last executing test programs: 3.121284369s ago: executing program 4 (id=3745): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x43, 0x1}, 0x10) close(r0) socket(0x10, 0x803, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r3 = syz_usb_connect$printer(0x0, 0x36, 0x0, 0x0) syz_usb_control_io(r3, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000004000010120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006800e97800000000000000000a0000000000000008000500", @ANYRES8=r7], 0x20}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000004380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000001800090400000000000000000a000000000000030000000008001e0001"], 0x24}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x1, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x420}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) getsockopt$WPAN_SECURITY_LEVEL(r6, 0x0, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x4) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) syz_clone(0x80000400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) 3.059972594s ago: executing program 1 (id=3747): sendto$inet6(0xffffffffffffffff, 0x0, 0xffffff89, 0x8810, &(0x7f0000000080)={0xa, 0x4ea0, 0x4, @loopback={0xff00000000000000}, 0x2ab8f1b6}, 0x1c) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffff8, 0x7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='rxrpc_recvmsg\x00', r3}, 0x18) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) recvmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYRES8], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000400000003"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) 2.88345275s ago: executing program 3 (id=3750): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)=ANY=[], 0xffffff6a) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r2, r5, 0xfffffffffffffc01, 0x8) read$msr(r4, &(0x7f0000002140)=""/102400, 0x19000) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = dup(r6) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4da69154e996c57a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="0d000000000000000000000000000000181100007af393ed14127ec41c4db70a34821d5d3d6cca90539e08139bae99eaaee41155ad92497deac75269ff675c52d7cdd7072a6dcd3ec502c2932ced1fa65017063e3eb095785abd", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000003c0)='irq_noise\x00', r0, 0x0, 0x4}, 0xffffffffffffffb5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r7, 0xc04c5349, &(0x7f0000000540)={0xffff, 0x652, 0x5}) r11 = openat$random(0xffffffffffffff9c, &(0x7f0000000a80), 0x8000, 0x0) cachestat(r11, &(0x7f0000000ac0)={0x2, 0x1000}, &(0x7f0000000b00), 0x0) r12 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r12, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat(r12, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r12, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010200000002000000000200ef0a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) 2.577665588s ago: executing program 4 (id=3752): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)=ANY=[], 0xffffff6a) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r2, r5, 0xfffffffffffffc01, 0x8) read$msr(r4, &(0x7f0000002140)=""/102400, 0x19000) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = dup(r6) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x64}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4da69154e996c57a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="0d000000000000000000000000000000181100007af393ed14127ec41c4db70a34821d5d3d6cca90539e08139bae99eaaee41155ad92497deac75269ff675c52d7cdd7072a6dcd3ec502c2932ced1fa65017063e3eb095785abd", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000003c0)='irq_noise\x00', r0, 0x0, 0x4}, 0xffffffffffffffb5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r7, 0xc04c5349, &(0x7f0000000540)={0xffff, 0x652, 0x5}) r11 = openat$random(0xffffffffffffff9c, &(0x7f0000000a80), 0x8000, 0x0) cachestat(r11, &(0x7f0000000ac0)={0x2, 0x1000}, &(0x7f0000000b00), 0x0) r12 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r12, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat(r12, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r12, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010200000002000000000200ef0a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) 2.191793362s ago: executing program 2 (id=3753): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)=ANY=[], 0xffffff6a) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r2, r5, 0xfffffffffffffc01, 0x8) read$msr(r4, &(0x7f0000002140)=""/102400, 0x19000) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = dup(r6) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a3200000000"], 0x64}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4da69154e996c57a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="0d000000000000000000000000000000181100007af393ed14127ec41c4db70a34821d5d3d6cca90539e08139bae99eaaee41155ad92497deac75269ff675c52d7cdd7072a6dcd3ec502c2932ced1fa65017063e3eb095785abd", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000003c0)='irq_noise\x00', r0, 0x0, 0x4}, 0xffffffffffffffb5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r7, 0xc04c5349, &(0x7f0000000540)={0xffff, 0x652, 0x5}) r11 = openat$random(0xffffffffffffff9c, &(0x7f0000000a80), 0x8000, 0x0) cachestat(r11, &(0x7f0000000ac0)={0x2, 0x1000}, &(0x7f0000000b00), 0x0) r12 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r12, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat(r12, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r12, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010200000002000000000200ef0a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) 2.148281696s ago: executing program 1 (id=3754): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, 0x0, 0x2141, 0x59) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000dc0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="dfbf00000000000000", @ANYRES32=r2, @ANYBLOB="0800c300741300000800c4"], 0x30}, 0x1, 0x0, 0x0, 0x240408c3}, 0x0) 2.128268308s ago: executing program 1 (id=3755): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)=ANY=[], 0xffffff6a) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r2, r5, 0xfffffffffffffc01, 0x8) read$msr(r4, &(0x7f0000002140)=""/102400, 0x19000) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = dup(r6) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[], 0x64}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4da69154e996c57a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="0d000000000000000000000000000000181100007af393ed14127ec41c4db70a34821d5d3d6cca90539e08139bae99eaaee41155ad92497deac75269ff675c52d7cdd7072a6dcd3ec502c2932ced1fa65017063e3eb095785abd", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000003c0)='irq_noise\x00', r0, 0x0, 0x4}, 0xffffffffffffffb5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r7, 0xc04c5349, &(0x7f0000000540)={0xffff, 0x652, 0x5}) r11 = openat$random(0xffffffffffffff9c, &(0x7f0000000a80), 0x8000, 0x0) cachestat(r11, &(0x7f0000000ac0)={0x2, 0x1000}, &(0x7f0000000b00), 0x0) r12 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r12, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat(r12, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r12, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010200000002000000000200ef0a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) 2.034480737s ago: executing program 3 (id=3756): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) shutdown(r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300), 0x111, 0x3}}, 0x20) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0xffffffff}, 0x8) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@block_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@norecovery}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") setxattr$security_ima(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)=ANY=[], 0x700, 0x1) rename(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='./file1\x00') unshare(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)={0x90000005}) connect$unix(r3, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) socket(0x25, 0x1, 0x8000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000400000008"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000035f7b6977c7f59bfbfa400000000000007040000f0ffffffb702000008000000182300006031cbb3256f65b61d63ae2e32070b4007bbc834c72c86ebdda77d864d6fd6a4b53c8520b27c9437f37284d65ea5fcbfe94a969afbb333ca67375321b2a7bfe13509401782d84509486fd35174cd015d8efc70d798e068e23fe5ef1489f96f2bce351aacbc59348c511406ad32d59decf68b3dad83caee85402116d67913f60de7a447cfe435ef3f1875933dab419b9f6bef", @ANYRESHEX=r5, @ANYBLOB="0000000000000000b70580000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) io_setup(0x8, &(0x7f0000002740)=0x0) io_pgetevents(r7, 0x2, 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000080)={0x0, 0x989680}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x54, r9, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004840}, 0x40000) 1.911362958s ago: executing program 3 (id=3757): syz_read_part_table(0x5e4, &(0x7f0000000000)="$eJzs3D2LXFUYB/D/uXfeFiLrBxBcSCMKRrETF2Oha7og2gnaWqxILMRCdgcVwZcPYCtaGIUQawUFCWKsrERYYiFib2GacGTuy0xAsZlFCfx+xZznnHue57mXe9sz4c5Wd5Nakuvd7KO2GybNw33wW/L2NFm+8EQy7xOmQ2JJ8tzlJ5+6sHexzNdrq9Xj4ep802U2jJPsDdGXk3xw+eCdLj5OyVGGMNPPZ5ms9tY+78O/3/TNkrbbw/9s8nXtX8QsP+aLJIelXb38ebLMJ8ndWXT7ziVpa63daz5OdpJ2/VVs4cr+teXjQ7yT4Uub9rOjd0t9aLg2Ta21Njk6O2a2yT2Pnbv0T0W7/GX3eONSrXV6ZsxtNhcOb80mw+yR7345ynKxrp7abEqe7CSvnDzzYHcnpa8x3f7xAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4Zfe9ev83zTg53/2Wdfz0p2k2W49z7zreW5xS/yv713bffOtSk9f3X/rp5Td+Pfg9fyRp2xycSebrfS/2w9X3umEyrLZb9z+81cw++/jbnfXCULok35/9+WYdO5wM42uP3pa832zdHwAAAAAAAAAAAAAAAAAAAFau5sLexSbPfnWj5PlsjvvXLJJSxukiqbXWP2tnPPz/w3gOP9dvpKySUsvt1c8nu3cldf7+A93fCvSJtdZJ16L8J4/Iv/grAAD//x/vY/E=") r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = signalfd4(r0, &(0x7f0000000740)={[0xfffffffffffffffb]}, 0x8, 0xc00) r2 = memfd_create(&(0x7f0000000600)='syzkaller\x00', 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) ioctl$BTRFS_IOC_RESIZE(r2, 0x50009403, &(0x7f0000000900)=ANY=[@ANYRES32=r4, @ANYBLOB="000000006d6178cc12b84058b3beb433f77e677e09f6a1e92849e211fb9ce696bdf6cc4490ae463597e62b77f8d3d1e402a29e3b9cfb4daacfef8fa0685d330e5a0f217c0290122b465686d0ed2f54ee61e3193a1209161a5b13d05e46ec5d025d0467f51c934725353b9ec4526c68795fe8a9547cfd1bcfe68a366c60910b4352d475891364188f973b66ef36a7436a1809405f8b789279f8bfb3d4b4720e5892ba70164c05ec8015c1"]) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x6, 0x0}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r7}, 0x18) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r5, @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r11, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{r12}, &(0x7f0000000780)=0x40000000, &(0x7f00000007c0)='%pS \x00', 0x2}, 0x20) sendmsg$nl_route_sched(r10, &(0x7f0000000180)={0x0, 0x18, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r13}, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x6, 0x6}, 0x0, 0x10000, 0xda, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_emit_ethernet(0xfdef, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], 0x0) r14 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r14, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="88010000170a"], 0x188}}, 0x0) r15 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r15, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x6, 0x8, 0x8, 0x4}]}, 0x10) getsockopt$sock_buf(r15, 0x1, 0x1a, 0x0, &(0x7f0000000000)=0x31) sendmsg$NL80211_CMD_SET_TID_CONFIG(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x1c, r9, 0xc4fc9e906872338b, 0x20, 0x200, {{0x15}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) socket$igmp6(0xa, 0x3, 0x2) sendmmsg$unix(r1, &(0x7f0000001980)=[{{&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40}}], 0x1, 0x4008080) 1.821809426s ago: executing program 3 (id=3758): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)=ANY=[], 0xffffff6a) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r2, r5, 0xfffffffffffffc01, 0x8) read$msr(r4, &(0x7f0000002140)=""/102400, 0x19000) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = dup(r6) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x64}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4da69154e996c57a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="0d000000000000000000000000000000181100007af393ed14127ec41c4db70a34821d5d3d6cca90539e08139bae99eaaee41155ad92497deac75269ff675c52d7cdd7072a6dcd3ec502c2932ced1fa65017063e3eb095785abd", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000003c0)='irq_noise\x00', r0, 0x0, 0x4}, 0xffffffffffffffb5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r7, 0xc04c5349, &(0x7f0000000540)={0xffff, 0x652, 0x5}) openat$random(0xffffffffffffff9c, &(0x7f0000000a80), 0x8000, 0x0) r11 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r11, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat(r11, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r11, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010200000002000000000200ef0a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) 1.705645056s ago: executing program 4 (id=3760): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x43, 0x1}, 0x10) close(r0) socket(0x10, 0x803, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', r1}, 0x18) r3 = syz_usb_connect$printer(0x0, 0x36, 0x0, 0x0) syz_usb_control_io(r3, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000004000010120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006800e97800000000000000000a0000000000000008000500", @ANYRES8=r7], 0x20}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000004380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000001800090400000000000000000a000000000000030000000008001e0001"], 0x24}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x1, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x420}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) getsockopt$WPAN_SECURITY_LEVEL(r6, 0x0, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x4) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) syz_clone(0x80000400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) 1.629610393s ago: executing program 0 (id=3763): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) shutdown(r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xfffc, 0x2, @ipv4={'\x00', '\xff\xff', @empty}, 0x101}, {0xa, 0xffff, 0xfffffffe, @private0, 0x1}, 0xffffffffffffffff, 0x40099d}}, 0x48) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0xffffffff}, 0x8) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@block_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@norecovery}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") setxattr$security_ima(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)=ANY=[], 0x700, 0x1) rename(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='./file1\x00') unshare(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)={0x90000005}) connect$unix(r3, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) socket(0x25, 0x1, 0x8000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000400000008"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000035f7b6977c7f59bfbfa400000000000007040000f0ffffffb702000008000000182300006031cbb3256f65b61d63ae2e32070b4007bbc834c72c86ebdda77d864d6fd6a4b53c8520b27c9437f37284d65ea5fcbfe94a969afbb333ca67375321b2a7bfe13509401782d84509486fd35174cd015d8efc70d798e068e23fe5ef1489f96f2bce351aacbc59348c511406ad32d59decf68b3dad83caee85402116d67913f60de7a447cfe435ef3f1875933dab419b9f6bef", @ANYRESHEX=r5, @ANYBLOB="0000000000000000b70580000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) io_setup(0x8, &(0x7f0000002740)=0x0) io_pgetevents(r7, 0x2, 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000080)={0x0, 0x989680}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x54, r9, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004840}, 0x40000) 1.511169794s ago: executing program 0 (id=3764): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRES32=r1, @ANYRES64=r1], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x400000d, 0x5d031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f00000004c0)={[{@dioread_lock}, {@noblock_validity}, {@abort}, {@dioread_lock}, {@stripe={'stripe', 0x3d, 0x1f5}}, {@grpjquota, 0x2e}, {@barrier}, {@nolazytime}, {@jqfmt_vfsv1}, {@grpid}], [], 0x2c}, 0x84, 0x4aa, &(0x7f0000000740)="$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") r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x2000, 0x0) r5 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r5, 0x0, 0x0, 0x120, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x401, 0x70bd2c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x401c0}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) r7 = socket$inet(0x2, 0x2, 0x1) setsockopt$sock_int(r7, 0x1, 0x5, &(0x7f0000000340)=0x6, 0x4) r8 = socket$packet(0x11, 0x2, 