last executing test programs: 6m5.932226162s ago: executing program 2 (id=87): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f00000003c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x4}}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@nombcache}]}, 0x1, 0x433, &(0x7f0000000e00)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file2\x00', &(0x7f00000000c0), &(0x7f0000000280)=ANY=[], 0xfe37, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x10, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x194, 0x0, &(0x7f0000000780)='GPL\x00', 0x100, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.self_freezing\x00', 0x275a, 0x0) sync_file_range(r1, 0x6, 0x9fd, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00006d2000/0x1000)=nil, 0x1000, 0x100000e, 0x8, 0x1) mlock(&(0x7f0000656000/0x3000)=nil, 0x3000) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x3f, 0xc, &(0x7f0000000340)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="300000003e000701fcfffffffddbdf25047c0000100036800c00020007009300000000000c00"], 0x30}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="2100000000000000000000000000100000"], 0x48) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000002, 0x13, r4, 0x6c0ea000) pidfd_getfd(0xffffffffffffffff, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='ext4_journal_start_reserved\x00', r0}, 0x18) ioprio_set$pid(0x3, 0x0, 0x2007) r5 = creat(&(0x7f0000000240)='./bus\x00', 0xc2) io_setup(0x5, &(0x7f0000000100)=0x0) io_submit(r6, 0x2, &(0x7f0000000200)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x0, r5, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x8, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x2, r5}]) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x40804}, 0x0) 6m3.354083865s ago: executing program 2 (id=100): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) r3 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r3, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000380)={0x43, 0x4, 0x3, 0x3}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) r4 = syz_io_uring_setup(0x4b5, 0x0, &(0x7f0000010080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000b40)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r4, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {0x0}], 0x0, 0x2}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r5, 0x0, 0x80000}, 0x18) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) sendmsg$tipc(r2, &(0x7f0000000400)={&(0x7f00000008c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x4008030) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x4, 0xf, 0xfb, 0x3, 0x40, @mcast2, @private2, 0x7848, 0x7800, 0xf8, 0x800}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x81, 0x20, 0x2, 0x80000000, {{0x1b, 0x4, 0x3, 0x10, 0x6c, 0x68, 0x0, 0x4, 0x2d, 0x0, @private=0xa010100, @multicast2, {[@end, @cipso={0x86, 0x27, 0x1, [{0x5, 0x12, "ec0409694c85a955192e4bbbf5da976e"}, {0x2, 0xf, "64f10ece0a487e490bba3462c1"}]}, @cipso={0x86, 0x2f, 0xdeae9dd3da294dce, [{0x6, 0xb, "f9234d38c4fb85e901"}, {0x1, 0x12, "60b5a7bafe934c25e2627c21c3f60668"}, {0x5, 0xc, "008f95ae9e9c15b2441e"}]}]}}}}}) sendmsg$MPTCP_PM_CMD_SET_FLAGS(r1, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xc0, 0x0, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xc}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x8}, @MPTCP_PM_ATTR_ADDR_REMOTE={0xc, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x97}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x4}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x7}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010100}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x6}]}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x34, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='kfree\x00', r0}, 0x18) socket$kcm(0x21, 0x2, 0x2) 6m2.979465801s ago: executing program 2 (id=103): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f0000000100)={[{@errors_remount}, {}, {@stripe={'stripe', 0x3d, 0x5}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x7}}]}, 0x1, 0x4c0, &(0x7f0000000a00)="$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") r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2400, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x24, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'veth0_to_team\x00', &(0x7f0000000280)=@ethtool_channels={0x3d, 0xffffffff, 0x0, 0x0, 0x4, 0x2, 0x1}}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioprio_set$pid(0x2, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) io_setup(0x2, &(0x7f0000000000)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYRESHEX=r3], &(0x7f0000000400)='syzkaller\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000380)=r8}, 0x20) recvmsg$unix(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000009c0)=""/181, 0xb5}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) shutdown(r7, 0x0) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x4050) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3c*s\xa8rVid:\xc4e', 0x0) epoll_create1(0x0) r10 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r10, &(0x7f0000000080)={0xc000200e}) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001980)={0x9, {"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", 0x1000}}, 0x1006) syz_usb_connect(0x5, 0x24, &(0x7f0000000180)=ANY=[], 0x0) eventfd(0x7) 6m2.192136715s ago: executing program 2 (id=109): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x67, 0x52e, &(0x7f0000000480)="$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") r3 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) r4 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$binfmt_register(r4, &(0x7f0000000440)={0x3a, 'syz2', 0x3a, 'M', 0x3a, 0x0, 0x3a, 'usrjquota=', 0x3a, '', 0x3a, './file2', 0x3a, [0x46]}, 0x32) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, 0x0, 0x0) 6m1.712975816s ago: executing program 2 (id=113): r0 = open(&(0x7f0000000280)='.\x00', 0x40080, 0x1d2) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x65) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000000)="3700000013000318680907070000000f0000ff3f13000000170a001700000000040037000d00030001362564aa58b9a6c011f6bbf44dc4", 0x37}], 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000002c0)=0x1) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000280)={0x0, 0x3, 0x7, 0x0, 0x10040, 0x8f}) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000100)=0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = syz_open_dev$MSR(0x0, 0x0, 0x0) semget$private(0x0, 0x5, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) pread64(r7, 0x0, 0x0, 0x29) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, 0x0, 0x24008800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x18) fcntl$notify(r0, 0x402, 0x5) fcntl$notify(r0, 0x402, 0x8000003d) 6m0.93943633s ago: executing program 2 (id=115): r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESOCT=r4, @ANYRES64=r1, @ANYRES64=r3, @ANYRESHEX=r0], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f00003ef000/0x3000)=nil, 0x3000, 0x400000, 0x3, &(0x7f000082a000/0x400000)=nil) mlock(&(0x7f00007d8000/0x800000)=nil, 0x800000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e88000085000000"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) socket$packet(0x11, 0xa, 0x300) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0xb}, 0x94) socket$packet(0x11, 0xa, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSTI(r8, 0x5412, &(0x7f00000001c0)=0x7f) mq_open(0x0, 0x42, 0x1f0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYRES64], 0x48) kexec_load(0x3e00, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0xff600000, 0x1000000}], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000500)='kfree\x00'}, 0x18) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) 6m0.899073482s ago: executing program 32 (id=115): r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESOCT=r4, @ANYRES64=r1, @ANYRES64=r3, @ANYRESHEX=r0], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f00003ef000/0x3000)=nil, 0x3000, 0x400000, 0x3, &(0x7f000082a000/0x400000)=nil) mlock(&(0x7f00007d8000/0x800000)=nil, 0x800000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e88000085000000"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) socket$packet(0x11, 0xa, 0x300) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0xb}, 0x94) socket$packet(0x11, 0xa, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSTI(r8, 0x5412, &(0x7f00000001c0)=0x7f) mq_open(0x0, 0x42, 0x1f0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYRES64], 0x48) kexec_load(0x3e00, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0xff600000, 0x1000000}], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000500)='kfree\x00'}, 0x18) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) 4m42.792747488s ago: executing program 3 (id=638): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0xfffffffffffefffe}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000300)={[{@minixdf}, {}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@commit={'commit', 0x3d, 0x5}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@noblock_validity}, {@nomblk_io_submit}]}, 0x1, 0x566, &(0x7f00000015c0)="$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") r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='kfree\x00', r4, 0x0, 0x7fffffffffffffff}, 0x18) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000020000000900010073797a30000000002c000000030a01010000000000000000020000000900010073797a30000000000900030073797a32000000003a000000030a03000000000000000000020000000900010073797a30000000000900030073797a32"], 0xa0}}, 0x8040) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f00000000c0)={[0xffffffffffff8518]}, 0x0, 0x0, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x3, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r5, 0x0) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)=@known='system.posix_acl_default\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x5, 0x6}, 0x120, 0x10000, 0x33f8, 0x1, 0x8, 0x20007, 0xb, 0x0, 0x0, 0x0, 0x1800000}, 0x0, 0xffffffffffffffff, r5, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000003800)=@newtaction={0x88c, 0x30, 0x12f, 0x0, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xfffffffd, 0x0, 0xfffffffe, 0xb84, 0x4, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0xff, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x0, 0x0, 0x2000c74, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x100, 0x5, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x100, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffff002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0xffffffff, 0x0, 0x200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0xfffffffc, 0x6, 0x0, 0x0, 0x0, 0xf, 0xf, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x5, 0x1000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffc, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0xfffffffc, 0x1]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xe8d0, 0x101, 0x8, 0x200, 0x3, 0x7f, 0x3, 0xffffffff, 0x3, 0x80000001, 0x8000000b, 0x1, 0xfffff0c2, 0x7, 0xa042, 0xfffffc21, 0xffff7fff, 0x4, 0x4, 0x400, 0x8, 0x7, 0x5d3b2fc3, 0x87f, 0x7ff, 0x5, 0x9, 0x2, 0x1, 0xa0, 0xb, 0x6, 0x2, 0x8, 0x7, 0x1, 0x1, 0x5, 0x1, 0x9, 0x4, 0x1, 0x8, 0x7, 0x8, 0x40000000, 0x5, 0x0, 0x40, 0x1, 0x5, 0x1, 0x9, 0x1ff, 0x0, 0x9, 0x426, 0x5, 0x7fff, 0xffffffff, 0x3a, 0x5, 0x9, 0x3feb, 0x0, 0x5, 0xeb5, 0x1fe, 0x5, 0x8, 0x0, 0x0, 0x7, 0x4, 0x2597, 0x9, 0x7, 0x4, 0xb8, 0xcb, 0xf, 0x0, 0x2, 0x4, 0x0, 0x27d, 0xc2c, 0x6, 0x1, 0x6, 0x4, 0x0, 0x8, 0x9, 0x10001, 0x3, 0x6, 0x2, 0xc, 0x6, 0x9, 0x3, 0x800001c1, 0x3, 0x9, 0x4, 0x3, 0xfffffffa, 0x6, 0x4, 0xa21, 0xffff, 0x3ff, 0x0, 0x8, 0x355a, 0x1, 0x6, 0xffffff60, 0xee, 0x1000, 0x6, 0xfffffffb, 0x2, 0x7, 0x0, 0xffffffff, 0xe0, 0x7f, 0xea50, 0x5, 0x2, 0x1000, 0x8, 0x0, 0x8, 0x1022, 0x7, 0x5, 0xfffffffa, 0x200, 0x7ff, 0xfffffff9, 0xfffffffd, 0x6, 0x1000, 0x8, 0x7fb, 0x81, 0x401, 0xe, 0x0, 0x8, 0x5, 0xfff, 0x1f2, 0x24000, 0x7, 0x100, 0x5, 0x6, 0x7ff, 0x7, 0x1b, 0x3a03, 0x7, 0xffffffff, 0x2, 0x3, 0x5, 0x403, 0x8, 0x5, 0x6, 0x54, 0xfffffffb, 0xfa7, 0x7, 0x60, 0x1, 0x10, 0xcc0b, 0xa, 0x62, 0x8, 0x120000, 0x8, 0x4, 0x1, 0x8001, 0xd, 0x5, 0x5, 0x5c, 0x4, 0x20067bd, 0x3866, 0x9, 0xed1, 0x8, 0x5, 0x3, 0x0, 0x2, 0x2, 0xdf9, 0xb, 0x6, 0xb0c, 0x7, 0x5, 0x5c3b, 0x6, 0xb21, 0x3c, 0xc1c, 0x3, 0x8, 0x3, 0x40000000, 0x2, 0x8, 0x4, 0xfff, 0x80000000, 0x2, 0x3ff, 0x0, 0x3, 0x8, 0x9, 0x6, 0x400, 0x10e, 0x1, 0x101, 0x41a, 0x6, 0x7, 0x6, 0x0, 0x8, 0x3, 0x401, 0xfffffffe, 0x100a, 0x0, 0x0, 0x1, 0xfffffff8, 0x8, 0xf87, 0x1, 0x9, 0x5, 0x9]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0xffff, 0x0, 0x1, 0x9, 0x100, {0x4, 0x2, 0x7, 0x2, 0x8000, 0x3}, {0x8, 0x0, 0x7fff, 0x8, 0x1, 0x100}, 0x2, 0x10, 0xe723}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1, 0x2}}}}]}]}, 0x88c}}, 0xc0) syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) 4m42.49149301s ago: executing program 3 (id=632): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x20000008}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0x10, &(0x7f0000000040)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ldst={0x1, 0x0, 0x4, 0x0, 0x0, 0x30}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001fc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)={0x90, 0x42, 0x200, 0x70bd2c, 0x25dfdbf7, {0x10}, [@generic="9a06a24c7d969737ceb44dfe0bce258b8e4a427beaaadc299ba68f3dea673d7ac551db3715297334b44987dcc9d47739594358ab0635c361b03c8ecf3dd1319e78d8b6bd1d274ef2e5452f848ae29d7e42a6c43c7f0ed9bc5171624aad5206c604ddd7ed2084ad00a3894dd7e66498ad6ef2d36430c783b8dde2"]}, 0x90}, 0x1, 0x0, 0x0, 0x4000045}, 0x810) truncate(&(0x7f0000000900)='./file1\x00', 0x24b9) syslog(0x2, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000100)={{0xc6c, 0x5}, 0x100, './file1\x00'}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000040)={0x7, 'pim6reg\x00', {0x800}, 0x7}) r6 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x9, 0x10, &(0x7f0000000a00)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x7, 0xc5, &(0x7f0000000540)=""/197, 0x41000, 0xe, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f00000007c0)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[r6, r0, 0xffffffffffffffff], &(0x7f0000000840)=[{0x0, 0x2, 0x8, 0x3}, {0x0, 0x4, 0x8}], 0x10, 0x4ae}, 0x94) setresgid(0xee01, 0x0, 0xffffffffffffffff) r7 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r7, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) listen(r7, 0x4) close_range(0xffffffffffffffff, r7, 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) sync() 4m42.301865729s ago: executing program 3 (id=635): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x9000) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) geteuid() socket$nl_audit(0x10, 0x3, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r3, 0xffffffffffffffff, 0x0) 4m42.230935402s ago: executing program 3 (id=636): openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x1e1802, 0x0) socket$rds(0x15, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYRES8=0x0], 0x48) r1 = syz_io_uring_setup(0x2439, &(0x7f0000000380)={0x0, 0x1064, 0x1000, 0x7, 0x40224}, &(0x7f00000006c0)=0x0, &(0x7f00000000c0)=0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22004004, &(0x7f0000000140), 0x81, 0x477, &(0x7f0000000a40)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000002c0)=0x10) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x3800) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000f"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa1", @ANYRES32=r5, @ANYRES64=r0], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000018c0)={&(0x7f00000001c0)='f2fs_readdir\x00', r6, 0x0, 0x4}, 0x18) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x10, 0x0, r1, 0x0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, 0x0, 0x530}, 0x0, 0x1000}) io_uring_enter(r1, 0x47f8, 0x1e43, 0x0, 0x0, 0x0) syz_emit_ethernet(0x82, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb0800450000740000000081069059640101006b08b402005356", @ANYRES32=0x41424344, @ANYBLOB="8c1000ca90781000080a8000000000000fbc080a0000000200000002fe"], 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(0xffffffffffffffff, 0x0, 0x0) fchdir(r7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r9, 0x0, r11, 0x0, 0x8000f28, 0x0) splice(r10, 0x0, r9, 0x0, 0x7f, 0xe) write(r8, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r12 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r12, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x304000, 0x800, 0x0, 0x3}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) 4m41.719124864s ago: executing program 3 (id=643): socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0xd000d, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x94, 0x4}, 0x800, 0x10000, 0x9, 0x1, 0x8, 0x401, 0xb, 0x0, 0x0, 0x0, 0x20800006}, 0x0, 0x1, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth1_to_bridge\x00', 0x0}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000035c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3183000000000000000019000000200001801400020076657468315f766c616e00000000000008000100", @ANYRES32=r3], 0x34}, 0x1, 0x0, 0x0, 0x8800}, 0x40010) r4 = socket$can_j1939(0x1d, 0x2, 0x7) r5 = syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1810714, &(0x7f0000000180)={[{@errors_continue}, {@init_itable_val}, {@minixdf}, {@jqfmt_vfsv0}, {@prjquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x100}}, {@barrier_val={'barrier', 0x3d, 0xb}}, {@errors_remount}, {@auto_da_alloc}, {@noblock_validity}, {@nodiscard}]}, 0x1, 0x475, &(0x7f0000000780)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000001080)={0x7, 0xfff, 0x3, 0x50d, 0xfffffffb}) r7 = socket(0x10, 0x2, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r8, &(0x7f0000000340)={0xa, 0x5, 0x2, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r8, 0x11a, 0x1, &(0x7f0000000480)=@gcm_256={{0x303}, "000200", "e123c5876ff425b1ebe250a8486be34705f4f827ae60ecb65e528248d5552bff", "7e25837b", "15d0db2c77179e1a"}, 0x38) write$binfmt_script(r8, &(0x7f0000000500)={'#! ', './file0'}, 0xb) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r8, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa2, 0x0, 0x0}, &(0x7f0000000040)=0x40) writev(r8, &(0x7f0000000100)=[{&(0x7f0000000a40)="fb", 0xffffff4f}], 0x1) close_range(r7, r8, 0x0) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) setsockopt$SO_J1939_FILTER(r4, 0x6b, 0x1, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r9, 0x0, 0x0, 0x20004041, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="6a0ac4ff000000027110b7000000000095001b00000000"], &(0x7f0000000480)='GPL\x00'}, 0x94) 4m40.995208966s ago: executing program 3 (id=652): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0xfffffffffffefffe}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000300)={[{@minixdf}, {}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@commit={'commit', 0x3d, 0x5}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@noblock_validity}, {@nomblk_io_submit}]}, 0x1, 0x566, &(0x7f00000015c0)="$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") r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='kfree\x00', r4, 0x0, 0x7fffffffffffffff}, 0x18) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000020000000900010073797a30000000002c000000030a01010000000000000000020000000900010073797a30000000000900030073797a32000000003a000000030a03000000000000000000020000000900010073797a30000000000900030073797a32"], 0xa0}}, 0x8040) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f00000000c0)={[0xffffffffffff8518]}, 0x0, 0x0, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x3, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r5, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_SET_DEBUG(r6, 0x227e, &(0x7f0000000100)) 4m40.994857826s ago: executing program 33 (id=652): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0xfffffffffffefffe}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000300)={[{@minixdf}, {}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@commit={'commit', 0x3d, 0x5}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@noblock_validity}, {@nomblk_io_submit}]}, 0x1, 0x566, &(0x7f00000015c0)="$eJzs3c9rHFUcAPDvbJL+1qZQinqQQA9GajdN4o8KgvUiiBYLeq9LMg0lm27JbkoTC20P9uJFiiBiQfwDvHss/gP+FQUtFClBD14is5lNt81ukqYbN3U+H5j2vZnZvPnum+/bNzu7bACFNZL9U4p4OSK+SSIOt20bjHzjyOp+yw+vTWVLEisrn/2ZRJKva+2f5P8fzCsvRcSvX0WcKK1vt764NFupVtP5vD7WmLs8Vl9cOnlxrjKTzqSXJiYnT781OfHuO2/3LNbXz/39/ad3Pzr99fHl736+f+R2EmfiUL6tPY5ncKO9MhIj+XMyFGee2HG8B43tJkm/D4BtGcjzfCiyMeBwDORZD/z/XY+IFaCgEvkPBdWaB7Su7Xt0HfzcePDB6gXQ+vgHV98biX3Na6MDy8ljV0bZ9e5wD9rP2vjljzu3syU2eR/ieg/aA2i5cTMiTg0Orh//knz8275TzTePN/ZkG0V7/YF+upvNf97oNP8prc1/osP852CH3N2OzfO/dL8HzXSVzf/e6zj/XRu6hgfy2gvNOd9QcuFiNT0VES9GxGgM7c3qG93POb18b6Xbtvb5X7Zk7bfmgvlx3B/c+/hjpiuNyrPE3O7BzYhXOs5/k7X+Tzr0f/Z8nNtiG8fSO69227Z5/Dtr5aeI1zr2/6M7WsnG9yfHmufDWOusWO+vW8d+69b+6If9jT/r/wMbxz+ctN+vrT99Gz/u+yfttm275/+e5PNmeU++7mql0Zgfj9iTfLJ+/cSjx7bqrf2z+EePbzz+dTr/90fEF1uM/9bRW1137ff5n8U//VT9//SFex9/+UO39rfW/282S6P5mq2Mf1s9wGd57gAAAAAAAGC3KUXEoUhK5bVyqVQur36+42gcKFVr9caJC7WFS9PR/K7scAyVWne6D7d9HmI8/zxsqz7xRH0yIo5ExLcD+5v18lStOt3v4AEAAAAAAAAAAAAAAAAAAGCXONjl+/+Z3wf6fXTAjvOT31Bcm+Z/L37pCdiVvP5Dccl/KC75D8Ul/6G45D8Ul/yH4pL/UFzyHwAAAAAAAAAAAAAAAAAAAAAAAAAAAHrq3Nmz2bKy/PDaVFafvrK4MFu7cnI6rc+W5xamylO1+cvlmVptppqWp2pzm/29aq12eXwiFq6ONdJ6Y6y+uHR+rrZwqXH+4lxlJj2fDv0nUQEAAAAAAAAAAAAAAAAAAMDzpb64NFupVtN5ha6F92NXHMZOBrhqWw8f3C1RKHQt7NtG5/Z5YAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACANv8GAAD//04mM/E=") r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='kfree\x00', r4, 