last executing test programs: 51m39.969488059s ago: executing program 32 (id=79): syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x200000, &(0x7f0000000200), 0x3, 0x570, &(0x7f0000000680)="$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") r0 = open(&(0x7f00000001c0)='./file1\x00', 0x14927e, 0x20) fallocate(r0, 0x0, 0x0, 0x1001f0) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000008850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) fallocate(r0, 0x3, 0x9, 0x10000) copy_file_range(r0, 0x0, r0, &(0x7f00000000c0)=0x39ea, 0x39ea, 0x0) 51m39.806936842s ago: executing program 33 (id=86): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x20081e, &(0x7f00000001c0)={[{@errors_remount}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7}}, {@noauto_da_alloc}]}, 0x1, 0x502, &(0x7f0000000a00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x30) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xd9}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) pwritev2(r0, &(0x7f0000000140)=[{&(0x7f0000000f40)="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", 0x7ff}], 0x1, 0x2, 0x647, 0x2) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 51m34.790109647s ago: executing program 34 (id=181): r0 = socket$inet6(0xa, 0x80002, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xca, 0x0, 0x0, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x7f}, 0xa5, 0x5, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040)=0x91, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3b}}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) 51m26.140155618s ago: executing program 35 (id=396): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port1\x00', 0x72, 0x0, 0x0, 0x8000008, 0x4, 0x2, 0x1, 0x0, 0x7cce8c743ee810df}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x40505330, &(0x7f00000000c0)={0x800080, 0x80, 0xffffffbc, 0x7, 0x0, 0x55a}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x40505330, &(0x7f0000000bc0)={0x800080, 0x858, 0x8, 0x7, 0x43, 0x558}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) 51m10.186520982s ago: executing program 36 (id=815): r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) mkdirat(0xffffffffffffff9c, 0x0, 0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000005b80)={@loopback, 0x33, r3}) 51m10.186280232s ago: executing program 37 (id=816): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000100)='timer_start\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x6, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 50m59.286937099s ago: executing program 38 (id=1072): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7ffc, 0xcc}, 0x50) 50m56.787513618s ago: executing program 39 (id=1110): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000340), 0x1, 0x52a, &(0x7f00000004c0)="$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") socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet(0xa, 0x801, 0x84) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "8a37f2", 0x8, 0x2c, 0x0, @remote, @local, {[], {{0x1100, 0x5, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_read_part_table(0x5d6, &(0x7f0000000880)="$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") 50m56.276260236s ago: executing program 9 (id=1122): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$kcm(0x10, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./bus\x00', 0x0, &(0x7f0000002480)=ANY=[], 0x1, 0x11f4, &(0x7f0000001280)="$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") socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) renameat2(r0, &(0x7f0000000380)='./file0\x00', r0, &(0x7f0000000200)='./bus/file0\x00', 0x0) 50m56.155886147s ago: executing program 9 (id=1125): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x31, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc000, &(0x7f00000006c0), 0x2, 0x246, &(0x7f0000000ac0)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='freezer.self_freezing\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x9) fallocate(r2, 0x0, 0x0, 0x10fff9) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xc, r3, 0x8, 0x0, 0x2}) 50m55.906630752s ago: executing program 9 (id=1127): setsockopt$MRT_FLUSH(0xffffffffffffffff, 0x0, 0xd0, &(0x7f0000000240)=0xa, 0x4) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000000080)=0xa40, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0a000000bbbbbbbbbbbbaaaaaaaaaabb86dd6d002000000111ff00000000000000000000000000000000ff0200000000000000000000000000014f194e20"], 0x4b) 50m55.763848174s ago: executing program 9 (id=1129): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000180), 0x1, 0x553, &(0x7f0000001080)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)={{}, {0x1, 0x2}, [], {}, [], {0x10, 0x5}}, 0x24, 0x2) 50m55.571597126s ago: executing program 9 (id=1132): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000010000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000318110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f00000006c0)='%pS \x00'}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200009, 0x4}, 0x0, 0xc8, 0x2c, 0x0, 0x2, 0x5, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100036c00fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 50m55.243783202s ago: executing program 9 (id=1138): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x1, 0x6}, 0x2, 0x0, 0x2, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f00000004c0)='|', 0x1}], 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="3800000010e7"], 0x38}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x20000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 50m55.243574982s ago: executing program 40 (id=1138): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x1, 0x6}, 0x2, 0x0, 0x2, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f00000004c0)='|', 0x1}], 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="3800000010e7"], 0x38}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x20000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 50m50.446498015s ago: executing program 7 (id=1213): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000f82818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='mm_page_alloc\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', '', [{0x20, 'memory.events\x00'}]}, 0x13) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000020000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x7, 0x0, 0x0, 0x3, 0x82, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xf}, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000000000007}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) 50m50.326422507s ago: executing program 7 (id=1217): ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) r3 = openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_user(r3, 0x0, 0x27) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 50m50.325941287s ago: executing program 7 (id=1218): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r2}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) 50m50.278036828s ago: executing program 7 (id=1229): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x400c84, &(0x7f0000000340), 0x1, 0x786, &(0x7f0000000800)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x185) fallocate(r0, 0x0, 0x1000000, 0x3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x8005, 0x0, 0x0, 0x19, 0x1c, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x204]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x1db) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)='\v', 0x1}], 0x1) 50m49.993324272s ago: executing program 7 (id=1224): mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x88}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0x3}, 0x18) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24002de8) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file2\x00', 0x101042, 0x100) mount$9p_rdma(&(0x7f0000000280), &(0x7f0000000300)='./file2\x00', &(0x7f0000000340), 0x208001, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e24}}) 50m49.415903851s ago: executing program 7 (id=1234): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f0000000340)='\x00', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x9, &(0x7f0000006680)) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 50m49.384792511s ago: executing program 41 (id=1234): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f0000000340)='\x00', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x9, &(0x7f0000006680)) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 45m4.379164199s ago: executing program 2 (id=4662): r0 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r1 = inotify_init1(0x0) r2 = inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x40000022) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYRES64=r2], 0x69) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1018e58, &(0x7f0000000380)={[{@nodioread_nolock}, {@noblock_validity}, {@data_err_ignore}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@nodiscard}, {@inlinecrypt}, {@i_version}]}, 0x6, 0x5fc, &(0x7f0000000600)="$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") r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc0000001900010000000000000000002001000000ffffffffffffffeb000000ac1414aa00000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000a900000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000000000000080400000000000000000080000000000000000000000000000000044000500ac1414aa000000000000000000000000000000003c0000"], 0xfc}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="380100002100010000000000fefffffffc020000000000000000000000000000fc02000000000000000000000000000000000000000000000a00000084000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f869e7569d7361d1e8001100ac14140c000000000000000000000000fc000000000000000000000000000001fc020000000000000000000000000004fe8000000000000000000000000000aaff0000000002000a00ac1414aa000000000000000000000000fe8000000000000000000000000000aa00000000000000000000000000000000ac1e0001000000000000000000000000ff040000003500000a00080000000000000000000000ffff7f000001fc02000000000000000000000000000064010102000000000000000000000000fc0200000000000000000000000000003c0000000000000008000200"], 0x138}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f00000008c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@orlov}, {@abort}, {@nombcache}, {@stripe={'stripe', 0x3d, 0x10}}]}, 0x64, 0x50a, &(0x7f0000000940)="$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") r5 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r5, &(0x7f0000000040), 0x10) listen(r5, 0x5) r6 = socket(0x28, 0x5, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000340)={0x200000, 0x200000, 0x0, 0x0, 0x5989}) setrlimit(0x40000000000008, &(0x7f0000000000)) connect$vsock_stream(r6, &(0x7f0000000080), 0x10) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002480)=@deltfilter={0x24, 0x2d, 0x1, 0x70bd2f, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff2}, {0x3, 0x2}, {0x4, 0x7}}}, 0x24}, 0x1, 0x0, 0x0, 0x4004885}, 0x40004) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_linger(r6, 0x1, 0x3c, &(0x7f00000000c0)={0x1, 0x79e}, 0x8) sendmmsg(r6, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x24008094) 45m2.98238108s ago: executing program 2 (id=4658): creat(&(0x7f0000000400)='./file0\x00', 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80880) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$P9_RVERSION(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mknod(&(0x7f0000000180)='./file0\x00', 0x1ffa, 0x0) acct(&(0x7f0000000140)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000003c0)=0x4) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000fedbdf25020000000900010073797a3000000000090003"], 0x34}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00'}, 0x18) r6 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'veth0_to_batadv\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000e72a06f92c163f00"/42], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x14, 0x0, 0x14}, 0x94) splice(r2, 0x0, r3, 0x0, 0x7, 0x0) 44m59.824028228s ago: executing program 2 (id=4678): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x5, &(0x7f0000000500)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x11}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f86dd", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x2, 0x0, 0x7ffc1ffb}]}) rt_sigaction(0x1, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000240)=0x100000001, 0x59) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) connect$inet6(r2, &(0x7f0000000200)={0xa, 0xffff, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x304}, "7ae5e400000000ae", "07f217bd74514677d4d57c363d63af84db44be5900", "00f8ff00", "8ce63ecbc640735f"}, 0x38) sendto$inet6(r2, &(0x7f0000000280)='S', 0x1, 0x8000, 0x0, 0x0) close(r2) rt_sigsuspend(0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000040000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') preadv(r6, &(0x7f0000000100)=[{&(0x7f0000001dc0)=""/206, 0xce}], 0x1, 0x141, 0x0) 44m59.381169265s ago: executing program 2 (id=4687): syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001040)="$eJzs3M9rHFUcAPDvTJL+bhNrrba2Gq1i8UfSpFV78KCi4EFB0EM9xiSttdtGmgi2BI0i9SgF7+JR8C/w5kXUgwheFTxKoWgQmnqKzK9mu9mkSZpkbfbzgc2+t/Nm3/vOzNt9My+zAbSt3uxPErEjIn6LiO4ie3OB3uJpZnpy+Pr05HASs7Nv/JXk5a5NTw5XRav1tpeZw2lE+mkSzyfz6x2/cPHMUK02er7M90+cfa9//MLFp06fHTo1emr03ODx48eODjz7zODTqxJnFte1/R+OHdj3yluXXxs+cfntH7/JmrX3YLG8Po5but4koCZ6s63292yucdmjy2j7nWBnXTrpbGFDWJaOiMh2V1fe/7ujI+Z2Xne8/ElLGwesqey7afPCi6dmgQ0siVa3AGiN6os+O/+tHus09PhfuPpCxKYyPTM9OTxzI/7OSMvXu9aw/t6IODH175fZI5Z7HQIAYAXysc2TzcZ/aezNn4u5jl3lHEpPRNwVEbsj4u6I2BMR90TkZe+NiPuKlWe7l1h/b0N+/vgnvdK0zaskG/89Vzf2m6mLv3zq6ShzO/P4u5KTp2ujR8ptcji6Nmf5gUXq+O6lXz9faFn9+C97ZPVXY8GyAVc6Gy7QjQxNDK3WRrj6ccT+zmbxJzdmArIjYF9E7F/eW++qEqcf//rAQoVuHf8iVmGeafariMeK/T8VDfFXksXnJ/u3RG30SH91VMz30y+XXl+o/tuKfxVk+3/bzcd/Q4nuf5JivrYrarXR8+PLr+PS758teE6z0uN/U/JmPmf98zvFax8MTUycH4jYlLya56tzuvz1wbl1q3xVPov/8KHm/X93uU4W//0RkR3EByPigYh4sGz7QxHxcEQcWiT+H1585N1F4k8iiZbu/5Gmn383jv+epH6+fgWJjjPff7vQjPnS9v+xmMo/awv5598tLLWBt7n5AAAA4I6QRsSOSNK+It27I9K0r6/4H/49sS2tjY1PPHFy7P1zI8U9Aj3RlVZXurrrrocOJFPlOxb5wfJacbX8aHnd+IuOrXm+b3isNtLi2KHdbb+5/0fV/zN/drS6dcCac78WtK/G/p+2qB3A+lvK979zAdiYmvT/ra1oB7D+nP9D+2rW/z9qyBv/w8Y0v///0eQn64CNyPgf2pf+D+1L/4e2dDv39a88Ud0ssPL32bLkO/zbJVH94sVa1rU15l6JtOUht1Ei6zHrW+ncb6gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADcyf4LAAD///ss5ts=") r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000001040)=0xc) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)={0x28, 0x1a, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x800, 0x0, 0x0, @ipv4=@multicast2}, @nested={0xc, 0x8, 0x0, 0x1, [@typed={0x8, 0xc, 0x0, 0x0, @uid=r1}]}]}, 0x28}}, 0x0) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000080000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f28bd421850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xdd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x2010018, &(0x7f00000002c0)={[], [{@fowner_gt={'fowner>', r1}}, {@subj_role={'subj_role', 0x3d, '\\%#%.+\x91\xe9\xfflH+\x84\x9ft\xefe\x05\x11\x80\xad\xc0[\x9ef\x17\x92\x96\xfb\xeb\f/;)D\xffZ2\x12=5\xf0\xe5^\x03\n\x0e\xba\xbdX\x87\'\xaa`\x8e\x82\xf3\xec[~3\bg*\xeb\xfb\xad\xf2\xfd\x8d\x90K\xdc\x9b*\xe0w5\xa8\x8c\xcb\x8f\x00\r\xc1L\xc9O3\xd95\xb1V\xacr\xe4T\x11\xee\xc0\xd4\xb3V:`\xa9\f\x1d\x9e\xd1\x8c/\xd2\xbe\xd6\xd4%\x96L\x99v\xf2\xbc9VN\xb3\xc3\xc8\x87\x05B\xef\xc5$|Kt}\xa8>\xc1\xcdU\xa6\x8eS7\xfbp\x9c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xeb\x00'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@smackfshat={'smackfshat', 0x3d, '-\''}}, {@fowner_gt={'fowner>', r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ext2\x00'}}, {@flag='rw'}]}, 0xff, 0x53b, &(0x7f0000000b80)="$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") ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee00}}, './file0\x00'}) socket$kcm(0xa, 0x2, 0x88) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBENT(r5, 0x4b47, &(0x7f0000000280)={0x4, 0x8, 0xde0}) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='mm_page_free\x00', r6, 0x0, 0xfffffffff7fffffc}, 0xc) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18020000fcffffff00000000000000008500000041000000850000007d00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x0, 0x2111, 0x300, &(0x7f0000000100), 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) futex(0x0, 0x3, 0x0, &(0x7f0000fd7ff0), 0x0, 0xfffffffd) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) 44m58.655385006s ago: executing program 2 (id=4690): prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0x27, 0x0, 0x0) request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000140)='\\\\@[\x01\x00\x00\x00', 0xfffffffffffffffe) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000c40)='./file0\x00', 0x808080, &(0x7f0000000c80)={[{@discard}, {@bh}, {@noblock_validity}]}, 0x2c, 0x52c, &(0x7f0000000640)="$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") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a3200000000140000001100"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002680)=ANY=[@ANYBLOB="140000001000010000000000000007000000000a60000000060a0b0400000000000000000200000034000480200001800e000100636f6e6e6c696d69740000000c000280080001400000000010000180090001006c617374000000000900010073797a30000000000900020073797a320000000014000000110001"], 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x0) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TIOCSERGETLSR(r7, 0x5459, &(0x7f0000000040)) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYRES32], 0xa0}, 0x1, 0xfffff000}, 0x0) 44m57.653454882s ago: executing program 2 (id=4700): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = fsopen(&(0x7f0000000040)='tmpfs\x00', 0x1) flistxattr(r0, 0x0, 0xffde) unshare(0x66000080) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="240000006800010009000000000000000a00000000000000080001000200000004000b", @ANYRESHEX=r1, @ANYRES8=r1, @ANYRESOCT=r1, @ANYRESDEC=r1], 0x24}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@delnexthop={0x20, 0x69, 0x503, 0x0, 0x0, {}, [{0xfffffffffffffefa, 0x1, 0x2}]}, 0x20}}, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r3}, &(0x7f00000001c0), &(0x7f00000002c0)='%pK \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) unshare(0x20000600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x12, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0x68, 0x30, 0x20, 0x70bd25, 0x0, {}, [{0x54, 0x1, [@m_bpf={0x50, 0x1, 0x0, 0x0, {{0x8}, {0x28, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x200000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) r8 = socket$rds(0x15, 0x5, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x2404c140) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019ef00000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r9, &(0x7f0000000000), 0x4000000000001f2, 0x0) bind$rds(r8, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r8, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0x2}, {0x0}, &(0x7f0000000340)=[{&(0x7f0000001140)=""/102, 0x66}], 0x1, 0x60, 0xfffffffefffffffe}}], 0x48, 0x8004}, 0x0) 44m57.553256813s ago: executing program 42 (id=4700): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = fsopen(&(0x7f0000000040)='tmpfs\x00', 0x1) flistxattr(r0, 0x0, 0xffde) unshare(0x66000080) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="240000006800010009000000000000000a00000000000000080001000200000004000b", @ANYRESHEX=r1, @ANYRES8=r1, @ANYRESOCT=r1, @ANYRESDEC=r1], 0x24}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@delnexthop={0x20, 0x69, 0x503, 0x0, 0x0, {}, [{0xfffffffffffffefa, 0x1, 0x2}]}, 0x20}}, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r3}, &(0x7f00000001c0), &(0x7f00000002c0)='%pK \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) unshare(0x20000600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x12, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0x68, 0x30, 0x20, 0x70bd25, 0x0, {}, [{0x54, 0x1, [@m_bpf={0x50, 0x1, 0x0, 0x0, {{0x8}, {0x28, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x200000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) r8 = socket$rds(0x15, 0x5, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x2404c140) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019ef00000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r9, &(0x7f0000000000), 0x4000000000001f2, 0x0) bind$rds(r8, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r8, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0x2}, {0x0}, &(0x7f0000000340)=[{&(0x7f0000001140)=""/102, 0x66}], 0x1, 0x60, 0xfffffffefffffffe}}], 0x48, 0x8004}, 0x0) 27m58.943786301s ago: executing program 1 (id=18927): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x1e, 0x805, 0x0) connect$tipc(r2, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{}, 0x2}}, 0x10) connect$tipc(r2, &(0x7f0000000600)=@id={0x1e, 0x3, 0x3}, 0x10) close(r2) r3 = accept(r0, &(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x0, @private0}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x130}, 0x1, 0x0, 0x0, 0x4}, 0x8884) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x6) sendto$inet6(r0, &(0x7f0000000800)="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", 0xfc13, 0x880, 0x0, 0xfffffffffffffef0) 27m58.94285783s ago: executing program 1 (id=18928): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000), 0x101000, 0x800, 0x3, 0x1}, 