0x300) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x10) setsockopt$packet_tx_ring(r8, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) setsockopt$packet_rx_ring(r8, 0x107, 0x5, &(0x7f0000000100)=@req3={0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x861}, 0x1c) sendmsg$inet(r7, &(0x7f0000001040)={&(0x7f0000000040)={0x2, 0xffff, @broadcast}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000940b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20008024) getdents(r4, 0x0, 0x54) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000000000)={&(0x7f00000002c0)={0x2, 0xffff, @private=0xa010100}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@cswp={0x58, 0x114, 0x7, {{0x1, 0x3}, &(0x7f0000000140)=0x4, 0x0, 0x2, 0x3ff, 0xd, 0x8000000000000000, 0x8, 0x2}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfffffff4, 0x5}, 0x0, 0x0, 0x1c4f, 0x5, 0x8, 0x8, 0x13}}], 0xb0}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 1.431874601s ago: executing program 0 (id=3765): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRES32=r1, @ANYRES64=r1], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x400000d, 0x5d031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f00000004c0)={[{@dioread_lock}, {@noblock_validity}, {@abort}, {@dioread_lock}, {@stripe={'stripe', 0x3d, 0x1f5}}, {@grpjquota, 0x2e}, {@barrier}, {@nolazytime}, {@jqfmt_vfsv1}, {@grpid}], [], 0x2c}, 0x84, 0x4aa, &(0x7f0000000740)="$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") openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x2000, 0x0) r4 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r4, 0x0, 0x0, 0x120, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x401, 0x70bd2c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x401c0}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) r6 = socket$inet(0x2, 0x2, 0x1) setsockopt$sock_int(r6, 0x1, 0x5, &(0x7f0000000340)=0x6, 0x4) socket$packet(0x11, 0x2, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000000000)={&(0x7f00000002c0)={0x2, 0xffff, @private=0xa010100}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@cswp={0x58, 0x114, 0x7, {{0x1, 0x3}, &(0x7f0000000140)=0x4, 0x0, 0x2, 0x3ff, 0xd, 0x8000000000000000, 0x8, 0x2}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfffffff4, 0x5}, 0x0, 0x0, 0x1c4f, 0x5, 0x8, 0x8, 0x13}}], 0xb0}, 0x0) 1.397959244s ago: executing program 0 (id=3766): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x2, 0xbf22, 0x1, 0xffffffffffffffff, 0xfffffffe}, 0x50) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext2\x00', &(0x7f00000007c0)='./file0/../file0\x00', 0xa00008, &(0x7f0000000540), 0x1, 0x7d1, &(0x7f0000001a80)="$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") r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f0000000a40)='GPL\x00', 0x4, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0x10001}, 0x18) sendto$inet6(r1, &(0x7f0000000040)='l', 0x1, 0xf5, &(0x7f0000000100)={0xa, 0x4e23, 0xfffffffe, @loopback}, 0x1c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0xa002a0}, 0x38) r3 = socket(0x15, 0x80005, 0x0) getsockopt(r3, 0x200000000114, 0x271a, 0xffffffffffffffff, &(0x7f0000000000)=0x7ffff000) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000001c0)={@empty, @empty, 0x0}, &(0x7f00000003c0)=0xc) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000800)={@local, @private0={0xfc, 0x0, '\x00', 0x81}, @loopback, 0x3, 0x1, 0x9, 0x200, 0x2, 0x48002c, r4}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000005c0)="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", &(0x7f0000000240)="30f49a744b530da2cd2aef0779dba7654922b425999648db863129cab9a24be8b4bb334840cccbd524e37d21ca9a50a4e66752bb26e370b739398001508a63133171a1909a1d62c7bf3491ddc3ad825e6a595370c3fb61f70fed246803a8f6b354b479735f802d", 0x1fd, r0}, 0x38) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @local}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/17, 0x11}], 0x1, 0x0, 0x402) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000a80)='kfree\x00', r7}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000006000000faffffff95"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000580)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x9, 0x7ffc0006}]}) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) write$tun(r8, &(0x7f0000000440)=ANY=[], 0x58) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff"], 0x48) 1.349786468s ago: executing program 0 (id=3767): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)=ANY=[], 0xffffff6a) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r2, r5, 0xfffffffffffffc01, 0x8) read$msr(r4, &(0x7f0000002140)=""/102400, 0x19000) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = dup(r6) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x64}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4da69154e996c57a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="0d000000000000000000000000000000181100007af393ed14127ec41c4db70a34821d5d3d6cca90539e08139bae99eaaee41155ad92497deac75269ff675c52d7cdd7072a6dcd3ec502c2932ced1fa65017063e3eb095785abd", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000003c0)='irq_noise\x00', r0, 0x0, 0x4}, 0xffffffffffffffb5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r7, 0xc04c5349, &(0x7f0000000540)={0xffff, 0x652, 0x5}) r11 = openat$random(0xffffffffffffff9c, &(0x7f0000000a80), 0x8000, 0x0) cachestat(r11, &(0x7f0000000ac0)={0x2, 0x1000}, &(0x7f0000000b00), 0x0) r12 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r12, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat(r12, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r12, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010200000002000000000200ef0a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) 1.337364769s ago: executing program 2 (id=3768): r0 = syz_create_resource$binfmt(&(0x7f0000001400)='./file0\x00') openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) truncate(&(0x7f0000000380)='./file0\x00', 0x361) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r1, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000007c0)=[0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x0, 0xb, &(0x7f0000000840)=[{}], 0x8, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xec, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b40)={0x98, 0x0, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x4008801) r3 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[0x4], 0x0, 0x0, 0x1, 0x1}}, 0x40) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x8}, 0x20000810) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r3, 0x58, &(0x7f00000002c0)}, 0x10) 1.301981893s ago: executing program 2 (id=3769): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x2, 0xbf22, 0x1, 0xffffffffffffffff, 0xfffffffe}, 0x50) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext2\x00', &(0x7f00000007c0)='./file0/../file0\x00', 0xa00008, &(0x7f0000000540), 0x1, 0x7d1, &(0x7f0000001a80)="$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") r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f0000000a40)='GPL\x00', 0x4, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0x10001}, 0x18) sendto$inet6(r1, &(0x7f0000000040)='l', 0x1, 0xf5, &(0x7f0000000100)={0xa, 0x4e23, 0xfffffffe, @loopback}, 0x1c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0xa002a0}, 0x38) r3 = socket(0x15, 0x80005, 0x0) getsockopt(r3, 0x200000000114, 0x271a, 0xffffffffffffffff, &(0x7f0000000000)=0x7ffff000) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000001c0)={@empty, @empty, 0x0}, &(0x7f00000003c0)=0xc) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000800)={@local, @private0={0xfc, 0x0, '\x00', 0x81}, @loopback, 0x3, 0x1, 0x9, 0x200, 0x2, 0x48002c, r4}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000005c0)="d2e7a77b8774b3dab0d6f7d3cbe095fdffffffffffffff9c13cb1485fb5f8dab42ab749bc509f941dceeb1d6a27e445a9966d121156a81022b4b38b8f147132cea9fc33fec7b9105a0016c96ca8d0ffa2f54c94c98eca59d939e9a76e6946edaeab542b8e7a9baadf516d11c5b96ec84ef27697e236e772f9c27a244277b5a1a8365e0c1def17d0014145812379541041026724629ead78ab889b22001abe478037cabc37ef54d7e8c1f82faa216763b865127140b55a5021a112eb595fcabeddf9ce0cfb0d153b8ab8cec42810b4ddd92bf25e05d6054e847860daccb1fccace1bb9678b9a26b3223103d22778a6f28852f4506fc5798a6268413d51535cb736353a7daddf8d0bea38044671ecc2881ca039b911d78f400924eabd6fa7a3626303841b8924e7ae83f3cf52fc586a5507a51db3fb69a28f233027af4c9f798fd620acca82e1887c53206f3e38c14f62010d56f1fdaf8ae0c95f42f9ef24a97175ff2a92c80e72a000fcdf9785a25c192d5166d76a90752b5b1237fe60856a1193e5651db3a4d399372795187243042b1e404082a988c49f8ac6d39189d41864d8ac98569785b1b71f9433dbf0d47e544d494c63b86f40a7ed753818c06298afabfe871052429df30a548876e898a7745f1d631cc4e4215b273f11bb26793", &(0x7f0000000240)="30f49a744b530da2cd2aef0779dba7654922b425999648db863129cab9a24be8b4bb334840cccbd524e37d21ca9a50a4e66752bb26e370b739398001508a63133171a1909a1d62c7bf3491ddc3ad825e6a595370c3fb61f70fed246803a8f6b354b479735f802d", 0x1fd, r0}, 0x38) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @local}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/17, 0x11}], 0x1, 0x0, 0x402) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000a80)='kfree\x00', r7}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000006000000faffffff95"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000580)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x9, 0x7ffc0006}]}) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) write$tun(r8, &(0x7f0000000440)=ANY=[], 0x58) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff"], 0x48) 1.253892897s ago: executing program 1 (id=3770): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRES32=r1, @ANYRES64=r1], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x400000d, 0x5d031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f00000004c0)={[{@dioread_lock}, {@noblock_validity}, {@abort}, {@dioread_lock}, {@stripe={'stripe', 0x3d, 0x1f5}}, {@grpjquota, 0x2e}, {@barrier}, {@nolazytime}, {@jqfmt_vfsv1}, {@grpid}], [], 0x2c}, 0x84, 0x4aa, &(0x7f0000000740)="$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") r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x2000, 0x0) r5 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r5, 0x0, 0x0, 0x120, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x401, 0x70bd2c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x401c0}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) r7 = socket$inet(0x2, 0x2, 0x1) setsockopt$sock_int(r7, 0x1, 0x5, &(0x7f0000000340)=0x6, 0x4) r8 = socket$packet(0x11, 0x2, 0x300) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x10) setsockopt$packet_tx_ring(r8, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) setsockopt$packet_rx_ring(r8, 0x107, 0x5, &(0x7f0000000100)=@req3={0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x861}, 0x1c) sendmsg$inet(r7, &(0x7f0000001040)={&(0x7f0000000040)={0x2, 0xffff, @broadcast}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000940b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20008024) getdents(r4, 0x0, 0x54) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000000000)={&(0x7f00000002c0)={0x2, 0xffff, @private=0xa010100}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@cswp={0x58, 0x114, 0x7, {{0x1, 0x3}, &(0x7f0000000140)=0x4, 0x0, 0x2, 0x3ff, 0xd, 0x8000000000000000, 0x8, 0x2}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfffffff4, 0x5}, 0x0, 0x0, 0x1c4f, 0x5, 0x8, 0x8, 0x13}}], 0xb0}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 1.163735265s ago: executing program 2 (id=3771): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)=ANY=[], 0xffffff6a) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r2, r5, 0xfffffffffffffc01, 0x8) read$msr(r4, &(0x7f0000002140)=""/102400, 0x19000) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = dup(r6) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x64}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4da69154e996c57a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="0d000000000000000000000000000000181100007af393ed14127ec41c4db70a34821d5d3d6cca90539e08139bae99eaaee41155ad92497deac75269ff675c52d7cdd7072a6dcd3ec502c2932ced1fa65017063e3eb095785abd", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000003c0)='irq_noise\x00', r0, 0x0, 0x4}, 0xffffffffffffffb5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r7, 0xc04c5349, &(0x7f0000000540)={0xffff, 0x652, 0x5}) openat$random(0xffffffffffffff9c, &(0x7f0000000a80), 0x8000, 0x0) r11 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r11, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat(r11, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r11, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010200000002000000000200ef0a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) 1.152508346s ago: executing program 4 (id=3772): unshare(0x6a040000) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r0, 0x0, 0x5}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2], 0x38}, 0x1, 0x0, 0x0, 0x4000011}, 0x4c080) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00736fc8ec053fcf24e1b038df84000000"], 0x50) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x7, 0x0, 0x0, 0x3, 0x82, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xf}, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000000000007}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x4e, 0x5, 0x0, 0x0, 0x0, 0xee, 0x80420, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff031, 0x3}, 0x103d0, 0x0, 0x0, 0x9, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0xb, &(0x7f00000001c0), 0x6a) r6 = socket$kcm(0x2d, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000000c0)={r7}) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000040)={r7}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000002000000000408000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7f8ffffff0000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000f80000b7020000010000008500000084000000b7000000000000009500000000000000e6aee5aa27f5eae6e9e498502635fb38f4a7165baaf837548acc1842bb13a7a19d901eba47dfec28ebf49cb66bab24aa55c06f3d7c0c5b36934e9521a53fdfbbe6d73bcdeea1c263d6050c999ef17c73b09a57f19ee86bad294f73473c50ffeff27ff4186531693d27b86f96fe6044d676f10ec9d89930ae9b28aded378038ee9599a6a66ba0dd64abfff5015a54aaaf60794618daa4cc6a18a44e1cb57f15791fdc15a7d8b3a7503ff0c8e35d"], &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r8, 0x0, &(0x7f0000000000)) add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000001c0)='percpu_destroy_chunk\x00', r3, 0x0, 0x8000100000001}, 0x18) r9 = syz_open_dev$usbfs(&(0x7f0000000000), 0x70, 0x103301) ioctl$USBDEVFS_IOCTL(r9, 0xc0105512, &(0x7f0000000200)) 912.006317ms ago: executing program 1 (id=3773): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x2000c16, &(0x7f0000000280)={[{@usrquota}, {@nodelalloc}]}, 0xff, 0x25e, &(0x7f0000000e80)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x45) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000140)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2141, 0x59) pwrite64(r5, &(0x7f0000000140)="f6", 0xffffff07, 0x8000c61) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000dc0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="dfbf00000000000000006700000008000300", @ANYRES32=r2, @ANYBLOB="0800c300741300000800c4"], 0x30}, 0x1, 0x0, 0x0, 0x240408c3}, 0x0) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000240)={0x0, 0x800}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x10, @multicast1}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000018c0)=ANY=[@ANYRES32=r8], 0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200)={r8, 0x3}, 0x8) fsetxattr$security_selinux(r7, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000400)='kfree\x00', r9}, 0x18) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000080)='system_u:object_r:hald_exec_t:s0\x00', 0x21) close_range(r6, r10, 0x2) 850.627203ms ago: executing program 3 (id=3774): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x2000c16, &(0x7f0000000280)={[{@usrquota}, {@nodelalloc}]}, 0xff, 0x25e, &(0x7f0000000e80)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x45) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000140)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2141, 0x59) pwrite64(r5, &(0x7f0000000140)="f6", 0xffffff07, 0x8000c61) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000dc0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="dfbf00000000000000006700000008000300", @ANYRES32=r2, @ANYBLOB="0800c300741300000800c4"], 0x30}, 0x1, 0x0, 0x0, 0x240408c3}, 0x0) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000240)={0x0, 0x800}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x10, @multicast1}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000018c0)=ANY=[@ANYRES32=r8], 0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200)={r8, 0x3}, 0x8) fsetxattr$security_selinux(r7, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000400)='kfree\x00', r9}, 0x18) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000080)='system_u:object_r:hald_exec_t:s0\x00', 