0x0, 0x7fffffffffffffff}, 0x18) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000020000000900010073797a30000000002c000000030a01010000000000000000020000000900010073797a30000000000900030073797a32000000003a000000030a03000000000000000000020000000900010073797a30000000000900030073797a32"], 0xa0}}, 0x8040) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f00000000c0)={[0xffffffffffff8518]}, 0x0, 0x0, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x3, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r5, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_SET_DEBUG(r6, 0x227e, &(0x7f0000000100)) 2.799966569s ago: executing program 5 (id=5170): r0 = syz_io_uring_setup(0x497, &(0x7f00000000c0)={0x0, 0x7079, 0x400, 0x3, 0x288}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x1, {0x0, r3}}) io_uring_enter(r0, 0x351a, 0x100, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = socket(0xa, 0x5, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) clock_settime(0x0, &(0x7f0000000040)) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r9}, 0x20) keyctl$chown(0x4, 0x0, 0xee01, 0xee00) add_key$keyring(&(0x7f0000000200), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000b315cc000000000000000000000000000000000000000000000000000000000000000000d800dc06020000000100000000007200060000006e22472d1b93f536347ca8c8785c5e371df045f46854a4ebe036dc4b83ad8ae351673a5729f2786504179633e627078571210e66fc366b5435017b746a6bf49fb321e26593658392678df1a64ef1235624619818b7f2fe0a5278f2ccdcd228711a402f46dea40f4df42544034dd53f6ca5ba1a9f62d4d3167f9e5ce05451a8bbfad7cc2dc978f82f3d59f6c1cfdcc4c36e31bec1e5b0d031ad300535ed148cc24c0dbef033c98606b8c6f1ec87e6f96db7f52f11b5b199236f317983b30fc4c83ce2847ae6ed71d8c346831d88ce844be02c"], 0x1f0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r5, 0x89fa, 0x0) socket$inet6(0xa, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000010) sendmsg$nl_xfrm(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="c0020000100063d10000000000000000fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000000000000000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc01000000000000000000000000000000000000330000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000b000000000000000000000000000000ffffffffffffffff000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001600000000020000000000000000000000bf010100636d61632861657329"], 0x2c0}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000300)=""/180}, 0x20) socket$unix(0x1, 0x2, 0x0) 2.695566563s ago: executing program 5 (id=5171): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x400000000008d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) timerfd_create(0x8, 0x80000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 1.291619954s ago: executing program 5 (id=5192): syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x4]}, 0x8, 0x800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x5031, 0xffffffffffffffff, 0xc2dcc000) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = fsopen(&(0x7f00000014c0)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = getpid() r3 = syz_pidfd_open(r2, 0x0) setns(r3, 0x24020000) r4 = syz_pidfd_open(0x0, 0x0) setns(r4, 0x24020000) futex(&(0x7f0000000040)=0x2, 0xb, 0x2, 0x0, &(0x7f0000000100)=0x1, 0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0x6c304000) futex(&(0x7f0000000040)=0x1, 0xd, 0x2, 0x0, 0x0, 0x0) 1.187034219s ago: executing program 0 (id=5196): syz_open_pts(0xffffffffffffffff, 0x58000) socket$tipc(0x1e, 0x0, 0x0) r0 = fsopen(&(0x7f0000000180)='proc\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x1) fchdir(r1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x2100, 0x0) lseek(r2, 0x300, 0x0) getdents(r2, 0x0, 0x58) bpf$PROG_LOAD(0x5, 0x0, 0x0) llistxattr(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000005c0)='./file1\x00', 0x1818e58, &(0x7f0000000140)={[{@errors_remount}, {@grpid}]}, 0x22, 0x63f, &(0x7f0000000d80)="$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") unshare(0x400) 1.15851882s ago: executing program 0 (id=5197): set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r0, 0x400, 0x1) fremovexattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00') syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0xfffffffe, 0x0, 0x0, 0xfffffffc) 1.106767592s ago: executing program 4 (id=5199): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000800000000005e002200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x6}, 0x18) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000040)="1c0000001a009b8a140000003b9b301f00"/28, 0x1c) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = socket$netlink(0x10, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000340)='dvmrp1\x00', 0x10) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r5, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) 1.031411845s ago: executing program 1 (id=5200): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = shmget$private(0x0, 0x2000, 0x100, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000000000/0x2000)=nil, 0x5000) 1.017572566s ago: executing program 4 (id=5201): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0xfffffffffffefffe}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000300)={[{@minixdf}, {}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@commit={'commit', 0x3d, 0x5}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@noblock_validity}, {@nomblk_io_submit}]}, 0x1, 0x566, &(0x7f00000015c0)="$eJzs3c9rHFUcAPDvbJL+1qZQinqQQA9GajdN4o8KgvUiiBYLeq9LMg0lm27JbkoTC20P9uJFiiBiQfwDvHss/gP+FQUtFClBD14is5lNt81ukqYbN3U+H5j2vZnZvPnum+/bNzu7bACFNZL9U4p4OSK+SSIOt20bjHzjyOp+yw+vTWVLEisrn/2ZRJKva+2f5P8fzCsvRcSvX0WcKK1vt764NFupVtP5vD7WmLs8Vl9cOnlxrjKTzqSXJiYnT781OfHuO2/3LNbXz/39/ad3Pzr99fHl736+f+R2EmfiUL6tPY5ncKO9MhIj+XMyFGee2HG8B43tJkm/D4BtGcjzfCiyMeBwDORZD/z/XY+IFaCgEvkPBdWaB7Su7Xt0HfzcePDB6gXQ+vgHV98biX3Na6MDy8ljV0bZ9e5wD9rP2vjljzu3syU2eR/ieg/aA2i5cTMiTg0Orh//knz8275TzTePN/ZkG0V7/YF+upvNf97oNP8prc1/osP852CH3N2OzfO/dL8HzXSVzf/e6zj/XRu6hgfy2gvNOd9QcuFiNT0VES9GxGgM7c3qG93POb18b6Xbtvb5X7Zk7bfmgvlx3B/c+/hjpiuNyrPE3O7BzYhXOs5/k7X+Tzr0f/Z8nNtiG8fSO69227Z5/Dtr5aeI1zr2/6M7WsnG9yfHmufDWOusWO+vW8d+69b+6If9jT/r/wMbxz+ctN+vrT99Gz/u+yfttm275/+e5PNmeU++7mql0Zgfj9iTfLJ+/cSjx7bqrf2z+EePbzz+dTr/90fEF1uM/9bRW1137ff5n8U//VT9//SFex9/+UO39rfW/282S6P5mq2Mf1s9wGd57gAAAAAAAGC3KUXEoUhK5bVyqVQur36+42gcKFVr9caJC7WFS9PR/K7scAyVWne6D7d9HmI8/zxsqz7xRH0yIo5ExLcD+5v18lStOt3v4AEAAAAAAAAAAAAAAAAAAGCXONjl+/+Z3wf6fXTAjvOT31Bcm+Z/L37pCdiVvP5Dccl/KC75D8Ul/6G45D8Ul/yH4pL/UFzyHwAAAAAAAAAAAAAAAAAAAAAAAAAAAHrq3Nmz2bKy/PDaVFafvrK4MFu7cnI6rc+W5xamylO1+cvlmVptppqWp2pzm/29aq12eXwiFq6ONdJ6Y6y+uHR+rrZwqXH+4lxlJj2fDv0nUQEAAAAAAAAAAAAAAAAAAMDzpb64NFupVtN5ha6F92NXHMZOBrhqWw8f3C1RKHQt7NtG5/Z5YAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACANv8GAAD//04mM/E=") r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='kfree\x00', r4, 0x0, 0x7fffffffffffffff}, 0x18) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[], 0xa0}}, 0x8040) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f00000000c0)={[0xffffffffffff8518]}, 0x0, 0x0, 0x8) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x3, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r5, 0x0) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)=@known='system.posix_acl_default\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x5, 0x6}, 0x120, 0x10000, 0x33f8, 0x1, 0x8, 0x20007, 0xb, 0x0, 0x0, 0x0, 0x1800000}, 0x0, 0xffffffffffffffff, r5, 0x2) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000003800)=@newtaction={0x88c, 0x30, 0x12f, 0x0, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xfffffffd, 0x0, 0xfffffffe, 0xb84, 0x4, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0xff, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x0, 0x0, 0x2000c74, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x100, 0x5, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x100, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffff002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0xffffffff, 0x0, 0x200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0xfffffffc, 0x6, 0x0, 0x0, 0x0, 0xf, 0xf, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x5, 0x1000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffc, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0xfffffffc, 0x1]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xe8d0, 0x101, 0x8, 0x200, 0x3, 0x7f, 0x3, 0xffffffff, 0x3, 0x80000001, 0x8000000b, 0x1, 0xfffff0c2, 0x7, 0xa042, 0xfffffc21, 0xffff7fff, 0x4, 0x4, 0x400, 0x8, 0x7, 0x5d3b2fc3, 0x87f, 0x7ff, 0x5, 0x9, 0x2, 0x1, 0xa0, 0xb, 0x6, 0x2, 0x8, 0x7, 0x1, 0x1, 0x5, 0x1, 0x9, 0x4, 0x1, 0x8, 0x7, 0x8, 0x40000000, 0x5, 0x0, 0x40, 0x1, 0x5, 0x1, 0x9, 0x1ff, 0x0, 0x9, 0x426, 0x5, 0x7fff, 0xffffffff, 0x3a, 0x5, 0x9, 0x3feb, 0x0, 0x5, 0xeb5, 0x1fe, 0x5, 0x8, 0x0, 0x0, 0x7, 0x4, 0x2597, 0x9, 0x7, 0x4, 0xb8, 0xcb, 0xf, 0x0, 0x2, 0x4, 0x0, 0x27d, 0xc2c, 0x6, 0x1, 0x6, 0x4, 0x0, 0x8, 0x9, 0x10001, 0x3, 0x6, 0x2, 0xc, 0x6, 0x9, 0x3, 0x800001c1, 0x3, 0x9, 0x4, 0x3, 0xfffffffa, 0x6, 0x4, 0xa21, 0xffff, 0x3ff, 0x0, 0x8, 0x355a, 0x1, 0x6, 0xffffff60, 0xee, 0x1000, 0x6, 0xfffffffb, 0x2, 0x7, 0x0, 0xffffffff, 0xe0, 0x7f, 0xea50, 0x5, 0x2, 0x1000, 0x8, 0x0, 0x8, 0x1022, 0x7, 0x5, 0xfffffffa, 0x200, 0x7ff, 0xfffffff9, 0xfffffffd, 0x6, 0x1000, 0x8, 0x7fb, 0x81, 0x401, 0xe, 0x0, 0x8, 0x5, 0xfff, 0x1f2, 0x24000, 0x7, 0x100, 0x5, 0x6, 0x7ff, 0x7, 0x1b, 0x3a03, 0x7, 0xffffffff, 0x2, 0x3, 0x5, 0x403, 0x8, 0x5, 0x6, 0x54, 0xfffffffb, 0xfa7, 0x7, 0x60, 0x1, 0x10, 0xcc0b, 0xa, 0x62, 0x8, 0x120000, 0x8, 0x4, 0x1, 0x8001, 0xd, 0x5, 0x5, 0x5c, 0x4, 0x20067bd, 0x3866, 0x9, 0xed1, 0x8, 0x5, 0x3, 0x0, 0x2, 0x2, 0xdf9, 0xb, 0x6, 0xb0c, 0x7, 0x5, 0x5c3b, 0x6, 0xb21, 0x3c, 0xc1c, 0x3, 0x8, 0x3, 0x40000000, 0x2, 0x8, 0x4, 0xfff, 0x80000000, 0x2, 0x3ff, 0x0, 0x3, 0x8, 0x9, 0x6, 0x400, 0x10e, 0x1, 0x101, 0x41a, 0x6, 0x7, 0x6, 0x0, 0x8, 0x3, 0x401, 0xfffffffe, 0x100a, 0x0, 0x0, 0x1, 0xfffffff8, 0x8, 0xf87, 0x1, 0x9, 0x5, 0x9]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0xffff, 0x0, 0x1, 0x9, 0x100, {0x4, 0x2, 0x7, 0x2, 0x8000, 0x3}, {0x8, 0x0, 0x7fff, 0x8, 0x1, 0x100}, 0x2, 0x10, 0xe723}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1, 0x2}}}}]}]}, 0x88c}}, 0xc0) syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$tcp_mem(r7, &(0x7f00000001c0)={0x9, 0x20, 0x6, 0x20, 0x3}, 0x48) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f0000000240)=ANY=[], 0x835, 0x0) truncate(&(0x7f0000000100)='./file0/file0\x00', 0x7) 835.830204ms ago: executing program 4 (id=5202): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xb2570000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='sched_switch\x00', r6}, 0xe) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioperm(0x4, 0x1, 0x6) r8 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$eJzs3M9LG2kYwPEnMYkxoslh2WUXFh92L7uXQbP3paEolAYq1pT+gNJRJ23INJFMsKSU2p56Lf0jehCP3oTWf8BLbz310puXQg/1UDol8yNGjdXGH/HH9wPyvvq8T+Z9Z1Sed2Bm4+bLh+WiYxTNukSTKhERkU2RjEQlFAnaqNdPSLtn8u/g5/d/Xr91+2ounx+fUp3ITf+XVdXhkTePngwEw1b7ZT1zd+NT9uP6r+u/b3ybflBytORopVpXU2eqH+rmjG3pXMkpG6qTtmU6lpYqjlXz41U/XrSr8/MNNStzQ6n5muU4alYaWrYaWq9qvdZQ875ZqqhhGDqUEuynsDQ1Zea6TJ494sngmNRqObNPRAZ2RQpLPZkQAADoqaD+b1X70WZJ3039H+tY/y//tVYfvLEyHNT/q4lm/S/SVv/f2/qsbfV/UkSOvf7fXRGdL6774/ih6n+cEc36PxX8/Xqe31ke9TrU/wAAAAAAAAAAAAAAAAAAAAAAnAWbrpt2XTcdtuFXv4gkvSdI/O97PU8cD67/xbb14o7YsIj9YqGwUPDbYMCaiNhiyaik5av3+xBo9hOi3iBtyshbezHIX1wo9HmRXFFKXv6YpCWzM991J67kx8fUtz0/Lqn2/Kyk5ZfO+dmd+fFmm5B//m7LNyQt72alKrbMBU/GhflPx1QvX8vvOP6ANw4AAAAAgPPA0JbW/r2/PW7sjvv7Yz/e2l93vD/g769HO+7vY/JHrFerBgAAAADgYnEaj8umbVu1c9cJV3jQrPC9xnuMiUhkr9ARdMKDn4JTFz/QGYt2NdWRxE9elI6d8LbRXmNksptPdtMihz2Hv716/eXorsX/K8l9VtptJ7HfSuMn9x8IAAAAwEnZKvrDn1zq7YQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALiATuLFcr1eIwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHBafA8AAP//ohEIjg==") bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r7, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000580)}, 0x20) r10 = socket(0xa, 0x3, 0x87) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000040)={'ipvlan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r10, 0x8916, &(0x7f0000000000)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x18, r11}) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001440)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {0xb9}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{0x0, 0x80000001, 0x20000000, 0x81, 0x3ff}, 0xb, 0x2}, [{0x6, 0x7fffffff, 0x9, 0xffffffff, 0x6a3, 0x1}, {0x6, 0x8, 0x3, 0x8, 0x8, 0x1}, {0x364b, 0x612e1579, 0x7, 0x3, 0x6, 0x7}, {0x4, 0x3, 0x2, 0x1ff, 0x7, 0x800003}, {0x2, 0x7, 0x67, 0x43e4dbe5, 0x0, 0x2000000}, {0xffffffff, 0x9, 0x18f, 0x3, 0x80000001}, {0x101, 0xfcb, 0x9, 0x7, 0x1, 0xf4d}, {0x80000001, 0x50000, 0x3, 0xff, 0x10, 0x80000001}, {0x3, 0x4, 0x471, 0x9, 0x4, 0x10}, {0x5, 0x7ff, 0x6, 0xcc6e, 0x3, 0x100}, {0x10001, 0x6, 0x1, 0x400, 0xb0a, 0x9}, {0x89a, 0x327a, 0xffff, 0x9, 0x4, 0x4}, {0xfffffffb, 0x6, 0x8, 0x2, 0xa760, 0x8}, {0x1004, 0x101, 0x5, 0xffff, 0x7}, {0x3, 0x5, 0x2, 0x2, 0x80000001, 0x7}, {0x1, 0x2, 0x3, 0x687, 0x1, 0x2000000}, {0x5, 0x7, 0x28632380, 0x0, 0x401, 0x101}, {0x5, 0xfffffffa, 0xde6, 0x6, 0x1871, 0x16000}, {0x655, 0x965, 0x0, 0xfb40, 0x7d60, 0x6}, {0x3ff, 0x3, 0x9, 0x4, 0x1, 0x14eb6124}, {0x0, 0x5f1b7e47, 0x100, 0x8, 0xea4, 0xe}, {0x1000, 0x6, 0xfffffffe, 0x9, 0x0, 0x80000001}, {0x7, 0x5, 0x5, 0x5, 0x40}, {0x4, 0x2, 0x7, 0x5, 0x2bb, 0x84a3}, {0xff, 0x9, 0x6, 0x5, 0x6, 0x69}, {0x2, 0x1, 0x27, 0x1, 0x6, 0x2}, {0x9, 0x0, 0x1800, 0x3, 0x7fff, 0x3}, {0x1, 0x0, 0x5, 0x6, 0xffffffff, 0xd}, {0x9, 0x6, 0x80000001, 0xa, 0x5, 0x10}, {0xb, 0x7fff, 0xf573, 0xb, 0x0, 0xbf}, {0xfffffffe, 0x2, 0x6, 0x0, 0x20, 0xf1ab}, {0x7fff, 0x80000001, 0xa77b, 0x4, 0x40, 0x9}, {0x3c, 0xe, 0xc9, 0xb1, 0x4, 0x71}, {0x3, 0xbb0f, 0x3, 0x0, 0x7f, 0x4}, {0x7, 0xfff, 0xc7d, 0xfd4, 0x1af3, 0xd}, {0x3, 0x1ec6, 0x3d9, 0x264, 0x5, 0x2}, {0x8, 0x5, 0xfffffffd, 0x9, 0xfffffffe, 0xd}, {0x99, 0x5, 0x30a2, 0x1, 0x3ac0abda, 0xfffffffa}, {0x2e, 0x200, 0xffffff2b, 0x2, 0x3, 0x7}, {0x7, 0xfffff001, 0x8, 0x40, 0x2, 0x8000000}, {0x9, 0x80000001, 0x7ff, 0x388, 0x2, 0x3}, {0x2, 0x400, 0xffffffff, 0xa, 0x4, 0x3aa30000}, {0x8, 0xf, 0x4, 0x6, 0x9}, {0x7, 0x6, 0xc5ec, 0x1, 0x1, 0x2}, {0xfffffb5c, 0x6, 0x4, 0x8, 0x72, 0x1}, {0x3, 0xa9, 0x3, 0x8, 0x6, 0x37}, {0x9, 0x1, 0x1, 0xa, 0x8000, 0x3}, {0x0, 0x6, 0x8, 0xaef, 0x8, 0x1}, {0x1, 0xda3d, 0xfffffff8, 0xfffffffd, 0x6, 0x5}, {0x1, 0xffffffff, 0x1, 0x3e, 0xe, 0x65}, {0x400, 0x5, 0x6, 0x2, 0x500, 0x8}, {0x18, 0xfffffffe, 0xe, 0x7, 0x800, 0x80000}, {0x0, 0xd, 0x8, 0x9, 0xfffffffd, 0x8}, {0x5, 0x7, 0x8, 0x0, 0x9, 0x6}, {0x6, 0x0, 0x2, 0x1, 0x1, 0x6}, {0x5, 0xffff68aa, 0x0, 0x10040, 0x7, 0x9}, {0x8, 0x0, 0x4, 0x0, 0x867, 0x2}, {0x5, 0x7, 0x4, 0x9, 0x7, 0x7}, {0x0, 0x9f1f, 0xffffff01, 0x8, 0x9ea, 0x4}, {0x7ff, 0x2, 0xfff, 0x6, 0xfffffff8, 0x50000}, {0x7f, 0x9, 0x2, 0x6cd, 0x1ff, 0xeaa}, {0x52, 0x6, 0x800, 0x28, 0xfff, 0xa24}, {0x3, 0xa, 0x6, 0x800, 0x3, 0x4942}, {0x1, 0x38f, 0x14, 0x5, 0xffffffff, 0x2}, {0x0, 0x6, 0x3, 0x9, 0xfd6a, 0x3}, {0x1000, 0x8, 0x6, 0xfffffffd, 0x6, 0x3}, {0x10, 0x800, 0xbd, 0xfff, 0x1, 0x7}, {0x6, 0x8, 0x2, 0x6, 0xa4, 0x4f08}, {0xec3a, 0x401, 0x8, 0x1c9, 0x7f, 0xfffffffb}, {0x40, 0x7, 0x7, 0x401, 0xb}, {0x9, 0x800, 0x5, 0xfffffffc, 0x3, 0x8}, {0x101, 0x2, 0xa7f, 0x4, 0xc, 0xfffffffd}, {0x9, 0x63ea, 0xffff8cd9, 0x4, 0x2, 0xfffffffb}, {0x200, 0x4, 0xb, 0x9e2c, 0xe, 0x1000}, {0x9, 0x9, 0x7ff, 0x0, 0x576}, {0x2, 0x9, 0xc, 0x8, 0x2, 0x6}, {0x0, 0x7, 0x4, 0x9, 0x2, 0xa2b7}, {0x7, 0x6, 0x1, 0x5, 0xb, 0x3}, {0x7fff, 0x100, 0x3, 0x8, 0x6, 0xe1920}, {0x4, 0x3b61, 0x2, 0x6891, 0xf, 0x800}, {0x3, 0x3, 0x8, 0x5, 0x240, 0x9}, {0x3, 0x8, 0x4, 0x6, 0x9, 0xb4}, {0x6, 0x7f, 0xff, 0x10, 0x0, 0xc}, {0xc, 0x800, 0x10000, 0x0, 0xfffffffb}, {0x4, 0x8, 0x4, 0x0, 0x31, 0x9}, {0x0, 0x9, 0xcd8, 0x0, 0x7}, {0xd6, 0x448, 0x4, 0x8, 0xb}, {0x10001, 0x21, 0x6, 0x1, 0x6, 0x2000000}, {0xb, 0x2, 0x7, 0x800, 0x4f3e, 0x8}, {0x9, 0x7d, 0x101, 0x1, 0x5f, 0x6}, {0xfffffff9, 0xcf3, 0x9, 0x2, 0x9, 0x2}, {0x8001, 0x1000, 0x8, 0x6, 0x1, 0x84b5}, {0x7, 0xffffff80, 0xcb, 0x784, 0x5, 0xb5ee}, {0x6, 0x0, 0x7, 0xfffffffc, 0x0, 0x2}, {0xa, 0x3, 0x6, 0x3, 0x8, 0x80000000}, {0x8, 0xe, 0x4, 0xffffffff, 0x8, 0xb3}, {0x5, 0x6, 0x400, 0x73, 0x0, 0x4}, {0x3, 0x9, 0x6, 0x6, 0x1000, 0x100}, {0xffff, 0x0, 0x30f0, 0x2, 0x8, 0xffffffff}, {0x8, 0x0, 0x7, 0x5, 0x6, 0xb63}, {0x4, 0xada, 0x6, 0x3, 0x6, 0x75333cdc}, {0x0, 0x6, 0x1, 0xffffffff, 0x4f38, 0x9}, {0x6, 0x3ff, 0xa34, 0x2, 0x7, 0x4}, {0xffff249d, 0x9, 0x9, 0x7ff, 0x7, 0x1}, {0x9fa3, 0x0, 0x3, 0x6, 0x1, 0x9}, {0x6, 0x4, 0x86, 0x8000000, 0x2000008, 0x7fffffff}, {0x10000, 0x4, 0x10, 0xc348, 0x8001, 0x4}, {0x1000, 0x4d77, 0x70, 0x7fffffff, 0x2, 0xd2}, {0x40, 0xffff9014, 0x6c200, 0x5, 0x6, 0x7}, {0xfff, 0x4, 0xbb23, 0x7, 0x2, 0x5}, {0x86, 0x22cd, 0x8, 0x5, 0x7, 0xfffffffa}, {0x5, 0xb, 0x8, 0x8, 0x8, 0x100}, {0x101, 0x400, 0xada, 0x6, 0x80000800, 0x124a}, {0x4, 0xc6e, 0xac, 0x4, 0x65, 0x1}, {0x10001, 0x4, 0x5, 0x4, 0x5}, {0xdd, 0x81, 0x1, 0x5, 0x652a6abe, 0x2}, {0xfffffeff, 0x2, 0x7, 0x4, 0x8000, 0x4}, {0xdb, 0x0, 0x8, 0x10000, 0x8, 0x5}, {0x4, 0x9, 0xb, 0x0, 0x0, 0x20fa}, {0xa, 0x2, 0x3, 0x6, 0x8, 0xb9}, {0xfffff54e, 0xfff, 0xe, 0x1, 0x0, 0x4}, {0xff, 0x9, 0x6, 0x1a5d1526, 0xfffffffd, 0x3}, {0x7fff, 0x1000, 0x324, 0x4, 0x80000000, 0x80000000}, {0xffff, 0x8, 0x8, 0x9, 0xffff, 0x3}, {0x7, 0x1, 0xa2f2, 0xa0, 0x8, 0x8}, {0x6, 0x2, 0x1000, 0x0, 0x2d1a, 0xc00}, {0x5, 0x3, 0x101, 0xe, 0x491f, 0x9}, {0x2, 0x8, 0x3, 0x4, 0x8}], [{0x2, 0x1}, {0x4, 0x1}, {0xa}, {0x3, 0x1}, {}, {0x5}, {0x3}, {0x4}, {0x5}, {0x4, 0x1}, {0x3, 0x1}, {}, {0x5}, {0x6}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {}, {0x1, 0x1}, {0x3, 0x1}, {0x1}, {0x5, 0x1}, {0x4}, {0x5}, {0x4}, {0x3}, {0x3}, {}, {0x4}, {0x5, 0x2}, {0x4}, {0x3}, {0x0, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x4}, {0x0, 0x1}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3}, {0x5}, {0x2, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3}, {0x5}, {0x4}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {0x4}, {0x1, 0x1}, {0x5}, {0x3}, {}, {}, {}, {0x3, 0x1}, {0x0, 0x5f52890cc5ecaef4}, {0x1, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x2}, {0x0, 0x1}, {}, {}, {}, {0x3}, {}, {0x4}, {0x4}, {0x4, 0x1}, {0x5, 0x1}, {}, {0x4, 0x1}, {0x2}, {0x1, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x7}, {0x2, 0x1}, {0x0, 0x3}, {0x0, 0x1}, {0x5, 0x1}, {}, {0x0, 0x1}, {0x2}, {0x1, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1}, {}, {0x2}, {0x5, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x2, 0x6d8294d27eb69e37}, {0x3}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x2}, {0x4}, {0x0, 0x1}, {0x2}, {0x5}, {0x4, 0x1}, {0x4}, {0x3, 0x1}, {0x3}, {0x1}, {}, {0x5}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {0x1, 0x1}], 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) pipe2$watch_queue(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000780)={0x6, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000640)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r9}}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x6}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @exit, @map_val={0x18, 0x9, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x80000000}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}], &(0x7f00000006c0)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x6, '\x00', r11, 0x1b, r13, 0x8, &(0x7f0000000740)={0x6, 0x5}, 0x8, 0x10, 0x0, 0x0, r14, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) sendmmsg$inet6(r0, &(0x7f0000000480)=[{{&(0x7f0000001140)={0xa, 0x5e21, 0x7, @loopback, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x002\x00'/32, @ANYRES32=0x0, @ANYBLOB="0000000014"], 0x40}}], 0x1, 0x44951) 583.563145ms ago: executing program 6 (id=5203): r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {}, {0x8, 0x4}}, [@filter_kind_options=@f_flow={{0x9}, {0x14, 0x2, [@TCA_FLOW_MODE={0x8, 0x2, 0x1}, @TCA_FLOW_KEYS={0x8, 0x1, 0x15625}]}}]}, 0x44}}, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r5) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) setsockopt$sock_attach_bpf(r4, 0x107, 0xf, &(0x7f0000000600), 0x56) sendmsg$kcm(r4, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x0, r6, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="27030200590214000600002fb96dbcf706e10500000086ddffff1144ee163cd4b8bf4a31accb", 0x26}], 0x1}, 