0x20) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f00000003c0)=0x800, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'veth1_to_batadv\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000000000000000000000007f0095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x18) bind$xdp(r4, &(0x7f00000001c0)={0x2c, 0x6, r6}, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c00)={0x38, r2, 0x10ada85e65c25359, 0xfffffffd, 0x25dfdbfc, {{0x6b}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x72}}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x4}]}]}]}]}, 0x38}}, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r9, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r10, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001300)=@newtfilter={0x888, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, r10, {0x0, 0x3}, {}, {0x3, 0xffe0}}, [@filter_kind_options=@f_fw={{0x7}, {0x854, 0x2, [@TCA_FW_POLICE={0x850, 0x2, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xa, 0x9, 0x4, 0x1, 0x8, 0x0, 0x1ff, 0x2, 0x81, 0x1, 0x9, 0x8, 0x1, 0x4, 0x7, 0x3e, 0x10001, 0x7fffffff, 0x1, 0x6, 0x0, 0xef, 0x7, 0x1000, 0x9, 0x7, 0x1778a66f, 0x6, 0xa34, 0x7, 0x3, 0x3, 0xffffffff, 0x1, 0x1b5, 0x3, 0xe5, 0xfffffff5, 0xfc46, 0xffff, 0x7, 0x4, 0x6, 0x9, 0x1, 0x64, 0xfffffffa, 0x7368, 0x2e, 0x0, 0x1, 0x3, 0x4, 0x6, 0x3, 0x3, 0x80000000, 0x6, 0x800, 0x9, 0x6, 0xfffffffd, 0x80000001, 0x40, 0x3, 0x8f, 0x7, 0x1, 0x5, 0x4, 0xc, 0x3, 0x10001, 0x80000000, 0x4007008, 0x200, 0x1, 0x5, 0x1000, 0x0, 0xaaf5, 0x2, 0x0, 0x0, 0x1, 0x9, 0xb, 0xd3, 0x5, 0x9, 0x1, 0x9, 0x2, 0x6, 0x10001, 0x3ff, 0x0, 0xa, 0x101, 0x8, 0x5, 0xb, 0x4, 0x1, 0xb3f4, 0xc8, 0x6a41, 0xde, 0x400, 0x54, 0x0, 0x2, 0xe6c, 0x7c77a153, 0x5, 0x9, 0x2, 0x8001, 0x1ff, 0x0, 0x401, 0x1, 0x8, 0x47, 0x7, 0x1, 0x5, 0x4, 0xc, 0x9, 0xff, 0x8006, 0x3ff, 0x6, 0x10, 0x3, 0x2, 0xe0000, 0x1, 0x7, 0xfffffff7, 0xfff, 0x2, 0x5, 0x8, 0x9, 0x5, 0xfffff801, 0x0, 0x9e76, 0x8, 0x8, 0xfff, 0x3034, 0xe, 0x200, 0x2, 0x1ff, 0x2, 0x9, 0x0, 0x80000001, 0x5, 0x1, 0x8, 0x1, 0x5, 0xfffffb24, 0x4, 0x7ff, 0x6, 0x4, 0x8, 0x8, 0x1400, 0xfbac, 0xa, 0x81, 0x7, 0x3, 0x4, 0x6, 0x0, 0x0, 0x565e975e, 0xbac8, 0x0, 0xffff8001, 0x0, 0x0, 0x248, 0x9, 0x7, 0xfffffffc, 0x400, 0x80, 0x8, 0x14f8, 0x10, 0x8, 0x9, 0x0, 0x101, 0x0, 0x101, 0x40, 0x101, 0x294, 0x6, 0xfff, 0x3, 0x5c0a, 0x9, 0x7fffffff, 0xfffffff7, 0x9, 0xa5, 0x8, 0x7, 0x5f, 0x4, 0x825, 0xf592, 0x2, 0x8, 0x800, 0x1, 0x4, 0x3, 0x5, 0x2, 0x1, 0x5, 0xffffffff, 0x9, 0x7f, 0xa, 0x9e, 0x7, 0xef1, 0x800, 0x6, 0x4, 0x10000, 0x400, 0x9, 0x8, 0x38f, 0x5b7f0f1c, 0x7, 0x80, 0x2, 0xffffffff, 0x7273, 0x5, 0xff]}, @TCA_POLICE_RATE={0x404, 0x2, [0xffff, 0x1c, 0x1ff, 0x800, 0x2, 0xa4000000, 0xbcb, 0x422, 0x4, 0x1, 0x400, 0xe326, 0x0, 0x6, 0x4, 0x1, 0x6, 0x200, 0x3, 0x2, 0x7, 0xe89b, 0x7c0, 0x6, 0x9, 0x3, 0xc0, 0x3ff, 0x1, 0x9, 0x9, 0x7, 0x3, 0xfffffffc, 0x8, 0x3ff, 0x3, 0x6, 0x2, 0x3, 0x5, 0x0, 0x50000, 0x80, 0x9, 0x1, 0x5, 0xe60, 0x6, 0x4310, 0x5, 0x55, 0x8, 0xb, 0x0, 0x3ff, 0xcdc, 0x1, 0x1, 0xd933, 0x6, 0x0, 0xb, 0x4, 0xb, 0x4000000, 0x6, 0x3, 0x3, 0x401, 0x2, 0x6, 0xb85, 0x5, 0x5, 0x9, 0xfffffffc, 0x1, 0x1, 0x75, 0x6, 0xffffffff, 0x0, 0x3, 0x6, 0x1f, 0x3, 0x0, 0x0, 0x2, 0x9, 0x383e, 0x18, 0x3, 0x1, 0xbdb3, 0x0, 0x8001, 0x7fffffff, 0x2c3e426c, 0x3, 0x0, 0x1, 0x10, 0x0, 0x0, 0x3, 0x9, 0x7e, 0x81, 0x8, 0xffffffff, 0xe6, 0x6e, 0xd0625800, 0x100, 0x1, 0x1, 0x80000000, 0x919, 0x3, 0xa, 0xb18, 0x60b3fb30, 0xbd, 0x5, 0xb9de, 0x9, 0x0, 0x4, 0x923, 0x800, 0x80, 0xf, 0x4, 0x3, 0x5, 0x80, 0x4, 0x4, 0x0, 0x10, 0x2, 0x65e2d6b5, 0xfffffff8, 0x200, 0xfffffffa, 0x7, 0x9, 0xbb97, 0x0, 0x7fffffff, 0x7, 0xffffffff, 0x8, 0x6, 0x3d3e, 0x19c3, 0x0, 0x5, 0xfffffffd, 0x400, 0xa, 0x80000000, 0x2, 0x33, 0xb, 0x5fd4, 0x8000, 0x0, 0xc, 0xd, 0x10000, 0x0, 0xff, 0x51c, 0x18, 0x6, 0xfffffff5, 0x4, 0x7c53, 0xfb, 0x3, 0x4, 0x2, 0x7, 0x3, 0xfffffffd, 0x31, 0xffff, 0x4, 0x87d, 0x5, 0x65d, 0x3, 0x3, 0x14, 0x8, 0x81, 0x8a22, 0x9, 0x2, 0x800, 0xca5, 0x7, 0x3, 0x6, 0xe45, 0x9, 0x599, 0x3, 0x1ff, 0x200, 0xa, 0x8, 0x4f77, 0x6, 0xf6, 0x7, 0x9, 0x4, 0x9, 0xfffffffa, 0x8000, 0xff, 0x9, 0xf, 0x7fffffff, 0x1000, 0x7, 0x80000000, 0x4, 0xfffffffa, 0x460, 0xee, 0x800, 0x8, 0x7ff, 0xd66, 0xc4, 0x5, 0xf, 0x81, 0x3, 0x22, 0xfffffff7, 0x7, 0x5, 0x9, 0x3, 0x0, 0x69, 0x800, 0x13bc013c, 0x1, 0x80]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0xfffffffffffffffe, 0x0, 0x110, 0x1, {0x1, 0x2, 0x3, 0x1, 0x101, 0x1}, {0xb, 0x0, 0x3, 0xf, 0x800, 0xdb}, 0x2, 0x1, 0x8}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x7}]}]}}, @TCA_RATE={0x6, 0x5, {0xff, 0x7}}]}, 0x888}, 0x1, 0x0, 0x0, 0x10}, 0x0) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="911075000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r12, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r13, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000008000000000018000380140003801000018004000300080001"], 0x44}}, 0x20008000) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x44, r13, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x8, 0x4, '\x00\x00\x00\x00'}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x44}}, 0x0) sendmsg$nl_xfrm(r11, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="54010000100001000000000000000000ffffffff000000000000000000000000ff0100000000000000000000000000010000fffd000000200000000084000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffe0000001000004d56c000000fe8000f5ffffff00000000000000001f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000feffffffffffffff00000000ffffffff000000002bbd700000000000020000002200000000000000480003006c7a73"], 0x154}}, 0x0) 27m58.799918893s ago: executing program 1 (id=18929): prlimit64(0x0, 0x0, &(0x7f0000000140)={0x0, 0xfffffffffffffffd}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendto$packet(r0, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000200)='syzkaller\x00'}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f00000002c0)={0x1, 0x2}, 0x8) setitimer(0x2, &(0x7f0000000040)={{0x0, 0xea60}, {0x0, 0xea60}}, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x204010, &(0x7f0000000000), 0x0, 0x65e, &(0x7f00000004c0)="$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") 27m58.775127183s ago: executing program 1 (id=18930): r0 = syz_socket_connect_nvme_tcp() close(r0) 27m58.759846943s ago: executing program 1 (id=18931): r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x90084, &(0x7f0000000500), 0x1, 0x573, &(0x7f0000000cc0)="$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") fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) fcntl$setsig(r1, 0xa, 0x13) syz_clone3(&(0x7f0000000340)={0x200000, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0, {0x34}, &(0x7f0000000200)=""/8, 0x8, &(0x7f0000000240)=""/168, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0x0], 0x3, {r1}}, 0x58) ptrace$getsig(0x4202, r2, 0xc, &(0x7f00000003c0)) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x14a) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000002c0)=0x20) statx(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x2000, 0xffff4a9c0080ffff, &(0x7f0000000240)) fallocate(r3, 0x20, 0x0, 0x8000) 27m58.672792074s ago: executing program 1 (id=18932): perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x5, 0x8}, 0x4e58, 0x5, 0x0, 0x4, 0x87, 0x9, 0xb, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r0, 0x0, 0x58) close(r0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)={[&(0x7f00000003c0)='GPL\x00']}, &(0x7f0000000540)={[&(0x7f0000000480)='\x00', &(0x7f00000004c0)=']$\'}!-\x00']}) 27m43.674375632s ago: executing program 43 (id=18932): perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x5, 0x8}, 0x4e58, 0x5, 0x0, 0x4, 0x87, 0x9, 0xb, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r0, 0x0, 0x58) close(r0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)={[&(0x7f00000003c0)='GPL\x00']}, &(0x7f0000000540)={[&(0x7f0000000480)='\x00', &(0x7f00000004c0)=']$\'}!-\x00']}) 27m36.387416242s ago: executing program 4 (id=19290): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='mm_page_free\x00', r0}, 0x18) setrlimit(0x9, &(0x7f0000000000)) io_setup(0x2004, &(0x7f0000000680)) 27m36.333814223s ago: executing program 4 (id=19292): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r1) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010326bd6000000000002d"], 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x20040814) 27m36.219775205s ago: executing program 4 (id=19293): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000240000"], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='kfree\x00', r0}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f80)=ANY=[@ANYBLOB="140000001000010000000000000000020000000a3c000000120a01010000000000000000020000000900020073797a310000000008000440000000000900010073797a3000000000080003400000000214"], 0x64}}, 0x0) 27m36.171656146s ago: executing program 4 (id=19294): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x101084, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0/../file1\x00', 0x20000, 0x8) mknodat$null(r1, &(0x7f0000000140)='./file0/../file0\x00', 0x8000, 0x103) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x10dc43, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f80)=ANY=[@ANYBLOB="140000001000010000000000000000020000000a3c000000120a01010000000000000000020000000900020073797a310000000008000440000000000900010073797a30000000000800034000000002"], 0x64}}, 0x0) 27m36.063749827s ago: executing program 4 (id=19296): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000008bc0)={0x0, 0x0, &(0x7f0000008b80)={&(0x7f0000004b80)=ANY=[@ANYBLOB="14000000100000000000000000000a34000000140a01ec6590fa0000000000050070cb57fd064000000000000000010900010073797a3000000000080003400000000828000000140a010300000000000000000100000a0c00064000000000000000020800034000000004140000001100010000000000000000000a00000a0000000000"], 0x84}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x1, 0x1, 0x8, 0x20005, 0x2b, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) inotify_init1(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x7ffffffffffffffe, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000000c0)={0x9}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=@gettaction={0x20, 0x5a, 0xc6b747b6bf1c6b95, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 27m35.547790715s ago: executing program 4 (id=19300): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x1, 0x1, 0x8, 0x20005, 0x2b, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) 27m35.547687095s ago: executing program 44 (id=19300): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x1, 0x1, 0x8, 0x20005, 0x2b, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) 16m43.676990558s ago: executing program 5 (id=30008): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) syz_usb_connect(0x4, 0x24, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0xc) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000000), 0x4) r6 = socket$nl_rdma(0x10, 0x3, 0x14) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r7, 0x84, 0x19, &(0x7f0000000340)={0x0, 0x1}, 0x8) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd29, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8081}, 0x20000010) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x1, 0x803, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x44}}, 0x0) 16m43.087081587s ago: executing program 5 (id=30014): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000380)='kmem_cache_free\x00', r0}, 0x18) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x800, &(0x7f0000000180)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES64, @ANYRES16=0x0], 0x1, 0x36e, &(0x7f0000000c00)="$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") r1 = open(&(0x7f0000000300)='./file0\x00', 0x145142, 0x0) sendfile(r1, r1, 0x0, 0x800000009) 16m43.023654778s ago: executing program 5 (id=30015): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES8=r0], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010001fff00000000000000f6ff060000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x800, &(0x7f0000000180)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES64, @ANYRES16=0x0], 0x1, 0x36e, &(0x7f0000000c00)="$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") r4 = open(&(0x7f0000000300)='./file0\x00', 0x145142, 0x0) ftruncate(r4, 0x2007ffb) sendfile(r4, r4, 0x0, 0x800000009) 16m42.938222679s ago: executing program 5 (id=30018): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = syz_io_uring_setup(0x2747, &(0x7f0000000140)={0x0, 0x2000000, 0x0, 0x2, 0x259}, &(0x7f0000000800)=0x0, &(0x7f0000000280)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x9, 0xb, &(0x7f0000000480)=ANY=[@ANYRESDEC=r1], &(0x7f0000000380)='syzkaller\x00', 0x174, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000cc0)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYBLOB="f6e6436fc0ce53f75f16cab8de39a63ed278c1adbe39b2e9541a884127e7eff025b37808b3863c668cebfcdd95bc979323f51574d4f2543454bd408d6d64c9d75cbb89c140796a9366cea721f2e9b242ca63c8d29df74af0f4394f30207c52d79186b23d50d22c83c429d3a9f693091e225bdf0f3120c9a41da1b0ee35514322f25c7a3107890047ad7e57f64a2743", @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x295, &(0x7f0000000a00)="$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") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1506000000000000000000000001000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000680)={0x2, 0x4e21, @local}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r5 = socket$unix(0x1, 0x2, 0x0) r6 = socket$unix(0x1, 0x2, 0x0) connect$unix(r6, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r6, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) connect$unix(r5, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) syz_clone3(&(0x7f0000000ec0)={0xa010200, 0x0, 0x0, 0x0, {}, &(0x7f0000000d80), 0x0, 0x0, 0x0}, 0x58) ppoll(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x41) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$unix(r5, &(0x7f00000008c0)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000780)="0ae37051642be1a4ae2971f7e5cb683c21571fee0f5404267e0177df252f0ac9fdda93f4eca9", 0x26}], 0x1, &(0x7f0000001000)=ANY=[@ANYRESOCT=r3, @ANYBLOB="ad8aeaea5574a3b7c784bc796e9ab4940112e4038d35a369f453cdc4e03e9ad71f6f0a0f334a470d6a7221efd87e0a638efe7c230427f2b182ca56fe45965101ac00f5238e2ead9df8c86c046955cdb1e98506e4de527a0243871c1d091a4bedfbe9b89389a1ee0aac3977507beb15", @ANYRES32=r5, @ANYRES32, @ANYRES32=r3, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r0, @ANYRES16=r2, @ANYRES32=r4, @ANYRES32=r0, @ANYRES32=r8, @ANYRES32=r4, @ANYRES8=0x0], 0x50, 0x85}, 0x20044850) ioctl$sock_SIOCGSKNS(r9, 0x894c, &(0x7f0000000940)=0x2) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a300000000070000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021340011800a0001006c696d6974000000240002800c00024000000000000000030c000140000000000000010108000440000000013c0000000c0a01010000000000000000070000000900020073797a31000000000900010073797a3000000000100003800c00008008000340000000ed"], 0xf4}}, 0x0) ioctl$EVIOCGREP(r8, 0x80084503, &(0x7f0000000100)=""/104) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0xc0, 0x0, 0x0, 0x4) sendmsg$NFT_BATCH(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f6873720000000014000100"], 0xfc}}, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000640)) pselect6(0x40, &(0x7f0000000040)={0xc}, 0x0, 0x0, 0x0, 0x0) 16m42.089489652s ago: executing program 5 (id=30027): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = syz_io_uring_setup(0x2747, &(0x7f0000000140)={0x0, 0x2000000, 0x0, 0x2, 0x259}, &(0x7f0000000800)=0x0, &(0x7f0000000280)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x9, 0xb, &(0x7f0000000480)=ANY=[@ANYRESDEC=r1], &(0x7f0000000380)='syzkaller\x00', 0x174, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000cc0)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYBLOB="f6e6436fc0ce53f75f16cab8de39a63ed278c1adbe39b2e9541a884127e7eff025b37808b3863c668cebfcdd95bc979323f51574d4f2543454bd408d6d64c9d75cbb89c140796a9366cea721f2e9b242ca63c8d29df74af0f4394f30207c52d79186b23d50d22c83c429d3a9f693091e225bdf0f3120c9a41da1b0ee35514322f25c7a3107890047ad7e57f64a2743", @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x295, &(0x7f0000000a00)="$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") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1506000000000000000000000001000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000680)={0x2, 0x4e21, @local}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = socket$unix(0x1, 0x2, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) connect$unix(r7, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r7, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) connect$unix(r6, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) syz_clone3(&(0x7f0000000ec0)={0xa010200, 0x0, 0x0, 0x0, {}, &(0x7f0000000d80), 0x0, 0x0, 0x0}, 0x58) ppoll(&(0x7f00000006c0)=[{r5}, {0xffffffffffffffff, 0x7020}], 0x2, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x41) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$unix(r6, &(0x7f00000008c0)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000780)="0ae37051642be1a4ae2971f7e5cb683c21571fee0f5404267e0177df252f0ac9fdda93f4eca9", 0x26}], 0x1, &(0x7f0000001000)=ANY=[@ANYRESOCT=r3, @ANYBLOB="ad8aeaea5574a3b7c784bc796e9ab4940112e4038d35a369f453cdc4e03e9ad71f6f0a0f334a470d6a7221efd87e0a638efe7c230427f2b182ca56fe45965101ac00f5238e2ead9df8c86c046955cdb1e98506e4de527a0243871c1d091a4bedfbe9b89389a1ee0aac3977507beb15", @ANYRES32=r6, @ANYRES32, @ANYRES32=r3, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r0, @ANYRES16=r2, @ANYRES32=r4, @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r4, @ANYRES8=0x0], 0x50, 0x85}, 0x20044850) ioctl$sock_SIOCGSKNS(r10, 0x894c, &(0x7f0000000940)=0x2) sendmsg$NFT_BATCH(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a300000000070000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021340011800a0001006c696d6974000000240002800c00024000000000000000030c000140000000000000010108000440000000013c0000000c0a01010000000000000000070000000900020073797a31000000000900010073797a3000000000100003800c00008008000340000000ed"], 0xf4}}, 0x0) ioctl$EVIOCGREP(r9, 0x80084503, &(0x7f0000000100)=""/104) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0xc0, 0x0, 0x0, 0x4) sendmsg$NFT_BATCH(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f6873720000000014000100"], 0xfc}}, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000640)) pselect6(0x40, &(0x7f0000000040)={0xc}, 0x0, 0x0, 0x0, 0x0) 16m41.159642257s ago: executing program 5 (id=30031): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000001cc0), r1) sendmsg$NFC_CMD_GET_DEVICE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000001d40)={0x14, r2, 0x621b7fa40716df4d, 0x70bd2b, 0x25dedbfe}, 0x14}, 0x1, 0x0, 0x0, 0xc894}, 0x4000000) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000000c0)=0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r5) sendmsg$NFC_CMD_DEV_UP(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="0100259d7000fcdbdf250200000008000100", @ANYRES32=r4], 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8004) r7 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001000010700000000000000000a00002806000100"], 0x1c}}, 0x0) r10 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r10, &(0x7f0000000340)=@id={0x1e, 0x3, 0x1, {0x4e23, 0x4}}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r9) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEV_UP(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, 0x0, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}]}, 0x1c}}, 0x0) sendmsg$NFC_CMD_ENABLE_SE(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r4}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x81d}, 0x2080) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r12}, 0x10) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) 16m26.087640107s ago: executing program 45 (id=30031): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000001cc0), r1) sendmsg$NFC_CMD_GET_DEVICE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000001d40)={0x14, r2, 0x621b7fa40716df4d, 0x70bd2b, 0x25dedbfe}, 0x14}, 0x1, 0x0, 0x0, 0xc894}, 0x4000000) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000000c0)=0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r5) sendmsg$NFC_CMD_DEV_UP(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="0100259d7000fcdbdf250200000008000100", @ANYRES32=r4], 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8004) r7 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001000010700000000000000000a00002806000100"], 0x1c}}, 0x0) r10 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r10, &(0x7f0000000340)=@id={0x1e, 0x3, 0x1, {0x4e23, 0x4}}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r9) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEV_UP(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, 0x0, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}]}, 0x1c}}, 0x0) sendmsg$NFC_CMD_ENABLE_SE(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r4}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x81d}, 0x2080) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r12}, 0x10) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) 15m30.924939111s ago: executing program 8 (id=31100): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(r0, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400008a, 0x0) 15m30.864940461s ago: executing program 8 (id=31102): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000380)='kmem_cache_free\x00', r1}, 