0x21) close_range(r6, r10, 0x2) 787.447609ms ago: executing program 4 (id=3775): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x2, 0xbf22, 0x1, 0xffffffffffffffff, 0xfffffffe}, 0x50) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext2\x00', &(0x7f00000007c0)='./file0/../file0\x00', 0xa00008, &(0x7f0000000540), 0x1, 0x7d1, &(0x7f0000001a80)="$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") setsockopt(r1, 0x84, 0x81, &(0x7f0000000400)="04b23ea2010e3d3d431977145c6d8285a381d63ce684", 0x16) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f0000000a40)='GPL\x00', 0x4, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0x10001}, 0x18) sendto$inet6(r1, &(0x7f0000000040)='l', 0x1, 0xf5, &(0x7f0000000100)={0xa, 0x4e23, 0xfffffffe, @loopback}, 0x1c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0xa002a0}, 0x38) r3 = socket(0x15, 0x80005, 0x0) getsockopt(r3, 0x200000000114, 0x271a, 0xffffffffffffffff, &(0x7f0000000000)=0x7ffff000) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000001c0)={@empty, @empty, 0x0}, &(0x7f00000003c0)=0xc) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000800)={@local, @private0={0xfc, 0x0, '\x00', 0x81}, @loopback, 0x3, 0x1, 0x9, 0x200, 0x2, 0x48002c, r4}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000005c0)="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", &(0x7f0000000240)="30f49a744b530da2cd2aef0779dba7654922b425999648db863129cab9a24be8b4bb334840cccbd524e37d21ca9a50a4e66752bb26e370b739398001508a63133171a1909a1d62c7bf3491ddc3ad825e6a595370c3fb61f70fed246803a8f6b354b479735f802d", 0x1fd, r0}, 0x38) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @local}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/17, 0x11}], 0x1, 0x0, 0x402) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000a80)='kfree\x00', r7}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000006000000faffffff95"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000580)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x9, 0x7ffc0006}]}) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) write$tun(r8, &(0x7f0000000440)=ANY=[], 0x58) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff"], 0x48) 683.303818ms ago: executing program 4 (id=3776): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)=ANY=[], 0xffffff6a) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r2, r5, 0xfffffffffffffc01, 0x8) read$msr(r4, &(0x7f0000002140)=""/102400, 0x19000) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = dup(r6) sendmsg$IPSET_CMD_CREATE(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4da69154e996c57a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="0d000000000000000000000000000000181100007af393ed14127ec41c4db70a34821d5d3d6cca90539e08139bae99eaaee41155ad92497deac75269ff675c52d7cdd7072a6dcd3ec502c2932ced1fa65017063e3eb095785abd", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000003c0)='irq_noise\x00', r0, 0x0, 0x4}, 0xffffffffffffffb5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r7, 0xc04c5349, &(0x7f0000000540)={0xffff, 0x652, 0x5}) r11 = openat$random(0xffffffffffffff9c, &(0x7f0000000a80), 0x8000, 0x0) cachestat(r11, &(0x7f0000000ac0)={0x2, 0x1000}, &(0x7f0000000b00), 0x0) r12 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r12, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat(r12, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r12, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010200000002000000000200ef0a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) 562.997339ms ago: executing program 1 (id=3777): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRES32=r1, @ANYRES64=r1], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x400000d, 0x5d031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f00000004c0)={[{@dioread_lock}, {@noblock_validity}, {@abort}, {@dioread_lock}, {@stripe={'stripe', 0x3d, 0x1f5}}, {@grpjquota, 0x2e}, {@barrier}, {@nolazytime}, {@jqfmt_vfsv1}, {@grpid}], [], 0x2c}, 0x84, 0x4aa, &(0x7f0000000740)="$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") r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x2000, 0x0) r5 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r5, 0x0, 0x0, 0x120, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x401, 0x70bd2c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x401c0}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) r7 = socket$inet(0x2, 0x2, 0x1) setsockopt$sock_int(r7, 0x1, 0x5, &(0x7f0000000340)=0x6, 0x4) r8 = socket$packet(0x11, 0x2, 0x300) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x10) setsockopt$packet_tx_ring(r8, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) setsockopt$packet_rx_ring(r8, 0x107, 0x5, &(0x7f0000000100)=@req3={0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x861}, 0x1c) sendmsg$inet(r7, &(0x7f0000001040)={&(0x7f0000000040)={0x2, 0xffff, @broadcast}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000940b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20008024) getdents(r4, 0x0, 0x54) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000000000)={&(0x7f00000002c0)={0x2, 0xffff, @private=0xa010100}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@cswp={0x58, 0x114, 0x7, {{0x1, 0x3}, &(0x7f0000000140)=0x4, 0x0, 0x2, 0x3ff, 0xd, 0x8000000000000000, 0x8, 0x2}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfffffff4, 0x5}, 0x0, 0x0, 0x1c4f, 0x5, 0x8, 0x8, 0x13}}], 0xb0}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 449.020869ms ago: executing program 0 (id=3778): unshare(0x6a040000) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r1, 0x0, 0x5}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3], 0x38}, 0x1, 0x0, 0x0, 0x4000011}, 0x4c080) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00736fc8ec053fcf24e1b038df84000000"], 0x50) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r6, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x7, 0x0, 0x0, 0x3, 0x82, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xf}, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000000000007}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x4e, 0x5, 0x0, 0x0, 0x0, 0xee, 0x80420, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff031, 0x3}, 0x103d0, 0x0, 0x0, 0x9, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0xb, &(0x7f00000001c0), 0x6a) r7 = socket$kcm(0x2d, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f00000000c0)={r8}) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000040)={r8}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000002000000000408000018110000", @ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r9, 0x0, &(0x7f0000000000)) add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000001c0)='percpu_destroy_chunk\x00', r4, 0x0, 0x8000100000001}, 0x18) r10 = syz_open_dev$usbfs(&(0x7f0000000000), 0x70, 0x103301) ioctl$USBDEVFS_IOCTL(r10, 0xc0105512, &(0x7f0000000200)) 302.416542ms ago: executing program 2 (id=3779): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRES32=r1, @ANYRES64=r1], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x400000d, 0x5d031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f00000004c0)={[{@dioread_lock}, {@noblock_validity}, {@abort}, {@dioread_lock}, {@stripe={'stripe', 0x3d, 0x1f5}}, {@grpjquota, 0x2e}, {@barrier}, {@nolazytime}, {@jqfmt_vfsv1}, {@grpid}], [], 0x2c}, 0x84, 0x4aa, &(0x7f0000000740)="$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") openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x2000, 0x0) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r3, 0x0, 0x0, 0x120, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x401, 0x70bd2c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x401c0}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000340)=0x6, 0x4) socket$packet(0x11, 0x2, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000040)={0x2, 0xffff, @broadcast}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000940b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20008024) 278.941944ms ago: executing program 3 (id=3780): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x2, 0xbf22, 0x1, 0xffffffffffffffff, 0xfffffffe}, 0x50) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext2\x00', &(0x7f00000007c0)='./file0/../file0\x00', 0xa00008, &(0x7f0000000540), 0x1, 0x7d1, &(0x7f0000001a80)="$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") setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f0000000400)="04b23ea2010e3d3d431977145c6d8285a381d63ce684", 0x16) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f0000000a40)='GPL\x00', 0x4, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x10001}, 0x18) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)='l', 0x1, 0xf5, &(0x7f0000000100)={0xa, 0x4e23, 0xfffffffe, @loopback}, 0x1c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0xa002a0}, 0x38) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x200000000114, 0x271a, 0xffffffffffffffff, &(0x7f0000000000)=0x7ffff000) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f00000001c0)={@empty, @empty, 0x0}, &(0x7f00000003c0)=0xc) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000800)={@local, @private0={0xfc, 0x0, '\x00', 0x81}, @loopback, 0x3, 0x1, 0x9, 0x200, 0x2, 0x48002c, r3}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000005c0)="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", &(0x7f0000000240)="30f49a744b530da2cd2aef0779dba7654922b425999648db863129cab9a24be8b4bb334840cccbd524e37d21ca9a50a4e66752bb26e370b739398001508a63133171a1909a1d62c7bf3491ddc3ad825e6a595370c3fb61f70fed246803a8f6b354b479735f802d", 0x1fd, r0}, 0x38) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @local}, 0xc) r5 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r5, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/17, 0x11}], 0x1, 0x0, 0x402) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000006000000faffffff95"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000580)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x9, 0x7ffc0006}]}) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) write$tun(r7, &(0x7f0000000440)=ANY=[], 0x58) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff"], 0x48) 0s ago: executing program 2 (id=3781): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)=ANY=[], 0xffffff6a) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r2, r5, 0xfffffffffffffc01, 0x8) read$msr(r4, &(0x7f0000002140)=""/102400, 0x19000) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = dup(r6) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a3200000000050001000700000014000780"], 0x64}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4da69154e996c57a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="0d000000000000000000000000000000181100007af393ed14127ec41c4db70a34821d5d3d6cca90539e08139bae99eaaee41155ad92497deac75269ff675c52d7cdd7072a6dcd3ec502c2932ced1fa65017063e3eb095785abd", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000003c0)='irq_noise\x00', r0, 0x0, 0x4}, 0xffffffffffffffb5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r7, 0xc04c5349, &(0x7f0000000540)={0xffff, 0x652, 0x5}) r11 = openat$random(0xffffffffffffff9c, &(0x7f0000000a80), 0x8000, 0x0) cachestat(r11, &(0x7f0000000ac0)={0x2, 0x1000}, &(0x7f0000000b00), 0x0) r12 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r12, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat(r12, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r12, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010200000002000000000200ef0a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) kernel console output (not intermixed with test programs): 418.250877][T16930] Symlink component flag not implemented [ 418.257376][T16928] netlink: 8 bytes leftover after parsing attributes in process `'. [ 418.265708][T16928] netlink: 8 bytes leftover after parsing attributes in process `'. [ 418.273866][T16930] Symlink component flag not implemented (7) [ 418.280010][T16930] Symlink component flag not implemented (116) [ 418.286495][T16928] netlink: 8 bytes leftover after parsing attributes in process `'. [ 418.298139][T16928] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 418.306163][T16931] netlink: 8 bytes leftover after parsing attributes in process `'. [ 418.319887][T16930] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3251'. [ 418.330508][T16930] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3251'. [ 418.359870][T16930] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3251'. [ 419.298810][T16954] loop2: detected capacity change from 0 to 164 [ 419.320622][T16954] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 419.450583][T16957] loop1: detected capacity change from 0 to 164 [ 419.466555][T16957] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 419.479930][T16954] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 419.488899][T16954] Symlink component flag not implemented [ 419.494591][T16954] Symlink component flag not implemented [ 419.500991][T16954] Symlink component flag not implemented (7) [ 419.507108][T16954] Symlink component flag not implemented (116) [ 419.514375][T16957] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 419.523023][T16957] Symlink component flag not implemented [ 419.528743][T16957] Symlink component flag not implemented [ 419.535311][T16957] Symlink component flag not implemented (7) [ 419.541395][T16957] Symlink component flag not implemented (116) [ 419.548940][T16954] netlink: 8 bytes leftover after parsing attributes in process `'. [ 419.567083][T16957] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 419.643116][T16964] netlink: 'syz.1.3262': attribute type 1 has an invalid length. [ 420.035656][T16976] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 420.826308][ T29] kauditd_printk_skb: 1364 callbacks suppressed [ 420.826328][ T29] audit: type=1326 audit(420.817:70774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16986 comm="syz.0.3271" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 420.860311][T16988] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 420.867073][ T29] audit: type=1326 audit(420.847:70775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16986 comm="syz.0.3271" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 420.891955][ T29] audit: type=1326 audit(420.847:70776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16986 comm="syz.0.3271" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 420.915059][ T29] audit: type=1326 audit(420.847:70777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16986 comm="syz.0.3271" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 420.938135][ T29] audit: type=1326 audit(420.847:70778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16986 comm="syz.0.3271" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 420.961128][ T29] audit: type=1326 audit(420.847:70779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16986 comm="syz.0.3271" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 420.984064][ T29] audit: type=1326 audit(420.847:70780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16986 comm="syz.0.3271" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 421.007092][ T29] audit: type=1326 audit(420.847:70781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16986 comm="syz.0.3271" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 421.030023][ T29] audit: type=1326 audit(420.847:70782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16986 comm="syz.0.3271" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 421.053198][ T29] audit: type=1326 audit(420.847:70783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16986 comm="syz.0.3271" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ffb1dfc1667 code=0x7ffc0000 [ 421.111524][T16993] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 421.333854][T16995] loop2: detected capacity change from 0 to 164 [ 421.342246][T16995] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 421.352895][T16995] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 421.361889][T16995] Symlink component flag not implemented [ 421.367738][T16995] Symlink component flag not implemented [ 421.373853][T16995] Symlink component flag not implemented (7) [ 421.380153][T16995] Symlink component flag not implemented (116) [ 421.415318][T16997] loop2: detected capacity change from 0 to 164 [ 421.422742][T16997] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 421.432475][T16997] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 421.440884][T16997] Symlink component flag not implemented [ 421.446670][T16997] Symlink component flag not implemented [ 421.452590][T16997] Symlink component flag not implemented (7) [ 421.458742][T16997] Symlink component flag not implemented (116) [ 421.608714][T17001] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 421.654982][T17005] loop2: detected capacity change from 0 to 164 [ 421.678671][T17003] $Hÿ: left promiscuous mode [ 421.683570][T17005] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 