0x4) 555.220706ms ago: executing program 6 (id=5204): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x11, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000010240)={0x0, 0x0, &(0x7f0000010200)={0x0}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) personality(0xfe47fef9f5ff7379) 528.098817ms ago: executing program 6 (id=5205): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001780)={0x0, 0x2, 0x313b, 0x1ff}, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@delchain={0x214, 0x65, 0x0, 0x70bd27, 0x0, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0x4}, {0x0, 0xa}}, [@TCA_CHAIN={0x8}, @TCA_CHAIN={0x8, 0xb, 0x89f}, @filter_kind_options=@f_u32={{0x8}, {0x1d8, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x2, 0x7, 0x2, 0x0, 0x7, 0xd, 0x94, 0x2}}, @TCA_U32_ACT={0x1c0, 0x7, [@m_mirred={0xf8, 0x6, 0x0, 0x0, {{0xb}, {0x84, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x40, 0x1, 0x10000000, 0x8, 0x9}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x3, 0xa612, 0x7, 0x5, 0x465}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x600, 0x800, 0x5, 0xd, 0x10001}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7, 0xd7f, 0x4, 0x101, 0xf2ee}, 0x4}}]}, {0x49, 0x6, "b8083961885b543789ad967454f0db2b480bb18feb380df604b82889ca7f43b1572a3ed1870ab968575007960e243939a71fb85c511e100be21361c496ca0ad578b0881a24"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_ife={0x40, 0x1a, 0x0, 0x0, {{0x8}, {0x4}, {0x15, 0x6, "59b69513e97e708c0dc836f724775dbb59"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_bpf={0x84, 0x13, 0x0, 0x0, {{0x8}, {0x4}, {0x59, 0x6, "f7204babd5daeab10b573aa451e156f6f0d6887e92a73192ba8e9f6ab586667d0dd075dea60e87e8effe0516db769010ea83aacfe8da532ff1e76f97da964c87eabc9f0f0cc50af71b66db9de0491f2ad72c3c10f5"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3}}}}]}]}}]}, 0x214}, 0x1, 0x0, 0x0, 0x91}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0xf, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000002040), 0xc2001, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ioctl$SNAPSHOT_FREE(r1, 0x3305) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000008000000000018000380140003801000018004000300080001"], 0x44}}, 0x20008000) r5 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8cffffffffffffff}, 0x3b35}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) sendto(0xffffffffffffffff, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 482.988209ms ago: executing program 5 (id=5206): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x102, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xb}, {0xffff, 0xffff}, {0x7, 0xfff3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x100, 0x7, 0x6361, 0x4, 0xc9, 0x6}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newqdisc={0x30, 0x24, 0x4ee4e6a52ff56541, 0x70b923, 0x80000, {0x0, 0x0, 0x0, r4, {0x0, 0xd}, {0xb, 0xb}, {0xa, 0xffeb}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4010865}, 0x4008000) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r7 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r7, 0x0, 0x0, 0x40, &(0x7f00000001c0)={0x11, 0x86dd, r6, 0x1, 0x64, 0x6, @random="df00"}, 0x14) 482.337829ms ago: executing program 5 (id=5207): r0 = syz_io_uring_setup(0x497, &(0x7f00000000c0)={0x0, 0x7079, 0x400, 0x3, 0x288}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x1, {0x0, r3}}) io_uring_enter(r0, 0x351a, 0x100, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = socket(0xa, 0x5, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) clock_settime(0x0, &(0x7f0000000040)) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r9}, 0x20) keyctl$chown(0x4, 0x0, 0xee01, 0xee00) add_key$keyring(&(0x7f0000000200), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1f0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r5, 0x89fa, &(0x7f0000000480)={'sit0\x00', 0x0}) socket$inet6(0xa, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000010) sendmsg$nl_xfrm(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="c0020000100063d10000000000000000fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000000000000000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc01000000000000000000000000000000000000330000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000b000000000000000000000000000000ffffffffffffffff000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001600000000020000000000000000000000bf010100636d61632861657329"], 0x2c0}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000300)=""/180}, 0x20) socket$unix(0x1, 0x2, 0x0) 481.851659ms ago: executing program 6 (id=5208): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x22, &(0x7f0000000400)={[{@oldalloc}, {@minixdf}, {@norecovery}, {@nojournal_checksum}, {@journal_dev={'journal_dev', 0x3d, 0x3}}, {@auto_da_alloc}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x61, 0x35, 0x61, 0x30, 0x5e, 0x4, 0x38], 0x2d, [0x31, 0x35, 0x35, 0x6f], 0x2d, [0x38, 0x63, 0x35, 0x38], 0x2d, [0x31, 0x32, 0x63, 0x38], 0x2d, [0x0, 0x65, 0x35, 0x63, 0x31, 0x37, 0x34, 0x54]}}}, {@measure}]}, 0xfe, 0x483, &(0x7f0000000dc0)="$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") bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r1], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) readv(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="070000000400000008020000d90000000000", @ANYBLOB="0000000000090100000000000000b2e1ab0f4cb0eb4e8030e74c21818b91d9d4af5d5c0085911d90eeb795290e57c76b4ea200000000000100662d0d4911f232f922820c6bb6351f2572d1a878df6c99f2e7ca77fd508add302631a267b9ac26384a6f8af84b78cd168e000000000000000000005ae7c6c5f0802835c5b69b06847337bc50ea863fe48bbfd155537947793e48cc5f128016ecbf5d7a6ad8c7", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000010000000000000000"], 0x50) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x189182, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_RATE_SET(0xffffffffffffffff, 0x0, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x9}) 427.634392ms ago: executing program 5 (id=5209): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) lsm_get_self_attr(0x66, &(0x7f0000000380)={0x0, 0x0, 0x6c, 0x4c, ""/76}, &(0x7f0000000400)=0x6c, 0x0) 427.331662ms ago: executing program 6 (id=5210): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}}, 0x40004) recvmmsg(r6, &(0x7f0000005140)=[{{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f00000052c0)=""/235, 0xeb}, {&(0x7f0000003080)=""/4096, 0x1000}], 0x3}, 0x3}], 0x1b00, 0x0, 0x0) 337.815655ms ago: executing program 0 (id=5211): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x102, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xb}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x28, 0x2, {{0x100, 0x7, 0x6361, 0x5, 0xffffffed, 0x6}, [@TCA_NETEM_LATENCY64={0xc, 0xa, 0x6}]}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x170b923, 0x80000, {0x0, 0x0, 0x0, r5, {0x0, 0xd}, {0xb, 0xb}, {0xa, 0xb}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_MAX_RATE={0x8, 0x7, 0x9}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x2001c061}, 0x4008000) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmmsg$inet(r1, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4ea1, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @dev={0xac, 0x14, 0x14, 0x41}, @rand_addr=0x64010102}}}], 0x20}}], 0x1, 0x0) 291.035407ms ago: executing program 0 (id=5212): bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x7, 0x4, 0x200, 0x21db}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="796100000000000000047e"], 0x14}}, 0x4000054) 241.74498ms ago: executing program 6 (id=5213): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7f, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) syz_open_procfs(r0, &(0x7f0000000000)='net/xfrm_stat\x00') 241.50077ms ago: executing program 1 (id=5214): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1, 0x0, 0x7}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000200), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$llc(r3, 0x0, 0x0) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000380), r2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000d40)={0x0, 0x300, &(0x7f0000000d00)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c020000", @ANYRES16=r5, @ANYBLOB="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", @ANYRES32=r6], 0x22c}}, 0x0) 241.16167ms ago: executing program 0 (id=5215): mmap(&(0x7f0000188000/0x3000)=nil, 0x3000, 0x3, 0x8031, 0xffffffffffffffff, 0xd6dac000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) ioperm(0x2, 0x7ff, 0x5c0c) timer_settime(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r3 = socket(0x10, 0x803, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x5}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001300)=@newtfilter={0xd0, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r5, {0xf}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0xa4, 0x2, [@TCA_U32_SEL={0x24, 0x5, {0x1, 0x1, 0x3, 0x1, 0x4, 0x102, 0x6, 0x7ffffffa, [{0x0, 0x53, 0xa9, 0x1}]}}, @TCA_U32_LINK={0x8}, @TCA_U32_SEL={0x74, 0x5, {0x10, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1000, 0xe, 0xfffff000, 0x9f6}, {0xdeb2, 0x3, 0x6, 0x3}, {0x9, 0x7, 0x40, 0x80}, {0x3, 0xde5, 0x1, 0xbd}, {0x7, 0xe22, 0x9, 0x5cf4}, {0x6, 0x0, 0x2, 0x1}]}}]}}]}, 0xd0}}, 0x24040084) 170.351443ms ago: executing program 1 (id=5216): getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={r0, 0x2}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={r0, @in={{0x2, 0x4e21, @empty}}, 0x4, 0x5}, &(0x7f0000000500)=0x90) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x1}, 0x50) close(0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r2], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000300)={[{@delalloc}, {@data_err_abort}, {@data_err_abort}, {@usrquota}, {@data_err_ignore}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@oldalloc}, {@grpquota}, {@noload}, {@sysvgroups}, {@oldalloc}, {@dioread_nolock}]}, 0x1, 0x565, &(0x7f00000007c0)="$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") r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x4, 0x28}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000008000000018120000", @ANYRES32=r6, @ANYBLOB], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7, 0x0, 0x7fffffffffffffff}, 0x18) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000240)={0x0, 0xc3, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000007040)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0xd}, 0x2000, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0x1, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r10, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)={0x2c, 0x1, 0x1, 0x301, 0x0, 0x0, {0x1}, [@CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x1ff}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1400}, @CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0xd0c}]}, 0x2c}}, 0x400c0) syz_emit_ethernet(0x7e, &(0x7f00000003c0)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x33, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010100, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x3, 0x24, 0x0, {0x15, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @private, @local, {[@cipso={0x86, 0x2a, 0x0, [{0x0, 0xd, "5e000000ff000000000000"}, {0x5, 0x5, "4eb8a6"}, {0x5, 0x12, "9606053d0006ff00800000b61af93a93"}]}, @lsrr={0x83, 0x13, 0x0, [@dev, @loopback, @loopback, @multicast2]}]}}}}}}}, 0x0) process_mrelease(0xffffffffffffffff, 0x0) 170.115582ms ago: executing program 0 (id=5217): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, 0x0, 0x0) timerfd_settime(r1, 0x2, &(0x7f0000000340), 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r3, &(0x7f0000004200)='t', 0x1) sendfile(r3, r2, 0x0, 0x3ffff) sendfile(r3, r2, 0x0, 0x7ffff000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) 169.717313ms ago: executing program 4 (id=5218): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, 0x0, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e25, 0x10001, @mcast2, 0xb}}}, 0x30) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r4, &(0x7f00000002c0), 0x2, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) write$UHID_CREATE2(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) syz_open_dev$hidraw(&(0x7f0000000000), 0x0, 0x81) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r6, 0xffffffffffffffff, 0x0) 140.850584ms ago: executing program 1 (id=5219): r0 = syz_io_uring_setup(0x497, &(0x7f00000000c0)={0x0, 0x7079, 0x400, 0x3, 0x288}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x1, {0x0, r3}}) io_uring_enter(r0, 0x351a, 0x100, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = socket(0xa, 0x5, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) clock_settime(0x0, &(0x7f0000000040)) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r9}, 0x20) keyctl$chown(0x4, 0x0, 0xee01, 0xee00) add_key$keyring(&(0x7f0000000200), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1f0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r5, 0x89fa, &(0x7f0000000480)={'sit0\x00', 0x0}) socket$inet6(0xa, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000010) sendmsg$nl_xfrm(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="c0020000100063d10000000000000000fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000000000000000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc01000000000000000000000000000000000000330000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000b000000000000000000000000000000ffffffffffffffff000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001600000000020000000000000000000000bf010100636d61632861657329"], 0x2c0}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000300)=""/180}, 0x20) socket$unix(0x1, 0x2, 0x0) 71.484847ms ago: executing program 4 (id=5220): futex(0x0, 0x1, 0x800001, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x2, &(0x7f0000ffd000/0x1000)=nil) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) set_mempolicy_home_node(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x553, &(0x7f0000001080)="$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") setxattr(0x0, 0x0, 0x0, 0x0, 0x1) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) move_pages(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000000), 0x0) fsetxattr(r1, 0x0, 0x0, 0x0, 0x1) 70.870967ms ago: executing program 1 (id=5221): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000a000000290000", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r1, &(0x7f0000000140)=0x92, r1, &(0x7f0000000200)=0x4000000000, 0xc, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="b8000000190001000000001300000000e00000020000000000200000000000000000000000000000000002000000000000000000000000000a"], 0xb8}}, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x1, 0x6, "fbddf0", 0x8, 0x3a, 0xff, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast2, {[], @echo_reply={0x81, 0x0, 0x0, 0x2002, 0x4}}}}}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet_sctp(0x2, 0x5, 0x84) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x4e24, @private=0xa010100}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) sendmsg$inet_sctp(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="d8", 0x1}], 0x1, &(0x7f00000000c0)=[@sndinfo={0x20, 0x84, 0x2, {0xa, 0x4, 0x28, 0x200000b, r6}}], 0x20, 0x2400e044}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000002c0)={r6, 0x4d, "4f7c155a8215bc62734451d3f50f7058701bab5e48207015bce8a5c51d303e364bf156fbd716a44520f2c53d2282b41535ea4070a0130e149444f7f43c016898aeae01e08d1f2d787ac21a8c34"}, &(0x7f0000000340)=0x55) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b8000000190001000000000000000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000a00000029000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000900000000000000000000000000000000000000000000000200000000000000ffffffffffffffff0000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff0700"/111], 0xb8}, 0x1, 0x0, 0x0, 0x20008800}, 0x10) 53.297058ms ago: executing program 1 (id=5222): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) ioctl$sock_SIOCBRDELBR(r4, 0x89a2, &(0x7f0000000000)='bridge0\x00') 0s ago: executing program 4 (id=5223): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socket$xdp(0x2c, 0x3, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) epoll_create1(0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = dup(r4) write$UHID_INPUT(r5, &(0x7f0000001040)={0xfc, {"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", 0x1000}}, 0x1006) kernel console output (not intermixed with test programs): 4-fs error (device loop6): ext4_orphan_get:1392: inode #15: comm syz.6.3079: iget: bad i_size value: 38620345925642 [ 295.068945][T13157] EXT4-fs error (device loop6): ext4_orphan_get:1397: comm syz.6.3079: couldn't read orphan inode 15 (err -117) [ 295.082114][T13157] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 295.122181][T13157] EXT4-fs error (device loop6): ext4_validate_block_bitmap:432: comm syz.6.3079: bg 0: block 5: invalid block bitmap [ 295.135032][T13157] EXT4-fs (loop6): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 295.147255][T13157] EXT4-fs (loop6): This should not happen!! Data will be lost [ 295.147255][T13157] [ 295.157180][T13157] EXT4-fs (loop6): Total free blocks count 0 [ 295.163370][T13157] EXT4-fs (loop6): Free/Dirty block details [ 295.169457][T13157] EXT4-fs (loop6): free_blocks=0 [ 295.174550][T13157] EXT4-fs (loop6): dirty_blocks=1 [ 295.179614][T13157] EXT4-fs (loop6): Block reservation details [ 295.185671][T13157] EXT4-fs (loop6): i_reserved_data_blocks=1 [ 295.210115][ T6096] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 295.253522][T13175] netlink: 16 bytes leftover after parsing attributes in process `syz.6.3086'. [ 295.314820][T13188] loop6: detected capacity change from 0 to 1024 [ 295.323076][T13188] EXT4-fs: Ignoring removed nomblk_io_submit option [ 295.351323][T13188] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 295.374241][T13188] netlink: 14 bytes leftover after parsing attributes in process `syz.6.3093'. [ 295.756582][T13259] netlink: 'syz.0.3122': attribute type 4 has an invalid length. [ 295.952824][T13286] netdevsim netdevsim5 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 296.001556][T13286] netdevsim netdevsim5 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 296.048010][T13286] netdevsim netdevsim5 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 296.063781][T13300] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 296.094680][T13286] netdevsim netdevsim5 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 296.156397][ T1891] netdevsim netdevsim5 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 296.168847][ T1891] netdevsim netdevsim5 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 296.185977][T11617] netdevsim netdevsim5 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 296.195458][T11617] netdevsim netdevsim5 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 296.219036][ T6096] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 296.348612][T13325] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 296.386193][T13312] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3143'. [ 296.575435][T13333] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 297.184648][T13361] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 297.205342][T13365] loop6: detected capacity change from 0 to 1024 [ 297.229878][T13365] EXT4-fs: Ignoring removed orlov option [ 297.241847][T13365] EXT4-fs (loop6): stripe (2) is not aligned with cluster size (16), stripe is disabled [ 297.257454][T13365] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 297.271616][T13365] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 297.460425][T13383] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 297.615383][T13389] __nla_validate_parse: 2 callbacks suppressed [ 297.615397][T13389] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3174'. [ 297.632711][T13398] loop6: detected capacity change from 0 to 1024 [ 297.639764][T13398] EXT4-fs: Ignoring removed nomblk_io_submit option [ 297.659241][T13398] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 297.681871][T13398] netlink: 14 bytes leftover after parsing attributes in process `syz.6.3177'. [ 297.882132][T13421] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 297.938340][T13423] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 298.118080][T13430] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3188'. [ 298.181275][T13438] netlink: 14 bytes leftover after parsing attributes in process `syz.0.3193'. [ 298.534475][ T6096] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 298.837406][ T29] kauditd_printk_skb: 1267 callbacks suppressed [ 298.837428][ T29] audit: type=1326 audit(306.600:48239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13453 comm="syz.1.3198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 298.876302][ T29] audit: type=1326 audit(306.600:48240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13453 