0x18) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x800, &(0x7f0000000180)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES64, @ANYRES16=0x0], 0x1, 0x36e, &(0x7f0000000c00)="$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") r2 = open(&(0x7f0000000300)='./file0\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r2, r2, 0x0, 0x800000009) 15m30.348768939s ago: executing program 8 (id=31108): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="580000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="46060900000000802800128009000100766c616e00000000180002800c0002001f0000001f000000060001000100000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB], 0x58}, 0x1, 0x0, 0x0, 0x600}, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 15m30.203091721s ago: executing program 8 (id=31109): mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000080)=0x9, 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000008c0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@nouser_xattr}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@stripe}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r2 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r3 = socket$inet(0x2, 0x3, 0x6) r4 = dup3(r2, r3, 0x0) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) msgsnd(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0100000000000000885cb90e383889b0c3614cc83af477707a44d14615d419cc00440f3b0cd33ccb415c4ff43ee882f50bb28f012a7a9572f6d95dc247356e940432927fe4d7443b91de2ada3ca1d1204505f7243f04bf56f064422e9cc6ee8cc14396f060784da2156ffc66d9f040b4e00a3e8b139ace1b0b14d6ec98ffa29ddd"], 0x101, 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000140)={0x44, @time={0x545, 0x4}, 0x5, {0x8, 0x5}, 0x0, 0x2, 0x3}) futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000140), 0xc4fffffd) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)=0x10) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000fc0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd602abe0000081100000000000000000000000000000001010000009600000000000000000000000000004e220008907872f046e7b3fdf93749a9d92e276b29d82f423633b6188e4712fb8711642b4fb20eef5a01911309960f21c84f33c5adec0b0c4d554c44857b3b007f30643639f2e4454bfb2a2eb617e01cc5cbead2e9699cec258c188867b227852909176d5189c827a232fe880481d206f9f3af3638da3487660ae83fa6b28d3cfb402e1196a085b2819b99bbf9b432fb352fd4d6edda6f12c50c676e38f032b02bcede22aa3b4f77206303b3828ae8a368883700f24ef3105277d3217da13affe06d6c61a2399dcb0fca4a06ea0489e28cf9534abf287b3999a541f59a2bec7aabdd32f56503369c01ea7ae0e820e0f840849a6d83338783bbe4a4347a19a753"], 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)=0x10) mbind(&(0x7f00004fc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x2, 0x0) syz_io_uring_setup(0x10d2, &(0x7f00000000c0)={0x0, 0xd69f, 0x80, 0x0, 0x34f}, &(0x7f0000000600)=0x0, &(0x7f00000005c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x4, 0x1cd83f7c25e05491, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100, 0x1, {0x3}}) 15m30.153818792s ago: executing program 8 (id=31110): io_setup(0x6, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x1000000, 0x0, 0x0, 0x5, 0xe, 0xffffffffffffffff, 0x0}]) bpf$PROG_LOAD(0x5, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40c5, 0x24) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)) 15m29.979648755s ago: executing program 8 (id=31116): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004d100005393000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000240), &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0xaa, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x4000008c, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe(&(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000016008500000059"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000850000007d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="540000000008010100000000000000000a000000050003002f0000000600024000000000240004800800024000000000080001400000fc"], 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x0) memfd_secret(0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) 15m29.979360195s ago: executing program 46 (id=31116): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004d100005393000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000240), &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0xaa, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x4000008c, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe(&(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000016008500000059"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000850000007d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="540000000008010100000000000000000a000000050003002f0000000600024000000000240004800800024000000000080001400000fc"], 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x0) memfd_secret(0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) 15m26.719305735s ago: executing program 6 (id=31178): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe(0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="540000000008010100000000000000000a000000050003002f000000060002400000000024000480080002400000000008000140"], 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x300, &(0x7f0000001500)={&(0x7f0000000580)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000040200f2c8dc1b000000180001801400020073797a5f74756e0000000000000000000c000280"], 0x38}, 0x1, 0x0, 0x0, 0x20000844}, 0x0) 15m26.715631855s ago: executing program 6 (id=31179): bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000018c0)={'#! ', '', [{0x20, '\x00'}, {0x20, ')\\)-.$&,/#&\x00'}], 0xa, "8ab95b45060777382eb43dbb4a3c5cd7b5702182b093e9b2c26d8a99b0f3f961fc8bf10cfdb36e417bd9e0bc64ae0b128b23c3e522f6a16b08ae9b68657b6abe118e6e409738000000625f6b58796b1a03487e94eb503bce2470b72cbfc151ed6f6dc542601d5a8ba79cc9187de53ca26ed00617c505cfc14eccc120618700036c425d19a55548d8d8c7e278fa98bc65e18d3a133e2663de42485e957c440a8d09a312de1db178b8bc"}, 0xbc) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3ff, 0x8, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0xa, 0x40000000000, &(0x7f00000000c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0x3e, &(0x7f00000002c0)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f4adf7", 0x8, 0x2c, 0x0, @dev, @mcast2, {[], @echo_reply={0x81, 0x0, 0x0, 0x8130, 0x3}}}}}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0x244}}, 0x8040) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="a34eccaa9f61c3879c85bea794ee67399a2325e574f7afdd5dad05785719458e5799e676232293a2139db94922c66a29f4ff14e6046756daeb1984f0af878da39e1c7e01ab7d339eb1a54aea095378afbcaadf13219d398e5623b25011ac186d8056a81c5e7adef96d8dc3d25ca601ea59d9e030e3afc08692b50ab3a1fa5b50a62e2b9d8b2b55e91370b345f5629380a19ec43178d0c35a5367241bf9c63026a71c3ef94d5b642324d32363d0dc97130386f3c7f48d5f56ed0e58f93eb7f003f604355f10d88852791819f5a4a07ae6", 0xd0}, {&(0x7f0000000100)="658a059ce319587d3276973f8cdf4353e56244e30c2ce0abd9175dbf6408997e52ddd38da9", 0x25}], 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280), 0x2140000, &(0x7f0000000200)=ANY=[@ANYBLOB='mpol=prefer:']) prlimit64(0x0, 0x13, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) r4 = open(&(0x7f0000000040)='./bus\x00', 0x80242, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000001540)={'vxcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x10, 0xf, &(0x7f0000001480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9}, [@map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x6}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x10000}]}, &(0x7f0000001500)='syzkaller\x00', 0x0, 0x9a, &(0x7f00000015c0)=""/154, 0x40f00, 0x3b, '\x00', r5, @fallback=0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001680)={0x0, 0xa, 0x3, 0x10000}, 0x10, 0x0, 0xffffffffffffffff, 0x8, 0x0, &(0x7f00000016c0)=[{0x3, 0x1, 0xf, 0x6}, {0x4, 0x5, 0x1, 0xb}, {0x5, 0x2, 0x10, 0xb}, {0x5, 0x2, 0xf, 0x4}, {0x0, 0x3, 0x5, 0x3}, {0x5, 0x4, 0x0, 0x6}, {0x4, 0x1, 0xc, 0xb}, {0x5, 0x3, 0x6, 0x6}], 0x10, 0x9}, 0x94) sendfile(r4, r4, 0x0, 0x800000009) getpgrp(0xffffffffffffffff) 15m25.943275937s ago: executing program 6 (id=31189): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(r0, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400008a, 0x0) 15m25.76100576s ago: executing program 6 (id=31190): mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000080)=0x9, 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000008c0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@nouser_xattr}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@stripe}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r2 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r3 = socket$inet(0x2, 0x3, 0x6) r4 = dup3(r2, r3, 0x0) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) msgsnd(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0100000000000000885cb90e383889b0c3614cc83af477707a44d14615d419cc00440f3b0cd33ccb415c4ff43ee882f50bb28f012a7a9572f6d95dc247356e940432927fe4d7443b91de2ada3ca1d1204505f7243f04bf56f064422e9cc6ee8cc14396f060784da2156ffc66d9f040b4e00a3e8b139ace1b0b14d6ec98ffa29ddd"], 0x101, 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000140)={0x44, @time={0x545, 0x4}, 0x5, {0x8, 0x5}, 0x0, 0x2, 0x3}) futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000140), 0xc4fffffd) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)=0x10) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], 0x0) mbind(&(0x7f00004fc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x2, 0x0) 15m25.72299261s ago: executing program 6 (id=31191): mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000080)=0x9, 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000008c0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@nouser_xattr}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@stripe}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r2 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r3 = socket$inet(0x2, 0x3, 0x6) r4 = dup3(r2, r3, 0x0) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) msgsnd(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0100000000000000885cb90e383889b0c3614cc83af477707a44d14615d419cc00440f3b0cd33ccb415c4ff43ee882f50bb28f012a7a9572f6d95dc247356e940432927fe4d7443b91de2ada3ca1d1204505f7243f04bf56f064422e9cc6ee8cc14396f060784da2156ffc66d9f040b4e00a3e8b139ace1b0b14d6ec98ffa29ddd"], 0x101, 0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000140), 0xc4fffffd) 15m25.487878624s ago: executing program 6 (id=31194): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) io_setup(0x6, &(0x7f0000001380)=0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x1000000, 0x0, 0x0, 0x5, 0xe, r0, 0x0}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='kfree\x00'}, 0x18) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) open(&(0x7f0000000180)='./file0\x00', 0x40c5, 0x24) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno', @ANYRESHEX]) syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80005}}, './file0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x12, &(0x7f00000002c0)={@remote, @multicast1, 0x0}, &(0x7f0000000300)=0xc) sendmsg$nl_route_sched(r5, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@gettfilter={0x74, 0x2e, 0x20, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0xb, 0x1}, {0xffe0}, {0x7, 0x9}}, [{0x8, 0xb, 0x4}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0xcfec}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0x8}, {0x8, 0xb, 0xfffffff8}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x3}]}, 0x74}, 0x1, 0x0, 0x0, 0x4800}, 0x4010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = getpgrp(0x0) kcmp(r8, r7, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kfree\x00', r12}, 0x18) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@version_u}]}}) 15m25.469435834s ago: executing program 47 (id=31194): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) io_setup(0x6, &(0x7f0000001380)=0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x1000000, 0x0, 0x0, 0x5, 0xe, r0, 0x0}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='kfree\x00'}, 0x18) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) open(&(0x7f0000000180)='./file0\x00', 0x40c5, 0x24) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno', @ANYRESHEX]) syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80005}}, './file0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x12, &(0x7f00000002c0)={@remote, @multicast1, 0x0}, &(0x7f0000000300)=0xc) sendmsg$nl_route_sched(r5, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@gettfilter={0x74, 0x2e, 0x20, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0xb, 0x1}, {0xffe0}, {0x7, 0x9}}, [{0x8, 0xb, 0x4}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0xcfec}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0x8}, {0x8, 0xb, 0xfffffff8}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x3}]}, 0x74}, 0x1, 0x0, 0x0, 0x4800}, 0x4010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = getpgrp(0x0) kcmp(r8, r7, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kfree\x00', r12}, 0x18) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@version_u}]}}) 196.614887ms ago: executing program 3 (id=43076): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x4, 0xc}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r0}, &(0x7f0000000000), &(0x7f0000000200)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) 194.376567ms ago: executing program 3 (id=43078): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) pwritev2(r0, 0x0, 0x0, 0x442, 0x2000000, 0x0) 179.899387ms ago: executing program 3 (id=43079): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) bpf$MAP_CREATE(0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e00000005000000020000004000"], 0x48) syz_emit_ethernet(0x5a, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0xe, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa210104, @local, {[@timestamp_addr={0x44, 0x14, 0xa, 0x1, 0x0, [{@multicast1}, {@loopback}]}, @generic={0x7, 0x10, "0990ec742f779f8fcaa6a306fc78"}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008c5a900b70400000000000085000000030000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) sendmsg$can_bcm(r2, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x80047437, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_wakeup_irq', 0x0, 0xb) r6 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x0) ioctl$LOOP_CONFIGURE(r6, 0x4c0a, &(0x7f0000000140)={r5, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @mcast1, 0x4}, 0x1c) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) ptrace(0x10, 0x0) 148.557238ms ago: executing program 3 (id=43081): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x4, 0xc}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r0}, &(0x7f0000000000), &(0x7f0000000200)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) (fail_nth: 1) 123.807808ms ago: executing program 3 (id=43083): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000200)=[{0xb7, 0x8, 0x3, 0x1000}]}) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[], 0x118) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffff001}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000380)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100d0000000fbdbdf252100000018000180140002007665746831"], 0x2c}, 0x1, 0x0, 0x0, 0x840}, 0x4008800) 121.698718ms ago: executing program 3 (id=43085): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001180)={&(0x7f0000000300)='kfree\x00', r0, 0x0, 0x1a400000}, 0x18) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$eJzs3c1vVFUbAPDnzkwLpe9rKzEqLkyjIZAoLS1g8GMBe0LwY+fGSgtBho/QGi2aWBLcmBg3LkhcuRD/CyW6dWXiwoUbV4akGsNGY3TMnbkzDO1MOy0dbu39/ZLbOeeeOz3nQp85Z+49ZyaAwhpLf5Qi9kTE5SRipK2sElnhWOO4O7+/fzrdkqjVXv0tiSTb1zw+yR6Hsyf/PRLx/TdJ7C6vrHdu4er56Wp19kqWn5i/cHlibuHqgXMXps/Onp29OPXc1NEjh48cnTx4X+dXakufuP7WOyMfnXz9i8/+Sia//OlkEsfi1zONsvbz2CxjMRZ/1GofLN+f/rse3ezKclJu/Z3clSzfwZZVyWJkMCIei5Eot/1vjsSHL+faOKCvaklEDSioRPxDQTXHAc339r29Dy71eVQCPAhLx9OfAx3iv9K4NhijMRARe5c9r8MlvQ1J6/ju25PX0y36dB0O6Gzx2o4stTz+k3psjsbOem7XndI913nTEcCp7DHd/8oG6x9blhf/8OAsXouIxzuN/9eO/zfa4v/NDdYv/gEAAAAAAGDz3DoeEc92uv9Xyu7N7Yyn6vf/ksb9vx/urhA8tgn1r33/r3R7E6oBOlg6HvFSx/m/rTm+o+Us9//GbMDkzLnq7MGIeCgi9sfAjjQ/uUodBz7efaNbWfv8v3RL62/OBczacbuy497nzEzPT9/POQMNS9cinqh0n/+T9v9Je/+fSV8PLvdYx+69N091K1s7/oF+qX0esa9j/5+0jklW/3yOifp4YKI5Kljpyfc++apb/eIf8pP2/7tWj//RpP3zeubW9/sHI+LQQqXWrXyj4//B5LVy8/en3p2en78yGTGYnFi5f2p9bYbtqhkPzXhJ43//06tf/2uN/9vicCgiFnus89F/hn/uVqb/h/yk8T+zrv5//Ympm6Nfd6u/t/7/cL1P35/tcf0PVtdrgObdTgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4LypFxP8iKY230qXS+HjEcEQ8ErtK1Utz88+cufT2xZm0rP79/6XmN/2ONPJJ8/v/R9vyU8vyhyLi4Yj4tDxUz4+fvlSdyfvkAQAAAAAAAAAAAAAAAAAAYIsY7rL+P/VLOe/WAX1XyR7FOxRPJe8GALkR/1Bc4h+KS/xDcYl/KK4Nxr/bBbAN6P+hqAZ6O2xnv9sB5EH/DwAAAAAA28qtF5+/kUTE4gtD9S01mJW1bgwO5dU6oJ9KeTcAyI05vFBcpv5AcfU4+RfYxpJW6s9ap/Lus/+T/jQIAAAAAAAAAAAAAFhh355bP665/h/Ylqz/h+Ky/h+Ky/p/KC7v8YG1VvFb/w8AAAAAAAAAAAAA+ZtbuHp+ulqdvSIhsdUSAxGxBZqRQ2Iw//DM+YUJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABo+TcAAP//Swsk/Q==") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004000009000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newsa={0x150, 0x10, 0x413, 0x70bd28, 0x0, {{@in=@multicast1, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x0, 0x5, 0x4e24, 0x0, 0xa, 0x0, 0x20}, {@in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x32}, @in=@private=0xa010100, {0xfffffffffffffffd, 0x7, 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x7f}, {0x0, 0x8, 0xcf}, {0xf6}, 0x0, 0x200000, 0x2, 0x4, 0x1}, [@algo_aead={0x5f, 0x12, {{'rfc4309(ccm(aes))\x00'}, 0x98, 0x60, "629e189e0c9a1441983efec42b494c21dc4216"}}]}, 0x150}}, 0x804) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYBLOB="fffffffed9526cfd8400128009000100766c616e0000000074000280060001"], 0xb4}}, 0x0) 67.137299ms ago: executing program 0 (id=43088): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000006600816657bb97c9269de9aaec8488040f0000004cb9cca7480ef402000000e305000a00000200000000", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 65.587339ms ago: executing program 0 (id=43089): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) bpf$MAP_CREATE(0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e00000005000000020000004000"], 0x48) syz_emit_ethernet(0x5a, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0xe, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa210104, @local, {[@timestamp_addr={0x44, 0x14, 0xa, 0x1, 0x0, [{@multicast1}, {@loopback}]}, @generic={0x7, 0x10, "0990ec742f779f8fcaa6a306fc78"}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008c5a900b70400000000000085000000030000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) sendmsg$can_bcm(r2, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x80047437, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_wakeup_irq', 0x0, 0xb) r6 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x0) ioctl$LOOP_CONFIGURE(r6, 0x4c0a, &(0x7f0000000140)={r5, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r7, 0x8, 0x0, 0x3, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) ptrace(0x10, 0x0) 7.07734ms ago: executing program 0 (id=43090): r0 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000040)={0x200000, 0x200000, 0x20000000}) (async) capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000040)={0x200000, 0x200000, 0x20000000}) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000012c0)={@fallback=0xffffffffffffffff, 0x2e, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}, {0x2, 0x0, @empty}, 0x78}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r6, 0x1, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x8890}, 0x20000010) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4050000200080006110600000000000c60000000000000095000000000000009f33ef60916e6e893f1eeb0be20000d072f5b89c3043c47c896ce0bc8731fa595b6b4d45ef26dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb3c5ca683a4b6fc89398f2b9000f224891060017c4700de60beac671e8e8fdecb03588aa6007e71f871ab5c2ff88afc6002084e5b52710aeee835cf0d78e45f70983826fb8579c1fb47d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0d18a93ee341ab59016f81860324b800c00000000000092d9c5fe34ccb80a61ffcb3363073fd8962823ee45f5d7394e9510f4a801efdf008499d7aca1afac6c702cfabe8a9c55c8dafcdb110036e14c1035cafdfef6a358cbfadb3579a285580a3c080d4e0a48d7bdc38a0437c8c1b3aa408a"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f00000006c0)={'gretap0\x00', &(0x7f00000005c0)={'erspan0\x00', 0x0, 0x7800, 0x700, 0x2, 0x28d, {{0x2b, 0x4, 0x0, 0x6, 0xac, 0x68, 0x0, 0x5, 0x4, 0x0, @rand_addr=0x64010101, @loopback, {[@noop, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x14, 0x74, 0x0, 0x5, [0x7ff, 0x1, 0x0, 0x3ff]}, @timestamp_addr={0x44, 0x1c, 0x4c, 0x1, 0x5, [{@rand_addr=0x64010101, 0x1}, {@local, 0x2}, {@multicast1, 0x4}]}, @generic={0xda, 0xf, "c46e759b1a6e39b8be14ea3b09"}, @timestamp_addr={0x44, 0x44, 0x63, 0x1, 0x7, [{@empty, 0xfe57}, {@loopback, 0xff}, {@multicast1, 0x1}, {@empty, 0x7f6}, {@multicast1, 0xfffffffd}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@multicast1, 0x28ec}, {@dev={0xac, 0x14, 0x14, 0x2f}, 0xfff}]}, @timestamp={0x44, 0x10, 0xc4, 0x0, 0x9, [0x1, 0x8, 0x0]}]}}}}}) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r11 = syz_open_dev$vcsu(&(0x7f0000000780), 0xffffffffffffffff, 0x14841) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xa, &(0x7f00000002c0)=@raw=[@call={0x85, 0x0, 0x0, 0x98}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000400)='syzkaller\x00', 0x8, 0xe4, &(0x7f00000004c0)=""/228, 0x41100, 0x10, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x2, 