421.692479][T17003] dummy0: left promiscuous mode [ 421.717756][T17005] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 421.730442][T17005] Symlink component flag not implemented [ 421.736294][T17005] Symlink component flag not implemented [ 421.747247][T17005] Symlink component flag not implemented (7) [ 421.753307][T17005] Symlink component flag not implemented (116) [ 421.823264][T17003] team1: left promiscuous mode [ 421.828193][T17003] team1: left allmulticast mode [ 421.834968][T17003] geneve2: left promiscuous mode [ 421.840038][T17003] geneve2: left allmulticast mode [ 421.845772][T16912] lo speed is unknown, defaulting to 1000 [ 421.851770][T16912] syz2: Port: 1 Link DOWN [ 421.861248][T10357] netdevsim netdevsim3 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.873088][T10357] netdevsim netdevsim3 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.909706][T10357] netdevsim netdevsim3 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.936936][T10357] netdevsim netdevsim3 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.998526][T17018] loop4: detected capacity change from 0 to 164 [ 422.010089][T17018] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 422.026862][T17018] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 422.035691][T17018] Symlink component flag not implemented [ 422.041614][T17018] Symlink component flag not implemented [ 422.055155][T17018] Symlink component flag not implemented (7) [ 422.061271][T17018] Symlink component flag not implemented (116) [ 422.125898][T17023] netlink: 'syz.4.3286': attribute type 1 has an invalid length. [ 422.761923][T17035] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 422.925018][T17033] __nla_validate_parse: 28 callbacks suppressed [ 422.925086][T17033] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3289'. [ 422.940505][T17033] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3289'. [ 423.044796][T17041] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 423.114221][T17044] loop4: detected capacity change from 0 to 164 [ 423.136346][T17044] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 423.162949][T17044] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 423.171991][T17044] Symlink component flag not implemented [ 423.177705][T17044] Symlink component flag not implemented [ 423.184414][T17044] Symlink component flag not implemented (7) [ 423.190468][T17044] Symlink component flag not implemented (116) [ 423.202425][T17044] netlink: 8 bytes leftover after parsing attributes in process `'. [ 423.213296][T17044] netlink: 8 bytes leftover after parsing attributes in process `'. [ 423.222724][T17044] netlink: 8 bytes leftover after parsing attributes in process `'. [ 423.231372][T17044] netlink: 8 bytes leftover after parsing attributes in process `'. [ 423.310687][T17048] netlink: 'syz.4.3294': attribute type 1 has an invalid length. [ 423.318549][T17048] netlink: 224 bytes leftover after parsing attributes in process `syz.4.3294'. [ 423.412056][T17052] loop2: detected capacity change from 0 to 164 [ 423.422623][T17052] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 423.433526][T17052] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 423.443097][T17052] Symlink component flag not implemented [ 423.448811][T17052] Symlink component flag not implemented [ 423.460551][T17052] Symlink component flag not implemented (7) [ 423.466653][T17052] Symlink component flag not implemented (116) [ 423.481993][T17052] netlink: 8 bytes leftover after parsing attributes in process `'. [ 423.491204][T17052] netlink: 8 bytes leftover after parsing attributes in process `'. [ 423.500789][T17052] netlink: 8 bytes leftover after parsing attributes in process `'. [ 423.583104][T17054] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 423.680383][T17064] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 423.745099][T17067] loop2: detected capacity change from 0 to 164 [ 423.754732][T17067] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 423.756949][T17069] loop1: detected capacity change from 0 to 164 [ 423.779309][T17069] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 423.781119][T17067] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 423.803740][T17067] Symlink component flag not implemented [ 423.809643][T17067] Symlink component flag not implemented [ 423.815539][T17067] Symlink component flag not implemented (7) [ 423.821662][T17067] Symlink component flag not implemented (116) [ 423.828941][T17069] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 423.847389][T17069] Symlink component flag not implemented [ 423.853115][T17069] Symlink component flag not implemented [ 423.859069][T17069] Symlink component flag not implemented (7) [ 423.865186][T17069] Symlink component flag not implemented (116) [ 423.876441][T17071] loop2: detected capacity change from 0 to 164 [ 423.885548][T17071] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 423.895370][T17071] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 423.904032][T17071] Symlink component flag not implemented [ 423.909760][T17071] Symlink component flag not implemented [ 423.921537][T17071] Symlink component flag not implemented (7) [ 423.927642][T17071] Symlink component flag not implemented (116) [ 423.940005][T17073] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 424.064333][T17083] loop1: detected capacity change from 0 to 164 [ 424.075291][T17083] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 424.084926][T17083] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 424.093443][T17083] Symlink component flag not implemented [ 424.099174][T17083] Symlink component flag not implemented [ 424.103785][T17084] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 424.106224][T17083] Symlink component flag not implemented (7) [ 424.119452][T17083] Symlink component flag not implemented (116) [ 424.130323][T17085] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 424.145168][T17083] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 424.180226][T17089] loop1: detected capacity change from 0 to 164 [ 424.189223][T17089] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 424.201338][T17089] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 424.209939][T17089] Symlink component flag not implemented [ 424.215706][T17089] Symlink component flag not implemented [ 424.221600][T17089] Symlink component flag not implemented (7) [ 424.227715][T17089] Symlink component flag not implemented (116) [ 424.238098][T17089] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 424.544298][T17094] loop1: detected capacity change from 0 to 512 [ 424.834058][T17094] EXT4-fs (loop1): failed to open journal device unknown-block(0,0) -6 [ 424.970891][T17108] netlink: 'syz.4.3318': attribute type 1 has an invalid length. [ 424.987313][T17092] wg1 speed is unknown, defaulting to 1000 [ 424.993710][T17092] lo speed is unknown, defaulting to 1000 [ 425.151172][T17113] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 425.263894][T17118] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 425.354209][T17120] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 425.761894][T17128] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 425.836223][ T29] kauditd_printk_skb: 1034 callbacks suppressed [ 425.836241][ T29] audit: type=1326 audit(425.827:71818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17121 comm="syz.2.3323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5d076165e7 code=0x7ffc0000 [ 425.865805][ T29] audit: type=1326 audit(425.827:71819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17121 comm="syz.2.3323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5d075bb829 code=0x7ffc0000 [ 425.888739][ T29] audit: type=1326 audit(425.827:71820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17121 comm="syz.2.3323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 425.911771][ T29] audit: type=1326 audit(425.827:71821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17121 comm="syz.2.3323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5d076165e7 code=0x7ffc0000 [ 425.934684][ T29] audit: type=1326 audit(425.827:71822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17121 comm="syz.2.3323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5d075bb829 code=0x7ffc0000 [ 425.957676][ T29] audit: type=1326 audit(425.827:71823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17121 comm="syz.2.3323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 425.980904][ T29] audit: type=1326 audit(425.827:71824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17121 comm="syz.2.3323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5d076165e7 code=0x7ffc0000 [ 426.003844][ T29] audit: type=1326 audit(425.827:71825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17121 comm="syz.2.3323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5d075bb829 code=0x7ffc0000 [ 426.026761][ T29] audit: type=1326 audit(425.827:71826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17121 comm="syz.2.3323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 426.057049][T17131] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 426.068543][ T29] audit: type=1326 audit(425.857:71827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17121 comm="syz.2.3323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5d076165e7 code=0x7ffc0000 [ 426.182525][T17138] netlink: 'syz.1.3329': attribute type 1 has an invalid length. [ 426.299227][T17144] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 426.309754][T17144] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 426.318357][T17144] Symlink component flag not implemented [ 426.324028][T17144] Symlink component flag not implemented [ 426.330348][T17144] Symlink component flag not implemented (7) [ 426.336416][T17144] Symlink component flag not implemented (116) [ 427.002758][T17160] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 427.689519][T17167] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 427.987160][T17175] set_capacity_and_notify: 1 callbacks suppressed [ 427.987175][T17175] loop2: detected capacity change from 0 to 164 [ 428.012820][T17175] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 428.030545][T17175] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 428.039587][T17175] Symlink component flag not implemented [ 428.045511][T17175] Symlink component flag not implemented [ 428.051645][T17175] Symlink component flag not implemented (7) [ 428.057711][T17175] Symlink component flag not implemented (116) [ 428.075459][T17175] __nla_validate_parse: 57 callbacks suppressed [ 428.075480][T17175] netlink: 8 bytes leftover after parsing attributes in process `'. [ 428.101423][T17175] netlink: 8 bytes leftover after parsing attributes in process `'. [ 428.110130][T17175] netlink: 8 bytes leftover after parsing attributes in process `'. [ 428.118532][T17175] netlink: 8 bytes leftover after parsing attributes in process `'. [ 428.138068][T17184] netlink: 'syz.0.3345': attribute type 13 has an invalid length. [ 428.167961][T17184] netlink: 372 bytes leftover after parsing attributes in process `syz.0.3345'. [ 428.199329][T17190] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3346'. [ 428.208462][T17190] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3346'. [ 428.223938][T17190] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 428.244879][T17192] netlink: 'syz.0.3348': attribute type 13 has an invalid length. [ 428.254543][T17192] netlink: 372 bytes leftover after parsing attributes in process `syz.0.3348'. [ 428.343335][T17195] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3349'. [ 428.352507][T17195] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3349'. [ 428.365345][T17195] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 428.579286][T17197] netlink: 'syz.4.3350': attribute type 1 has an invalid length. [ 428.762284][T17202] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 428.993719][T17204] netlink: 'syz.1.3353': attribute type 1 has an invalid length. [ 429.311085][T17208] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 429.442538][T17217] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 429.564269][T17220] loop2: detected capacity change from 0 to 2048 [ 429.616365][T13083] loop2: p3 < > p4 < > [ 429.620691][T13083] loop2: partition table partially beyond EOD, truncated [ 429.627996][T13083] loop2: p3 start 4284289 is beyond EOD, truncated [ 429.636455][T17220] loop2: p3 < > p4 < > [ 429.640649][T17220] loop2: partition table partially beyond EOD, truncated [ 429.647922][T17220] loop2: p3 start 4284289 is beyond EOD, truncated [ 429.661457][T17220] netlink: 'syz.2.3360': attribute type 13 has an invalid length. [ 430.291123][T17235] checkentry_lsm: 2 callbacks suppressed [ 430.291137][T17235] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 430.323547][T17236] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 430.324583][T17237] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 430.570175][T17239] loop2: detected capacity change from 0 to 164 [ 430.577706][T17239] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 430.589732][T17239] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 430.598337][T17239] Symlink component flag not implemented [ 430.604029][T17239] Symlink component flag not implemented [ 430.609901][T17239] Symlink component flag not implemented (7) [ 430.616059][T17239] Symlink component flag not implemented (116) [ 430.665491][T17243] loop2: detected capacity change from 0 to 164 [ 430.672959][T17243] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 430.682558][T17243] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 430.691075][T17243] Symlink component flag not implemented [ 430.696836][T17243] Symlink component flag not implemented [ 430.702814][T17243] Symlink component flag not implemented (7) [ 430.708879][T17243] Symlink component flag not implemented (116) [ 430.738632][T17245] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 430.862693][T17249] netlink: 'syz.0.3372': attribute type 13 has an invalid length. [ 430.957114][T17253] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 431.085861][T17255] loop4: detected capacity change from 0 to 164 [ 431.094474][T17255] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 431.124809][T17255] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 431.139054][T17255] Symlink component flag not implemented [ 431.144737][T17255] Symlink component flag not implemented [ 431.150597][T17255] Symlink component flag not implemented (7) [ 431.156697][T17255] Symlink component flag not implemented (116) [ 431.186144][T17261] loop4: detected capacity change from 0 to 164 [ 431.193404][T17261] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 431.203688][T17261] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 431.217056][T17263] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 431.227478][T17261] Symlink component flag not implemented [ 431.227768][T17262] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 431.233197][T17261] Symlink component flag not implemented [ 431.233439][T17261] Symlink component flag not implemented (7) [ 431.253524][T17261] Symlink component flag not implemented (116) [ 431.688578][ T29] kauditd_printk_skb: 1115 callbacks suppressed [ 431.688604][ T29] audit: type=1326 audit(431.677:72943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17273 comm="syz.2.3381" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 431.718279][ T29] audit: type=1326 audit(431.677:72944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17273 comm="syz.2.3381" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 431.741345][ T29] audit: type=1326 audit(431.677:72945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17273 comm="syz.2.3381" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 431.764470][ T29] audit: type=1326 audit(431.687:72946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17273 comm="syz.2.3381" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 431.787516][ T29] audit: type=1326 audit(431.687:72947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17273 comm="syz.2.3381" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 431.810840][ T29] audit: type=1326 audit(431.687:72948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17273 comm="syz.2.3381" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 431.833984][ T29] audit: type=1326 audit(431.687:72949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17273 comm="syz.2.3381" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 431.857056][ T29] audit: type=1326 audit(431.687:72950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17273 comm="syz.2.3381" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 431.879968][ T29] audit: type=1326 audit(431.687:72951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17273 comm="syz.2.3381" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 431.902960][ T29] audit: type=1326 