comm="syz.1.3198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 298.899402][ T29] audit: type=1326 audit(306.600:48241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13453 comm="syz.1.3198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 298.909730][T13454] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 298.922441][ T29] audit: type=1326 audit(306.600:48242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13453 comm="syz.1.3198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 298.922493][ T29] audit: type=1326 audit(306.600:48243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13453 comm="syz.1.3198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 298.922589][ T29] audit: type=1326 audit(306.600:48244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13453 comm="syz.1.3198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 298.922659][ T29] audit: type=1326 audit(306.600:48245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13453 comm="syz.1.3198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 298.922697][ T29] audit: type=1326 audit(306.600:48246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13453 comm="syz.1.3198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 298.922730][ T29] audit: type=1326 audit(306.600:48247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13453 comm="syz.1.3198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 298.922806][ T29] audit: type=1326 audit(306.600:48248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13453 comm="syz.1.3198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 299.270290][T13484] xt_CT: You must specify a L4 protocol and not use inversions on it [ 299.315088][T13489] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 299.434915][T13501] netlink: 14 bytes leftover after parsing attributes in process `syz.0.3219'. [ 299.471385][T13488] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3212'. [ 299.478512][T13473] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3205'. [ 299.565867][T13509] netlink: 14 bytes leftover after parsing attributes in process `syz.5.3221'. [ 299.834942][T13533] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3228'. [ 299.844012][T13533] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3228'. [ 300.190137][T13563] smc: net device bond0 applied user defined pnetid SYZ0 [ 300.200628][T13563] smc: net device bond0 erased user defined pnetid SYZ0 [ 300.260883][T13572] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 301.130689][T13603] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 301.294195][T13619] loop6: detected capacity change from 0 to 1024 [ 301.301392][T13619] EXT4-fs: Ignoring removed nomblk_io_submit option [ 301.380539][T13619] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 301.874636][T13689] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 302.163465][ T6096] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 302.210841][T13719] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 302.540593][T13757] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 302.722067][T13777] __nla_validate_parse: 12 callbacks suppressed [ 302.722089][T13777] netlink: 14 bytes leftover after parsing attributes in process `syz.4.3326'. [ 302.792754][T13781] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 302.888310][T13805] netdevsim netdevsim5 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 302.933198][T13805] netdevsim netdevsim5 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 302.997146][T13805] netdevsim netdevsim5 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 303.052231][T13805] netdevsim netdevsim5 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 303.069751][T13828] bridge0: port 1(gretap0) entered blocking state [ 303.077511][T13828] bridge0: port 1(gretap0) entered disabled state [ 303.086617][T13828] gretap0: entered allmulticast mode [ 303.092757][T13828] gretap0: entered promiscuous mode [ 303.102086][T13828] gretap0: left allmulticast mode [ 303.107188][T13828] gretap0: left promiscuous mode [ 303.112312][T13828] bridge0: port 1(gretap0) entered disabled state [ 303.140961][T13830] wg1 speed is unknown, defaulting to 1000 [ 303.149927][T11640] netdevsim netdevsim5 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 303.158326][T13830] lo speed is unknown, defaulting to 1000 [ 303.168329][T11640] netdevsim netdevsim5 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 303.189796][T11640] netdevsim netdevsim5 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 303.220454][T11640] netdevsim netdevsim5 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 303.264323][T13830] geneve0 speed is unknown, defaulting to 1000 [ 303.269782][T13821] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3344'. [ 303.340605][T13830] lo speed is unknown, defaulting to 1000 [ 303.438090][T13842] netlink: 'syz.5.3353': attribute type 10 has an invalid length. [ 303.472025][T13842] netlink: 'syz.5.3353': attribute type 10 has an invalid length. [ 303.480063][T13842] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3353'. [ 303.673370][ T29] kauditd_printk_skb: 1224 callbacks suppressed [ 303.673385][ T29] audit: type=1400 audit(311.669:49473): avc: denied { mount } for pid=13862 comm="syz.6.3361" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 303.940288][ T29] audit: type=1400 audit(311.711:49474): avc: denied { read } for pid=13858 comm="syz.1.3359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 303.960297][ T29] audit: type=1400 audit(311.722:49475): avc: denied { mounton } for pid=13862 comm="syz.6.3361" path="/466/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 303.983088][ T29] audit: type=1400 audit(311.732:49476): avc: denied { create } for pid=13860 comm="syz.5.3360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 304.003154][ T29] audit: type=1400 audit(311.732:49477): avc: denied { mount } for pid=13862 comm="syz.6.3361" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 304.024680][ T29] audit: type=1400 audit(311.732:49478): avc: denied { unmount } for pid=13862 comm="syz.6.3361" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 304.045261][ T29] audit: type=1326 audit(311.753:49479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13860 comm="syz.5.3360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 304.068357][ T29] audit: type=1326 audit(311.753:49480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13860 comm="syz.5.3360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 304.092413][ T29] audit: type=1326 audit(311.753:49481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13860 comm="syz.5.3360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=47 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 304.116468][ T29] audit: type=1400 audit(311.753:49482): avc: denied { read } for pid=13860 comm="syz.5.3360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 304.149085][T13869] netlink: 16 bytes leftover after parsing attributes in process `syz.6.3363'. [ 304.230283][T13874] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 304.449758][T13893] netlink: 14 bytes leftover after parsing attributes in process `syz.4.3373'. [ 304.649651][T13902] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3377'. [ 304.742933][T13912] loop6: detected capacity change from 0 to 128 [ 305.188846][T13917] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 305.557850][T13944] netlink: 'syz.6.3391': attribute type 10 has an invalid length. [ 305.564285][T13940] netlink: 14 bytes leftover after parsing attributes in process `syz.5.3390'. [ 305.583612][T13944] team0 (unregistering): Port device team_slave_0 removed [ 305.601773][T13944] team0 (unregistering): Port device team_slave_1 removed [ 305.626995][T13948] netlink: 14 bytes leftover after parsing attributes in process `syz.4.3394'. [ 305.937465][T13968] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 306.158272][T13983] lo: entered allmulticast mode [ 306.177049][T13966] netlink: 16 bytes leftover after parsing attributes in process `syz.6.3400'. [ 306.671542][T14001] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3415'. [ 306.799608][T14048] wg1 speed is unknown, defaulting to 1000 [ 306.814548][T14048] lo speed is unknown, defaulting to 1000 [ 306.905423][T14048] geneve0 speed is unknown, defaulting to 1000 [ 306.951661][T14068] loop6: detected capacity change from 0 to 1024 [ 306.965449][T14068] EXT4-fs: Ignoring removed nomblk_io_submit option [ 307.030549][T14048] lo speed is unknown, defaulting to 1000 [ 307.071712][T14068] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 307.574238][T14105] __nla_validate_parse: 3 callbacks suppressed [ 307.574253][T14105] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3434'. [ 307.618651][T14124] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3437'. [ 307.975705][ T6096] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 307.986767][T14153] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 308.173828][T14167] loop6: detected capacity change from 0 to 1024 [ 308.181873][T14167] EXT4-fs: Ignoring removed nomblk_io_submit option [ 308.201836][T14167] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 308.235940][T14174] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 308.252471][T14167] netlink: 14 bytes leftover after parsing attributes in process `syz.6.3443'. [ 308.618347][ T29] kauditd_printk_skb: 1001 callbacks suppressed [ 308.618366][ T29] audit: type=1326 audit(316.848:50484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14188 comm="syz.5.3450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 308.647878][ T29] audit: type=1326 audit(316.848:50485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14188 comm="syz.5.3450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 308.671031][ T29] audit: type=1326 audit(316.848:50486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14188 comm="syz.5.3450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 308.694013][ T29] audit: type=1326 audit(316.848:50487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14188 comm="syz.5.3450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 308.717136][ T29] audit: type=1326 audit(316.848:50488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14188 comm="syz.5.3450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 308.740157][ T29] audit: type=1326 audit(316.848:50489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14188 comm="syz.5.3450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 308.776459][ T29] audit: type=1326 audit(317.027:50490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14191 comm="syz.5.3450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f888d142005 code=0x7ffc0000 [ 308.899695][ T6096] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 308.912214][ T29] audit: type=1326 audit(317.174:50491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14191 comm="syz.5.3450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 308.936356][ T29] audit: type=1326 audit(317.174:50492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14188 comm="syz.5.3450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=96 compat=0 ip=0xffffffffff600000 code=0x7ffc0000 [ 308.960618][ T29] audit: type=1326 audit(317.174:50493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14188 comm="syz.5.3450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 309.014227][T14200] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3451'. [ 309.179022][T14237] loop6: detected capacity change from 0 to 1024 [ 309.189633][T14238] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 309.252233][T14237] EXT4-fs: Ignoring removed nomblk_io_submit option [ 309.286471][ T1891] netdevsim netdevsim4 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 309.305508][ T1891] netdevsim netdevsim4 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 309.314236][ T1891] netdevsim netdevsim4 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 309.333427][ T1891] netdevsim netdevsim4 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 309.353143][T14237] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 309.495705][ T6096] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 309.664939][T14280] netlink: 'syz.0.3468': attribute type 39 has an invalid length. [ 309.739415][T14284] loop6: detected capacity change from 0 to 128 [ 310.134915][T14292] netlink: 96 bytes leftover after parsing attributes in process `syz.1.3472'. [ 310.763435][T14332] netlink: 96 bytes leftover after parsing attributes in process `syz.1.3486'. [ 310.828942][T14338] netlink: 'syz.1.3489': attribute type 7 has an invalid length. [ 310.836882][T14338] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3489'. [ 311.239669][T14357] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 311.363975][T14364] ªªªªªª: renamed from vlan0 [ 311.537111][T14367] netlink: 14 bytes leftover after parsing attributes in process `syz.1.3502'. [ 311.852796][T14383] tipc: Enabling of bearer rejected, failed to enable media [ 311.941520][T14393] netlink: 96 bytes leftover after parsing attributes in process `syz.0.3510'. [ 311.966615][T14391] loop6: detected capacity change from 0 to 128 [ 312.006875][T14400] netlink: 14 bytes leftover after parsing attributes in process `syz.5.3512'. [ 312.195269][T14398] Set syz1 is full, maxelem 65536 reached [ 312.275244][T14407] wg1 speed is unknown, defaulting to 1000 [ 312.281893][T14407] lo speed is unknown, defaulting to 1000 [ 312.320862][T14407] geneve0 speed is unknown, defaulting to 1000 [ 312.398140][T14407] lo speed is unknown, defaulting to 1000 [ 312.955401][T14423] loop6: detected capacity change from 0 to 1024 [ 312.962306][T14423] EXT4-fs: Ignoring removed oldalloc option [ 312.968984][T14423] EXT4-fs: Ignoring removed oldalloc option [ 313.059074][T14423] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 313.195885][T14456] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3532'. [ 313.205975][T14456] netlink: 348 bytes leftover after parsing attributes in process `syz.5.3532'. [ 313.216123][T14456] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3532'. [ 313.226036][T14456] netlink: 348 bytes leftover after parsing attributes in process `syz.5.3532'. [ 313.268634][T14456] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3532'. [ 313.288480][T14457] netlink: 14 bytes leftover after parsing attributes in process `syz.4.3533'. [ 313.345954][T14469] atomic_op ffff88816222c128 conn xmit_atomic 0000000000000000 [ 313.373991][ T6096] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 313.405040][T14474] atomic_op ffff8881633d4528 conn xmit_atomic 0000000000000000 [ 313.411858][T14476] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3541'. [ 313.435089][T14476] macvtap0: entered promiscuous mode [ 313.441581][T14476] erspan0: entered promiscuous mode [ 313.446878][T14476] macvtap0: entered allmulticast mode [ 313.453655][T14476] erspan0: entered allmulticast mode [ 313.468235][T14479] netlink: 20 bytes leftover after parsing attributes in process `syz.6.3539'. [ 313.480161][T14476] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3541'. [ 313.500966][T14476] macvtap0: left promiscuous mode [ 313.507198][T14476] erspan0: left promiscuous mode [ 313.512263][T14476] macvtap0: left allmulticast mode [ 313.518509][T14476] erspan0: left allmulticast mode [ 313.549034][T14483] loop6: detected capacity change from 0 to 1024 [ 313.556066][T14483] EXT4-fs: Ignoring removed nomblk_io_submit option [ 313.600349][ T29] kauditd_printk_skb: 444 callbacks suppressed [ 313.600418][ T29] audit: type=1326 audit(322.090:50938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14485 comm="syz.1.3544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 313.630356][ T29] audit: type=1326 audit(322.132:50939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14485 comm="syz.1.3544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 313.653369][ T29] audit: type=1326 audit(322.132:50940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14485 comm="syz.1.3544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 313.676405][ T29] audit: type=1326 audit(322.132:50941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14485 comm="syz.1.3544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 313.700765][ T29] audit: type=1326 audit(322.206:50942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14485 comm="syz.1.3544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=71 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 313.723759][ T29] audit: type=1326 audit(322.206:50943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14485 comm="syz.1.3544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 313.747001][ T29] audit: type=1326 audit(322.206:50944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14485 comm="syz.1.3544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 313.927468][T14483] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 314.050911][T14483] netlink: 14 bytes leftover after parsing attributes in process `syz.6.3543'. [ 314.120804][ T29] audit: type=1326 audit(322.468:50945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14498 comm="syz.0.3547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 314.143918][ T29] audit: type=1326 audit(322.468:50946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14498 comm="syz.0.3547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 314.167046][ T29] audit: type=1326 audit(322.468:50947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14498 comm="syz.0.3547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 314.377815][T14517] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 314.440674][T14522] sch_fq: defrate 4294967295 ignored. [ 314.462506][T14524] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 314.672275][ T6096] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 314.679683][T14538] netlink: 'syz.4.3561': attribute type 12 has an invalid length. [ 314.929553][T14555] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 315.950112][T14596] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 318.349793][T14690] __nla_validate_parse: 11 callbacks suppressed [ 318.349809][T14690] netlink: 16 bytes leftover after parsing attributes in process `syz.6.3621'. [ 318.383991][ T29] kauditd_printk_skb: 726 callbacks suppressed [ 318.384010][ T29] audit: type=1326 audit(327.125:51674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14689 comm="syz.6.3621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 318.413392][ T29] audit: type=1326 audit(327.125:51675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14689 comm="syz.6.3621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 318.486223][T14712] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3629'. [ 318.525425][ T29] audit: type=1326 audit(327.177:51676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14689 comm="syz.6.3621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 318.548564][ T29] audit: type=1326 audit(327.177:51677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14689 comm="syz.6.3621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 318.571655][ T29] audit: type=1326 audit(327.177:51678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14689 comm="syz.6.3621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 318.594666][ T29] audit: type=1326 audit(327.177:51679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14689 comm="syz.6.3621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 318.617678][ T29] audit: type=1326 audit(327.177:51680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14689 comm="syz.6.3621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 318.640729][ T29] audit: type=1326 audit(327.209:51681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14711 comm="syz.1.3629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 318.663980][ T29] audit: type=1326 audit(327.209:51682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14711 comm="syz.1.3629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 318.687244][ T29] audit: type=1326 audit(327.209:51683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14711 comm="syz.1.3629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=228 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 319.587032][T14783] netlink: 14 bytes leftover after parsing attributes in process `syz.1.3656'. [ 319.741983][T14779] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 320.773818][T14804] netlink: 96 bytes leftover after parsing attributes in process `syz.4.3663'. [ 321.063843][T14810] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3665'. [ 321.131462][T14824] netlink: 14 bytes leftover after parsing attributes in process `syz.6.3669'. [ 321.250411][T14846] netlink: 32 bytes leftover after parsing attributes in process `syz.1.3679'. [ 321.854739][T14883] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 