0x2, 0x0, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r10, r11, r2, r2, r2, r1, r2, r1, r2]}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xa, &(0x7f00000002c0)=@raw=[@call={0x85, 0x0, 0x0, 0x98}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000400)='syzkaller\x00', 0x8, 0xe4, &(0x7f00000004c0)=""/228, 0x41100, 0x10, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x2, 0x2, 0x0, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r10, r11, r2, r2, r2, r1, r2, r1, r2]}, 0x94) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0x4, 0x4, 0x12}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@map=r12, r8, 0x26}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'tunl0\x00', 0x0}) socket$netlink(0x10, 0x3, 0x0) (async) r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x6, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r13}]}, 0x40}}, 0x0) 6.84563ms ago: executing program 0 (id=43091): bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e3, 0x0) (fail_nth: 2) 6.6994ms ago: executing program 0 (id=43092): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x1}, 0x18) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) io_uring_setup(0x27ed, &(0x7f0000000080)={0x0, 0x5f83, 0x400, 0x0, 0x10, 0x0, r2}) 0s ago: executing program 0 (id=43093): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="32fe80fd2da22bba183b0e42927578081a45ee1db26ebc3a0d5cbe6d76318ce7c812d79da32668b4db8f4efbac167c1e54515d80354769d2ce4ded97c4c3eaf6b73477c94d63c95cbbb893714507"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r3}, 0x10) (async) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000580)=ANY=[], 0x0) close_range(r4, 0xffffffffffffffff, 0x200000000000000) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000181100000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x7d) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) (async, rerun: 32) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)={0x30, r1, 0x301, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x14}, @val={0x8}, @val={0xc, 0x99, {0x2, 0x4}}}}}, 0x30}}, 0x44) (rerun: 32) r6 = syz_mount_image$msdos(&(0x7f0000000280), &(0x7f0000000180)='./file2\x00', 0x4000, &(0x7f0000000400)=ANY=[], 0x1, 0x2d5, &(0x7f0000000840)="$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") ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000300)={{0x1, 0x1, 0x18, r6, {0x10001}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x3, [@typedef={0x7, 0x0, 0x0, 0x8, 0x1}, @volatile={0x4, 0x0, 0x0, 0x9, 0x5}, @func={0xf, 0x0, 0x0, 0xc, 0x5}, @enum64={0xfffffffd, 0x1, 0x0, 0x13, 0x0, 0x5, [{0xd, 0x3, 0xfff}]}]}, {0x0, [0x5f]}}, &(0x7f0000000580)=""/137, 0x57, 0x89, 0x0, 0x800, 0x10000, @value=r2}, 0x28) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(r9, &(0x7f0000000080)=ANY=[@ANYBLOB='b *:'], 0x8) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) (async, rerun: 32) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) (rerun: 32) r11 = openat$cgroup_devices(r10, &(0x7f00000001c0)='devices.deny\x00', 0x2, 0x0) splice(r8, 0x0, r11, 0x0, 0x8, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r7, 0x4004f50d, &(0x7f0000000100)) (async) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) kernel console output (not intermixed with test programs): sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2924.690829][ T29] audit: type=1326 audit(4971.545:178074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23030 comm="syz.0.40992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2924.714376][ T29] audit: type=1326 audit(4971.545:178075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23030 comm="syz.0.40992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=201 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2924.716740][T23035] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 2924.738791][ T29] audit: type=1326 audit(4971.545:178076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23030 comm="syz.0.40992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2925.964562][T23042] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 2926.046331][ T29] audit: type=1326 audit(4972.925:178077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23052 comm="syz.3.41000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2926.070340][ T29] audit: type=1326 audit(4972.925:178078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23052 comm="syz.3.41000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2926.093679][ T29] audit: type=1326 audit(4972.925:178079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23052 comm="syz.3.41000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=201 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2926.117021][ T29] audit: type=1326 audit(4972.925:178080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23052 comm="syz.3.41000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2926.966469][T23061] 9pnet_fd: Insufficient options for proto=fd [ 2927.001691][T23065] netlink: 148 bytes leftover after parsing attributes in process `syz.3.41005'. [ 2927.378685][T23095] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2927.805601][T23107] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41024'. [ 2927.814819][T23107] netlink: 16 bytes leftover after parsing attributes in process `syz.0.41024'. [ 2927.823937][T23107] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41024'. [ 2927.833148][T23107] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41024'. [ 2928.033422][ T29] audit: type=1326 audit(4974.915:178081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23122 comm="syz.0.41031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2928.057316][ T29] audit: type=1326 audit(4974.915:178082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23122 comm="syz.0.41031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2928.063531][T23123] siw: device registration error -23 [ 2928.287211][T23131] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 2928.353236][T23142] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2928.361999][T23144] 9pnet_fd: Insufficient options for proto=fd [ 2928.496735][T23151] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41042'. [ 2928.505903][T23151] netlink: 16 bytes leftover after parsing attributes in process `syz.0.41042'. [ 2928.515385][T23151] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41042'. [ 2928.524461][T23151] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41042'. [ 2928.588921][T23161] netlink: 176 bytes leftover after parsing attributes in process `syz.0.41046'. [ 2928.655121][T23167] bond0: option mode: unable to set because the bond device is up [ 2928.708800][T23173] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 2929.371117][T23202] 8021q: adding VLAN 0 to HW filter on device bond29 [ 2929.537231][T23227] netlink: 'syz.3.41073': attribute type 12 has an invalid length. [ 2929.581927][T23231] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 2929.855116][T23247] 8021q: adding VLAN 0 to HW filter on device bond14 [ 2929.874807][T23254] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 2929.996533][ T29] kauditd_printk_skb: 135 callbacks suppressed [ 2929.996550][ T29] audit: type=1326 audit(4976.875:178218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23268 comm="syz.0.41090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2930.006315][T23269] siw: device registration error -23 [ 2930.026777][ T29] audit: type=1326 audit(4976.875:178219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23268 comm="syz.0.41090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2930.055872][ T29] audit: type=1326 audit(4976.875:178220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23268 comm="syz.0.41090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2930.079982][ T29] audit: type=1326 audit(4976.875:178221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23268 comm="syz.0.41090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2930.103248][ T29] audit: type=1326 audit(4976.875:178222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23268 comm="syz.0.41090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2930.127633][ T29] audit: type=1326 audit(4976.875:178223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23268 comm="syz.0.41090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2930.137585][T23274] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 2930.151596][ T29] audit: type=1326 audit(4976.875:178224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23268 comm="syz.0.41090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2930.182804][ T29] audit: type=1326 audit(4976.875:178225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23268 comm="syz.0.41090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2930.206301][ T29] audit: type=1326 audit(4976.875:178226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23268 comm="syz.0.41090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2930.230407][ T29] audit: type=1326 audit(4976.875:178227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23268 comm="syz.0.41090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2930.241538][T23279] 8021q: adding VLAN 0 to HW filter on device bond30 [ 2931.145504][T23389] siw: device registration error -23 [ 2931.172392][T23396] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2931.192616][T23393] 8021q: adding VLAN 0 to HW filter on device bond15 [ 2931.235797][T23400] 8021q: adding VLAN 0 to HW filter on device bond16 [ 2931.298196][T23410] 8021q: adding VLAN 0 to HW filter on device bond17 [ 2932.052051][T23436] __nla_validate_parse: 13 callbacks suppressed [ 2932.052069][T23436] netlink: 2 bytes leftover after parsing attributes in process `syz.3.41161'. [ 2932.286198][T23449] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2932.356584][T23452] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41167'. [ 2932.365714][T23452] netlink: 16 bytes leftover after parsing attributes in process `syz.3.41167'. [ 2932.374796][T23452] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41167'. [ 2932.384393][T23452] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41167'. [ 2933.042649][T23478] lo speed is unknown, defaulting to 1000 [ 2935.433329][T23512] lo speed is unknown, defaulting to 1000 [ 2935.691619][ T29] kauditd_printk_skb: 245 callbacks suppressed [ 2935.691636][ T29] audit: type=1326 audit(4982.574:178473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23559 comm="syz.0.41207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2935.701526][T23560] siw: device registration error -23 [ 2935.721805][ T29] audit: type=1326 audit(4982.574:178474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23559 comm="syz.0.41207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2935.750492][ T29] audit: type=1326 audit(4982.574:178475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23559 comm="syz.0.41207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2935.773784][ T29] audit: type=1326 audit(4982.574:178476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23559 comm="syz.0.41207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2935.797094][ T29] audit: type=1326 audit(4982.574:178477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23559 comm="syz.0.41207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2935.820495][ T29] audit: type=1326 audit(4982.574:178478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23559 comm="syz.0.41207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2935.843800][ T29] audit: type=1326 audit(4982.574:178479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23559 comm="syz.0.41207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2935.867174][ T29] audit: type=1326 audit(4982.574:178480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23559 comm="syz.0.41207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2935.890507][ T29] audit: type=1326 audit(4982.574:178481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23559 comm="syz.0.41207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2935.913722][ T29] audit: type=1326 audit(4982.574:178482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23559 comm="syz.0.41207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2936.178170][T23572] lo speed is unknown, defaulting to 1000 [ 2936.587520][T23584] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41218'. [ 2936.596818][T23584] netlink: 16 bytes leftover after parsing attributes in process `syz.3.41218'. [ 2936.605894][T23584] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41218'. [ 2936.616299][T23584] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41218'. [ 2936.777604][T23590] lo speed is unknown, defaulting to 1000 [ 2936.975299][T23596] siw: device registration error -23 [ 2937.893303][T23606] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 2938.090773][T23620] lo speed is unknown, defaulting to 1000 [ 2939.691136][T23625] netlink: 2 bytes leftover after parsing attributes in process `syz.0.41233'. [ 2939.785343][T23626] lo speed is unknown, defaulting to 1000 [ 2940.922576][ T29] kauditd_printk_skb: 184 callbacks suppressed [ 2940.922591][ T29] audit: type=1326 audit(4987.803:178667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23636 comm="syz.0.41235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2940.952806][ T29] audit: type=1326 audit(4987.803:178668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23636 comm="syz.0.41235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2940.988083][ T29] audit: type=1326 audit(4987.803:178669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23636 comm="syz.0.41235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2941.012116][ T29] audit: type=1326 audit(4987.803:178670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23636 comm="syz.0.41235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2941.035411][ T29] audit: type=1326 audit(4987.803:178671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23636 comm="syz.0.41235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2941.059396][ T29] audit: type=1326 audit(4987.803:178672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23636 comm="syz.0.41235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2941.062822][T23640] lo speed is unknown, defaulting to 1000 [ 2941.083592][ T29] audit: type=1326 audit(4987.803:178673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23636 comm="syz.0.41235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2941.113019][ T29] audit: type=1326 audit(4987.803:178674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23636 comm="syz.0.41235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd01751d290 code=0x7ffc0000 [ 2941.136333][ T29] audit: type=1326 audit(4987.803:178675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23636 comm="syz.0.41235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2941.160196][ T29] audit: type=1326 audit(4987.803:178676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23636 comm="syz.0.41235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2941.235549][T23654] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2941.286692][T23658] bond0: option mode: unable to set because the bond device is up [ 2941.532528][T23663] lo speed is unknown, defaulting to 1000 [ 2942.653153][T23695] bond0: option mode: unable to set because the bond device is up [ 2942.818692][T23705] siw: device registration error -23 [ 2943.187635][T23724] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2944.210546][ C0] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2944.286883][T23737] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41270'. [ 2944.296056][T23737] netlink: 16 bytes leftover after parsing attributes in process `syz.0.41270'. [ 2944.305158][T23737] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41270'. [ 2944.314283][T23737] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41270'. [ 2944.373298][T23746] 8021q: adding VLAN 0 to HW filter on device bond18 [ 2944.607838][T23759] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 2944.800360][T23767] 8021q: adding VLAN 0 to HW filter on device bond19 [ 2945.250803][ C0] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2946.149993][T23791] netlink: 24 bytes leftover after parsing attributes in process `syz.0.41291'. [ 2946.213323][T23795] 8021q: adding VLAN 0 to HW filter on device bond31 [ 2946.245926][T23802] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 2947.945729][T23813] netlink: 24 bytes leftover after parsing attributes in process `syz.0.41299'. [ 2949.258301][ T29] kauditd_printk_skb: 110 callbacks suppressed [ 2949.258318][ T29] audit: type=1326 audit(4996.132:178787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23833 comm="syz.3.41309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2949.288773][ T29] audit: type=1326 audit(4996.132:178788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23833 comm="syz.3.41309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2949.312702][ T29] audit: type=1326 audit(4996.132:178789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23833 comm="syz.3.41309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2949.336054][ T29] audit: type=1326 audit(4996.132:178790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23833 comm="syz.3.41309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2949.359631][ T29] audit: type=1326 audit(4996.132:178791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23833 comm="syz.3.41309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2949.383583][ T29] audit: type=1326 audit(4996.132:178792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23833 comm="syz.3.41309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2949.407513][ T29] audit: type=1326 audit(4996.132:178793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23833 comm="syz.3.41309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f764687d290 code=0x7ffc0000 [ 2949.431448][ T29] audit: type=1326 audit(4996.132:178794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23833 comm="syz.3.41309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2949.454789][ T29] audit: type=1326 audit(4996.132:178795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23833 comm="syz.3.41309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2949.478709][ T29] audit: type=1326 audit(4996.132:178796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23833 comm="syz.3.41309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2949.718412][T23856] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41319'. [ 2949.727544][T23856] netlink: 16 bytes leftover after parsing attributes in process `syz.0.41319'. [ 2949.737417][T23856] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41319'. [ 2949.746616][T23856] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41319'. [ 2949.848827][T23865] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 2949.876001][T23868] siw: device registration error -23 [ 2949.957871][T23876] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41327'. [ 2949.967067][T23876] netlink: 16 bytes leftover after parsing attributes in process `syz.0.41327'. [ 2949.976257][T23876] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41327'. [ 2949.985390][T23876] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41327'. [ 2950.107805][T23880] lo speed is unknown, defaulting to 1000 [ 2950.325161][T23884] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 2950.847714][T23900] lo speed is unknown, defaulting to 1000 [ 2951.254682][T23904] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 2951.831335][T23911] lo speed is unknown, defaulting to 1000 [ 2953.794723][T23944] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2953.860990][T23945] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41354'. [ 2953.870118][T23945] netlink: 16 bytes leftover after parsing attributes in process `syz.3.41354'. [ 2953.879189][T23945] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41354'. [ 2953.888242][T23945] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41354'. [ 2954.747020][T23965] lo speed is unknown, defaulting to 1000 [ 2955.198579][T23978] netlink: 24 bytes leftover after parsing attributes in process `syz.0.41368'. [ 2956.476640][T24035] netlink: 12 bytes leftover after parsing attributes in process `syz.0.41393'. [ 2956.605285][T24055] 9pnet_fd: Insufficient options for proto=fd [ 2956.987114][T24092] lo speed is unknown, defaulting to 1000 [ 2957.781417][T24142] 9pnet_fd: Insufficient options for proto=fd [ 2957.824193][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 2957.824207][ T29] audit: type=1326 audit(5004.700:178914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24147 comm="syz.0.41440" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2957.854194][ T29] audit: type=1326 audit(5004.700:178915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24147 comm="syz.0.41440" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2958.876380][ T29] audit: type=1326 audit(5005.750:178916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24182 comm="syz.3.41454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2958.900898][ T29] audit: type=1326 audit(5005.750:178917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24182 comm="syz.3.41454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2958.924890][ T29] audit: type=1326 