [ 302.706462][T12103] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12103 comm=syz.8.2922 [ 303.402067][T12123] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12123 comm=syz.8.2929 [ 304.344716][T12145] syzkaller0: entered promiscuous mode [ 304.367872][T12145] syzkaller0: entered allmulticast mode [ 304.600145][T12156] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12156 comm=syz.6.2944 [ 305.017223][T12168] __nla_validate_parse: 10 callbacks suppressed [ 305.017243][T12168] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2949'. [ 305.054330][T12163] syz.6.2947 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 305.095423][T12163] CPU: 1 UID: 0 PID: 12163 Comm: syz.6.2947 Tainted: G W syzkaller #0 PREEMPT(full) [ 305.095468][T12163] Tainted: [W]=WARN [ 305.095476][T12163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 305.095555][T12163] Call Trace: [ 305.095563][T12163] [ 305.095571][T12163] __dump_stack+0x1d/0x30 [ 305.095599][T12163] dump_stack_lvl+0x95/0xd0 [ 305.095625][T12163] dump_stack+0x15/0x1b [ 305.095717][T12163] dump_header+0x80/0x240 [ 305.095742][T12163] oom_kill_process+0x295/0x350 [ 305.095905][T12163] out_of_memory+0x97d/0xb80 [ 305.095944][T12163] try_charge_memcg+0x62e/0xa10 [ 305.096075][T12163] obj_cgroup_charge_pages+0x23/0xc0 [ 305.096127][T12163] __memcg_kmem_charge_page+0x9e/0x170 [ 305.096156][T12163] __alloc_frozen_pages_noprof+0x18a/0x360 [ 305.096197][T12163] alloc_pages_mpol+0xb3/0x260 [ 305.096279][T12163] alloc_pages_noprof+0x8f/0x140 [ 305.096318][T12163] __vmalloc_node_range_noprof+0xa46/0x12b0 [ 305.096400][T12163] __kvmalloc_node_noprof+0x3d4/0x650 [ 305.096434][T12163] ? futex_hash_allocate+0x190/0x9d0 [ 305.096473][T12163] ? futex_hash_allocate+0x190/0x9d0 [ 305.096521][T12163] futex_hash_allocate+0x190/0x9d0 [ 305.096551][T12163] ? cap_task_prctl+0x13f/0x6e0 [ 305.096582][T12163] futex_hash_prctl+0xd8/0xf0 [ 305.096648][T12163] __se_sys_prctl+0x4f4/0x1400 [ 305.096688][T12163] __x64_sys_prctl+0x67/0x80 [ 305.096721][T12163] x64_sys_call+0x2533/0x3020 [ 305.096823][T12163] do_syscall_64+0x12c/0x370 [ 305.096870][T12163] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 305.096902][T12163] RIP: 0033:0x7fc32b5bc819 [ 305.096943][T12163] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 305.096970][T12163] RSP: 002b:00007fc32a017028 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 305.096998][T12163] RAX: ffffffffffffffda RBX: 00007fc32b835fa0 RCX: 00007fc32b5bc819 [ 305.097053][T12163] RDX: 0000000001000000 RSI: 0000000000000001 RDI: 000000000000004e [ 305.097149][T12163] RBP: 00007fc32b652c91 R08: 0000000000000000 R09: 0000000000000000 [ 305.097178][T12163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 305.097194][T12163] R13: 00007fc32b836038 R14: 00007fc32b835fa0 R15: 00007ffde3c81758 [ 305.097215][T12163] [ 305.146901][ T28] kauditd_printk_skb: 4083 callbacks suppressed [ 305.147023][ T28] audit: type=1326 audit(1776167850.444:30079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12126 comm="syz.3.2933" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbc24696597 code=0x7ffc0000 [ 305.161368][T12163] memory: usage 263256kB, limit 307200kB, failcnt 348 [ 305.167252][ T28] audit: type=1326 audit(1776167850.476:30080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12126 comm="syz.3.2933" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fbc2463db99 code=0x7ffc0000 [ 305.180516][T12163] memory+swap: usage 263608kB, limit 9007199254740988kB, failcnt 0 [ 305.221112][ T28] audit: type=1326 audit(1776167850.476:30081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12126 comm="syz.3.2933" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbc24696597 code=0x7ffc0000 [ 305.275466][T12163] kmem: usage 253832kB, limit 9007199254740988kB, failcnt 0 [ 305.395915][ T28] audit: type=1326 audit(1776167850.476:30082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12126 comm="syz.3.2933" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fbc2463db99 code=0x7ffc0000 [ 305.427880][T12163] Memory cgroup stats for [ 305.496175][T12171] syzkaller0: entered promiscuous mode [ 305.506464][T12171] syzkaller0: entered allmulticast mode [ 305.513604][T12163] /syz6: [ 305.513867][T12163] cache 0 [ 305.516984][ T8089] audit: audit_backlog=65 > audit_backlog_limit=64 [ 305.520005][T12163] rss 36864 [ 305.529861][ T8089] audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 [ 305.540050][ T8089] audit: backlog limit exceeded [ 305.544070][T12163] shmem 0 [ 305.550935][ T28] audit: type=1326 audit(1776167850.476:30083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12126 comm="syz.3.2933" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbc24696597 code=0x7ffc0000 [ 305.574974][T12163] mapped_file 0 [ 305.580873][T12163] dirty 0 [ 305.583872][T12163] writeback 0 [ 305.587180][T12163] workingset_refault_anon 4163 [ 305.613345][ T8089] audit: audit_backlog=65 > audit_backlog_limit=64 [ 305.620316][ T8089] audit: audit_lost=7 audit_rate_limit=0 audit_backlog_limit=64 [ 305.631480][T12163] workingset_refault_file 0 [ 305.654114][T12163] swap 356352 [ 305.698639][T12163] swapcached 19070976 [ 305.702694][T12163] pgpgin 219083 [ 305.769183][T12163] pgpgout 219073 [ 305.797220][T12163] pgfault 290145 [ 305.806038][T12181] netlink: 'syz.8.2955': attribute type 10 has an invalid length. [ 305.825129][T12163] pgmajfault 600 [ 305.836176][T12163] inactive_anon 0 [ 305.842218][ T307] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 305.851996][ T307] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 305.884511][T12163] active_anon 36864 [ 305.889274][T12163] inactive_file 0 [ 305.893355][T12163] active_file 4096 [ 305.901299][T12163] unevictable 0 [ 305.913174][ T307] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 305.922481][ T5770] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 305.940720][T12163] hierarchical_memory_limit 314572800 [ 305.946476][T12163] hierarchical_memsw_limit 9223372036854771712 [ 305.947882][T12186] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12186 comm=syz.8.2957 [ 305.954383][T12163] total_cache 0 [ 305.999305][T12163] total_rss 36864 [ 306.003428][T12163] total_shmem 0 [ 306.008797][T12163] total_mapped_file 0 [ 306.035538][T12163] total_dirty 0 [ 306.049110][T12189] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12189 comm=syz.8.2958 [ 306.063832][T12163] total_writeback 0 [ 306.071993][T12163] total_workingset_refault_anon 4163 [ 306.101240][T12163] total_workingset_refault_file 0 [ 306.122635][T12163] total_swap 356352 [ 306.183924][T12163] total_swapcached 19070976 [ 306.211417][T12163] total_pgpgin 219083 [ 306.241713][T12163] total_pgpgout 219073 [ 306.249654][T12163] total_pgfault 290145 [ 306.258263][T12163] total_pgmajfault 600 [ 306.266750][T12163] total_inactive_anon 0 [ 306.284639][T12163] total_active_anon 36864 [ 306.297811][T12163] total_inactive_file 0 [ 306.306632][T12163] total_active_file 4096 [ 306.322253][T12163] total_unevictable 0 [ 306.334906][T12163] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz6,task_memcg=/syz6,task=syz.6.2947,pid=12162,uid=0 [ 306.365212][T12163] Memory cgroup out of memory: Killed process 12163 (syz.6.2947) total-vm:96212kB, anon-rss:1340kB, file-rss:22280kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 306.632804][T12197] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12197 comm=syz.8.2961 [ 306.753534][T12204] netlink: 'syz.7.2965': attribute type 4 has an invalid length. [ 306.774359][T12204] netlink: 'syz.7.2965': attribute type 4 has an invalid length. [ 306.807358][T12204] netlink: 'syz.7.2965': attribute type 4 has an invalid length. [ 306.825162][T12209] netlink: 24 bytes leftover after parsing attributes in process `syz.8.2967'. [ 306.975700][T12222] netlink: 24 bytes leftover after parsing attributes in process `syz.8.2971'. [ 307.010410][T12222] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12222 comm=syz.8.2971 [ 307.856344][T12249] netlink: 'syz.3.2980': attribute type 4 has an invalid length. [ 307.944466][T12251] netlink: 'syz.3.2980': attribute type 4 has an invalid length. [ 308.143170][T12254] netlink: 'syz.3.2980': attribute type 4 has an invalid length. [ 308.228455][T12258] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2982'. [ 308.374274][T12264] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2984'. [ 308.432531][T12264] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12264 comm=syz.3.2984 [ 308.520577][T12266] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2985'. [ 308.578368][T12266] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12266 comm=syz.3.2985 [ 309.160828][T12276] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2989'. [ 309.169958][T12276] netlink: 28 bytes leftover after parsing attributes in process `syz.6.2989'. [ 309.179239][T12276] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2989'. [ 309.196487][T12276] netlink: 28 bytes leftover after parsing attributes in process `syz.6.2989'. [ 309.236078][T12276] netlink: 'syz.6.2989': attribute type 6 has an invalid length. [ 309.539004][T12288] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12288 comm=syz.8.3003 [ 309.633791][T12295] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12295 comm=syz.8.2994 [ 309.917454][ T28] kauditd_printk_skb: 2740 callbacks suppressed [ 309.917476][ T28] audit: type=1400 audit(1776192431.298:32805): avc: denied { read write } for pid=12296 comm="syz.8.2995" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.130374][ T28] audit: type=1400 audit(1776192431.403:32806): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.541419][ T28] audit: type=1400 audit(1776192432.117:32807): avc: denied { read write } for pid=8033 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.597425][ T28] audit: type=1400 audit(1776192432.170:32808): avc: denied { prog_load } for pid=12300 comm="syz.4.2997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.637821][ T28] audit: type=1400 audit(1776192432.170:32809): avc: denied { prog_load } for pid=12300 comm="syz.4.2997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.723092][ T28] audit: type=1400 audit(1776192432.180:32810): avc: denied { open } for pid=12300 comm="syz.4.2997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 310.781078][ T28] audit: type=1400 audit(1776192432.180:32811): avc: denied { read } for pid=12302 comm="syz.6.2996" dev="nsfs" ino=4026533700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 310.845997][ T28] audit: type=1400 audit(1776192432.180:32812): avc: denied { bpf } for pid=12300 comm="syz.4.2997" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 310.911195][ T28] audit: type=1400 audit(1776192432.254:32813): avc: denied { prog_load } for pid=12302 comm="syz.6.2996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.950247][ T28] audit: type=1400 audit(1776192432.264:32814): avc: denied { prog_load } for pid=12302 comm="syz.6.2996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 312.938872][T12359] __nla_validate_parse: 2 callbacks suppressed [ 312.938893][T12359] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3018'. [ 313.107596][T12359] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12359 comm=syz.4.3018 [ 313.244857][T12366] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3030'. [ 313.293034][T12366] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12366 comm=syz.7.3030 [ 313.428065][T12374] netlink: 'syz.8.3022': attribute type 1 has an invalid length. [ 313.511434][T12374] bond8: (slave vxcan3): The slave device specified does not support setting the MAC address [ 313.571563][T12374] bond8: (slave vxcan3): Error -95 calling set_mac_address [ 313.648025][T12380] netlink: 20 bytes leftover after parsing attributes in process `syz.8.3022'. [ 313.672573][T12380] bond8: (slave bridge0): Enslaving as an active interface with a down link [ 313.711293][T12374] netlink: 28 bytes leftover after parsing attributes in process `syz.8.3022'. [ 314.146290][T12401] netlink: 24 bytes leftover after parsing attributes in process `syz.8.3034'. [ 314.177110][T12401] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12401 comm=syz.8.3034 [ 314.296388][T12409] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3038'. [ 314.439007][T12413] bond9: option lacp_rate: mode dependency failed, not supported in mode balance-xor(2) [ 314.476546][T12413] bond9 (unregistering): Released all slaves [ 314.909867][ T28] kauditd_printk_skb: 452 callbacks suppressed [ 314.909887][ T28] audit: type=1400 audit(1776225204.704:33267): avc: denied { read write } for pid=6815 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 314.981436][ T28] audit: type=1400 audit(1776225204.746:33268): avc: denied { create } for pid=12415 comm="syz.7.3040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 315.137155][ T28] audit: type=1400 audit(1776225204.946:33269): avc: denied { read write } for pid=8089 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 315.173867][T12419] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3042'. [ 315.188958][ T28] audit: type=1400 audit(1776225204.977:33270): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 315.215153][ T28] audit: type=1400 audit(1776225204.988:33271): avc: denied { prog_load } for pid=12418 comm="syz.3.3042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.235180][ T28] audit: type=1400 audit(1776225204.988:33272): avc: denied { prog_load } for pid=12418 comm="syz.3.3042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.271868][T12423] netlink: 24 bytes leftover after parsing attributes in process `syz.8.3043'. [ 315.298344][T12423] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12423 comm=syz.8.3043 [ 315.321103][ T28] audit: type=1400 audit(1776225204.988:33273): avc: denied { open } for pid=12418 comm="syz.3.3042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 315.364391][ T28] audit: type=1400 audit(1776225204.998:33274): avc: denied { create } for pid=12418 comm="syz.3.3042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 315.403786][T12431] netlink: 24 bytes leftover after parsing attributes in process `syz.8.3046'. [ 315.413029][ T28] audit: type=1400 audit(1776225204.998:33275): avc: denied { create } for pid=12418 comm="syz.3.3042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 315.455314][ T28] audit: type=1400 audit(1776225205.009:33276): avc: denied { create } for pid=12420 comm="syz.8.3041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 315.507833][T12431] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12431 comm=syz.8.3046 [ 315.786246][T12439] syzkaller0: entered promiscuous mode [ 315.801157][T12439] syzkaller0: entered allmulticast mode [ 315.987256][T12452] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3055'. [ 316.032429][T12452] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12452 comm=syz.6.3055 [ 316.660048][T12489] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12489 comm=syz.3.3068 [ 316.712334][T12493] netlink: 'syz.3.3070': attribute type 7 has an invalid length. [ 316.720431][T12493] netlink: 'syz.3.3070': attribute type 8 has an invalid length. [ 316.979900][T12510] xt_CT: No such helper "snmp_trap" [ 317.043755][T12513] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12513 comm=syz.4.3079 [ 317.411414][T12543] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12543 comm=syz.4.3092 [ 317.458976][T12549] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12549 comm=syz.7.3096 [ 317.788609][T12554] netlink: 'syz.4.3097': attribute type 10 has an invalid length. [ 317.811799][T12554] team0: Device vxcan1 is of different type [ 317.989461][T12583] __nla_validate_parse: 8 callbacks suppressed [ 317.989481][T12583] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3107'. [ 318.034358][T12583] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12583 comm=syz.4.3107 [ 318.055707][T12587] syzkaller0: entered promiscuous mode [ 318.068131][T12587] syzkaller0: entered allmulticast mode [ 318.109012][T12592] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3111'. [ 318.215406][T12597] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12597 comm=syz.4.3111 [ 318.250861][T12599] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3113'. [ 318.276418][T12601] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3114'. [ 318.372559][T12604] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12604 comm=syz.6.3113 [ 318.550632][T12621] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3121'. [ 318.571123][T12619] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3120'. [ 318.690719][T12628] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 318.729357][T12630] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3124'. [ 318.777361][T12635] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3126'. [ 318.800337][T12610] netlink: 'syz.6.3116': attribute type 10 has an invalid length. [ 318.837375][T12610] team0: Device vxcan1 is of different type [ 318.847762][T12638] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3127'. [ 318.889864][T12641] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3128'. [ 319.680090][ T28] kauditd_printk_skb: 1156 callbacks suppressed [ 319.680110][ T28] audit: type=1400 audit(16709.564:34430): avc: denied { create } for pid=12680 comm="syz.4.3145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 319.716583][ T28] audit: type=1400 audit(16709.564:34431): avc: denied { open } for pid=12680 comm="syz.4.3145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 319.766399][ T28] audit: type=1400 audit(16709.658:34432): avc: denied { read write } for pid=6815 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 319.810848][ T28] audit: type=1400 audit(16709.690:34433): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 319.841963][ T28] audit: type=1400 audit(16709.700:34434): avc: denied { prog_load } for pid=12682 comm="syz.7.3146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 319.861804][ T28] audit: type=1400 audit(16709.700:34435): avc: denied { read write } for pid=12682 comm="syz.7.3146" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 319.886488][ T28] audit: type=1400 audit(16709.700:34436): avc: denied { create } for pid=12682 comm="syz.7.3146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 319.909250][ T28] audit: type=1400 audit(16709.700:34437): avc: denied { create } for pid=12682 comm="syz.7.3146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 319.941597][ T28] audit: type=1400 audit(16709.700:34438): avc: denied { create } for pid=12682 comm="syz.7.3146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 319.963000][ T28] audit: type=1400 audit(16709.700:34439): avc: denied { read write } for pid=12682 comm="syz.7.3146" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 319.970861][T12670] netlink: 'syz.3.3140': attribute type 10 has an invalid length. [ 320.085425][T12699] netlink: 'syz.3.3153': attribute type 10 has an invalid length. [ 320.098828][T12699] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 320.110541][T12699] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.121394][T12699] hsr0: entered promiscuous mode [ 320.135212][T12698] selinux_netlink_send: 17 callbacks suppressed [ 320.135230][T12698] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12698 comm=syz.7.3152 [ 320.157944][T12701] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12701 comm=syz.6.3154 [ 320.171584][T12703] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12703 comm=syz.4.3155 [ 320.227895][T12709] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12709 comm=syz.4.3158 [ 320.241164][T12707] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12707 comm=syz.7.3156 [ 320.286761][T12714] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12714 comm=syz.7.3160 [ 320.370779][T12719] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12719 comm=syz.7.3162 [ 320.403498][T12721] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12721 comm=syz.4.3163 [ 320.564183][T12732] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12732 comm=syz.3.3167 [ 320.583949][T12735] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12735 comm=syz.8.3169 [ 322.378068][ T36] ================================================================== [ 322.386521][ T36] BUG: KCSAN: data-race in n_tty_lookahead_flow_ctrl / tty_set_termios [ 322.394979][ T36] [ 322.397452][ T36] write to 0xffff888129d72508 of 44 bytes by task 12809 on cpu 1: [ 322.405328][ T36] tty_set_termios+0xc0/0x910 [ 322.410086][ T36] set_termios+0x373/0x4f0 [ 322.414572][ T36] tty_mode_ioctl+0x37f/0x5b0 [ 322.419316][ T36] n_tty_ioctl_helper+0x87/0x370 [ 322.424577][ T36] n_tty_ioctl+0x101/0x230 [ 322.429071][ T36] tty_ioctl+0x83e/0xb80 [ 322.433490][ T36] __se_sys_ioctl+0xce/0x140 [ 322.438139][ T36] __x64_sys_ioctl+0x43/0x50 [ 322.442864][ T36] x64_sys_call+0x1563/0x3020 [ 322.447631][ T36] do_syscall_64+0x12c/0x370 [ 322.452266][ T36] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 322.458191][ T36] [ 322.460546][ T36] read to 0xffff888129d72522 of 1 bytes by task 36 on cpu 0: [ 322.468299][ T36] n_tty_lookahead_flow_ctrl+0x1bd/0x300 [ 322.473979][ T36] tty_port_default_lookahead_buf+0x91/0xc0 [ 322.480194][ T36] flush_to_ldisc+0x288/0x340 [ 322.485097][ T36] process_scheduled_works+0x513/0xa10 [ 322.490643][ T36] worker_thread+0x58a/0x780 [ 322.495312][ T36] kthread+0x22a/0x280 [ 322.499506][ T36] ret_from_fork+0x150/0x360 [ 322.504156][ T36] ret_from_fork_asm+0x1a/0x30 [ 322.508986][ T36] [ 322.511327][ T36] value changed: 0x13 -> 0xa9 [ 322.516029][ T36] [ 322.518375][ T36] Reported by Kernel Concurrency Sanitizer on: [ 322.524563][ T36] CPU: 0 UID: 0 PID: 36 Comm: kworker/u8:2 Tainted: G W syzkaller #0 PREEMPT(full) [ 322.535796][ T36] Tainted: [W]=WARN [ 322.539736][ T36] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 322.549859][ T36] Workqueue: events_unbound flush_to_ldisc [ 322.555727][ T36] ==================================================================