322.411568][T14923] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 322.446070][T14933] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3711'. [ 322.610519][T14939] netlink: 14 bytes leftover after parsing attributes in process `syz.4.3713'. [ 323.110495][T14949] netlink: 14 bytes leftover after parsing attributes in process `syz.1.3715'. [ 323.201673][T14963] macsec0: entered promiscuous mode [ 323.207195][T14963] bridge0: entered promiscuous mode [ 323.208497][T14965] netlink: 12 bytes leftover after parsing attributes in process `syz.6.3722'. [ 323.213068][T14963] bridge0: port 3(macsec0) entered blocking state [ 323.213145][T14963] bridge0: port 3(macsec0) entered disabled state [ 323.213282][T14963] macsec0: entered allmulticast mode [ 323.213299][T14963] bridge0: entered allmulticast mode [ 323.214930][ T29] kauditd_printk_skb: 774 callbacks suppressed [ 323.214962][ T29] audit: type=1400 audit(332.197:52455): avc: denied { create } for pid=14966 comm="syz.5.3723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 323.314704][ T29] audit: type=1400 audit(332.239:52456): avc: denied { ioctl } for pid=14966 comm="syz.5.3723" path="socket:[44864]" dev="sockfs" ino=44864 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 323.340146][ T29] audit: type=1326 audit(332.250:52457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14962 comm="syz.0.3721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 323.364692][ T29] audit: type=1326 audit(332.250:52458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14962 comm="syz.0.3721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 323.388719][ T29] audit: type=1326 audit(332.250:52459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14962 comm="syz.0.3721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 323.392763][T14963] macsec0: left allmulticast mode [ 323.412998][ T29] audit: type=1326 audit(332.250:52460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14962 comm="syz.0.3721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 323.416864][T14963] bridge0: left allmulticast mode [ 323.446003][ T29] audit: type=1326 audit(332.250:52461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14962 comm="syz.0.3721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 323.470118][ T29] audit: type=1326 audit(332.250:52462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14962 comm="syz.0.3721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 323.494114][ T29] audit: type=1326 audit(332.250:52463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14962 comm="syz.0.3721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 323.518206][ T29] audit: type=1326 audit(332.250:52464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14962 comm="syz.0.3721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 323.651611][T14963] bridge0: left promiscuous mode [ 323.816208][T14998] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3733'. [ 323.832946][T15002] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 323.985402][T15025] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 324.474531][T15061] netlink: 14 bytes leftover after parsing attributes in process `syz.0.3761'. [ 324.810960][T15065] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3762'. [ 325.156423][T15108] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 325.322105][T15123] wg1: entered promiscuous mode [ 325.327112][T15123] wg1: entered allmulticast mode [ 325.441602][T15122] netlink: 14 bytes leftover after parsing attributes in process `syz.5.3781'. [ 325.939552][T15156] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3795'. [ 326.108091][T15162] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3796'. [ 326.195028][T15172] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3800'. [ 326.216335][T15175] netlink: 14 bytes leftover after parsing attributes in process `syz.5.3802'. [ 326.276379][T15184] netlink: 'syz.0.3806': attribute type 12 has an invalid length. [ 326.305129][T15189] netlink: 'syz.0.3808': attribute type 30 has an invalid length. [ 326.406343][T15199] netlink: 'syz.1.3813': attribute type 10 has an invalid length. [ 326.415382][T15199] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3813'. [ 326.612066][T15222] netlink: 'syz.4.3823': attribute type 4 has an invalid length. [ 326.620712][T15222] netlink: 'syz.4.3823': attribute type 4 has an invalid length. [ 326.663641][T15224] macsec0: entered promiscuous mode [ 326.668623][T15226] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 326.668943][T15224] bridge0: entered promiscuous mode [ 326.684304][T15224] bridge0: left promiscuous mode [ 327.014420][T15263] SELinux: ebitmap: truncated map [ 327.020656][T15263] SELinux: failed to load policy [ 327.034754][T15267] sch_tbf: burst 19869 is lower than device lo mtu (11337746) ! [ 327.092937][T15277] netlink: 'syz.4.3844': attribute type 10 has an invalid length. [ 327.143968][T15272] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 327.157166][T15272] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 328.011196][T15330] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 328.041000][ T29] kauditd_printk_skb: 903 callbacks suppressed [ 328.041018][ T29] audit: type=1326 audit(337.221:53368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15324 comm="syz.6.3862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 328.070374][ T29] audit: type=1326 audit(337.221:53369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15324 comm="syz.6.3862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 328.093385][ T29] audit: type=1326 audit(337.221:53370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15324 comm="syz.6.3862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 328.116413][ T29] audit: type=1326 audit(337.221:53371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15324 comm="syz.6.3862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 328.139383][ T29] audit: type=1326 audit(337.221:53372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15324 comm="syz.6.3862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 328.162503][ T29] audit: type=1326 audit(337.221:53373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15324 comm="syz.6.3862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 328.185728][ T29] audit: type=1326 audit(337.221:53374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15324 comm="syz.6.3862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 328.208910][ T29] audit: type=1326 audit(337.221:53375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15324 comm="syz.6.3862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 328.232102][ T29] audit: type=1326 audit(337.221:53376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15324 comm="syz.6.3862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 328.255173][ T29] audit: type=1326 audit(337.221:53377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15324 comm="syz.6.3862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 328.482315][T15341] macsec0: entered promiscuous mode [ 328.487636][T15341] bridge0: entered promiscuous mode [ 328.493305][T15341] bridge0: port 3(macsec0) entered blocking state [ 328.500063][T15341] bridge0: port 3(macsec0) entered disabled state [ 328.519721][T15341] macsec0: entered allmulticast mode [ 328.525068][T15341] bridge0: entered allmulticast mode [ 328.546825][T15346] __nla_validate_parse: 6 callbacks suppressed [ 328.546844][T15346] netlink: 14 bytes leftover after parsing attributes in process `syz.6.3869'. [ 328.593963][T15341] macsec0: left allmulticast mode [ 328.599178][T15341] bridge0: left allmulticast mode [ 328.672492][T15353] netlink: 14 bytes leftover after parsing attributes in process `syz.1.3871'. [ 328.682572][T15341] bridge0: left promiscuous mode [ 329.198178][T15400] netlink: 14 bytes leftover after parsing attributes in process `syz.0.3887'. [ 329.564361][T15415] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3892'. [ 329.596496][T15419] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3893'. [ 329.663023][T15425] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 329.750983][T15432] netlink: 'syz.1.3899': attribute type 11 has an invalid length. [ 329.758868][T15432] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3899'. [ 330.288453][T15488] netlink: 14 bytes leftover after parsing attributes in process `syz.4.3922'. [ 330.539470][T15493] netlink: 16 bytes leftover after parsing attributes in process `syz.6.3923'. [ 330.705584][T15515] netlink: 'syz.6.3928': attribute type 4 has an invalid length. [ 330.723795][T15515] netlink: 'syz.6.3928': attribute type 4 has an invalid length. [ 330.901016][T15537] serio: Serial port ptm2 [ 331.214231][T15560] netlink: 14 bytes leftover after parsing attributes in process `syz.1.3947'. [ 331.402693][T15575] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 331.498988][T15583] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 331.628408][T15594] netlink: 14 bytes leftover after parsing attributes in process `syz.6.3960'. [ 331.881829][T15609] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 332.339059][T15647] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 332.674467][T15671] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 332.804627][T15680] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 332.805231][ T29] kauditd_printk_skb: 1173 callbacks suppressed [ 332.805249][ T29] audit: type=1326 audit(342.256:54551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15679 comm="syz.4.3989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 332.844767][ T29] audit: type=1326 audit(342.266:54552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15679 comm="syz.4.3989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 332.868897][ T29] audit: type=1326 audit(342.266:54553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15679 comm="syz.4.3989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 332.893119][ T29] audit: type=1326 audit(342.266:54554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15679 comm="syz.4.3989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 332.916354][ T29] audit: type=1326 audit(342.266:54555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15679 comm="syz.4.3989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 332.940528][ T29] audit: type=1326 audit(342.266:54556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15679 comm="syz.4.3989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 332.964529][ T29] audit: type=1326 audit(342.266:54557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15679 comm="syz.4.3989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 332.988413][ T29] audit: type=1326 audit(342.266:54558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15679 comm="syz.4.3989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 333.012325][ T29] audit: type=1326 audit(342.266:54559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15679 comm="syz.4.3989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 333.036208][ T29] audit: type=1326 audit(342.266:54560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15679 comm="syz.4.3989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 333.320916][T15700] __nla_validate_parse: 5 callbacks suppressed [ 333.320934][T15700] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3997'. [ 333.387525][T15711] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4001'. [ 333.601296][T15718] xt_CT: No such helper "netbios-ns" [ 333.715006][T15732] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4008'. [ 333.876062][T15751] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 333.940619][T15758] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4017'. [ 334.037823][T15746] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4013'. [ 334.066847][T15765] wg1 speed is unknown, defaulting to 1000 [ 334.074521][T15765] lo speed is unknown, defaulting to 1000 [ 334.086548][T15755] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4016'. [ 334.126499][T15765] geneve0 speed is unknown, defaulting to 1000 [ 334.204759][T15770] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 334.208159][T15765] lo speed is unknown, defaulting to 1000 [ 334.340217][T15782] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4026'. [ 334.347842][T15786] netlink: 14 bytes leftover after parsing attributes in process `syz.4.4028'. [ 334.636744][T15797] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4031'. [ 334.821380][T15803] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 334.877576][T15807] wg1 speed is unknown, defaulting to 1000 [ 334.884758][T15807] lo speed is unknown, defaulting to 1000 [ 334.921465][T15807] geneve0 speed is unknown, defaulting to 1000 [ 334.989491][T15807] lo speed is unknown, defaulting to 1000 [ 335.629693][T15851] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4053'. [ 337.236908][T15943] 9pnet_fd: Insufficient options for proto=fd [ 338.210432][ T29] kauditd_printk_skb: 984 callbacks suppressed [ 338.210451][ T29] audit: type=1326 audit(347.938:55545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15964 comm="syz.1.4085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 338.239826][ T29] audit: type=1326 audit(347.938:55546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15964 comm="syz.1.4085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 338.263000][ T29] audit: type=1326 audit(347.938:55547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15964 comm="syz.1.4085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=228 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 338.286082][ T29] audit: type=1326 audit(347.938:55548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15964 comm="syz.1.4085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 338.309095][ T29] audit: type=1326 audit(347.938:55549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15964 comm="syz.1.4085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 338.332518][ T29] audit: type=1326 audit(347.969:55550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15964 comm="syz.1.4085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 338.339500][T15978] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 338.355627][ T29] audit: type=1326 audit(347.969:55551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15964 comm="syz.1.4085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 338.355743][ T29] audit: type=1326 audit(347.969:55552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15964 comm="syz.1.4085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 338.355775][ T29] audit: type=1326 audit(348.022:55553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.5.4087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 338.355808][ T29] audit: type=1326 audit(348.022:55554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.5.4087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 338.407556][T15965] __nla_validate_parse: 1 callbacks suppressed [ 338.407576][T15965] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4085'. [ 339.049849][T16008] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4098'. [ 339.230350][T16018] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 339.765703][T16036] bridge: RTM_NEWNEIGH with invalid ether address [ 340.427290][T16048] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4121'. [ 340.981770][T16069] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4116'. [ 341.106741][T16078] ref_ctr increment failed for inode: 0x122d offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff888109e78000 [ 341.234050][T16081] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 341.522237][T16083] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4122'. [ 341.602175][T16094] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4126'. [ 341.815664][T16107] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4131'. [ 341.906174][T16110] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 342.113932][T16132] netlink: 'syz.5.4142': attribute type 13 has an invalid length. [ 342.363556][T16138] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4144'. [ 342.965462][T16159] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 342.994765][ T29] kauditd_printk_skb: 687 callbacks suppressed [ 342.994782][ T29] audit: type=1326 audit(352.951:56242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16156 comm="syz.4.4147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 343.106523][ T29] audit: type=1326 audit(352.983:56243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16156 comm="syz.4.4147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 343.129699][ T29] audit: type=1326 audit(352.983:56244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16156 comm="syz.4.4147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 343.152621][ T29] audit: type=1326 audit(352.983:56245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16156 comm="syz.4.4147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 343.175700][ T29] audit: type=1326 audit(352.983:56246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16156 comm="syz.4.4147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 343.198903][ T29] audit: type=1326 audit(352.993:56247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16156 comm="syz.4.4147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 343.221989][ T29] audit: type=1326 audit(352.993:56248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16156 comm="syz.4.4147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 343.245046][ T29] audit: type=1326 audit(352.993:56249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16156 comm="syz.4.4147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=20 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 343.267930][ T29] audit: type=1326 audit(352.993:56250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16156 comm="syz.4.4147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 343.291088][ T29] audit: type=1326 audit(352.993:56251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16156 comm="syz.4.4147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7feaa678f749 code=0x7ffc0000 [ 343.385506][T16161] IPv6: NLM_F_CREATE should be specified when creating new route [ 343.615052][T16175] syz_tun: entered allmulticast mode [ 343.677528][T16173] syz_tun: left allmulticast mode [ 343.830764][T16184] netlink: 14 bytes leftover after parsing attributes in process `syz.4.4156'. [ 344.148691][T16200] lo: Caught tx_queue_len zero misconfig [ 344.607812][T16205] netlink: 14 bytes leftover after parsing attributes in process `syz.6.4161'. [ 344.813956][T16212] netdevsim netdevsim5 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 344.875398][T16212] netdevsim netdevsim5 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 344.907570][T16216] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 344.935530][T16212] netdevsim netdevsim5 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 344.971416][T16223] netlink: 'syz.4.4168': attribute type 1 has an invalid length. [ 345.000246][T16223] 8021q: adding VLAN 0 to HW filter on device bond4 [ 345.019697][T16212] netdevsim netdevsim5 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 345.086306][T11646] netdevsim netdevsim5 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 345.104152][T11646] netdevsim netdevsim5 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 345.133747][T11646] netdevsim netdevsim5 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 345.143299][T11646] netdevsim netdevsim5 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 345.915567][T16259] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4179'. [ 346.302562][T16289] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 346.355075][T16290] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4190'. [ 346.485744][T16282] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4188'. [ 346.653029][T16302] SELinux: Context system_u:object_r:logrotate_exec_t:s0 is not valid (left unmapped). [ 346.721188][ C1] EXT4-fs (loop2): error count since last fsck: 5 [ 346.727742][ C1] EXT4-fs (loop2): last error at time 1763554113: ext4_lookup:1791: inode 2 [ 346.731517][T16306] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 347.013924][T16320] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 347.264725][T16327] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4205'. [ 347.424620][T16335] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4208'. [ 347.465120][T16338] netlink: 14 bytes leftover after parsing attributes in process `syz.4.4210'. [ 347.524138][T16349] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4211'. [ 347.787999][ T29] kauditd_printk_skb: 371 callbacks suppressed [ 347.788017][ T29] audit: type=1326 audit(357.993:56623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16358 comm="syz.1.4212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 