audit(5005.750:178918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24182 comm="syz.3.41454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2958.948297][ T29] audit: type=1326 audit(5005.750:178919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24182 comm="syz.3.41454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2958.972525][ T29] audit: type=1326 audit(5005.750:178920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24182 comm="syz.3.41454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2958.996083][ T29] audit: type=1326 audit(5005.750:178921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24182 comm="syz.3.41454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2959.020261][ T29] audit: type=1326 audit(5005.750:178922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24182 comm="syz.3.41454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2959.027759][T24189] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2959.044384][ T29] audit: type=1326 audit(5005.750:178923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24182 comm="syz.3.41454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2959.095687][T24190] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41457'. [ 2959.104945][T24190] netlink: 16 bytes leftover after parsing attributes in process `syz.3.41457'. [ 2959.113984][T24190] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41457'. [ 2959.123992][T24190] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41457'. [ 2959.152581][T24194] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41458'. [ 2959.161654][T24194] netlink: 16 bytes leftover after parsing attributes in process `syz.0.41458'. [ 2959.171317][T24194] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41458'. [ 2959.180386][T24194] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41458'. [ 2959.416079][T24202] lo speed is unknown, defaulting to 1000 [ 2960.822519][T24238] netlink: 24 bytes leftover after parsing attributes in process `syz.0.41475'. [ 2960.853693][T24240] netlink: 4 bytes leftover after parsing attributes in process `syz.0.41476'. [ 2960.989040][T24243] lo speed is unknown, defaulting to 1000 [ 2961.695995][T24258] 9pnet_fd: Insufficient options for proto=fd [ 2961.820658][T24272] 9pnet_fd: Insufficient options for proto=fd [ 2961.885585][T24280] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2962.767198][T24293] 9pnet_fd: Insufficient options for proto=fd [ 2963.030718][ T29] kauditd_printk_skb: 80 callbacks suppressed [ 2963.030768][ T29] audit: type=1326 audit(5009.899:179004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24305 comm="syz.0.41495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2963.063192][ T29] audit: type=1326 audit(5009.929:179005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24305 comm="syz.0.41495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2963.078281][T24303] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 2963.086490][ T29] audit: type=1326 audit(5009.929:179006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24305 comm="syz.0.41495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2963.086580][ T29] audit: type=1326 audit(5009.929:179007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24305 comm="syz.0.41495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2963.233990][T24308] lo speed is unknown, defaulting to 1000 [ 2964.074788][ T29] audit: type=1326 audit(5010.949:179008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24314 comm="syz.3.41505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2964.098176][ T29] audit: type=1326 audit(5010.949:179009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24314 comm="syz.3.41505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2964.122082][ T29] audit: type=1326 audit(5010.949:179010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24314 comm="syz.3.41505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2964.146137][ T29] audit: type=1326 audit(5010.949:179011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24314 comm="syz.3.41505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2964.169598][ T29] audit: type=1326 audit(5010.949:179012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24314 comm="syz.3.41505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2964.193186][ T29] audit: type=1326 audit(5010.949:179013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24314 comm="syz.3.41505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2964.429984][T24330] __nla_validate_parse: 6 callbacks suppressed [ 2964.430011][T24330] netlink: 8 bytes leftover after parsing attributes in process `syz.3.41512'. [ 2964.446041][T24330] netlink: 64 bytes leftover after parsing attributes in process `syz.3.41512'. [ 2964.786350][T24359] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 2965.427714][T24374] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 2965.512189][T24384] siw: device registration error -23 [ 2966.093550][T24405] netlink: 24 bytes leftover after parsing attributes in process `syz.3.41541'. [ 2966.762988][T24414] lo speed is unknown, defaulting to 1000 [ 2968.215490][T24433] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41552'. [ 2968.225211][T24433] netlink: 16 bytes leftover after parsing attributes in process `syz.0.41552'. [ 2968.234334][T24433] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41552'. [ 2968.243384][T24433] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41552'. [ 2968.517243][T24442] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 2969.290475][T24450] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 2969.346092][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 2969.346110][ T29] audit: type=1326 audit(5016.228:179067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24452 comm="syz.0.41559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2969.376600][ T29] audit: type=1326 audit(5016.228:179068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24452 comm="syz.0.41559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2969.400032][ T29] audit: type=1326 audit(5016.228:179069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24452 comm="syz.0.41559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2969.423971][ T29] audit: type=1326 audit(5016.228:179070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24452 comm="syz.0.41559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2969.447437][ T29] audit: type=1326 audit(5016.228:179071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24452 comm="syz.0.41559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2969.471181][ T29] audit: type=1326 audit(5016.228:179072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24452 comm="syz.0.41559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2969.495437][ T29] audit: type=1326 audit(5016.228:179073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24452 comm="syz.0.41559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2969.518706][ T29] audit: type=1326 audit(5016.228:179074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24452 comm="syz.0.41559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2969.542482][ T29] audit: type=1326 audit(5016.228:179075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24452 comm="syz.0.41559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2969.566239][ T29] audit: type=1326 audit(5016.228:179076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24452 comm="syz.0.41559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2969.683868][T24467] netlink: 60 bytes leftover after parsing attributes in process `syz.0.41564'. [ 2969.693873][T24466] netlink: 60 bytes leftover after parsing attributes in process `syz.0.41564'. [ 2969.822173][T24469] lo speed is unknown, defaulting to 1000 [ 2971.872452][T24498] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 2972.377659][T24501] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2974.451539][T24528] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 2975.558582][T24545] lo speed is unknown, defaulting to 1000 [ 2976.244243][T24558] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2976.900874][T24569] netlink: 60 bytes leftover after parsing attributes in process `syz.0.41602'. [ 2976.910212][T24568] netlink: 60 bytes leftover after parsing attributes in process `syz.0.41602'. [ 2977.115778][ T29] kauditd_printk_skb: 187 callbacks suppressed [ 2977.115793][ T29] audit: type=1326 audit(5023.987:179264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24585 comm="syz.3.41610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2977.163240][ T29] audit: type=1326 audit(5024.027:179265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24585 comm="syz.3.41610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=74 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2977.186508][ T29] audit: type=1326 audit(5024.027:179266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24585 comm="syz.3.41610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2977.209787][ T29] audit: type=1326 audit(5024.027:179267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24585 comm="syz.3.41610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2977.233260][ T29] audit: type=1326 audit(5024.027:179268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24585 comm="syz.3.41610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2977.256639][ T29] audit: type=1326 audit(5024.027:179269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24585 comm="syz.3.41610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2977.279903][ T29] audit: type=1326 audit(5024.027:179270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24585 comm="syz.3.41610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2977.303218][ T29] audit: type=1326 audit(5024.027:179271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24585 comm="syz.3.41610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2977.326357][ T29] audit: type=1326 audit(5024.027:179272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24585 comm="syz.3.41610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2977.349613][ T29] audit: type=1326 audit(5024.027:179273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24585 comm="syz.3.41610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2977.402520][T24605] netlink: 24 bytes leftover after parsing attributes in process `syz.0.41618'. [ 2977.570799][T24625] netlink: 24 bytes leftover after parsing attributes in process `syz.0.41626'. [ 2977.601379][T24615] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 2977.655675][T24634] netlink: 'syz.0.41630': attribute type 10 has an invalid length. [ 2977.666508][T24634] team0: Port device hsr_slave_0 added [ 2978.999686][T24689] lo speed is unknown, defaulting to 1000 [ 2980.341844][T24729] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41669'. [ 2980.351612][T24729] netlink: 16 bytes leftover after parsing attributes in process `syz.0.41669'. [ 2980.360770][T24729] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41669'. [ 2980.369823][T24729] netlink: 36 bytes leftover after parsing attributes in process `syz.0.41669'. [ 2980.394097][T24733] netlink: 24 bytes leftover after parsing attributes in process `syz.0.41670'. [ 2980.516636][T24735] lo speed is unknown, defaulting to 1000 [ 2980.805816][T24737] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 2981.030157][T24747] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 2981.250621][T24756] netlink: 8 bytes leftover after parsing attributes in process `syz.3.41680'. [ 2983.096560][T24800] lo speed is unknown, defaulting to 1000 [ 2984.225087][T24815] netlink: 60 bytes leftover after parsing attributes in process `syz.3.41701'. [ 2984.234434][T24814] netlink: 60 bytes leftover after parsing attributes in process `syz.3.41701'. [ 2984.278803][ T29] kauditd_printk_skb: 146 callbacks suppressed [ 2984.278839][ T29] audit: type=1326 audit(5031.156:179420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24816 comm="syz.3.41702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2984.308550][ T29] audit: type=1326 audit(5031.156:179421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24816 comm="syz.3.41702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2984.331929][ T29] audit: type=1326 audit(5031.156:179422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24816 comm="syz.3.41702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2984.355199][ T29] audit: type=1326 audit(5031.156:179423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24816 comm="syz.3.41702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2984.378533][ T29] audit: type=1326 audit(5031.156:179424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24816 comm="syz.3.41702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2984.401767][ T29] audit: type=1326 audit(5031.156:179425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24816 comm="syz.3.41702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2984.425038][ T29] audit: type=1326 audit(5031.156:179426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24816 comm="syz.3.41702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=25 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2984.448199][ T29] audit: type=1326 audit(5031.156:179427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24816 comm="syz.3.41702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2984.471412][ T29] audit: type=1326 audit(5031.156:179428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24816 comm="syz.3.41702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2984.494822][ T29] audit: type=1326 audit(5031.316:179429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24821 comm="syz.3.41704" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 2984.558514][T24828] wireguard3: entered promiscuous mode [ 2984.563993][T24828] wireguard3: entered allmulticast mode [ 2984.736451][T24836] netlink: 24 bytes leftover after parsing attributes in process `syz.3.41709'. [ 2985.100456][T24852] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 2986.040856][T24877] netlink: 24 bytes leftover after parsing attributes in process `syz.0.41724'. [ 2986.350822][T24892] lo speed is unknown, defaulting to 1000 [ 2988.839931][T24929] netlink: 8 bytes leftover after parsing attributes in process `syz.0.41745'. [ 2989.895110][T24939] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 2990.011961][T24958] lo speed is unknown, defaulting to 1000 [ 2990.811540][T24966] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2990.881227][T24967] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41761'. [ 2990.890418][T24967] netlink: 16 bytes leftover after parsing attributes in process `syz.3.41761'. [ 2990.899520][T24967] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41761'. [ 2990.909283][T24967] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41761'. [ 2990.962783][T24975] netlink: 24 bytes leftover after parsing attributes in process `syz.0.41764'. [ 2992.728009][T25017] openvswitch: netlink: Message has 6 unknown bytes. [ 2993.650139][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 2993.650167][ T29] audit: type=1326 audit(5040.525:179482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25040 comm="syz.0.41792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2993.655444][T25041] netlink: 28 bytes leftover after parsing attributes in process `syz.0.41792'. [ 2993.656355][ T29] audit: type=1326 audit(5040.525:179483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25040 comm="syz.0.41792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2993.681938][T25041] netlink: 3 bytes leftover after parsing attributes in process `syz.0.41792'. [ 2993.689222][ T29] audit: type=1326 audit(5040.525:179484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25040 comm="syz.0.41792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2993.716259][T25041] batadv0: entered promiscuous mode [ 2993.722354][ T29] audit: type=1326 audit(5040.525:179485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25040 comm="syz.0.41792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2993.745095][T25041] batadv0: entered allmulticast mode [ 2993.763626][T25042] netlink: 3 bytes leftover after parsing attributes in process `syz.0.41792'. [ 2993.774096][ T29] audit: type=1326 audit(5040.525:179486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25040 comm="syz.0.41792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2993.812491][ T29] audit: type=1326 audit(5040.525:179487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25040 comm="syz.0.41792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2993.836387][ T29] audit: type=1326 audit(5040.525:179488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25040 comm="syz.0.41792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2993.860393][ T29] audit: type=1326 audit(5040.525:179489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25040 comm="syz.0.41792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2993.883624][ T29] audit: type=1326 audit(5040.525:179490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25040 comm="syz.0.41792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=166 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2993.907405][ T29] audit: type=1326 audit(5040.525:179491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25040 comm="syz.0.41792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 2993.935608][T25042] batadv0: entered promiscuous mode [ 2993.940887][T25042] batadv0: entered allmulticast mode [ 2994.283223][T25061] lo speed is unknown, defaulting to 1000 [ 2996.750704][T25083] netlink: 8 bytes leftover after parsing attributes in process `syz.3.41809'. [ 2996.763587][T25084] lo speed is unknown, defaulting to 1000 [ 2996.926671][T25096] lo speed is unknown, defaulting to 1000 [ 2996.933958][T25098] lo speed is unknown, defaulting to 1000 [ 2998.333869][T25107] lo speed is unknown, defaulting to 1000 [ 2999.538074][T25120] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3001.252002][T25130] lo speed is unknown, defaulting to 1000 [ 3002.565592][T25157] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3002.624117][T25149] lo speed is unknown, defaulting to 1000 [ 3002.670680][T25168] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41827'. [ 3002.680009][T25168] netlink: 16 bytes leftover after parsing attributes in process `syz.3.41827'. [ 3002.689215][T25168] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41827'. [ 3002.699043][T25168] netlink: 36 bytes leftover after parsing attributes in process `syz.3.41827'. [ 3003.572797][T25185] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3004.336681][T25195] netlink: 32 bytes leftover after parsing attributes in process `syz.3.41838'. [ 3006.662186][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 3006.662217][ T29] audit: type=1326 audit(5053.533:179519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25203 comm="syz.0.41842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3006.692758][ T29] audit: type=1326 audit(5053.533:179520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25203 comm="syz.0.41842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3006.716221][ T29] audit: type=1326 audit(5053.533:179521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25203 comm="syz.0.41842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3006.740329][ T29] audit: type=1326 audit(5053.533:179522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25203 comm="syz.0.41842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3006.764443][ T29] audit: type=1326 audit(5053.533:179523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25203 comm="syz.0.41842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3006.787766][ T29] audit: type=1326 audit(5053.533:179524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25203 comm="syz.0.41842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3006.811810][ T29] audit: type=1326 audit(5053.533:179525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25203 comm="syz.0.41842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3006.835119][ T29] audit: type=1326 audit(5053.533:179526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25203 comm="syz.0.41842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3006.858906][ T29] audit: type=1326 audit(5053.533:179527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25203 comm="syz.0.41842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3006.882856][ T29] audit: type=1326 audit(5053.533:179528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25203 comm="syz.0.41842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3006.935185][T25208] lo speed is unknown, defaulting to 1000 [ 3007.399808][T25214] netlink: 16 bytes leftover after parsing attributes in process `syz.3.41846'. [ 3007.591426][T25216] lo speed is unknown, defaulting to 1000 [ 3007.713716][T25226] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3008.028144][T25240] netlink: 16 bytes leftover after parsing attributes in process `syz.0.41858'. [ 3008.284749][T25258] netlink: 60 bytes leftover after parsing attributes in process `syz.0.41866'. [ 3008.294334][T25257] netlink: 60 bytes leftover after parsing attributes in process `syz.0.41866'. [ 3009.815856][T25295] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3009.995481][T25302] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3011.298440][T25325] netlink: 