audit(431.687:72952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17273 comm="syz.2.3381" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 431.912006][T17277] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 432.011322][T17279] netlink: 'syz.3.3383': attribute type 13 has an invalid length. [ 432.086578][T17286] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 432.130357][T17287] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 432.145234][T17289] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 432.277895][T17294] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 432.574024][T17298] netlink: 'syz.2.3391': attribute type 1 has an invalid length. [ 432.884043][T17303] netlink: 'syz.1.3393': attribute type 1 has an invalid length. [ 433.315681][T17310] loop2: detected capacity change from 0 to 2048 [ 433.346630][T17310] loop2: p3 < > p4 < > [ 433.350873][T17310] loop2: partition table partially beyond EOD, truncated [ 433.358342][T17310] loop2: p3 start 4284289 is beyond EOD, truncated [ 433.370852][T17310] netlink: 'syz.2.3396': attribute type 13 has an invalid length. [ 433.382835][T17310] __nla_validate_parse: 55 callbacks suppressed [ 433.382853][T17310] netlink: 372 bytes leftover after parsing attributes in process `syz.2.3396'. [ 433.495092][T17318] netlink: 'syz.2.3400': attribute type 1 has an invalid length. [ 433.503035][T17318] netlink: 224 bytes leftover after parsing attributes in process `syz.2.3400'. [ 433.589183][T17321] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3401'. [ 433.598249][T17321] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3401'. [ 433.699235][T17326] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3403'. [ 433.708392][T17326] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3403'. [ 434.243811][T17335] netlink: 'syz.2.3407': attribute type 1 has an invalid length. [ 434.251718][T17335] netlink: 224 bytes leftover after parsing attributes in process `syz.2.3407'. [ 434.399784][T17337] netlink: 'syz.0.3408': attribute type 13 has an invalid length. [ 434.410190][T17337] netlink: 372 bytes leftover after parsing attributes in process `syz.0.3408'. [ 434.531636][T17348] netlink: 8 bytes leftover after parsing attributes in process `'. [ 434.540718][T17348] netlink: 8 bytes leftover after parsing attributes in process `'. [ 435.364334][T17366] loop1: detected capacity change from 0 to 164 [ 435.373116][T17366] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 435.385639][T17366] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 435.394572][T17366] Symlink component flag not implemented [ 435.400335][T17366] Symlink component flag not implemented [ 435.408537][T17366] Symlink component flag not implemented (7) [ 435.414635][T17366] Symlink component flag not implemented (116) [ 435.502836][T17368] loop1: detected capacity change from 0 to 2048 [ 435.566306][T13083] loop1: p3 < > p4 < > [ 435.570620][T13083] loop1: partition table partially beyond EOD, truncated [ 435.577995][T13083] loop1: p3 start 4284289 is beyond EOD, truncated [ 435.586762][T17368] loop1: p3 < > p4 < > [ 435.591129][T17368] loop1: partition table partially beyond EOD, truncated [ 435.598963][T17368] loop1: p3 start 4284289 is beyond EOD, truncated [ 435.608356][T17377] checkentry_lsm: 6 callbacks suppressed [ 435.608373][T17377] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 435.622263][T17368] netlink: 'syz.1.3420': attribute type 13 has an invalid length. [ 435.756176][T17382] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 436.447684][T17390] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 436.562182][T17394] netlink: 'syz.4.3431': attribute type 1 has an invalid length. [ 436.682729][T17403] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 436.696276][ T29] kauditd_printk_skb: 1959 callbacks suppressed [ 436.696293][ T29] audit: type=1326 audit(436.687:74912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17388 comm="syz.3.3429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f18ad8065e7 code=0x7ffc0000 [ 436.725872][ T29] audit: type=1326 audit(436.687:74913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17388 comm="syz.3.3429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f18ad7ab829 code=0x7ffc0000 [ 436.748927][ T29] audit: type=1326 audit(436.687:74914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17388 comm="syz.3.3429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 436.772066][ T29] audit: type=1326 audit(436.687:74915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17388 comm="syz.3.3429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f18ad8065e7 code=0x7ffc0000 [ 436.794979][ T29] audit: type=1326 audit(436.687:74916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17388 comm="syz.3.3429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f18ad7ab829 code=0x7ffc0000 [ 436.817909][ T29] audit: type=1326 audit(436.687:74917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17388 comm="syz.3.3429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 436.840931][ T29] audit: type=1326 audit(436.687:74918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17388 comm="syz.3.3429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f18ad8065e7 code=0x7ffc0000 [ 436.863925][ T29] audit: type=1326 audit(436.687:74919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17388 comm="syz.3.3429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f18ad7ab829 code=0x7ffc0000 [ 436.886835][ T29] audit: type=1326 audit(436.687:74920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17388 comm="syz.3.3429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 436.910021][ T29] audit: type=1326 audit(436.767:74921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17388 comm="syz.3.3429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f18ad8065e7 code=0x7ffc0000 [ 437.005928][T17408] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 437.316732][T17415] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 437.416458][T17419] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 438.142559][T17433] netlink: 'syz.0.3447': attribute type 13 has an invalid length. [ 438.170288][T17434] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 438.269875][T17439] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 438.335919][T17442] loop1: detected capacity change from 0 to 128 [ 438.353247][T17442] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 438.435734][T17438] __nla_validate_parse: 43 callbacks suppressed [ 438.435752][T17438] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3449'. [ 438.540678][T17442] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3450'. [ 438.590085][T17448] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3451'. [ 438.599240][T17448] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3451'. [ 438.610541][ T3316] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 438.619992][T17448] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 438.743725][T17461] loop1: detected capacity change from 0 to 128 [ 438.754553][T17461] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 438.767441][T17463] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3455'. [ 438.776538][T17463] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3455'. [ 438.971384][ T3316] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 439.001003][T17468] loop1: detected capacity change from 0 to 128 [ 439.010436][T17468] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 439.024368][T17470] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3458'. [ 439.033445][T17470] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3458'. [ 439.075113][T17472] loop4: detected capacity change from 0 to 2048 [ 439.136467][T17472] loop4: p3 < > p4 < > [ 439.140762][T17472] loop4: partition table partially beyond EOD, truncated [ 439.148370][T17472] loop4: p3 start 4284289 is beyond EOD, truncated [ 439.157804][ T3006] loop4: p3 < > p4 < > [ 439.162038][ T3006] loop4: partition table partially beyond EOD, truncated [ 439.175705][ T3006] loop4: p3 start 4284289 is beyond EOD, truncated [ 439.187190][T17472] netlink: 'syz.4.3460': attribute type 13 has an invalid length. [ 439.197731][T17472] netlink: 372 bytes leftover after parsing attributes in process `syz.4.3460'. [ 439.251333][T17475] netlink: 'syz.4.3461': attribute type 1 has an invalid length. [ 439.259202][T17475] netlink: 224 bytes leftover after parsing attributes in process `syz.4.3461'. [ 439.269293][T13083] udevd[13083]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 439.328954][ T3316] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 439.796733][T17489] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 440.044505][T17498] netlink: 'syz.4.3469': attribute type 1 has an invalid length. [ 440.289351][T17503] loop1: detected capacity change from 0 to 2048 [ 440.326362][T13083] loop1: p3 < > p4 < > [ 440.330617][T13083] loop1: partition table partially beyond EOD, truncated [ 440.338170][T13083] loop1: p3 start 4284289 is beyond EOD, truncated [ 440.347431][T17503] loop1: p3 < > p4 < > [ 440.351616][T17503] loop1: partition table partially beyond EOD, truncated [ 440.358980][T17503] loop1: p3 start 4284289 is beyond EOD, truncated [ 440.372653][T17503] netlink: 'syz.1.3471': attribute type 13 has an invalid length. [ 440.722836][T17511] netlink: 'syz.3.3474': attribute type 13 has an invalid length. [ 440.848184][T17522] checkentry_lsm: 6 callbacks suppressed [ 440.848198][T17522] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 440.881594][T17523] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 440.893216][T17524] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 440.973424][T17528] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 441.270232][T17530] netlink: 'syz.1.3481': attribute type 1 has an invalid length. [ 441.648038][T17532] netlink: 'syz.2.3482': attribute type 1 has an invalid length. [ 441.681010][T17534] loop4: detected capacity change from 0 to 2048 [ 441.706394][T13083] loop4: p3 < > p4 < > [ 441.710651][T13083] loop4: partition table partially beyond EOD, truncated [ 441.718020][T13083] loop4: p3 start 4284289 is beyond EOD, truncated [ 441.726894][T17534] loop4: p3 < > p4 < > [ 441.731172][T17534] loop4: partition table partially beyond EOD, truncated [ 441.738639][T17534] loop4: p3 start 4284289 is beyond EOD, truncated [ 441.751990][T17534] netlink: 'syz.4.3483': attribute type 13 has an invalid length. [ 441.763867][T17537] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 441.806734][T13083] udevd[13083]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 441.838693][T17542] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 441.874635][T17543] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 441.888944][ T29] kauditd_printk_skb: 812 callbacks suppressed [ 441.888959][ T29] audit: type=1326 audit(441.877:75734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17531 comm="syz.2.3482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 441.918275][ T29] audit: type=1326 audit(441.877:75735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17531 comm="syz.2.3482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=429 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 441.941374][ T29] audit: type=1326 audit(441.877:75736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17531 comm="syz.2.3482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 441.964494][ T29] audit: type=1326 audit(441.877:75737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17531 comm="syz.2.3482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 441.987528][ T29] audit: type=1326 audit(441.877:75738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17531 comm="syz.2.3482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 442.010630][ T29] audit: type=1326 audit(441.877:75739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17531 comm="syz.2.3482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 442.033877][ T29] audit: type=1326 audit(441.877:75740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17531 comm="syz.2.3482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 442.057037][ T29] audit: type=1326 audit(441.877:75741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17531 comm="syz.2.3482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 442.080289][ T29] audit: type=1326 audit(441.877:75742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17531 comm="syz.2.3482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 442.093401][T17545] loop1: detected capacity change from 0 to 2048 [ 442.103716][ T29] audit: type=1326 audit(441.877:75743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17531 comm="syz.2.3482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 442.166460][T17545] loop1: p3 < > p4 < > [ 442.170714][T17545] loop1: partition table partially beyond EOD, truncated [ 442.177903][T17545] loop1: p3 start 4284289 is beyond EOD, truncated [ 442.193549][T17545] netlink: 'syz.1.3487': attribute type 13 has an invalid length. [ 442.242953][T17547] netlink: 'syz.1.3488': attribute type 1 has an invalid length. [ 442.496320][T17552] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 442.613703][T17557] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 442.691147][T17563] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 442.979280][T17565] loop1: detected capacity change from 0 to 128 [ 442.991200][T17565] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 443.184825][ T3316] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 443.228833][T17572] loop1: detected capacity change from 0 to 2048 [ 443.256393][T13083] loop1: p3 < > p4 < > [ 443.260667][T13083] loop1: partition table partially beyond EOD, truncated [ 443.268011][T13083] loop1: p3 start 4284289 is beyond EOD, truncated [ 443.277416][T17572] loop1: p3 < > p4 < > [ 443.281632][T17572] loop1: partition table partially beyond EOD, truncated [ 443.314828][T17572] loop1: p3 start 4284289 is beyond EOD, truncated [ 443.333962][T17577] loop2: detected capacity change from 0 to 128 [ 443.364975][T17577] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 443.379974][T13083] udevd[13083]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 443.552226][T17577] __nla_validate_parse: 39 callbacks suppressed [ 443.552278][T17577] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3499'. [ 443.567844][T17586] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3502'. [ 443.576931][T17586] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3502'. [ 443.657416][ T3320] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 443.697368][T17582] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3501'. [ 443.857631][T17595] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3505'. [ 443.866714][T17595] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3505'. [ 444.285252][T17599] validate_nla: 1 callbacks suppressed [ 444.285276][T17599] netlink: 'syz.4.3506': attribute type 1 has an invalid length. [ 444.298741][T17599] netlink: 224 bytes leftover after parsing attributes in process `syz.4.3506'. [ 444.432299][T17604] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3507'. [ 444.441370][T17604] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3507'. [ 444.450545][T17605] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3508'. [ 444.682135][T17609] netlink: 'syz.0.3510': attribute type 13 has an invalid length. [ 445.888889][T17645] netlink: 'syz.0.3521': attribute type 13 has an invalid length. [ 446.020064][T17648] checkentry_lsm: 7 callbacks suppressed [ 446.020082][T17648] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 446.120191][T17652] netlink: 'syz.4.3524': attribute type 1 has an invalid length. [ 446.168501][T17655] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 446.182700][T17656] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 446.727539][T17659] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 446.896191][ T29] kauditd_printk_skb: 1506 callbacks suppressed [ 446.896218][ T29] audit: type=1326 audit(446.887:77250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17660 comm="syz.0.3527" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ffb1dfb65e7 code=0x7ffc0000 [ 446.912930][T17664] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 446.926562][ T29] audit: type=1326 audit(446.887:77251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17660 comm="syz.0.3527" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ffb1df5b829 code=0x7ffc0000 [ 446.956973][ T29] audit: type=1326 audit(446.887:77252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17660 comm="syz.0.3527" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 446.980085][ T29] audit: type=1326 audit(446.887:77253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17660 comm="syz.0.3527" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ffb1dfb65e7 code=0x7ffc0000 [ 447.003030][ T29] audit: type=1326 