347.823844][T16359] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 347.849519][ T29] audit: type=1326 audit(358.025:56624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16358 comm="syz.1.4212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 347.872568][ T29] audit: type=1326 audit(358.025:56625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16358 comm="syz.1.4212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 347.895630][ T29] audit: type=1326 audit(358.025:56626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16358 comm="syz.1.4212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 347.918709][ T29] audit: type=1326 audit(358.025:56627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16358 comm="syz.1.4212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 347.941727][ T29] audit: type=1326 audit(358.025:56628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16358 comm="syz.1.4212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 347.964741][ T29] audit: type=1326 audit(358.025:56629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16358 comm="syz.1.4212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 347.987836][ T29] audit: type=1326 audit(358.025:56630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16358 comm="syz.1.4212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 348.010831][ T29] audit: type=1326 audit(358.025:56631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16358 comm="syz.1.4212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 348.033906][ T29] audit: type=1326 audit(358.025:56632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16358 comm="syz.1.4212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 348.395166][T16374] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4219'. [ 348.705837][T16386] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 348.888483][T16393] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4226'. [ 349.003871][T16409] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 349.051706][T16418] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4235'. [ 349.088415][T16421] wg1 speed is unknown, defaulting to 1000 [ 349.095235][T16421] lo speed is unknown, defaulting to 1000 [ 349.144410][T16421] geneve0 speed is unknown, defaulting to 1000 [ 349.174747][T16429] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 349.295846][T16421] lo speed is unknown, defaulting to 1000 [ 349.746481][T16441] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4241'. [ 349.900995][T16452] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4245'. [ 350.203915][T16461] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4249'. [ 350.570463][T16488] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4256'. [ 350.640023][T16493] sit0: Caught tx_queue_len zero misconfig [ 350.708785][T16499] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4261'. [ 350.946801][T16505] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4262'. [ 351.151215][T16519] netlink: 14 bytes leftover after parsing attributes in process `syz.4.4267'. [ 351.197123][T16514] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4265'. [ 351.372272][T16530] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 351.412549][T16535] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 351.776912][T16569] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 351.818583][T16573] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 352.780626][ T29] kauditd_printk_skb: 1170 callbacks suppressed [ 352.780647][ T29] audit: type=1400 audit(363.218:57803): avc: denied { ioctl } for pid=16625 comm="syz.5.4302" path="socket:[48834]" dev="sockfs" ino=48834 ioctlcmd=0x7459 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 352.832094][ T29] audit: type=1326 audit(363.281:57804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16627 comm="syz.5.4304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 352.872130][ T29] audit: type=1326 audit(363.281:57805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16627 comm="syz.5.4304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 352.895211][ T29] audit: type=1326 audit(363.302:57806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16627 comm="syz.5.4304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 352.918251][ T29] audit: type=1326 audit(363.302:57807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16627 comm="syz.5.4304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 352.941562][ T29] audit: type=1326 audit(363.312:57808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16627 comm="syz.5.4304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 352.964619][ T29] audit: type=1326 audit(363.312:57809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16627 comm="syz.5.4304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 352.988004][ T29] audit: type=1326 audit(363.312:57810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16627 comm="syz.5.4304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 353.011326][ T29] audit: type=1326 audit(363.312:57811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16627 comm="syz.5.4304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 353.034559][ T29] audit: type=1326 audit(363.312:57812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16627 comm="syz.5.4304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 353.082098][T16638] $Hÿ: (slave bridge0): Releasing backup interface [ 353.096206][T16638] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 353.351513][T16674] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 353.386970][T16678] macsec0: entered promiscuous mode [ 353.393362][T16678] bridge0: entered promiscuous mode [ 353.402463][T16678] bridge0: port 1(macsec0) entered blocking state [ 353.410141][T16678] bridge0: port 1(macsec0) entered disabled state [ 353.416742][T16678] macsec0: entered allmulticast mode [ 353.423038][T16678] bridge0: entered allmulticast mode [ 353.550863][T16678] macsec0: left allmulticast mode [ 353.555954][T16678] bridge0: left allmulticast mode [ 353.629157][T16678] bridge0: left promiscuous mode [ 353.668403][T16687] __nla_validate_parse: 6 callbacks suppressed [ 353.668427][T16687] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4325'. [ 353.784167][T16703] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4332'. [ 353.806717][T16703] netlink: 32 bytes leftover after parsing attributes in process `syz.4.4332'. [ 353.838063][T16709] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4334'. [ 353.865193][T16716] netdevsim netdevsim4 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 353.924662][T16716] netdevsim netdevsim4 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 353.980777][T16716] netdevsim netdevsim4 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 354.035072][T16727] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 354.047734][T16716] netdevsim netdevsim4 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 354.111320][T11648] netdevsim netdevsim4 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 354.126457][ T31] netdevsim netdevsim4 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 354.145988][ T31] netdevsim netdevsim4 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 354.161973][ T31] netdevsim netdevsim4 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 354.203854][T16734] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4341'. [ 354.252916][T16734] macsec0: entered promiscuous mode [ 354.258225][T16734] bridge0: entered promiscuous mode [ 354.264078][T16734] bridge0: port 1(macsec0) entered blocking state [ 354.271155][T16734] bridge0: port 1(macsec0) entered disabled state [ 354.279457][T16734] macsec0: entered allmulticast mode [ 354.285891][T16734] bridge0: entered allmulticast mode [ 354.439150][T16734] macsec0: left allmulticast mode [ 354.444288][T16734] bridge0: left allmulticast mode [ 354.581195][T16734] bridge0: left promiscuous mode [ 354.943293][T16743] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 355.211653][T16756] tipc: New replicast peer: 255.255.255.255 [ 355.217728][T16756] tipc: Enabled bearer , priority 10 [ 355.320984][T16763] ip6tnl0: entered promiscuous mode [ 355.326367][T16763] ip6tnl0: entered allmulticast mode [ 355.423479][T16748] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4344'. [ 355.581513][T16778] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 355.603899][T16781] netlink: 'syz.1.4358': attribute type 30 has an invalid length. [ 355.662183][T16757] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4347'. [ 355.970873][T16797] netlink: 'syz.5.4363': attribute type 11 has an invalid length. [ 356.458916][T16805] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4366'. [ 356.571276][T16808] netlink: 'syz.5.4367': attribute type 12 has an invalid length. [ 356.681160][T16823] netlink: 14 bytes leftover after parsing attributes in process `syz.4.4373'. [ 356.721966][T16828] bridge_slave_0: left promiscuous mode [ 356.727741][T16828] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.768084][T16828] bridge_slave_1: left allmulticast mode [ 356.773815][T16828] bridge_slave_1: left promiscuous mode [ 356.779501][T16828] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.791734][T16828] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 357.354447][T16852] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4381'. [ 357.459828][T16863] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 357.494619][T16865] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 357.540664][T16870] 9p: Unknown access argument : -22 [ 357.555361][ T29] kauditd_printk_skb: 866 callbacks suppressed [ 357.555376][ T29] audit: type=1326 audit(368.241:58679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.1.4383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 357.639895][ T29] audit: type=1326 audit(368.283:58680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.1.4383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=228 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 357.663975][ T29] audit: type=1326 audit(368.283:58681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.1.4383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 357.687979][ T29] audit: type=1326 audit(368.283:58682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.1.4383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 357.711270][ T29] audit: type=1326 audit(368.288:58683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.1.4383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 357.734323][ T29] audit: type=1326 audit(368.288:58684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.1.4383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 357.758367][ T29] audit: type=1326 audit(368.288:58685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.1.4383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 357.782503][ T29] audit: type=1326 audit(368.288:58686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.1.4383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 357.858086][ T29] audit: type=1326 audit(368.560:58687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16882 comm="syz.1.4392" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 357.882196][ T29] audit: type=1326 audit(368.560:58688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16882 comm="syz.1.4392" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 358.804414][T16912] pimreg: entered allmulticast mode [ 359.227820][T16926] __nla_validate_parse: 2 callbacks suppressed [ 359.227855][T16926] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4405'. [ 359.259538][T16928] ip6gretap0: entered promiscuous mode [ 359.269335][T16928] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4406'. [ 359.283424][T16928] ip6gretap0 (unregistering): left promiscuous mode [ 359.386775][T16944] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4413'. [ 359.508306][T16953] netlink: 14 bytes leftover after parsing attributes in process `syz.4.4418'. [ 359.635325][T16964] netlink: 3 bytes leftover after parsing attributes in process `syz.0.4422'. [ 359.645380][T16964] 1ªX¹¦À: renamed from 60ªX¹¦À [ 359.665489][T16964] A link change request failed with some changes committed already. Interface 61ªX¹¦À may have been left with an inconsistent configuration, please check. [ 360.024795][T16986] wg1 speed is unknown, defaulting to 1000 [ 360.041625][T16974] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4424'. [ 360.052391][T16986] lo speed is unknown, defaulting to 1000 [ 360.199421][T16986] geneve0 speed is unknown, defaulting to 1000 [ 360.364104][T16994] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4430'. [ 360.600097][T16986] lo speed is unknown, defaulting to 1000 [ 362.061333][T17022] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4438'. [ 362.256066][T17041] netlink: 14 bytes leftover after parsing attributes in process `syz.4.4444'. [ 362.735658][ T29] kauditd_printk_skb: 527 callbacks suppressed [ 362.735677][ T29] audit: type=1326 audit(373.663:59216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17055 comm="syz.1.4446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 362.765086][ T29] audit: type=1326 audit(373.663:59217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17055 comm="syz.1.4446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 362.788440][ T29] audit: type=1326 audit(373.663:59218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17055 comm="syz.1.4446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 362.811620][ T29] audit: type=1326 audit(373.663:59219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17055 comm="syz.1.4446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 362.828035][T17061] tipc: Enabled bearer , priority 0 [ 362.834733][ T29] audit: type=1326 audit(373.663:59220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17055 comm="syz.1.4446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 362.834827][ T29] audit: type=1326 audit(373.663:59221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17055 comm="syz.1.4446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 362.834862][ T29] audit: type=1326 audit(373.663:59222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17055 comm="syz.1.4446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 362.834896][ T29] audit: type=1326 audit(373.663:59223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17055 comm="syz.1.4446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 362.834925][ T29] audit: type=1326 audit(373.663:59224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17055 comm="syz.1.4446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 362.835015][ T29] audit: type=1326 audit(373.663:59225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17055 comm="syz.1.4446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 362.989090][T17064] tipc: New replicast peer: 255.255.255.83 [ 362.995934][T17064] tipc: Enabled bearer , priority 10 [ 363.002890][T17057] tipc: Resetting bearer [ 363.023716][T17057] tipc: Disabling bearer [ 363.101991][T17071] netlink: 14 bytes leftover after parsing attributes in process `syz.6.4452'. [ 363.182365][T17082] netlink: 'syz.1.4456': attribute type 7 has an invalid length. [ 364.099616][T17109] netlink: 'syz.6.4463': attribute type 10 has an invalid length. [ 364.110137][T17113] tipc: Enabling of bearer rejected, failed to enable media [ 364.138412][T17109] netlink: 'syz.6.4463': attribute type 10 has an invalid length. [ 364.151022][T17111] __nla_validate_parse: 3 callbacks suppressed [ 364.151040][T17111] netlink: 14 bytes leftover after parsing attributes in process `syz.4.4464'. [ 365.144433][T17154] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4475'. [ 365.275257][T17158] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 365.499561][T17159] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4487'. [ 365.535575][T17177] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4484'. [ 365.754885][T17188] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4488'. [ 366.325461][T17206] netlink: 'syz.4.4492': attribute type 7 has an invalid length. [ 366.333248][T17206] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4492'. [ 366.373940][T17208] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4494'. [ 366.536140][T17215] netdevsim netdevsim4 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 366.583508][T17220] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 366.622956][T17215] netdevsim netdevsim4 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 366.698477][T17225] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 366.721790][T17215] netdevsim netdevsim4 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 366.787003][T17229] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4502'. [ 366.812665][T17215] netdevsim netdevsim4 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 366.828723][T17237] netlink: 'syz.0.4503': attribute type 7 has an invalid length. [ 366.836532][T17237] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4503'. [ 366.875730][T11676] netdevsim netdevsim4 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 366.889480][T11676] netdevsim netdevsim4 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 366.905397][T11676] netdevsim netdevsim4 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 366.922758][T11676] netdevsim netdevsim4 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 366.950842][T17231] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4501'. [ 367.035451][T17246] random: crng reseeded on system resumption [ 367.046188][T17246] Restarting kernel threads ... [ 367.051276][T17246] Done restarting kernel threads. [ 367.056701][T17246] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=17246 comm=syz.6.4506 [ 367.097734][T17246] wg1 speed is unknown, defaulting to 1000 [ 367.104222][T17246] lo speed is unknown, defaulting to 1000 [ 367.149944][T17246] geneve0 speed is unknown, defaulting to 1000 [ 367.226381][T17246] lo speed is unknown, defaulting to 1000 [ 367.305507][T17259] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 367.553457][T17280] netdevsim netdevsim4 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 367.577659][ T29] kauditd_printk_skb: 711 callbacks suppressed [ 367.577682][ T29] audit: type=1326 audit(378.762:59937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17265 comm="syz.1.4512" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 367.607556][ T29] audit: type=1326 audit(378.762:59938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17265 comm="syz.1.4512" exe="/root/syz-executor" sig=0 arch=c000003e syscall=228 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 367.630689][ T29] audit: type=1326 audit(378.762:59939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17265 comm="syz.1.4512" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 367.653680][ T29] audit: type=1326 audit(378.762:59940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17265 comm="syz.1.4512" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 367.676768][ T29] audit: type=1326 audit(378.762:59941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17265 comm="syz.1.4512" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 367.699799][ T29] audit: type=1326 audit(378.775:59942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17265 comm="syz.1.4512" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 367.723070][ T29] audit: type=1326 audit(378.775:59943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17265 comm="syz.1.4512" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 367.745993][ T29] audit: type=1326 audit(378.775:59944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17265 comm="syz.1.4512" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 367.769068][ T29] audit: type=1326 audit(378.775:59945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17265 comm="syz.1.4512" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 367.792140][ T29] audit: type=1326 audit(378.775:59946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17265 comm="syz.1.4512" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 367.835985][T17280] netdevsim netdevsim4 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 367.967567][T17280] netdevsim netdevsim4 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 368.536930][T17300] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 368.787500][T17280] netdevsim netdevsim4 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 368.889953][T11646] netdevsim netdevsim4 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 368.924893][T11646] netdevsim netdevsim4 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 368.933225][T11646] netdevsim netdevsim4 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 368.941730][T11646] netdevsim netdevsim4 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 