4 bytes leftover after parsing attributes in process `syz.3.41894'. [ 3011.420235][T25329] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3012.987347][T25337] lo speed is unknown, defaulting to 1000 [ 3014.054419][T25344] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3014.753051][T25365] lo speed is unknown, defaulting to 1000 [ 3015.165801][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 3015.165823][ T29] audit: type=1326 audit(5062.031:179603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25370 comm="syz.0.41913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3015.195222][ T29] audit: type=1326 audit(5062.031:179604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25370 comm="syz.0.41913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3015.236777][ T29] audit: type=1326 audit(5062.081:179605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25370 comm="syz.0.41913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3015.260218][ T29] audit: type=1326 audit(5062.081:179606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25370 comm="syz.0.41913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3015.283639][ T29] audit: type=1326 audit(5062.081:179607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25370 comm="syz.0.41913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3015.306983][ T29] audit: type=1326 audit(5062.081:179608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25370 comm="syz.0.41913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3015.330248][ T29] audit: type=1326 audit(5062.081:179609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25370 comm="syz.0.41913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3015.353623][ T29] audit: type=1326 audit(5062.081:179610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25370 comm="syz.0.41913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3015.376875][ T29] audit: type=1326 audit(5062.081:179611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25370 comm="syz.0.41913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3015.400276][ T29] audit: type=1326 audit(5062.081:179612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25370 comm="syz.0.41913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3015.503949][T25380] netlink: 60 bytes leftover after parsing attributes in process `syz.0.41915'. [ 3015.514276][T25375] netlink: 60 bytes leftover after parsing attributes in process `syz.0.41915'. [ 3016.426722][T25395] netlink: 24 bytes leftover after parsing attributes in process `syz.3.41923'. [ 3016.524095][T25409] netlink: 64 bytes leftover after parsing attributes in process `syz.3.41930'. [ 3017.560909][T25425] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3018.260204][T25440] netlink: 12 bytes leftover after parsing attributes in process `syz.0.41942'. [ 3019.336506][T25458] lo speed is unknown, defaulting to 1000 [ 3019.453947][T25466] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3020.359357][T25491] netlink: 12 bytes leftover after parsing attributes in process `syz.0.41965'. [ 3020.509673][T25494] lo speed is unknown, defaulting to 1000 [ 3021.248658][T25497] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3021.523470][T25511] lo speed is unknown, defaulting to 1000 [ 3022.311971][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 3022.311988][ T29] audit: type=1326 audit(5069.170:179730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25512 comm="syz.0.41973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3022.362388][ T29] audit: type=1326 audit(5069.200:179731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25512 comm="syz.0.41973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3022.385884][ T29] audit: type=1326 audit(5069.200:179732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25512 comm="syz.0.41973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3022.409261][ T29] audit: type=1326 audit(5069.200:179733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25512 comm="syz.0.41973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3022.432628][ T29] audit: type=1326 audit(5069.200:179734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25512 comm="syz.0.41973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3022.455910][ T29] audit: type=1326 audit(5069.200:179735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25512 comm="syz.0.41973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3022.479187][ T29] audit: type=1326 audit(5069.200:179736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25512 comm="syz.0.41973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3022.502444][ T29] audit: type=1326 audit(5069.210:179737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25512 comm="syz.0.41973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3022.525874][ T29] audit: type=1326 audit(5069.210:179738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25512 comm="syz.0.41973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3022.549157][ T29] audit: type=1326 audit(5069.210:179739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25512 comm="syz.0.41973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3023.763112][T25547] lo speed is unknown, defaulting to 1000 [ 3024.608271][T25563] lo speed is unknown, defaulting to 1000 [ 3025.555341][T25573] lo speed is unknown, defaulting to 1000 [ 3025.847658][T25585] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3026.039745][T25588] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3026.733027][T25618] lo speed is unknown, defaulting to 1000 [ 3027.498075][T25640] C: renamed from team_slave_0 [ 3027.504242][T25640] netlink: 'syz.3.42026': attribute type 1 has an invalid length. [ 3027.512071][T25640] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 3028.251986][T25660] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3029.241633][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 3029.241647][ T29] audit: type=1326 audit(5076.109:179746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25683 comm="syz.0.42044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3029.271108][ T29] audit: type=1326 audit(5076.109:179747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25683 comm="syz.0.42044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3029.294591][ T29] audit: type=1326 audit(5076.139:179748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25683 comm="syz.0.42044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3029.317905][ T29] audit: type=1326 audit(5076.139:179749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25683 comm="syz.0.42044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3029.341290][ T29] audit: type=1326 audit(5076.139:179750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25683 comm="syz.0.42044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3029.364954][ T29] audit: type=1326 audit(5076.139:179751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25683 comm="syz.0.42044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3029.388258][ T29] audit: type=1326 audit(5076.139:179752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25683 comm="syz.0.42044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3029.411742][ T29] audit: type=1326 audit(5076.139:179753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25683 comm="syz.0.42044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3029.435157][ T29] audit: type=1326 audit(5076.139:179754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25683 comm="syz.0.42044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3029.458504][ T29] audit: type=1326 audit(5076.139:179755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25683 comm="syz.0.42044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3029.558496][T25693] lo speed is unknown, defaulting to 1000 [ 3030.482213][T25712] netlink: 48 bytes leftover after parsing attributes in process `syz.3.42056'. [ 3031.117046][T25727] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3031.939405][T25742] lo speed is unknown, defaulting to 1000 [ 3033.593939][T25759] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3033.660044][T25760] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42073'. [ 3033.669369][T25760] netlink: 16 bytes leftover after parsing attributes in process `syz.3.42073'. [ 3033.678510][T25760] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42073'. [ 3033.687648][T25760] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42073'. [ 3034.234308][T25764] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3034.328610][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 3034.328624][ T29] audit: type=1326 audit(5081.198:179818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25772 comm="syz.0.42078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3034.359304][ T29] audit: type=1326 audit(5081.198:179819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25772 comm="syz.0.42078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3034.382846][ T29] audit: type=1326 audit(5081.198:179820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25772 comm="syz.0.42078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3034.407096][ T29] audit: type=1326 audit(5081.198:179821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25772 comm="syz.0.42078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3034.430414][ T29] audit: type=1326 audit(5081.198:179822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25772 comm="syz.0.42078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3034.454347][ T29] audit: type=1326 audit(5081.208:179823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25772 comm="syz.0.42078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3034.478407][ T29] audit: type=1326 audit(5081.208:179824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25772 comm="syz.0.42078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3034.501814][ T29] audit: type=1326 audit(5081.208:179825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25772 comm="syz.0.42078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3034.505826][T25777] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3034.526296][ T29] audit: type=1326 audit(5081.208:179826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25772 comm="syz.0.42078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3034.559769][ T29] audit: type=1326 audit(5081.208:179827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25772 comm="syz.0.42078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3034.606141][T25779] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42079'. [ 3034.615285][T25779] netlink: 16 bytes leftover after parsing attributes in process `syz.3.42079'. [ 3034.618682][T25781] lo speed is unknown, defaulting to 1000 [ 3034.624363][T25779] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42079'. [ 3034.639794][T25779] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42079'. [ 3034.652671][T25783] netlink: 'syz.0.42078': attribute type 1 has an invalid length. [ 3034.677490][T25783] bond20: entered promiscuous mode [ 3034.683189][T25783] 8021q: adding VLAN 0 to HW filter on device bond20 [ 3035.355505][T25793] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3035.472855][T25804] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3036.057476][T25807] lo speed is unknown, defaulting to 1000 [ 3036.910332][T25812] netlink: 8 bytes leftover after parsing attributes in process `syz.3.42090'. [ 3037.186857][T25822] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3037.354175][T25839] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3037.421104][T25840] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42103'. [ 3037.430214][T25840] netlink: 16 bytes leftover after parsing attributes in process `syz.3.42103'. [ 3037.439284][T25840] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42103'. [ 3037.448404][T25840] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42103'. [ 3038.334942][T25852] netlink: 'syz.3.42107': attribute type 13 has an invalid length. [ 3038.356245][T25852] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 3038.373193][T18470] lo speed is unknown, defaulting to 1000 [ 3038.376187][T16957] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 3038.379117][T18470] syz0: Port: 1 Link ACTIVE [ 3039.459786][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 3039.459804][ T29] audit: type=1326 audit(5086.327:179855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25876 comm="syz.0.42117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3039.489765][ T29] audit: type=1326 audit(5086.327:179856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25876 comm="syz.0.42117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3039.513106][ T29] audit: type=1326 audit(5086.327:179857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25876 comm="syz.0.42117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3039.520812][T25879] netlink: 8 bytes leftover after parsing attributes in process `syz.0.42118'. [ 3039.536375][ T29] audit: type=1326 audit(5086.327:179858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25876 comm="syz.0.42117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3039.536416][ T29] audit: type=1326 audit(5086.327:179859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25876 comm="syz.0.42117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3039.536523][ T29] audit: type=1326 audit(5086.327:179860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25876 comm="syz.0.42117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3039.536569][ T29] audit: type=1326 audit(5086.327:179861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25876 comm="syz.0.42117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3039.536608][ T29] audit: type=1326 audit(5086.327:179862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25876 comm="syz.0.42117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3039.536747][ T29] audit: type=1326 audit(5086.327:179863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25876 comm="syz.0.42117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3039.536786][ T29] audit: type=1326 audit(5086.327:179864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25876 comm="syz.0.42117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3040.970455][T25898] lo speed is unknown, defaulting to 1000 [ 3041.875041][T25907] netlink: 8 bytes leftover after parsing attributes in process `syz.0.42128'. [ 3041.987328][T25911] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3042.092510][T25926] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3042.156821][T25936] netlink: 'syz.0.42141': attribute type 13 has an invalid length. [ 3042.178936][T25936] 8021q: adding VLAN 0 to HW filter on device team0 [ 3042.190551][T25936] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 3042.264453][T25934] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3042.305953][ C0] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 3042.343243][T25944] netlink: 48 bytes leftover after parsing attributes in process `syz.3.42144'. [ 3042.991661][T25962] netlink: 'syz.3.42152': attribute type 13 has an invalid length. [ 3043.002995][T25962] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 3043.200300][T25990] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3043.330208][T25988] tipc: New replicast peer: 0.0.255.255 [ 3043.332751][T26002] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3043.335903][T25988] tipc: Enabled bearer , priority 10 [ 3043.418270][T26011] netlink: 8 bytes leftover after parsing attributes in process `syz.0.42175'. [ 3043.433960][T26007] netlink: 60 bytes leftover after parsing attributes in process `syz.3.42173'. [ 3043.443434][T26006] netlink: 60 bytes leftover after parsing attributes in process `syz.3.42173'. [ 3043.463545][T26006] lo speed is unknown, defaulting to 1000 [ 3045.242861][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 3045.242878][ T29] audit: type=1326 audit(5092.107:179961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26044 comm="syz.3.42191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3045.280704][T26049] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3045.306642][T26051] netlink: 8 bytes leftover after parsing attributes in process `syz.3.42194'. [ 3045.316424][ T29] audit: type=1326 audit(5092.107:179962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26044 comm="syz.3.42191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3045.339699][ T29] audit: type=1326 audit(5092.107:179963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26044 comm="syz.3.42191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3045.362931][ T29] audit: type=1326 audit(5092.107:179964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26044 comm="syz.3.42191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3045.386228][ T29] audit: type=1326 audit(5092.107:179965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26044 comm="syz.3.42191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3045.409582][ T29] audit: type=1326 audit(5092.107:179966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26044 comm="syz.3.42191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3045.432856][ T29] audit: type=1326 audit(5092.107:179967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26044 comm="syz.3.42191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3045.456229][ T29] audit: type=1326 audit(5092.107:179968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26044 comm="syz.3.42191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3045.479562][ T29] audit: type=1326 audit(5092.107:179969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26044 comm="syz.3.42191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3045.502804][ T29] audit: type=1326 audit(5092.107:179970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26044 comm="syz.3.42191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3045.665423][T26060] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42197'. [ 3045.674788][T26060] netlink: 16 bytes leftover after parsing attributes in process `syz.0.42197'. [ 3045.683925][T26060] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42197'. [ 3045.693848][T26060] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42197'. [ 3046.493829][T26076] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3046.526341][T26078] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3047.739886][T26087] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3047.787465][T26090] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3047.853069][T26091] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42208'. [ 3047.862153][T26091] netlink: 16 bytes leftover after parsing attributes in process `syz.3.42208'. [ 3047.871251][T26091] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42208'. [ 3047.880338][T26091] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42208'. [ 3048.942843][T26104] netlink: 4 bytes leftover after parsing attributes in process `syz.3.42213'. [ 3049.101612][T26108] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3049.235174][T26117] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3049.570283][T26135] netlink: 8 bytes leftover after parsing attributes in process `syz.0.42227'. [ 3049.606250][T26140] netlink: 12 bytes leftover after parsing attributes in process `syz.3.42229'. [ 3049.714229][T26145] netlink: 8 bytes leftover after parsing attributes in process `syz.3.42231'. [ 3050.067164][ C0] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 3050.096810][T26158] netlink: 12 bytes leftover after parsing attributes in process `syz.0.42237'. [ 3050.774240][T26164] netlink: 12 bytes leftover after parsing attributes in process `syz.3.42239'. [ 3051.885066][T26194] lo speed is unknown, defaulting to 1000 [ 3051.915464][T26202] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3052.234320][T26219] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65526 sclass=netlink_xfrm_socket pid=26219 comm=syz.3.42263 [ 3052.248177][T26219] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3052.364748][T26222] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3052.411325][T26225] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3054.580331][T26236] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3054.604800][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 3054.604813][ T29] audit: type=1326 audit(5101.465:180024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26237 comm="syz.0.42269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3054.634439][ T29] audit: type=1326 audit(5101.465:180025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26237 comm="syz.0.42269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3054.657807][ T29] audit: type=1326 audit(5101.465:180026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26237 comm="syz.0.42269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3054.681074][ T29] audit: type=1326 audit(5101.465:180027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26237 comm="syz.0.42269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3054.704441][ T29] audit: type=1326 audit(5101.465:180028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26237 comm="syz.0.42269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3054.727775][ T29] audit: type=1326 