audit(446.887:77254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17660 comm="syz.0.3527" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ffb1df5b829 code=0x7ffc0000 [ 447.026182][ T29] audit: type=1326 audit(446.887:77255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17660 comm="syz.0.3527" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 447.058228][ T29] audit: type=1326 audit(446.917:77256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17660 comm="syz.0.3527" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ffb1dfb65e7 code=0x7ffc0000 [ 447.081283][ T29] audit: type=1326 audit(446.917:77257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17660 comm="syz.0.3527" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ffb1df5b829 code=0x7ffc0000 [ 447.104294][ T29] audit: type=1326 audit(446.917:77258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17660 comm="syz.0.3527" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7ffb1dfbf749 code=0x7ffc0000 [ 447.127423][ T29] audit: type=1326 audit(446.947:77259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17660 comm="syz.0.3527" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ffb1dfb65e7 code=0x7ffc0000 [ 447.156296][T17669] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 447.192387][T17670] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 447.576387][T17673] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 447.683882][T17675] netlink: 'syz.0.3532': attribute type 13 has an invalid length. [ 447.794311][T17680] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 447.952525][T17684] wg1 speed is unknown, defaulting to 1000 [ 447.958922][T17684] lo speed is unknown, defaulting to 1000 [ 448.016582][T17690] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 448.379068][T17700] loop2: detected capacity change from 0 to 128 [ 448.388261][T17700] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 448.596367][ T3320] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 448.756760][T17713] __nla_validate_parse: 25 callbacks suppressed [ 448.756779][T17713] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3544'. [ 448.935327][T17719] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3546'. [ 448.944399][T17719] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3546'. [ 449.078733][T17723] wg1 speed is unknown, defaulting to 1000 [ 449.085347][T17723] lo speed is unknown, defaulting to 1000 [ 449.152672][T17726] loop2: detected capacity change from 0 to 512 [ 449.164438][T17726] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 449.176101][T17726] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 449.186297][T17726] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3549: Corrupt directory, running e2fsck is recommended [ 449.231553][T17726] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 449.239941][T17726] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3549: corrupted in-inode xattr: invalid ea_ino [ 449.253936][T17726] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3549: couldn't read orphan inode 15 (err -117) [ 449.266991][T17726] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 449.300733][T17726] bond2: entered promiscuous mode [ 449.332490][T17733] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3550'. [ 449.341625][T17733] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3550'. [ 449.358172][T17734] loop4: detected capacity change from 0 to 512 [ 449.366304][T17734] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 449.377866][T17734] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 449.388031][T17734] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3551: Corrupt directory, running e2fsck is recommended [ 449.417695][T17734] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 449.425773][T17734] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3551: corrupted in-inode xattr: invalid ea_ino [ 449.439857][T17734] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3551: couldn't read orphan inode 15 (err -117) [ 449.439982][T17736] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 449.463437][T17736] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 449.473688][T17736] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3549: Corrupt directory, running e2fsck is recommended [ 449.487585][T17734] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 449.506037][T17736] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 3: comm syz.2.3549: path /733/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 449.581317][T17734] bond2: entered promiscuous mode [ 449.597338][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 449.645156][T17739] loop2: detected capacity change from 0 to 512 [ 449.666969][T17739] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 449.678533][T17739] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 449.688673][T17739] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3552: Corrupt directory, running e2fsck is recommended [ 449.704385][T17734] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 449.716055][T17734] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 449.726194][T17734] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3551: Corrupt directory, running e2fsck is recommended [ 449.739207][T17734] EXT4-fs error (device loop4): ext4_readdir:264: inode #2: block 3: comm syz.4.3551: path /681/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 449.794853][T17739] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 449.817394][T17746] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3553'. [ 449.826290][T17739] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3552: corrupted in-inode xattr: invalid ea_ino [ 449.826708][T17739] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3552: couldn't read orphan inode 15 (err -117) [ 449.839898][T17746] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3553'. [ 449.861955][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 449.892510][T17739] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 449.920578][T17750] netlink: 'syz.4.3555': attribute type 1 has an invalid length. [ 449.928405][T17750] netlink: 224 bytes leftover after parsing attributes in process `syz.4.3555'. [ 449.957480][T17745] wg1 speed is unknown, defaulting to 1000 [ 449.963851][T17745] lo speed is unknown, defaulting to 1000 [ 449.975749][T17739] bond3: entered promiscuous mode [ 450.034472][T17739] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 450.046061][T17739] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 450.056203][T17739] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3552: Corrupt directory, running e2fsck is recommended [ 450.085583][T17739] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 3: comm syz.2.3552: path /734/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 450.165225][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 450.189014][T17756] loop1: detected capacity change from 0 to 128 [ 450.211974][T17756] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 450.346401][T17763] netlink: 'syz.2.3559': attribute type 1 has an invalid length. [ 450.354273][T17763] netlink: 224 bytes leftover after parsing attributes in process `syz.2.3559'. [ 450.409795][T17756] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3557'. [ 450.476522][ T3316] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 450.759478][T17774] wg1 speed is unknown, defaulting to 1000 [ 450.766340][T17774] lo speed is unknown, defaulting to 1000 [ 450.912675][T17781] loop4: detected capacity change from 0 to 512 [ 450.926519][T17781] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 450.938144][T17781] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 450.948285][T17781] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3566: Corrupt directory, running e2fsck is recommended [ 450.985154][T17781] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 450.994522][T17781] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3566: corrupted in-inode xattr: invalid ea_ino [ 451.008492][T17781] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3566: couldn't read orphan inode 15 (err -117) [ 451.021564][T17781] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 451.075409][T17781] bond3: entered promiscuous mode [ 451.117393][T17781] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 451.129214][T17781] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 451.139562][T17781] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3566: Corrupt directory, running e2fsck is recommended [ 451.159739][T17781] EXT4-fs error (device loop4): ext4_readdir:264: inode #2: block 3: comm syz.4.3566: path /684/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 451.211276][T17785] wg1 speed is unknown, defaulting to 1000 [ 451.225233][T17789] loop2: detected capacity change from 0 to 512 [ 451.239659][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 451.247680][T17789] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 451.257538][T17785] lo speed is unknown, defaulting to 1000 [ 451.260238][T17789] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 451.276469][T17789] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3568: Corrupt directory, running e2fsck is recommended [ 451.314177][T17789] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 451.325445][T17789] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3568: corrupted in-inode xattr: invalid ea_ino [ 451.363267][T17789] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3568: couldn't read orphan inode 15 (err -117) [ 451.396432][T17789] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 451.470950][T17800] checkentry_lsm: 5 callbacks suppressed [ 451.470969][T17800] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 451.496163][T17801] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 451.562609][T17802] bond4: entered promiscuous mode [ 451.601644][T17789] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 451.613282][T17789] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 451.623464][T17789] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3568: Corrupt directory, running e2fsck is recommended [ 451.637785][T17789] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 3: comm syz.2.3568: path /737/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 451.688514][T17806] bond0: entered promiscuous mode [ 451.783086][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 451.887042][T17813] loop2: detected capacity change from 0 to 512 [ 451.905273][T17813] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 451.916950][T17813] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 451.927101][T17813] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3574: Corrupt directory, running e2fsck is recommended [ 451.976755][ T29] kauditd_printk_skb: 1237 callbacks suppressed [ 451.976770][ T29] audit: type=1326 audit(451.967:78497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17817 comm="syz.3.3576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 452.037189][T17813] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 452.056494][T17813] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3574: corrupted in-inode xattr: invalid ea_ino [ 452.074463][ T29] audit: type=1326 audit(451.997:78498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17817 comm="syz.3.3576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 452.097563][ T29] audit: type=1326 audit(451.997:78499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17817 comm="syz.3.3576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 452.120551][ T29] audit: type=1326 audit(451.997:78500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17817 comm="syz.3.3576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 452.143600][ T29] audit: type=1326 audit(451.997:78501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17817 comm="syz.3.3576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 452.166601][ T29] audit: type=1326 audit(451.997:78502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17817 comm="syz.3.3576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 452.178040][T17813] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3574: couldn't read orphan inode 15 (err -117) [ 452.189737][ T29] audit: type=1326 audit(451.997:78503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17817 comm="syz.3.3576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 452.189767][ T29] audit: type=1326 audit(451.997:78504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17817 comm="syz.3.3576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 452.189805][ T29] audit: type=1326 audit(451.997:78505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17817 comm="syz.3.3576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 452.270595][ T29] audit: type=1326 audit(451.997:78506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17817 comm="syz.3.3576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 452.316600][T17813] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 452.373203][T17820] bond1: entered promiscuous mode [ 452.435037][T17813] bond5: entered promiscuous mode [ 452.445529][T17827] loop4: detected capacity change from 0 to 512 [ 452.506474][T17827] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 452.518162][T17827] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 452.528333][T17827] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3579: Corrupt directory, running e2fsck is recommended [ 452.620353][T17828] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 452.632032][T17828] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 452.642328][T17828] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3574: Corrupt directory, running e2fsck is recommended [ 452.698754][T17827] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 452.719869][T17833] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 452.726967][T17828] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 3: comm syz.2.3574: path /738/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 452.749473][T17827] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3579: corrupted in-inode xattr: invalid ea_ino [ 452.776454][T17827] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3579: couldn't read orphan inode 15 (err -117) [ 452.800804][T17827] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 452.849832][T17827] bond4: entered promiscuous mode [ 452.868398][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 452.911461][T17827] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 452.923411][T17827] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 452.933681][T17827] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3579: Corrupt directory, running e2fsck is recommended [ 452.946769][T17827] EXT4-fs error (device loop4): ext4_readdir:264: inode #2: block 3: comm syz.4.3579: path /687/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 452.980067][T17839] loop2: detected capacity change from 0 to 512 [ 452.989019][T17839] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 453.000582][T17839] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 453.010735][T17839] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3582: Corrupt directory, running e2fsck is recommended [ 453.069910][T17839] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 453.082442][T17839] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3582: corrupted in-inode xattr: invalid ea_ino [ 453.108114][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 453.118222][T17839] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3582: couldn't read orphan inode 15 (err -117) [ 453.131467][T17839] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 453.199355][T17839] bond6: entered promiscuous mode [ 453.235134][T17847] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 453.268757][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 453.454469][T17849] wg1 speed is unknown, defaulting to 1000 [ 453.461647][T17849] lo speed is unknown, defaulting to 1000 [ 454.062375][T17865] loop4: detected capacity change from 0 to 512 [ 454.072806][T17865] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 454.084470][T17865] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 454.094615][T17865] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3590: Corrupt directory, running e2fsck is recommended [ 454.108501][T17867] loop1: detected capacity change from 0 to 512 [ 454.126524][T17867] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 454.127560][T17865] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 454.138214][T17867] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 454.148332][T17865] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3590: corrupted in-inode xattr: invalid ea_ino [ 454.156693][T17867] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3591: Corrupt directory, running e2fsck is recommended [ 454.172209][T17865] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3590: couldn't read orphan inode 15 (err -117) [ 454.196901][T17865] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 454.212245][T17867] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 454.220606][T17867] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3591: corrupted in-inode xattr: invalid ea_ino [ 454.234210][T17867] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3591: couldn't read orphan inode 15 (err -117) [ 454.246974][T17867] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 454.280491][T17865] bond5: entered promiscuous mode [ 454.293848][T17867] bond2: entered promiscuous mode [ 454.367253][ T3316] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 454.386392][T17865] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 454.398070][T17865] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 454.408211][T17865] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3590: Corrupt directory, running e2fsck is recommended [ 454.431594][T17865] EXT4-fs error (device loop4): ext4_readdir:264: inode #2: block 3: comm syz.4.3590: path /690/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 454.463119][T17877] loop1: detected capacity change from 0 to 1024 [ 454.470243][T17877] EXT4-fs: Ignoring removed orlov option [ 454.479770][T17879] __nla_validate_parse: 14 callbacks suppressed [ 454.479788][T17879] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3593'. [ 454.508277][T17877] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 454.576613][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 454.610314][T17885] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3595'. [ 454.619449][T17885] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3595'. [ 454.643014][T17886] loop4: detected capacity change from 0 to 512 [ 454.652978][ T3316] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 454.677675][T17886] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 454.689366][T17886] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 454.699567][T17886] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3596: Corrupt directory, running e2fsck is recommended [ 454.734121][T17885] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 454.762374][T17890] bond1: entered promiscuous mode [ 454.769007][T17886] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 454.777543][T17891] loop1: detected capacity change from 0 to 128 [ 454.786930][T17886] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3596: corrupted in-inode xattr: invalid ea_ino [ 454.801339][T17886] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3596: couldn't read orphan inode 15 (err -117) [ 454.821474][T17886] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 454.838526][T17891] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 454.886645][T17891] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3597'. [ 454.914853][ T3316] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 454.918226][T17886] bond6: entered promiscuous mode [ 455.014403][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 455.036325][T17896] wg1 speed is unknown, defaulting to 1000 [ 455.047010][T17896] lo speed is unknown, defaulting to 1000 [ 455.066310][T17901] loop4: detected capacity change from 0 to 512 [ 455.078406][T17901] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 455.090114][T17901] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 455.100346][T17901] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3601: Corrupt directory, running e2fsck is recommended [ 455.148239][T17901] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 455.157489][T17904] bond1: left promiscuous mode [ 455.170729][T17901] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3601: corrupted in-inode xattr: invalid ea_ino [ 455.184482][T17901] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3601: couldn't read orphan inode 15 (err -117) [ 455.197523][T17901] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 455.236058][T17901] bond7: entered promiscuous mode [ 455.306108][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 455.346869][T17910] loop4: detected capacity change from 0 to 512 [ 455.356745][T17910] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 455.368434][T17910] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 455.378595][T17910] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3604: Corrupt directory, running e2fsck is recommended [ 455.420958][T17910] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 455.429091][T17910] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3604: corrupted in-inode xattr: invalid ea_ino [ 455.442876][T17910] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3604: couldn't read orphan inode 15 (err -117) [ 455.457457][T17910] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 455.499014][T17910] bond8: entered promiscuous mode [ 455.543922][T17917] loop2: detected capacity change from 0 to 128 [ 455.557223][T17917] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 455.593424][T17910] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 455.605058][T17910] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 455.615286][T17910] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3604: Corrupt directory, running e2fsck is recommended [ 455.628927][T17910] EXT4-fs error (device loop4): ext4_readdir:264: inode #2: block 3: comm syz.4.3604: path /693/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 455.713664][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 455.744596][T17926] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3607'. [ 455.753711][T17926] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3607'. [ 455.766822][T17926] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 455.777556][T17925] loop4: detected capacity change from 0 to 512 [ 455.788662][T17925] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 455.800258][T17925] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 455.810494][T17925] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3608: Corrupt directory, running e2fsck is recommended [ 455.848957][T17925] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 455.857858][T17925] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3608: corrupted in-inode xattr: invalid ea_ino [ 455.891858][T17925] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3608: couldn't read orphan inode 15 (err -117) [ 455.904018][T17929] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 455.914851][T17925] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 455.938051][ T3320] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 455.966511][T17932] loop2: detected capacity change from 0 to 1024 [ 455.976276][T17932] EXT4-fs: Ignoring removed orlov option [ 455.993800][T17925] bond9: entered promiscuous mode [ 456.029940][T17932] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 456.088664][T17939] bond2: entered promiscuous mode [ 456.113912][T17934] wg1 speed is unknown, defaulting to 1000 [ 456.121910][T17934] lo speed is unknown, defaulting to 1000 [ 456.146211][T17925] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 456.157871][T17925] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 456.168032][T17925] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3608: Corrupt directory, running e2fsck is recommended [ 456.214516][T17925] EXT4-fs error (device loop4): ext4_readdir:264: inode #2: block 3: comm syz.4.3608: path /694/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 456.279288][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 456.346674][T17945] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 456.358301][T17945] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 456.368496][T17945] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3614: Corrupt directory, running e2fsck is recommended [ 456.417590][T17950] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 456.429225][T17950] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 456.439360][T17950] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3616: Corrupt directory, running e2fsck is recommended [ 456.453557][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 456.481827][T17950] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 456.490322][T17950] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3616: corrupted in-inode xattr: invalid ea_ino [ 456.505576][T17950] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3616: couldn't read orphan inode 15 (err -117) [ 456.519575][T17945] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 456.527729][T17956] bond2: left promiscuous mode [ 456.532700][T17956] bond3: left promiscuous mode [ 456.537638][T17956] bond4: left promiscuous mode [ 456.542623][T17956] bond5: left promiscuous mode [ 456.547660][T17956] bond6: left promiscuous mode [ 456.552629][T17956] bond7: left promiscuous mode [ 456.556505][T17945] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3614: corrupted in-inode xattr: invalid ea_ino [ 456.557540][T17956] bond8: left promiscuous mode [ 456.575773][T17956] bond9: left promiscuous mode [ 456.603367][T17954] bond3: entered promiscuous mode [ 456.631359][T17950] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 456.647051][T17945] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3614: couldn't read orphan inode 15 (err -117) [ 456.679192][T17945] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 456.704199][T17950] bond3: entered promiscuous mode [ 456.729245][T17964] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3619'. [ 456.738419][T17964] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3619'. [ 456.786045][T17945] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 456.790329][T17964] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 456.797762][T17945] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 456.816474][T17945] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3614: Corrupt directory, running e2fsck is recommended [ 456.829841][T17945] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 3: comm syz.2.3614: path /746/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 456.892724][ T3316] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 456.911805][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 456.931136][T17968] bond4: entered promiscuous mode [ 456.964975][T17973] EXT4-fs: Ignoring removed orlov option [ 456.977862][T17973] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 456.980571][T17974] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3621'. [ 456.998991][T17974] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3621'. [ 457.019147][T17974] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 457.064475][T17978] bond5: entered promiscuous mode [ 457.115504][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 457.140519][T17983] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 457.151595][T17985] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 457.152453][T17983] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 457.170891][T17983] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3625: Corrupt directory, running e2fsck is recommended [ 457.206193][T17983] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 457.217419][ T29] kauditd_printk_skb: 1207 callbacks suppressed [ 457.217437][ T29] audit: type=1326 audit(457.207:79714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17986 comm="syz.4.3626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef150cf749 code=0x7ffc0000 [ 457.222476][T17983] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3625: corrupted in-inode xattr: invalid ea_ino [ 457.224566][ T29] audit: type=1326 audit(457.207:79715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17986 comm="syz.4.3626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=277 compat=0 ip=0x7fef150cf749 code=0x7ffc0000 [ 457.265769][T17987] netlink: 'syz.4.3626': attribute type 1 has an invalid length. [ 457.284148][ T29] audit: type=1326 audit(457.237:79716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17986 comm="syz.4.3626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef150cf749 code=0x7ffc0000 [ 457.291642][T17983] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3625: couldn't read orphan inode 15 (err -117) [ 457.314376][ T29] audit: type=1326 audit(457.237:79717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17986 comm="syz.4.3626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef150cf749 code=0x7ffc0000 [ 457.329688][T17983] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 457.349324][ T29] audit: type=1326 audit(457.247:79718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17986 comm="syz.4.3626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fef150cdf90 code=0x7ffc0000 [ 457.385121][ T29] audit: type=1326 audit(457.247:79719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17986 comm="syz.4.3626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef150cf749 code=0x7ffc0000 [ 457.408219][ T29] audit: type=1326 audit(457.247:79720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17986 comm="syz.4.3626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fef150cdf90 code=0x7ffc0000 [ 457.431298][ T29] audit: type=1326 audit(457.247:79721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17986 comm="syz.4.3626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fef150d0f77 code=0x7ffc0000 [ 457.454412][ T29] audit: type=1326 audit(457.247:79722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17986 comm="syz.4.3626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fef150cf749 code=0x7ffc0000 [ 457.477394][ T29] audit: type=1326 audit(457.247:79723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17986 comm="syz.4.3626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fef150d0f77 code=0x7ffc0000 [ 457.506626][T17989] bond7: entered promiscuous mode [ 457.538824][T17992] bond2: entered promiscuous mode [ 457.563995][T17989] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 457.575603][T17989] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 457.585836][T17989] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3625: Corrupt directory, running e2fsck is recommended [ 457.598853][T17989] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 3: comm syz.2.3625: path /748/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 457.728753][T18000] bond2: left promiscuous mode [ 457.847055][T18006] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 457.980365][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 458.107380][T18013] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 458.306471][T18017] wg1 speed is unknown, defaulting to 1000 [ 458.313004][T18017] lo speed is unknown, defaulting to 1000 [ 458.658813][T18034] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 458.670500][T18034] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 458.680709][T18034] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3641: Corrupt directory, running e2fsck is recommended [ 458.718292][T18034] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 458.728715][T18034] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3641: corrupted in-inode xattr: invalid ea_ino [ 458.759223][T18034] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3641: couldn't read orphan inode 15 (err -117) [ 458.773418][T18034] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 458.798793][T18037] EXT4-fs: Ignoring removed orlov option [ 458.817822][T18037] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 458.884381][T18041] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 458.896069][T18041] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 458.906344][T18041] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3643: Corrupt directory, running e2fsck is recommended [ 458.930885][ T3316] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 458.958748][T18041] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 458.968718][T18041] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3643: corrupted in-inode xattr: invalid ea_ino [ 458.993924][T18044] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 459.005635][T18044] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 459.015793][T18044] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3644: Corrupt directory, running e2fsck is recommended [ 459.046315][T18041] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3643: couldn't read orphan inode 15 (err -117) [ 459.066773][T18041] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 459.081691][T18044] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 459.089963][T18044] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3644: corrupted in-inode xattr: invalid ea_ino [ 459.104641][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 459.134007][T18044] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3644: couldn't read orphan inode 15 (err -117) [ 459.169105][T18041] bond8: entered promiscuous mode [ 