368.988423][T17331] __nla_validate_parse: 11 callbacks suppressed [ 368.988443][T17331] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4531'. [ 369.037386][T17338] veth12: entered promiscuous mode [ 369.043801][T17338] veth12: entered allmulticast mode [ 369.218400][T17355] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4538'. [ 369.397512][T17364] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 369.476064][T17370] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4546'. [ 369.899312][T17385] netlink: 188 bytes leftover after parsing attributes in process `syz.5.4551'. [ 369.950527][T17387] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4552'. [ 370.348507][T17408] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4558'. [ 370.506171][T17413] netlink: 14 bytes leftover after parsing attributes in process `syz.6.4559'. [ 370.791138][T17425] macsec1: entered promiscuous mode [ 370.796412][T17425] bridge0: entered promiscuous mode [ 370.821358][T17425] bridge0: port 4(macsec1) entered blocking state [ 370.827892][T17425] bridge0: port 4(macsec1) entered disabled state [ 370.840088][T17425] macsec1: entered allmulticast mode [ 370.845442][T17425] bridge0: entered allmulticast mode [ 370.853336][T17425] macsec1: left allmulticast mode [ 370.858422][T17425] bridge0: left allmulticast mode [ 370.879486][T17425] bridge0: left promiscuous mode [ 370.910345][T17418] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4560'. [ 371.024713][T17422] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4561'. [ 371.113131][T17433] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4565'. [ 372.097367][T17475] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 372.179805][T17477] macsec0: entered promiscuous mode [ 372.185250][T17477] bridge0: entered promiscuous mode [ 372.193524][T17477] bridge0: port 1(macsec0) entered blocking state [ 372.200064][T17477] bridge0: port 1(macsec0) entered disabled state [ 372.210395][T17477] macsec0: entered allmulticast mode [ 372.217182][T17477] bridge0: entered allmulticast mode [ 372.334453][T17477] macsec0: left allmulticast mode [ 372.340711][T17477] bridge0: left allmulticast mode [ 372.347124][ T29] kauditd_printk_skb: 794 callbacks suppressed [ 372.347141][ T29] audit: type=1326 audit(383.778:60741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17476 comm="syz.0.4576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 372.377462][ T29] audit: type=1326 audit(383.778:60742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17476 comm="syz.0.4576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 372.406806][T17477] bridge0: left promiscuous mode [ 372.415085][T17481] netlink: 'syz.4.4578': attribute type 12 has an invalid length. [ 372.438635][ T29] audit: type=1326 audit(383.851:60743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17478 comm="syz.6.4577" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 372.462743][ T29] audit: type=1326 audit(383.851:60744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17478 comm="syz.6.4577" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 372.530617][ T29] audit: type=1326 audit(383.956:60745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17497 comm="syz.6.4582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 372.554670][ T29] audit: type=1326 audit(383.956:60746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17497 comm="syz.6.4582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 372.578614][ T29] audit: type=1326 audit(383.956:60747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17497 comm="syz.6.4582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 372.601633][ T29] audit: type=1326 audit(383.956:60748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17497 comm="syz.6.4582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 372.625716][ T29] audit: type=1326 audit(383.956:60749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17497 comm="syz.6.4582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 372.649895][ T29] audit: type=1326 audit(383.956:60750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17497 comm="syz.6.4582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 372.810641][T17519] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 373.520999][T17542] veth2: entered promiscuous mode [ 373.527615][T17542] veth2: entered allmulticast mode [ 373.529102][T17544] netlink: 'syz.4.4600': attribute type 1 has an invalid length. [ 373.559887][T17544] 8021q: adding VLAN 0 to HW filter on device bond5 [ 373.633475][T17550] bond5 (unregistering): Released all slaves [ 373.687596][T17556] macsec1: entered promiscuous mode [ 373.692871][T17556] bridge0: entered promiscuous mode [ 373.699155][T17556] bridge0: port 4(macsec1) entered blocking state [ 373.705633][T17556] bridge0: port 4(macsec1) entered disabled state [ 373.721372][T17556] macsec1: entered allmulticast mode [ 373.726742][T17556] bridge0: entered allmulticast mode [ 373.737139][T17556] macsec1: left allmulticast mode [ 373.742206][T17556] bridge0: left allmulticast mode [ 373.771932][T17556] bridge0: left promiscuous mode [ 373.828296][T17561] __nla_validate_parse: 6 callbacks suppressed [ 373.828316][T17561] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4605'. [ 373.889926][T17552] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4603'. [ 374.059338][T17570] xt_CT: No such helper "snmp_trap" [ 374.189169][T17566] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4607'. [ 375.170397][T17611] macsec0: entered promiscuous mode [ 375.176864][T17611] bridge0: entered promiscuous mode [ 375.185171][T17611] bridge0: port 1(macsec0) entered blocking state [ 375.191720][T17611] bridge0: port 1(macsec0) entered disabled state [ 375.238658][T17611] macsec0: entered allmulticast mode [ 375.245139][T17611] bridge0: entered allmulticast mode [ 375.277308][T17611] macsec0: left allmulticast mode [ 375.283561][T17611] bridge0: left allmulticast mode [ 375.422400][T17611] bridge0: left promiscuous mode [ 375.830740][T17636] netlink: 14 bytes leftover after parsing attributes in process `syz.6.4629'. [ 375.988150][T17654] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4633'. [ 375.997252][T17654] batadv1: left allmulticast mode [ 376.002351][T17654] batadv1: left promiscuous mode [ 376.008476][T17654] bridge0: port 4(batadv1) entered disabled state [ 376.329185][T17665] netdevsim netdevsim5 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 376.434646][T17665] netdevsim netdevsim5 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 376.510165][T17665] netdevsim netdevsim5 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 376.567354][T17665] netdevsim netdevsim5 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 376.632949][T11626] netdevsim netdevsim5 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 376.659944][T11626] netdevsim netdevsim5 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 376.674926][T11626] netdevsim netdevsim5 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 376.683769][T11626] netdevsim netdevsim5 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 376.774417][T17675] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4639'. [ 376.784398][T17675] netlink: 32 bytes leftover after parsing attributes in process `syz.5.4639'. [ 376.806944][T17673] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 376.998743][T17687] VFS: Mount too revealing [ 377.018279][T17687] VFS: Mount too revealing [ 377.056022][T17692] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4648'. [ 377.149165][T17700] wg1 speed is unknown, defaulting to 1000 [ 377.167048][T17700] lo speed is unknown, defaulting to 1000 [ 377.398200][T17700] geneve0 speed is unknown, defaulting to 1000 [ 377.807795][ T29] kauditd_printk_skb: 695 callbacks suppressed [ 377.807813][ T29] audit: type=1326 audit(389.499:61446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17710 comm="syz.6.4650" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 377.869563][ T29] audit: type=1326 audit(389.531:61447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17710 comm="syz.6.4650" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 377.892637][ T29] audit: type=1326 audit(389.531:61448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17710 comm="syz.6.4650" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 377.915668][ T29] audit: type=1326 audit(389.531:61449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17710 comm="syz.6.4650" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 377.938677][ T29] audit: type=1326 audit(389.531:61450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17710 comm="syz.6.4650" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 377.961806][ T29] audit: type=1326 audit(389.531:61451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17710 comm="syz.6.4650" exe="/root/syz-executor" sig=0 arch=c000003e syscall=131 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 377.984978][ T29] audit: type=1326 audit(389.531:61452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17710 comm="syz.6.4650" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 378.008174][ T29] audit: type=1326 audit(389.531:61453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17710 comm="syz.6.4650" exe="/root/syz-executor" sig=0 arch=c000003e syscall=133 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 378.031243][ T29] audit: type=1326 audit(389.531:61454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17710 comm="syz.6.4650" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 378.054235][ T29] audit: type=1326 audit(389.531:61455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17710 comm="syz.6.4650" exe="/root/syz-executor" sig=0 arch=c000003e syscall=439 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 378.072479][T17700] lo speed is unknown, defaulting to 1000 [ 378.311107][T17730] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 378.443093][T17738] serio: Serial port ptm2 [ 378.600509][T17748] netlink: 'syz.6.4663': attribute type 12 has an invalid length. [ 378.754482][T17758] netlink: 'syz.6.4668': attribute type 12 has an invalid length. [ 379.662430][T17777] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 380.104144][T17785] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4676'. [ 380.112298][T17806] netlink: 'syz.1.4684': attribute type 1 has an invalid length. [ 380.291952][T17813] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 380.620235][T17836] macsec1: entered promiscuous mode [ 380.626705][T17836] bridge0: entered promiscuous mode [ 380.633389][T17836] bridge0: port 4(macsec1) entered blocking state [ 380.639856][T17836] bridge0: port 4(macsec1) entered disabled state [ 380.649283][T17836] macsec1: entered allmulticast mode [ 380.655712][T17836] bridge0: entered allmulticast mode [ 380.672793][T17836] macsec1: left allmulticast mode [ 380.677845][T17836] bridge0: left allmulticast mode [ 380.701720][T17836] bridge0: left promiscuous mode [ 381.418262][T17870] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 381.466826][T17862] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4705'. [ 382.522494][T17919] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4723'. [ 382.676251][ T29] kauditd_printk_skb: 653 callbacks suppressed [ 382.676268][ T29] audit: type=1326 audit(394.616:62109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17926 comm="syz.6.4724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 382.738500][T17927] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 382.750675][T17914] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4722'. [ 382.781556][ T29] audit: type=1326 audit(394.658:62110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17926 comm="syz.6.4724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 382.805737][ T29] audit: type=1326 audit(394.658:62111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17926 comm="syz.6.4724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 382.829692][ T29] audit: type=1326 audit(394.658:62112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17926 comm="syz.6.4724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 382.853752][ T29] audit: type=1326 audit(394.658:62113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17926 comm="syz.6.4724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 382.877802][ T29] audit: type=1326 audit(394.658:62114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17926 comm="syz.6.4724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 382.901801][ T29] audit: type=1326 audit(394.658:62115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17926 comm="syz.6.4724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 382.925923][ T29] audit: type=1326 audit(394.658:62116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17926 comm="syz.6.4724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 382.950060][ T29] audit: type=1326 audit(394.658:62117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17926 comm="syz.6.4724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 382.974240][ T29] audit: type=1326 audit(394.668:62118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17926 comm="syz.6.4724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f199beef749 code=0x7ffc0000 [ 383.063654][T17932] netlink: 14 bytes leftover after parsing attributes in process `syz.4.4725'. [ 383.083354][T17935] netlink: 664 bytes leftover after parsing attributes in process `gtp'. [ 383.178422][T17940] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 384.714750][T17970] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4734'. [ 384.728117][T17983] netlink: 14 bytes leftover after parsing attributes in process `syz.6.4738'. [ 384.810193][T17975] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4735'. [ 384.840615][T17991] siw: device registration error -23 [ 384.897661][T17996] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4744'. [ 384.924717][T18002] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4746'. [ 384.936168][T18002] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4746'. [ 385.117396][T18012] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4750'. [ 385.157389][T18015] futex_wake_op: syz.0.4751 tries to shift op by -1; fix this program [ 385.215616][T18022] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4753'. [ 385.229509][T18022] team0 (unregistering): Port device team_slave_0 removed [ 385.239219][T18022] team0 (unregistering): Port device team_slave_1 removed [ 385.340926][T18033] veth10: entered promiscuous mode [ 385.346253][T18033] veth10: entered allmulticast mode [ 385.423236][T18041] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4761'. [ 385.433523][T18041] netem: change failed [ 385.549478][T18049] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 385.619652][T18054] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4767'. [ 385.670185][T18044] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4763'. [ 385.886927][T18071] netdevsim netdevsim5 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 386.053163][T18071] netdevsim netdevsim5 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 386.114975][T18083] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4775'. [ 386.253316][T18071] netdevsim netdevsim5 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 386.397065][T18071] netdevsim netdevsim5 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 386.459647][T11681] netdevsim netdevsim5 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 386.478036][T11681] netdevsim netdevsim5 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 386.491232][T11681] netdevsim netdevsim5 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 386.499641][T11681] netdevsim netdevsim5 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 386.676125][T18108] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4782'. [ 387.155378][T18114] wg1 speed is unknown, defaulting to 1000 [ 387.180686][T18114] lo speed is unknown, defaulting to 1000 [ 387.574520][ T29] kauditd_printk_skb: 540 callbacks suppressed [ 387.574537][ T29] audit: type=1326 audit(399.758:62659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.0.4788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 387.606116][ T29] audit: type=1326 audit(399.758:62660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.0.4788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 387.630153][ T29] audit: type=1326 audit(399.758:62661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.0.4788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 387.654139][ T29] audit: type=1326 audit(399.758:62662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.0.4788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 387.678157][ T29] audit: type=1326 audit(399.758:62663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.0.4788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 387.920835][ T29] audit: type=1326 audit(399.895:62664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.0.4788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 387.945090][ T29] audit: type=1326 audit(399.895:62665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.0.4788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 387.969162][ T29] audit: type=1326 audit(399.895:62666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.0.4788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ffc5ff749 code=0x7ffc0000 [ 388.345622][ T29] audit: type=1326 audit(400.566:62667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18149 comm="syz.5.4793" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 388.369802][ T29] audit: type=1326 audit(400.566:62668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18149 comm="syz.5.4793" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 388.518572][T18152] IPv6: sit2: Disabled Multicast RS [ 388.859187][T18114] geneve0 speed is unknown, defaulting to 1000 [ 390.084094][T18208] macsec0: entered promiscuous mode [ 390.089469][T18208] bridge0: entered promiscuous mode [ 390.330770][T18208] bridge0: port 1(macsec0) entered blocking state [ 390.337375][T18208] bridge0: port 1(macsec0) entered disabled state [ 390.388177][T18208] macsec0: entered allmulticast mode [ 390.393537][T18208] bridge0: entered allmulticast mode [ 390.419862][T18213] __nla_validate_parse: 5 callbacks suppressed [ 390.419881][T18213] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4813'. [ 390.454694][T18208] macsec0: left allmulticast mode [ 390.459810][T18208] bridge0: left allmulticast mode [ 390.467169][T18208] bridge0: left promiscuous mode [ 390.551208][T18114] lo speed is unknown, defaulting to 1000 [ 390.606476][T18219] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 390.703157][T18223] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4817'. [ 390.838140][T18231] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 390.867178][T18238] netlink: 'syz.6.4821': attribute type 7 has an invalid length. [ 390.876301][T18238] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4821'. [ 391.243228][T18254] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 391.875430][T18271] wg1 speed is unknown, defaulting to 1000 [ 391.881649][T18271] lo speed is unknown, defaulting to 1000 [ 392.033338][T18271] geneve0 speed is unknown, defaulting to 1000 [ 392.103656][T18263] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4831'. [ 392.149822][T18277] netlink: 14 bytes leftover after parsing attributes in process `syz.6.4835'. [ 392.249675][T18282] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4837'. [ 392.277537][T18271] lo speed is unknown, defaulting to 1000 [ 392.703456][ T29] kauditd_printk_skb: 488 callbacks suppressed [ 392.703519][ T29] audit: type=1326 audit(405.139:63157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.5.4841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 392.768941][ T29] audit: type=1326 audit(405.139:63158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.5.4841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 392.793153][ T29] audit: type=1326 audit(405.139:63159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.5.4841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 392.817502][ T29] audit: type=1326 audit(405.139:63160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.5.4841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 392.841892][ T29] audit: type=1326 audit(405.139:63161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.5.4841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 392.866075][ T29] audit: type=1326 audit(405.139:63162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.5.4841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 392.890310][ T29] audit: type=1326 audit(405.139:63163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.5.4841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 392.914510][ T29] audit: type=1326 audit(405.139:63164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.5.4841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 392.938681][ T29] audit: type=1326 audit(405.139:63165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.5.4841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 392.962843][ T29] audit: type=1326 audit(405.139:63166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.5.4841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 393.203626][T18322] netlink: 'syz.1.4850': attribute type 4 has an invalid length. [ 393.302169][T18328] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 393.470812][T18324] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4851'. [ 393.533623][T18339] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4857'. [ 393.627178][T18341] netlink: 14 bytes leftover after parsing attributes in process `syz.6.4858'. [ 393.763041][T18351] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 393.967050][T18364] netlink: 'syz.5.4864': attribute type 12 has an invalid length. [ 394.012315][T18367] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 394.391215][T18386] tipc: Enabling of bearer rejected, failed to enable media [ 394.923357][T18420] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 395.817303][T18469] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 396.856946][T18542] wg1 speed is unknown, defaulting to 1000 [ 396.863168][T18542] lo speed is unknown, defaulting to 1000 [ 396.925305][T18542] geneve0 speed is unknown, defaulting to 1000 [ 397.001220][T18555] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 397.034089][T18557] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 397.047053][T18542] lo speed is unknown, defaulting to 1000 [ 397.380574][T18589] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 397.445334][T18592] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 397.496221][ T29] kauditd_printk_skb: 1724 callbacks suppressed [ 397.496239][ T29] audit: type=1400 audit(410.176:64891): avc: denied { create } for pid=18594 comm="syz.1.