audit(5101.465:180029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26237 comm="syz.0.42269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3054.751125][ T29] audit: type=1326 audit(5101.465:180030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26237 comm="syz.0.42269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3054.774431][ T29] audit: type=1326 audit(5101.465:180031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26237 comm="syz.0.42269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3054.797770][ T29] audit: type=1326 audit(5101.465:180032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26237 comm="syz.0.42269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3054.821000][ T29] audit: type=1326 audit(5101.465:180033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26237 comm="syz.0.42269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3055.699599][T26254] lo speed is unknown, defaulting to 1000 [ 3056.393931][T26260] __nla_validate_parse: 3 callbacks suppressed [ 3056.393966][T26260] netlink: 8 bytes leftover after parsing attributes in process `syz.0.42277'. [ 3056.417733][T26260] 8021q: adding VLAN 0 to HW filter on device bond22 [ 3056.435877][T26260] netlink: 'syz.0.42277': attribute type 13 has an invalid length. [ 3056.453230][T26260] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 3056.485396][T26262] pimreg: entered allmulticast mode [ 3056.500675][T26261] pimreg: left allmulticast mode [ 3056.574330][T26271] netlink: 8 bytes leftover after parsing attributes in process `syz.0.42282'. [ 3056.634316][T26273] netlink: 8 bytes leftover after parsing attributes in process `syz.3.42283'. [ 3058.095392][T26283] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3058.120047][T26285] netlink: 8 bytes leftover after parsing attributes in process `syz.3.42287'. [ 3058.206906][T26286] lo speed is unknown, defaulting to 1000 [ 3058.233546][T26301] netlink: 8 bytes leftover after parsing attributes in process `syz.3.42290'. [ 3058.250322][T26301] 8021q: adding VLAN 0 to HW filter on device bond32 [ 3058.266412][T26301] netlink: 'syz.3.42290': attribute type 13 has an invalid length. [ 3058.281886][T26301] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 3058.366242][T26302] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3058.397861][T26306] pimreg: entered allmulticast mode [ 3058.440093][T26308] pimreg: entered allmulticast mode [ 3058.454172][T26307] pimreg: left allmulticast mode [ 3059.077477][T26322] netlink: 4 bytes leftover after parsing attributes in process `syz.0.42298'. [ 3059.153304][T26335] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3059.385478][T26344] pimreg: entered allmulticast mode [ 3059.392886][T26343] pimreg: left allmulticast mode [ 3059.659838][T26354] pimreg: entered allmulticast mode [ 3059.666863][T26353] pimreg: left allmulticast mode [ 3059.834234][T26359] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3060.761224][T26369] netlink: 8 bytes leftover after parsing attributes in process `syz.3.42318'. [ 3060.866541][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 3060.866559][ T29] audit: type=1400 audit(5107.724:180049): avc: denied { accept } for pid=26372 comm="syz.3.42320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3060.902686][T26373] lo speed is unknown, defaulting to 1000 [ 3061.127680][T26388] openvswitch: netlink: Message has 6 unknown bytes. [ 3062.795854][T26394] lo speed is unknown, defaulting to 1000 [ 3064.267957][T26415] lo speed is unknown, defaulting to 1000 [ 3064.308320][T26424] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3064.469157][T26441] netlink: 8 bytes leftover after parsing attributes in process `syz.0.42339'. [ 3064.564107][T26445] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3064.649735][T26448] netlink: 4 bytes leftover after parsing attributes in process `syz.0.42341'. [ 3064.649749][T26447] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42340'. [ 3064.649767][T26447] netlink: 16 bytes leftover after parsing attributes in process `syz.3.42340'. [ 3064.649783][T26447] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42340'. [ 3064.649806][T26447] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42340'. [ 3064.897742][ T29] audit: type=1400 audit(5111.753:180050): avc: denied { map } for pid=26446 comm="syz.0.42341" path="socket:[378836]" dev="sockfs" ino=378836 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 3065.002764][ T29] audit: type=1326 audit(5111.863:180051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26456 comm="syz.0.42343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3065.026876][ T29] audit: type=1326 audit(5111.863:180052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26456 comm="syz.0.42343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3065.050987][ T29] audit: type=1326 audit(5111.863:180053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26456 comm="syz.0.42343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd01751d290 code=0x7ffc0000 [ 3065.074430][ T29] audit: type=1326 audit(5111.863:180054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26456 comm="syz.0.42343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3065.098451][ T29] audit: type=1326 audit(5111.863:180055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26456 comm="syz.0.42343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3065.122348][ T29] audit: type=1326 audit(5111.863:180056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26456 comm="syz.0.42343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3065.145618][ T29] audit: type=1326 audit(5111.863:180057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26456 comm="syz.0.42343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3065.169411][ T29] audit: type=1326 audit(5111.863:180058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26456 comm="syz.0.42343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3065.258990][T26462] netlink: 60 bytes leftover after parsing attributes in process `syz.0.42345'. [ 3065.303846][T26465] netlink: 8 bytes leftover after parsing attributes in process `syz.0.42346'. [ 3065.418796][T26470] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42347'. [ 3065.427928][T26470] netlink: 16 bytes leftover after parsing attributes in process `syz.0.42347'. [ 3065.507169][T26469] lo speed is unknown, defaulting to 1000 [ 3066.069696][ C0] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 3067.330351][T26483] lo speed is unknown, defaulting to 1000 [ 3068.305316][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 3068.305339][ T29] audit: type=1326 audit(5115.163:180121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26506 comm="syz.3.42363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3068.335631][ T29] audit: type=1326 audit(5115.163:180122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26506 comm="syz.3.42363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3068.359621][ T29] audit: type=1326 audit(5115.163:180123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26506 comm="syz.3.42363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3068.383586][ T29] audit: type=1326 audit(5115.163:180124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26506 comm="syz.3.42363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3068.406924][ T29] audit: type=1326 audit(5115.163:180125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26506 comm="syz.3.42363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3068.430733][ T29] audit: type=1326 audit(5115.163:180126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26506 comm="syz.3.42363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3068.454024][ T29] audit: type=1326 audit(5115.163:180127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26506 comm="syz.3.42363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3068.478176][ T29] audit: type=1326 audit(5115.163:180128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26506 comm="syz.3.42363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3068.502033][ T29] audit: type=1326 audit(5115.163:180129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26506 comm="syz.3.42363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3068.525371][ T29] audit: type=1326 audit(5115.163:180130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26506 comm="syz.3.42363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3069.083304][T26509] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 3069.258274][T26532] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3069.462493][T26541] lo speed is unknown, defaulting to 1000 [ 3070.254081][T26550] openvswitch: netlink: Message has 6 unknown bytes. [ 3070.595153][T26563] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3070.648611][T26570] openvswitch: netlink: Message has 6 unknown bytes. [ 3070.985230][T26585] __nla_validate_parse: 3 callbacks suppressed [ 3070.985242][T26585] netlink: 12 bytes leftover after parsing attributes in process `syz.3.42397'. [ 3071.151855][T26591] 9pnet_fd: Insufficient options for proto=fd [ 3071.299611][T26595] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3071.414156][T26599] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42402'. [ 3071.423261][T26599] netlink: 16 bytes leftover after parsing attributes in process `syz.0.42402'. [ 3071.432363][T26599] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42402'. [ 3071.441459][T26599] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42402'. [ 3072.251937][T26631] lo speed is unknown, defaulting to 1000 [ 3072.732824][T26676] netlink: 16 bytes leftover after parsing attributes in process `syz.0.42426'. [ 3073.077924][T26685] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42430'. [ 3073.086998][T26685] netlink: 16 bytes leftover after parsing attributes in process `syz.0.42430'. [ 3073.096563][T26685] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42430'. [ 3073.105696][T26685] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42430'. [ 3073.379266][ T29] kauditd_printk_skb: 190 callbacks suppressed [ 3073.379284][ T29] audit: type=1400 audit(5120.232:180321): avc: denied { relabelfrom } for pid=26688 comm="syz.3.42431" name="" dev="pipefs" ino=379799 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 3073.409134][ T29] audit: type=1400 audit(5120.232:180322): avc: denied { relabelto } for pid=26688 comm="syz.3.42431" name="" dev="pipefs" ino=379799 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:crond_var_run_t:s0" [ 3073.970639][T26695] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3074.507495][T26712] lo speed is unknown, defaulting to 1000 [ 3075.136092][T26719] openvswitch: netlink: Message has 6 unknown bytes. [ 3075.337078][T26727] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3075.571636][ T29] audit: type=1326 audit(5122.432:180323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26758 comm="syz.0.42460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3075.618341][ T29] audit: type=1326 audit(5122.462:180324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26758 comm="syz.0.42460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3075.641523][ T29] audit: type=1326 audit(5122.462:180325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26758 comm="syz.0.42460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3075.664798][ T29] audit: type=1326 audit(5122.462:180326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26758 comm="syz.0.42460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3075.688197][ T29] audit: type=1326 audit(5122.462:180327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26758 comm="syz.0.42460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=285 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3075.711473][ T29] audit: type=1326 audit(5122.462:180328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26758 comm="syz.0.42460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3075.734737][ T29] audit: type=1326 audit(5122.462:180329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26758 comm="syz.0.42460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3075.758025][ T29] audit: type=1326 audit(5122.472:180330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26760 comm="syz.0.42461" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x10000000 [ 3076.425239][T26765] rdma_op ffff8881b82d6d80 conn xmit_rdma 0000000000000000 [ 3077.522613][T26793] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3077.599370][T26794] __nla_validate_parse: 1 callbacks suppressed [ 3077.599384][T26794] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42474'. [ 3077.614644][T26794] netlink: 16 bytes leftover after parsing attributes in process `syz.3.42474'. [ 3077.623785][T26794] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42474'. [ 3077.633126][T26794] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42474'. [ 3078.451222][T26810] wireguard3: entered promiscuous mode [ 3078.456922][T26810] wireguard3: entered allmulticast mode [ 3079.112069][ T29] audit: type=1326 audit(5125.971:180331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26816 comm="syz.0.42482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3079.141104][ T29] audit: type=1326 audit(5125.971:180332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26816 comm="syz.0.42482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd01751d290 code=0x7ffc0000 [ 3079.165485][ T29] audit: type=1326 audit(5125.971:180333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26816 comm="syz.0.42482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3079.188913][ T29] audit: type=1326 audit(5125.971:180334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26816 comm="syz.0.42482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3079.212179][ T29] audit: type=1326 audit(5125.971:180335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26816 comm="syz.0.42482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3079.235607][ T29] audit: type=1326 audit(5125.971:180336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26816 comm="syz.0.42482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3079.258836][ T29] audit: type=1326 audit(5125.971:180337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26816 comm="syz.0.42482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3079.282443][ T29] audit: type=1326 audit(5125.971:180338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26816 comm="syz.0.42482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd01751d290 code=0x7ffc0000 [ 3079.305860][ T29] audit: type=1326 audit(5125.971:180339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26816 comm="syz.0.42482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3079.329146][ T29] audit: type=1326 audit(5125.971:180340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26816 comm="syz.0.42482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd01751e929 code=0x7ffc0000 [ 3079.452391][T26819] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3079.510830][T26833] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3079.585086][T26831] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3080.533537][T26843] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3080.599346][T26844] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42492'. [ 3080.608523][T26844] netlink: 16 bytes leftover after parsing attributes in process `syz.3.42492'. [ 3080.617674][T26844] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42492'. [ 3080.626822][T26844] netlink: 36 bytes leftover after parsing attributes in process `syz.3.42492'. [ 3081.484415][T26852] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3082.862516][T26869] lo speed is unknown, defaulting to 1000 [ 3083.830876][T26875] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3083.955937][T26878] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3084.033489][T26885] netlink: 20 bytes leftover after parsing attributes in process `syz.0.42507'. [ 3084.515259][T26893] xt_bpf: check failed: parse error [ 3084.680097][T26895] lo speed is unknown, defaulting to 1000 [ 3086.853506][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 3086.853525][ T29] audit: type=1326 audit(5133.710:180379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26928 comm="syz.3.42523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3086.883877][ T29] audit: type=1326 audit(5133.710:180380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26928 comm="syz.3.42523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=28 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3086.907103][ T29] audit: type=1326 audit(5133.710:180381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26928 comm="syz.3.42523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3086.930968][ T29] audit: type=1326 audit(5133.710:180382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26928 comm="syz.3.42523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3086.955080][ T29] audit: type=1326 audit(5133.710:180383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26928 comm="syz.3.42523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3086.978205][ T29] audit: type=1326 audit(5133.710:180384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26928 comm="syz.3.42523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3087.001766][ T29] audit: type=1326 audit(5133.710:180385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26928 comm="syz.3.42523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3087.025826][ T29] audit: type=1326 audit(5133.710:180386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26928 comm="syz.3.42523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3087.049429][ T29] audit: type=1326 audit(5133.710:180387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26928 comm="syz.3.42523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3087.073495][ T29] audit: type=1326 audit(5133.710:180388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26928 comm="syz.3.42523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3087.229147][T26938] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3087.422533][T26957] netlink: 36 bytes leftover after parsing attributes in process `syz.0.42533'. [ 3087.451324][T26963] netlink: 14593 bytes leftover after parsing attributes in process `syz.0.42536'. [ 3087.462128][T26963] netlink: 'syz.0.42536': attribute type 4 has an invalid length. [ 3087.470689][T26963] netlink: 17 bytes leftover after parsing attributes in process `syz.0.42536'. [ 3087.522150][T26965] netlink: 32 bytes leftover after parsing attributes in process `syz.0.42537'. [ 3087.795417][T26973] netlink: 20 bytes leftover after parsing attributes in process `syz.0.42540'. [ 3089.292540][T27008] lo speed is unknown, defaulting to 1000 [ 3091.553989][T27089] netlink: 12 bytes leftover after parsing attributes in process `syz.3.42577'. [ 3091.869851][ T29] kauditd_printk_skb: 163 callbacks suppressed [ 3091.869867][ T29] audit: type=1326 audit(5138.719:180552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27097 comm="syz.3.42582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f76468758e7 code=0x7ffc0000 [ 3091.900628][ T29] audit: type=1326 audit(5138.749:180553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27097 comm="syz.3.42582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f764681ab19 code=0x7ffc0000 [ 3091.923915][ T29] audit: type=1326 audit(5138.749:180554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27097 comm="syz.3.42582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f76468758e7 code=0x7ffc0000 [ 3091.947097][ T29] audit: type=1326 audit(5138.749:180555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27097 comm="syz.3.42582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f764681ab19 code=0x7ffc0000 [ 3091.970226][ T29] audit: type=1326 audit(5138.749:180556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27097 comm="syz.3.42582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3091.993600][ T29] audit: type=1326 audit(5138.749:180557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27097 comm="syz.3.42582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f76468758e7 code=0x7ffc0000 [ 3092.016951][ T29] audit: type=1326 audit(5138.749:180558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27097 comm="syz.3.42582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f764681ab19 code=0x7ffc0000 [ 3092.040169][ T29] audit: type=1326 audit(5138.749:180559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27097 comm="syz.3.42582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3092.063556][ T29] audit: type=1326 audit(5138.799:180560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27097 comm="syz.3.42582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f76468758e7 code=0x7ffc0000 [ 3092.086821][ T29] audit: type=1326 audit(5138.799:180561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27097 comm="syz.3.42582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f764681ab19 code=0x7ffc0000 [ 3092.516612][T27112] RDS: rds_bind could not find a transport for ::ffff:172.30.0.4, load rds_tcp or rds_rdma? [ 3092.870493][T27176] netlink: 16 bytes leftover after parsing attributes in process `syz.3.42602'. [ 3092.879608][T27176] netlink: 4 bytes leftover after parsing attributes in process `syz.3.42602'. [ 3092.967583][T27170] lo speed is unknown, defaulting to 1000 [ 3093.851441][T27189] netlink: 'syz.3.42607': attribute type 4 has an invalid length. [ 3093.905102][T27197] netlink: 16 bytes leftover after parsing attributes in process `syz.0.42610'. [ 3094.847472][T27215] hsr_slave_0: entered promiscuous mode [ 3094.853262][T27215] hsr_slave_0: left promiscuous mode [ 3094.929472][T27226] Non-string source [ 3094.935873][T27226] netlink: 24 bytes leftover after parsing attributes in process `syz.0.42620'. [ 3094.954722][T27226] netlink: 4 bytes leftover after parsing attributes in process `syz.0.42620'. [ 3095.048244][T27235] lo speed is unknown, defaulting to 1000 [ 3095.244170][T27267] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3096.211061][T27292] netlink: 24 bytes leftover after parsing attributes in process `syz.0.42645'. [ 3096.336807][T27297] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3097.134889][T27311] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3097.320623][T27322] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3097.433260][ T29] kauditd_printk_skb: 288 callbacks suppressed [ 3097.433271][ T29] audit: type=1326 audit(5144.288:180850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27328 comm="syz.3.42657" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f764687e929 code=0x0 [ 3098.497834][T27358] netlink: 4732 bytes leftover after parsing attributes in process `syz.0.42665'. [ 3098.550646][T27363] openvswitch: netlink: Message has 6 unknown bytes. [ 3098.714730][ C0] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 3099.150457][T27381] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3100.071176][T27391] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3100.117562][ T29] audit: type=1326 audit(5146.978:180851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27393 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3100.140648][ T29] audit: type=1326 audit(5146.978:180852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27393 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3100.163475][ T29] audit: type=1326 audit(5146.978:180853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27393 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3100.186089][ T29] audit: type=1326 audit(5146.998:180854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27393 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3100.208722][ T29] audit: type=1326 audit(5146.998:180855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27393 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3100.231415][ T29] audit: type=1326 audit(5146.998:180856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27393 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=158 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3100.254174][ T29] audit: type=1326 audit(5146.998:180857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27393 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3100.276926][ T29] audit: type=1326 audit(5146.998:180858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27393 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3100.299580][ T29] audit: type=1326 audit(5146.998:180859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27393 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3100.325383][T27400] hsr_slave_0: entered promiscuous mode [ 3100.331115][T27400] hsr_slave_0: left promiscuous mode [ 3100.376037][T27405] netlink: 8 bytes leftover after parsing attributes in process `syz.0.42681'. [ 3101.209224][T27433] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3102.152288][T27443] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3103.095524][T27448] lo speed is unknown, defaulting to 1000 [ 3104.053866][T27457] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3105.509850][T27473] lo speed is unknown, defaulting to 1000 [ 3106.083594][T27478] hsr_slave_0: entered promiscuous mode [ 3106.090491][T27478] hsr_slave_0: left promiscuous mode [ 3106.109956][T27481] Non-string source [ 3106.903657][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 3106.903674][ T29] audit: type=1326 audit(5153.757:180891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27499 comm="syz.3.42710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3106.935039][ T29] audit: type=1326 audit(5153.757:180892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27499 comm="syz.3.42710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3106.958442][ T29] audit: type=1326 audit(5153.757:180893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27499 comm="syz.3.42710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3106.981709][ T29] audit: type=1326 audit(5153.757:180894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27499 comm="syz.3.42710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3107.005010][ T29] audit: type=1326 audit(5153.757:180895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27499 comm="syz.3.42710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3107.028385][ T29] audit: type=1326 audit(5153.767:180896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27499 comm="syz.3.42710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3107.051651][ T29] audit: type=1326 audit(5153.767:180897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27499 comm="syz.3.42710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3107.074981][ T29] audit: type=1326 audit(5153.767:180898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27499 comm="syz.3.42710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3107.098295][ T29] audit: type=1326 audit(5153.767:180899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27499 comm="syz.3.42710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3107.121582][ T29] audit: type=1326 audit(5153.767:180900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27499 comm="syz.3.42710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3107.191664][T27506] Q6\bY4: renamed from lo (while UP) [ 3107.217536][T27508] openvswitch: netlink: Message has 6 unknown bytes. [ 3107.494194][T27517] netlink: 4 bytes leftover after parsing attributes in process `syz.0.42716'. [ 3107.569067][T27518] netlink: 44 bytes leftover after parsing attributes in process `syz.0.42716'. [ 3107.899643][T27524] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 3107.987347][T27525] netlink: 52 bytes leftover after parsing attributes in process `syz.3.42718'. [ 3107.996468][T27525] netlink: 16 bytes leftover after parsing attributes in process `syz.3.42718'. [ 3108.005580][T27525] netlink: 52 bytes leftover after parsing attributes in process `syz.3.42718'. [ 3108.367119][T27537] tipc: Enabling of bearer rejected, failed to enable media [ 3108.457699][T27547] openvswitch: netlink: Message has 6 unknown bytes. [ 3108.583104][T27549] lo speed is unknown, defaulting to 1000 [ 3109.136109][T27568] netlink: 8 bytes leftover after parsing attributes in process `syz.3.42733'. [ 3109.987092][T27592] lo speed is unknown, defaulting to 1000 [ 3110.933947][T27618] openvswitch: netlink: Message has 6 unknown bytes. [ 3111.107436][T27639] openvswitch: netlink: Message has 6 unknown bytes. [ 3111.201632][T27641] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3111.360488][T27647] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3111.459929][T27659] openvswitch: netlink: Message has 6 unknown bytes. [ 3111.606304][T27665] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3111.668638][T27670] netlink: 4 bytes leftover after parsing attributes in process `syz.0.42775'. [ 3111.736232][T27672] netlink: 4 bytes leftover after parsing attributes in process `syz.0.42776'. [ 3111.749643][T27672] team0: Port device hsr_slave_0 removed [ 3112.035270][T27694] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3112.884768][T27708] netlink: 52 bytes leftover after parsing attributes in process `syz.3.42791'. [ 3112.894053][T27708] netlink: 16 bytes leftover after parsing attributes in process `syz.3.42791'. [ 3112.903128][T27708] netlink: 52 bytes leftover after parsing attributes in process `syz.3.42791'. [ 3113.897403][T27725] netlink: 5 bytes leftover after parsing attributes in process `syz.3.42796'. [ 3113.906506][T27725] 1{X: renamed from 30{X (while UP) [ 3113.913416][T27725] 1{X: entered allmulticast mode [ 3113.919074][T27725] A link change request failed with some changes committed already. Interface 31{X may have been left with an inconsistent configuration, please check. [ 3113.979724][T27730] openvswitch: netlink: Message has 6 unknown bytes. [ 3114.028188][ T29] kauditd_printk_skb: 193 callbacks suppressed [ 3114.028203][ T29] audit: type=1326 audit(5160.886:181094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27735 comm="syz.3.42801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3114.057788][ T29] audit: type=1326 audit(5160.886:181095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27735 comm="syz.3.42801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3114.081139][ T29] audit: type=1326 audit(5160.886:181096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27735 comm="syz.3.42801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3114.104422][ T29] audit: type=1326 audit(5160.886:181097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27735 comm="syz.3.42801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3114.127732][ T29] audit: type=1326 audit(5160.886:181098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27735 comm="syz.3.42801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3114.151091][ T29] audit: type=1326 audit(5160.886:181099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27735 comm="syz.3.42801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3114.174493][ T29] audit: type=1326 audit(5160.886:181100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27735 comm="syz.3.42801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3114.197914][ T29] audit: type=1326 audit(5160.886:181101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27735 comm="syz.3.42801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3114.221150][ T29] audit: type=1326 audit(5160.886:181102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27735 comm="syz.3.42801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3114.244391][ T29] audit: type=1326 audit(5160.886:181103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27735 comm="syz.3.42801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3114.412223][T27757] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=27757 comm=syz.3.42809 [ 3114.557460][T27761] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3115.601108][T27780] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3115.828810][T27794] netlink: 4 bytes leftover after parsing attributes in process `syz.3.42824'. [ 3117.290197][T27838] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3117.822478][T27894] Non-string source [ 3119.743921][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 3119.743939][ T29] audit: type=1326 audit(5166.595:181159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27909 comm="syz.3.42873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3119.773598][ T29] audit: type=1326 audit(5166.595:181160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27909 comm="syz.3.42873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3119.821062][T27906] lo speed is unknown, defaulting to 1000 [ 3119.828627][ T29] audit: type=1326 audit(5166.645:181161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27909 comm="syz.3.42873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3119.852079][ T29] audit: type=1326 audit(5166.645:181162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27909 comm="syz.3.42873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3119.875335][ T29] audit: type=1326 audit(5166.645:181163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27909 comm="syz.3.42873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3119.898686][ T29] audit: type=1326 audit(5166.645:181164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27909 comm="syz.3.42873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3119.921955][ T29] audit: type=1326 audit(5166.645:181165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27909 comm="syz.3.42873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3119.945254][ T29] audit: type=1326 audit(5166.655:181166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27909 comm="syz.3.42873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3119.968493][ T29] audit: type=1326 audit(5166.655:181167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27909 comm="syz.3.42873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3119.991810][ T29] audit: type=1326 audit(5166.665:181168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27909 comm="syz.3.42873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3120.131933][T27924] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3120.396602][T27978] netlink: 8 bytes leftover after parsing attributes in process `syz.3.42897'. [ 3120.787318][T28004] netlink: 4 bytes leftover after parsing attributes in process `syz.3.42908'. [ 3120.796697][T28004] netlink: 12 bytes leftover after parsing attributes in process `syz.3.42908'. [ 3120.811895][T28004] netlink: 8 bytes leftover after parsing attributes in process `syz.3.42908'. [ 3121.205664][T28018] Non-string source [ 3121.223320][T28020] Non-string source [ 3121.377708][T28034] netlink: 4 bytes leftover after parsing attributes in process `syz.0.42922'. [ 3121.934592][T28090] netlink: 60 bytes leftover after parsing attributes in process `syz.3.42947'. [ 3122.476185][T28106] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3124.831567][T28113] lo speed is unknown, defaulting to 1000 [ 3126.289005][ T29] kauditd_printk_skb: 201 callbacks suppressed [ 3126.289022][ T29] audit: type=1400 audit(5173.144:181370): avc: denied { mounton } for pid=28129 comm="syz.0.42959" path="/" dev="ramfs" ino=384360 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 3126.317582][T28130] 9pnet_fd: Insufficient options for proto=fd [ 3126.366941][ T29] audit: type=1400 audit(5173.174:181371): avc: denied { write } for pid=28129 comm="syz.0.42959" path="socket:[384364]" dev="sockfs" ino=384364 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 3126.725735][T28132] lo speed is unknown, defaulting to 1000 [ 3127.282717][T28165] netlink: 'syz.3.42968': attribute type 2 has an invalid length. [ 3127.290602][T28165] netlink: 'syz.3.42968': attribute type 1 has an invalid length. [ 3127.298494][T28165] netlink: 132 bytes leftover after parsing attributes in process `syz.3.42968'. [ 3127.776504][T28190] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3128.092580][T28215] Non-string source [ 3128.396669][T28237] Non-string source [ 3128.652508][T28244] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 3129.090629][T28265] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3129.818669][T28286] netlink: 24 bytes leftover after parsing attributes in process `syz.3.43021'. [ 3129.834965][T28286] netlink: 4 bytes leftover after parsing attributes in process `syz.3.43021'. [ 3130.027130][T28297] netlink: 'syz.3.43025': attribute type 39 has an invalid length. [ 3131.100091][ T29] audit: type=1326 audit(5177.953:181372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28327 comm="syz.3.43040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3131.123722][ T29] audit: type=1326 audit(5177.953:181373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28327 comm="syz.3.43040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3131.147091][ T29] audit: type=1326 audit(5177.953:181374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28327 comm="syz.3.43040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3131.170413][ T29] audit: type=1326 audit(5177.953:181375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28327 comm="syz.3.43040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3131.193783][ T29] audit: type=1326 audit(5177.953:181376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28327 comm="syz.3.43040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3131.217090][ T29] audit: type=1326 audit(5177.953:181377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28327 comm="syz.3.43040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3131.240356][ T29] audit: type=1326 audit(5177.953:181378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28327 comm="syz.3.43040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3131.263574][ T29] audit: type=1326 audit(5177.953:181379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28327 comm="syz.3.43040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3131.298372][T28334] lo speed is unknown, defaulting to 1000 [ 3131.348842][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 3131.348859][ T29] audit: type=1326 audit(5178.193:181409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28333 comm="syz.3.43043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3131.378218][ T29] audit: type=1326 audit(5178.193:181411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28333 comm="syz.3.43043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3131.401517][ T29] audit: type=1326 audit(5178.193:181410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28335 comm="syz.3.43043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f76468b11e5 code=0x7ffc0000 [ 3131.499620][ T29] audit: type=1326 audit(5178.343:181412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28335 comm="syz.3.43043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3132.292125][T28368] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3132.443053][ T29] audit: type=1326 audit(5179.293:181413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28372 comm="syz.3.43060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3132.467404][ T29] audit: type=1326 audit(5179.293:181414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28372 comm="syz.3.43060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3132.490940][ T29] audit: type=1326 audit(5179.293:181415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28372 comm="syz.3.43060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3132.514151][ T29] audit: type=1326 audit(5179.293:181416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28372 comm="syz.3.43060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3132.537448][ T29] audit: type=1326 audit(5179.293:181417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28372 comm="syz.3.43060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3132.560657][ T29] audit: type=1326 audit(5179.293:181418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28372 comm="syz.3.43060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f764687e929 code=0x7ffc0000 [ 3132.745933][T28384] netlink: 60 bytes leftover after parsing attributes in process `syz.3.43065'. [ 3132.755129][T28384] netlink: 60 bytes leftover after parsing attributes in process `syz.3.43065'. [ 3134.658767][T28391] netlink: 'syz.3.43067': attribute type 3 has an invalid length. [ 3135.036665][T28407] netlink: 33912 bytes leftover after parsing attributes in process `syz.3.43074'. [ 3135.388873][T28431] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 3135.507572][T28450] ================================================================== [ 3135.515681][T28450] BUG: KCSAN: data-race in __dentry_kill / fast_dput [ 3135.522359][T28450] [ 3135.524679][T28450] write to 0xffff888106d14f10 of 8 bytes by task 28451 on cpu 0: [ 3135.532395][T28450] __dentry_kill+0x142/0x4b0 [ 3135.536980][T28450] dput+0x5e/0xd0 [ 3135.540610][T28450] step_into+0x5b2/0x820 [ 3135.544859][T28450] walk_component+0x162/0x220 [ 3135.549540][T28450] link_path_walk+0x544/0x900 [ 3135.554219][T28450] path_lookupat+0x63/0x2a0 [ 3135.558738][T28450] do_o_path+0x45/0x130 [ 3135.562890][T28450] path_openat+0x1df9/0x2170 [ 3135.567493][T28450] do_filp_open+0x1f1/0x230 [ 3135.572011][T28450] do_sys_openat2+0xa6/0x110 [ 3135.576606][T28450] __x64_sys_openat+0xf2/0x120 [ 3135.581379][T28450] x64_sys_call+0x1af/0x2fb0 [ 3135.585972][T28450] do_syscall_64+0xd2/0x200 [ 3135.590474][T28450] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3135.596398][T28450] [ 3135.598736][T28450] read to 0xffff888106d14f10 of 8 bytes by task 28450 on cpu 1: [ 3135.606361][T28450] fast_dput+0x5f/0x2c0 [ 3135.610535][T28450] dput+0x24/0xd0 [ 3135.614201][T28450] step_into+0x5b2/0x820 [ 3135.618446][T28450] walk_component+0x162/0x220 [ 3135.623131][T28450] link_path_walk+0x544/0x900 [ 3135.627812][T28450] __filename_parentat+0x15c/0x3f0 [ 3135.632931][T28450] filename_create+0x79/0x290 [ 3135.637616][T28450] do_mkdirat+0x52/0x3f0 [ 3135.641860][T28450] __x64_sys_mkdirat+0x4c/0x60 [ 3135.646635][T28450] x64_sys_call+0x2be0/0x2fb0 [ 3135.651319][T28450] do_syscall_64+0xd2/0x200 [ 3135.655815][T28450] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3135.661722][T28450] [ 3135.664039][T28450] value changed: 0xffff888237986608 -> 0x0000000000000000 [ 3135.671150][T28450] [ 3135.673485][T28450] Reported by Kernel Concurrency Sanitizer on: [ 3135.679647][T28450] CPU: 1 UID: 0 PID: 28450 Comm: syz.0.43093 Tainted: G W 6.16.0-rc5-syzkaller-00224-g379f604cc3dc #0 PREEMPT(voluntary) [ 3135.693821][T28450] Tainted: [W]=WARN [ 3135.697650][T28450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 3135.707787][T28450] ==================================================================