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 397.531922][ T29] audit: type=1400 audit(410.218:64892): avc: denied { create } for pid=18594 comm="syz.1.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 397.574606][ T29] audit: type=1400 audit(410.249:64893): avc: denied { execmem } for pid=18594 comm="syz.1.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 397.620839][ T29] audit: type=1400 audit(410.291:64894): avc: denied { allowed } for pid=18597 comm="syz.5.4952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 397.639819][ T29] audit: type=1400 audit(410.291:64895): avc: denied { map_create } for pid=18597 comm="syz.5.4952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.658658][ T29] audit: type=1400 audit(410.291:64896): avc: denied { execmem } for pid=18597 comm="syz.5.4952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 397.677512][ T29] audit: type=1400 audit(410.291:64897): avc: denied { map_create } for pid=18597 comm="syz.5.4952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.696397][ T29] audit: type=1400 audit(410.291:64898): avc: denied { prog_load } for pid=18597 comm="syz.5.4952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.715084][ T29] audit: type=1326 audit(410.291:64899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18597 comm="syz.5.4952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 397.738074][ T29] audit: type=1326 audit(410.291:64900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18597 comm="syz.5.4952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888d10f749 code=0x7ffc0000 [ 397.920662][T18609] __nla_validate_parse: 7 callbacks suppressed [ 397.920681][T18609] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4956'. [ 398.194673][T18623] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 398.465314][T18641] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 398.486255][T18641] hsr_slave_1 (unregistering): left promiscuous mode [ 399.079477][T18660] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 399.679111][T18678] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 399.712527][T18678] hsr_slave_1 (unregistering): left promiscuous mode [ 399.814932][T18683] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4985'. [ 399.942521][T18689] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 400.134873][T18702] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4993'. [ 400.191060][T18702] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4993'. [ 400.428844][T18718] macsec0: entered promiscuous mode [ 400.434170][T18718] bridge0: entered promiscuous mode [ 400.442770][T18718] bridge0: port 1(macsec0) entered blocking state [ 400.450338][T18718] bridge0: port 1(macsec0) entered disabled state [ 400.458987][T18718] macsec0: entered allmulticast mode [ 400.464347][T18718] bridge0: entered allmulticast mode [ 400.472188][T18718] macsec0: left allmulticast mode [ 400.477502][T18718] bridge0: left allmulticast mode [ 400.491641][T18718] bridge0: left promiscuous mode [ 401.072463][T18751] bridge0: entered promiscuous mode [ 401.084666][T18751] macsec0: entered promiscuous mode [ 401.096244][T18751] bridge0: port 1(macsec0) entered blocking state [ 401.102832][T18751] bridge0: port 1(macsec0) entered disabled state [ 401.117454][T18751] macsec0: entered allmulticast mode [ 401.122903][T18751] bridge0: entered allmulticast mode [ 401.135577][T18751] macsec0: left allmulticast mode [ 401.140747][T18751] bridge0: left allmulticast mode [ 401.152786][T18751] bridge0: left promiscuous mode [ 401.164542][T18756] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5013'. [ 401.296116][T18759] wg1 speed is unknown, defaulting to 1000 [ 401.302266][T18759] lo speed is unknown, defaulting to 1000 [ 401.373940][T18759] geneve0 speed is unknown, defaulting to 1000 [ 401.501013][T18759] lo speed is unknown, defaulting to 1000 [ 401.766872][T18777] wg1 speed is unknown, defaulting to 1000 [ 401.780381][T18777] lo speed is unknown, defaulting to 1000 [ 401.885871][T18777] geneve0 speed is unknown, defaulting to 1000 [ 402.008740][T18777] lo speed is unknown, defaulting to 1000 [ 402.753254][ T29] kauditd_printk_skb: 1007 callbacks suppressed [ 402.753269][ T29] audit: type=1400 audit(415.692:65908): avc: denied { allowed } for pid=18798 comm="syz.1.5032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 402.806563][ T29] audit: type=1400 audit(415.744:65909): avc: denied { map_create } for pid=18798 comm="syz.1.5032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 402.825327][ T29] audit: type=1400 audit(415.744:65910): avc: denied { execmem } for pid=18798 comm="syz.1.5032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 402.844210][ T29] audit: type=1400 audit(415.744:65911): avc: denied { map_create } for pid=18798 comm="syz.1.5032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 402.862990][ T29] audit: type=1400 audit(415.744:65912): avc: denied { prog_load } for pid=18798 comm="syz.1.5032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 402.881693][ T29] audit: type=1326 audit(415.744:65913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18798 comm="syz.1.5032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 402.904825][ T29] audit: type=1326 audit(415.744:65914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18798 comm="syz.1.5032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 402.927820][ T29] audit: type=1326 audit(415.744:65915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18798 comm="syz.1.5032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=228 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 402.950940][ T29] audit: type=1326 audit(415.744:65916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18798 comm="syz.1.5032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 402.974050][ T29] audit: type=1326 audit(415.744:65917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18798 comm="syz.1.5032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5368c6f749 code=0x7ffc0000 [ 403.078509][T18808] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 403.812367][T18832] wg1 speed is unknown, defaulting to 1000 [ 403.828684][T18832] lo speed is unknown, defaulting to 1000 [ 403.942023][T18832] geneve0 speed is unknown, defaulting to 1000 [ 404.074408][T18832] lo speed is unknown, defaulting to 1000 [ 404.241925][T18840] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 404.420033][T18846] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 405.230387][T18883] netlink: 'syz.4.5064': attribute type 1 has an invalid length. [ 405.271567][T18883] 8021q: adding VLAN 0 to HW filter on device bond5 [ 405.310884][T18886] 8021q: adding VLAN 0 to HW filter on device bond5 [ 405.319633][T18886] bond5: (slave vxcan1): The slave device specified does not support setting the MAC address [ 405.355576][T18886] bond5: (slave vxcan1): Error -95 calling set_mac_address [ 405.402246][T18883] bond6: entered promiscuous mode [ 405.428197][T18883] 8021q: adding VLAN 0 to HW filter on device bond6 [ 405.450229][T18883] bond5: (slave bond6): Enslaving as an active interface with a down link [ 405.461926][T18887] macvlan2: entered promiscuous mode [ 405.467294][T18887] macvlan2: entered allmulticast mode [ 405.497677][T18887] bond5: entered promiscuous mode [ 405.515339][T18887] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 405.539230][T18887] bond5: left promiscuous mode [ 407.068310][T18927] netlink: 'syz.5.5080': attribute type 13 has an invalid length. [ 407.147306][T18931] wg1 speed is unknown, defaulting to 1000 [ 407.163887][T18931] lo speed is unknown, defaulting to 1000 [ 407.265136][T18931] geneve0 speed is unknown, defaulting to 1000 [ 407.409884][T18945] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5087'. [ 407.417903][T18947] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5088'. [ 407.446941][T18931] lo speed is unknown, defaulting to 1000 [ 407.455581][T18947] netlink: 'syz.0.5088': attribute type 10 has an invalid length. [ 407.464369][T18947] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5088'. [ 407.549185][ T29] kauditd_printk_skb: 514 callbacks suppressed [ 407.549262][ T29] audit: type=1400 audit(420.722:66432): avc: denied { create } for pid=18952 comm="syz.1.5090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 407.595366][ T29] audit: type=1400 audit(420.754:66433): avc: denied { create } for pid=18952 comm="syz.1.5090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 407.615543][ T29] audit: type=1400 audit(420.764:66434): avc: denied { execmem } for pid=18952 comm="syz.1.5090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 407.634456][ T29] audit: type=1400 audit(420.764:66435): avc: denied { map_create } for pid=18952 comm="syz.1.5090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 407.653243][ T29] audit: type=1400 audit(420.764:66436): avc: denied { prog_load } for pid=18952 comm="syz.1.5090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 407.761456][T18957] netlink: 'syz.1.5091': attribute type 4 has an invalid length. [ 407.774039][T18957] netlink: 'syz.1.5091': attribute type 4 has an invalid length. [ 407.784218][ T29] audit: type=1400 audit(420.869:66437): avc: denied { create } for pid=18952 comm="syz.1.5090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 407.803505][ T29] audit: type=1400 audit(420.869:66438): avc: denied { prog_load } for pid=18952 comm="syz.1.5090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 407.822196][ T29] audit: type=1400 audit(420.943:66439): avc: denied { map_create } for pid=18956 comm="syz.4.5092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 407.841091][ T29] audit: type=1400 audit(420.943:66440): avc: denied { map_create } for pid=18955 comm="syz.1.5091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 407.859810][ T29] audit: type=1400 audit(420.943:66441): avc: denied { prog_load } for pid=18955 comm="syz.1.5091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 407.961427][ T1036] lo speed is unknown, defaulting to 1000 [ 407.967220][ T1036] s{z2: Port: 1 Link ACTIVE [ 408.163731][T18969] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 408.187525][T18970] wg1 speed is unknown, defaulting to 1000 [ 408.214737][T18970] lo speed is unknown, defaulting to 1000 [ 408.364948][T18970] geneve0 speed is unknown, defaulting to 1000 [ 408.415075][T18979] netlink: 'syz.5.5101': attribute type 13 has an invalid length. [ 408.441153][T18979] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 408.595508][T18970] lo speed is unknown, defaulting to 1000 [ 408.727026][T19002] netlink: 'syz.5.5110': attribute type 4 has an invalid length. [ 410.973210][T19056] wg1 speed is unknown, defaulting to 1000 [ 410.979458][T19056] lo speed is unknown, defaulting to 1000 [ 411.064824][T19056] geneve0 speed is unknown, defaulting to 1000 [ 411.156902][T19056] lo speed is unknown, defaulting to 1000 [ 411.313431][T19061] wg1 speed is unknown, defaulting to 1000 [ 411.335024][T19061] lo speed is unknown, defaulting to 1000 [ 411.521445][T19061] geneve0 speed is unknown, defaulting to 1000 [ 411.715623][T19061] lo speed is unknown, defaulting to 1000 [ 412.011389][T19069] netlink: 'syz.5.5134': attribute type 15 has an invalid length. [ 412.020366][T19069] netlink: 24 bytes leftover after parsing attributes in process `syz.5.5134'. [ 412.316543][ T29] kauditd_printk_skb: 414 callbacks suppressed [ 412.316561][ T29] audit: type=1400 audit(425.733:66856): avc: denied { create } for pid=19087 comm="syz.6.5143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 412.386899][ T29] audit: type=1400 audit(425.754:66857): avc: denied { open } for pid=19089 comm="syz.5.5144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 412.406901][ T29] audit: type=1400 audit(425.775:66858): avc: denied { map_create } for pid=19089 comm="syz.5.5144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.426804][ T29] audit: type=1400 audit(425.786:66859): avc: denied { prog_load } for pid=19089 comm="syz.5.5144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.445522][ T29] audit: type=1400 audit(425.786:66860): avc: denied { prog_load } for pid=19089 comm="syz.5.5144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.465201][ T29] audit: type=1400 audit(425.796:66861): avc: denied { prog_load } for pid=19089 comm="syz.5.5144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.485062][ T29] audit: type=1400 audit(425.796:66862): avc: denied { map_create } for pid=19089 comm="syz.5.5144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.504948][ T29] audit: type=1400 audit(425.796:66863): avc: denied { prog_load } for pid=19089 comm="syz.5.5144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.524725][ T29] audit: type=1400 audit(425.796:66864): avc: denied { prog_load } for pid=19089 comm="syz.5.5144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.544445][ T29] audit: type=1400 audit(425.807:66865): avc: denied { prog_load } for pid=19091 comm="syz.0.5136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.636629][T19103] wg1 speed is unknown, defaulting to 1000 [ 412.652971][T19103] lo speed is unknown, defaulting to 1000 [ 412.713138][T19103] geneve0 speed is unknown, defaulting to 1000 [ 412.894931][T19103] lo speed is unknown, defaulting to 1000 [ 413.294284][T19119] wg1 speed is unknown, defaulting to 1000 [ 413.313388][T19119] lo speed is unknown, defaulting to 1000 [ 413.385634][T19119] geneve0 speed is unknown, defaulting to 1000 [ 413.471389][T19122] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 413.488015][T19119] lo speed is unknown, defaulting to 1000 [ 413.570323][T19129] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 413.603586][T19132] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 414.104264][T19156] wg1 speed is unknown, defaulting to 1000 [ 414.116606][T19156] lo speed is unknown, defaulting to 1000 [ 414.186189][T19156] geneve0 speed is unknown, defaulting to 1000 [ 414.303814][T19156] lo speed is unknown, defaulting to 1000 [ 414.510195][T19169] netlink: 'syz.1.5173': attribute type 4 has an invalid length. [ 414.531413][ T3402] lo speed is unknown, defaulting to 1000 [ 414.537282][ T3402] s{z2: Port: 1 Link DOWN [ 414.544487][T19169] netlink: 'syz.1.5173': attribute type 4 has an invalid length. [ 414.562435][ T3402] lo speed is unknown, defaulting to 1000 [ 414.568241][ T3402] s{z2: Port: 1 Link ACTIVE [ 414.636861][T19175] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5176'. [ 414.652947][T19177] netlink: 44 bytes leftover after parsing attributes in process `syz.1.5177'. [ 414.816387][T19184] wg1 speed is unknown, defaulting to 1000 [ 414.829595][T19184] lo speed is unknown, defaulting to 1000 [ 414.905902][T19184] geneve0 speed is unknown, defaulting to 1000 [ 415.040369][T19184] lo speed is unknown, defaulting to 1000 [ 415.405713][T19199] macsec1: entered promiscuous mode [ 415.411128][T19199] bridge0: entered promiscuous mode [ 415.418518][T19199] bridge0: port 4(macsec1) entered blocking state [ 415.425195][T19199] bridge0: port 4(macsec1) entered disabled state [ 415.450853][T19199] macsec1: entered allmulticast mode [ 415.456244][T19199] bridge0: entered allmulticast mode [ 415.474267][T19199] macsec1: left allmulticast mode [ 415.479385][T19199] bridge0: left allmulticast mode [ 415.490769][T19199] bridge0: left promiscuous mode [ 416.776014][T19258] syzkaller0: entered promiscuous mode [ 416.781619][T19258] syzkaller0: entered allmulticast mode [ 417.099969][ T29] kauditd_printk_skb: 659 callbacks suppressed [ 417.099987][ T29] audit: type=1400 audit(430.751:67525): avc: denied { prog_load } for pid=19280 comm="syz.4.5220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.172687][T19284] ================================================================== [ 417.180932][T19284] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 417.188255][T19284] [ 417.190584][T19284] write to 0xffff8881714106c0 of 4 bytes by task 19276 on cpu 1: [ 417.198316][T19284] touch_atime+0x1e8/0x340 [ 417.202758][T19284] shmem_file_read_iter+0x477/0x540 [ 417.207977][T19284] copy_splice_read+0x442/0x660 [ 417.212837][T19284] splice_direct_to_actor+0x290/0x680 [ 417.218250][T19284] do_splice_direct+0xda/0x150 [ 417.223029][T19284] do_sendfile+0x380/0x650 [ 417.227475][T19284] __x64_sys_sendfile64+0x105/0x150 [ 417.232698][T19284] x64_sys_call+0x2bb4/0x3000 [ 417.237394][T19284] do_syscall_64+0xd2/0x200 [ 417.241915][T19284] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 417.247835][T19284] [ 417.250165][T19284] read to 0xffff8881714106c0 of 4 bytes by task 19284 on cpu 0: [ 417.257798][T19284] atime_needs_update+0x25f/0x3e0 [ 417.262860][T19284] touch_atime+0x4a/0x340 [ 417.267213][T19284] shmem_file_read_iter+0x477/0x540 [ 417.272430][T19284] copy_splice_read+0x442/0x660 [ 417.277300][T19284] splice_direct_to_actor+0x290/0x680 [ 417.282725][T19284] do_splice_direct+0xda/0x150 [ 417.287530][T19284] do_sendfile+0x380/0x650 [ 417.291983][T19284] __x64_sys_sendfile64+0x105/0x150 [ 417.297201][T19284] x64_sys_call+0x2bb4/0x3000 [ 417.301909][T19284] do_syscall_64+0xd2/0x200 [ 417.306468][T19284] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 417.312385][T19284] [ 417.314736][T19284] value changed: 0x312ecf75 -> 0x31ceff44 [ 417.320468][T19284] [ 417.322806][T19284] Reported by Kernel Concurrency Sanitizer on: [ 417.328971][T19284] CPU: 0 UID: 0 PID: 19284 Comm: syz.0.5217 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 417.340358][T19284] Tainted: [W]=WARN [ 417.344174][T19284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 417.354246][T19284] ================================================================== [ 417.365252][ T29] audit: type=1400 audit(431.024:67526): avc: denied { create } for pid=19288 comm="syz.4.5223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 417.481575][ T29] audit: type=1400 audit(431.087:67527): avc: denied { map_create } for pid=19285 comm="syz.1.5222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.501464][ T29] audit: type=1400 audit(431.087:67528): avc: denied { map_create } for pid=19285 comm="syz.1.5222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.521280][ T29] audit: type=1400 audit(431.087:67529): avc: denied { prog_load } for pid=19285 comm="syz.1.5222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.540923][ T29] audit: type=1400 audit(431.119:67530): avc: denied { map_create } for pid=19288 comm="syz.4.5223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.560763][ T29] audit: type=1400 audit(431.119:67531): avc: denied { prog_load } for pid=19288 comm="syz.4.5223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.580380][ T29] audit: type=1400 audit(431.119:67532): avc: denied { prog_load } for pid=19288 comm="syz.4.5223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 423.079122][ T3562] page_pool_release_retry() stalled pool shutdown: id 67, 1 inflight 60 sec