459.175132][T18052] set_capacity_and_notify: 8 callbacks suppressed [ 459.175175][T18052] loop4: detected capacity change from 0 to 512 [ 459.195145][T18044] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 459.215361][T18052] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 459.226978][T18052] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 459.237153][T18052] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3647: Corrupt directory, running e2fsck is recommended [ 459.302818][T18052] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 459.311568][T18041] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 459.323143][T18041] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 459.326191][T18044] bond4: entered promiscuous mode [ 459.333433][T18041] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3643: Corrupt directory, running e2fsck is recommended [ 459.338829][T18052] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3647: corrupted in-inode xattr: invalid ea_ino [ 459.351831][T18041] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 3: comm syz.2.3643: path /750/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 459.399968][T18052] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3647: couldn't read orphan inode 15 (err -117) [ 459.477725][T18052] bond10: entered promiscuous mode [ 459.495146][T18044] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 459.506805][T18044] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 459.517053][T18044] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3644: Corrupt directory, running e2fsck is recommended [ 459.558258][T18044] EXT4-fs error (device loop1): ext4_readdir:264: inode #2: block 3: comm syz.1.3644: path /715/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 459.591704][T18057] __nla_validate_parse: 10 callbacks suppressed [ 459.591723][T18057] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3646'. [ 459.628573][T18052] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 459.640262][T18052] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 459.650489][T18052] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3647: Corrupt directory, running e2fsck is recommended [ 459.667621][T18052] EXT4-fs error (device loop4): ext4_readdir:264: inode #2: block 3: comm syz.4.3647: path /699/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 459.724369][T18063] loop2: detected capacity change from 0 to 1024 [ 459.731802][T18063] EXT4-fs: Ignoring removed orlov option [ 459.738452][T18065] loop1: detected capacity change from 0 to 2048 [ 459.852273][T18072] netlink: 28 bytes leftover after parsing attributes in process `syz.4.3651'. [ 459.861444][T18072] netlink: 28 bytes leftover after parsing attributes in process `syz.4.3651'. [ 459.874805][T18072] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 459.890221][T18073] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 459.960320][T18078] netlink: 'syz.3.3654': attribute type 13 has an invalid length. [ 459.969602][T18079] bond9: entered promiscuous mode [ 460.101373][T18086] bond2: left promiscuous mode [ 460.106376][T18086] bond3: left promiscuous mode [ 460.111548][T18086] bond4: left promiscuous mode [ 460.116629][T18086] bond5: left promiscuous mode [ 460.121571][T18086] bond6: left promiscuous mode [ 460.126486][T18086] bond7: left promiscuous mode [ 460.131530][T18086] bond8: left promiscuous mode [ 460.136514][T18086] bond9: left promiscuous mode [ 460.141580][T18075] wg1 speed is unknown, defaulting to 1000 [ 460.153649][T18075] lo speed is unknown, defaulting to 1000 [ 460.194357][T18083] wg1 speed is unknown, defaulting to 1000 [ 460.201300][T18083] lo speed is unknown, defaulting to 1000 [ 460.349170][T18090] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 460.657842][T18094] loop4: detected capacity change from 0 to 1024 [ 460.666464][T18094] EXT4-fs: Ignoring removed orlov option [ 460.698827][T18096] netlink: 'syz.2.3661': attribute type 1 has an invalid length. [ 460.706797][T18096] netlink: 224 bytes leftover after parsing attributes in process `syz.2.3661'. [ 460.723657][T18100] loop1: detected capacity change from 0 to 512 [ 460.732691][T18100] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 460.744381][T18100] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 460.754514][T18100] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3662: Corrupt directory, running e2fsck is recommended [ 460.782024][T18100] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 460.790110][T18100] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3662: corrupted in-inode xattr: invalid ea_ino [ 460.803676][T18100] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3662: couldn't read orphan inode 15 (err -117) [ 460.825643][T18100] bond5: entered promiscuous mode [ 460.857385][T18104] loop1: detected capacity change from 0 to 512 [ 460.869350][T18104] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 460.881000][T18104] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 460.891445][T18104] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3663: Corrupt directory, running e2fsck is recommended [ 460.934939][T18107] loop4: detected capacity change from 0 to 1024 [ 460.944637][T18104] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 460.947476][T18107] EXT4-fs: Ignoring removed orlov option [ 460.958764][T18104] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3663: corrupted in-inode xattr: invalid ea_ino [ 460.972634][T18104] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3663: couldn't read orphan inode 15 (err -117) [ 461.016924][T18104] bond6: entered promiscuous mode [ 461.068382][T18104] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 461.079932][T18104] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 461.090115][T18104] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3663: Corrupt directory, running e2fsck is recommended [ 461.103188][T18104] EXT4-fs error (device loop1): ext4_readdir:264: inode #2: block 3: comm syz.1.3663: path /719/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 461.167384][T18115] loop4: detected capacity change from 0 to 2048 [ 461.244261][T18118] loop1: detected capacity change from 0 to 512 [ 461.256840][T18120] loop4: detected capacity change from 0 to 512 [ 461.274666][T18118] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 461.286569][T18118] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 461.296771][T18118] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3668: Corrupt directory, running e2fsck is recommended [ 461.316173][T18120] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 461.327833][T18120] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 461.338108][T18120] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3667: Corrupt directory, running e2fsck is recommended [ 461.355871][T18118] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 461.364232][T18118] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3668: corrupted in-inode xattr: invalid ea_ino [ 461.366739][T18125] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 461.378249][T18118] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3668: couldn't read orphan inode 15 (err -117) [ 461.405235][T18120] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 461.413679][T18120] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3667: corrupted in-inode xattr: invalid ea_ino [ 461.427358][T18120] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3667: couldn't read orphan inode 15 (err -117) [ 461.449172][T18118] bond7: entered promiscuous mode [ 461.484860][T18120] bond11: entered promiscuous mode [ 461.556422][T18118] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 461.568040][T18118] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 461.578193][T18118] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3668: Corrupt directory, running e2fsck is recommended [ 461.591301][T18118] EXT4-fs error (device loop1): ext4_readdir:264: inode #2: block 3: comm syz.1.3668: path /720/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 461.621834][T18129] wg1 speed is unknown, defaulting to 1000 [ 461.629018][T18129] lo speed is unknown, defaulting to 1000 [ 461.654567][T18120] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 461.666177][T18120] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 461.676320][T18120] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3667: Corrupt directory, running e2fsck is recommended [ 461.689345][T18120] EXT4-fs error (device loop4): ext4_readdir:264: inode #2: block 3: comm syz.4.3667: path /704/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 461.783729][T18137] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 461.804923][T18136] EXT4-fs: Ignoring removed orlov option [ 461.840108][T18139] bond10: left promiscuous mode [ 461.845264][T18139] bond11: left promiscuous mode [ 461.899696][T18144] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 461.911332][T18144] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 461.921629][T18144] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3674: Corrupt directory, running e2fsck is recommended [ 461.963153][T18144] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 461.971405][T18144] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3674: corrupted in-inode xattr: invalid ea_ino [ 461.985074][T18144] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3674: couldn't read orphan inode 15 (err -117) [ 462.002887][T18147] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3675'. [ 462.056483][T17868] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 219 vs 220 free clusters [ 462.084121][T18144] bond10: entered promiscuous mode [ 462.122468][T18152] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 462.154245][T18144] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 462.165862][T18144] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 462.176141][T18144] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3674: Corrupt directory, running e2fsck is recommended [ 462.188823][T18155] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 462.189440][T18144] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 3: comm syz.2.3674: path /757/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 462.275648][T18158] EXT4-fs: Ignoring removed orlov option [ 462.294134][ T29] kauditd_printk_skb: 1216 callbacks suppressed [ 462.294154][ T29] audit: type=1326 audit(462.277:80940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18157 comm="syz.2.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 462.323669][ T29] audit: type=1326 audit(462.287:80941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18157 comm="syz.2.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 462.346784][ T29] audit: type=1326 audit(462.287:80942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18157 comm="syz.2.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 462.369919][ T29] audit: type=1326 audit(462.287:80943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18157 comm="syz.2.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 462.392949][ T29] audit: type=1326 audit(462.287:80944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18157 comm="syz.2.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=333 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 462.416073][ T29] audit: type=1326 audit(462.287:80945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18157 comm="syz.2.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 462.439189][ T29] audit: type=1326 audit(462.287:80946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18157 comm="syz.2.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 462.462116][ T29] audit: type=1326 audit(462.287:80947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18157 comm="syz.2.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d0761f749 code=0x7ffc0000 [ 462.485330][ T29] audit: type=1326 audit(462.287:80948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18157 comm="syz.2.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5d07621667 code=0x7ffc0000 [ 462.508241][ T29] audit: type=1326 audit(462.287:80949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18157 comm="syz.2.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f5d076215dc code=0x7ffc0000 [ 462.610159][T18163] wg1 speed is unknown, defaulting to 1000 [ 462.616737][T18163] lo speed is unknown, defaulting to 1000 [ 462.704157][T18171] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 462.874581][T18180] netlink: 'syz.4.3686': attribute type 1 has an invalid length. [ 462.882445][T18180] netlink: 224 bytes leftover after parsing attributes in process `syz.4.3686'. [ 462.882941][T18177] bond3: entered promiscuous mode [ 462.954232][T18182] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 462.965901][T18182] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 462.976061][T18182] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3687: Corrupt directory, running e2fsck is recommended [ 463.032090][T18185] bond4: entered promiscuous mode [ 463.045812][T18182] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 463.046636][T18187] bond6: entered promiscuous mode [ 463.054429][T18182] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3687: corrupted in-inode xattr: invalid ea_ino [ 463.072678][T18182] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3687: couldn't read orphan inode 15 (err -117) [ 463.142500][T18182] bond8: entered promiscuous mode [ 463.235619][T18182] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 463.247324][T18182] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 463.257692][T18182] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3687: Corrupt directory, running e2fsck is recommended [ 463.271095][T18182] EXT4-fs error (device loop1): ext4_readdir:264: inode #2: block 3: comm syz.1.3687: path /724/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 463.373491][T18202] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 463.659265][T18207] wg1 speed is unknown, defaulting to 1000 [ 463.665765][T18207] lo speed is unknown, defaulting to 1000 [ 463.694442][T18213] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 463.870012][T18217] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 464.086789][T18225] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 464.098517][T18225] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 464.108754][T18225] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3702: Corrupt directory, running e2fsck is recommended [ 464.138959][T18225] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 464.147255][T18225] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3702: corrupted in-inode xattr: invalid ea_ino [ 464.162169][T18225] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3702: couldn't read orphan inode 15 (err -117) [ 464.237838][T18228] wg1 speed is unknown, defaulting to 1000 [ 464.244152][T18228] lo speed is unknown, defaulting to 1000 [ 464.315841][T18225] bond11: entered promiscuous mode [ 464.374963][T18225] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 464.386543][T18225] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 464.396790][T18225] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3702: Corrupt directory, running e2fsck is recommended [ 464.410175][T18225] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 3: comm syz.2.3702: path /762/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 464.506705][T18233] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3704'. [ 464.533769][T18237] set_capacity_and_notify: 8 callbacks suppressed [ 464.533828][T18237] loop4: detected capacity change from 0 to 512 [ 464.584915][T18237] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 464.596590][T18237] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 464.606777][T18237] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3706: Corrupt directory, running e2fsck is recommended [ 464.684858][T18244] loop1: detected capacity change from 0 to 1024 [ 464.721997][T18237] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 464.730704][T18244] EXT4-fs: Ignoring removed orlov option [ 464.737256][T18237] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3706: corrupted in-inode xattr: invalid ea_ino [ 464.754578][T18237] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3706: couldn't read orphan inode 15 (err -117) [ 464.824742][T18237] bond12: entered promiscuous mode [ 464.836402][T18246] loop2: detected capacity change from 0 to 1024 [ 464.843522][T18246] EXT4-fs: Ignoring removed orlov option [ 464.862555][T18254] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 464.988182][T18263] loop4: detected capacity change from 0 to 512 [ 465.026179][T18263] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 465.037882][T18263] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 465.048040][T18263] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3715: Corrupt directory, running e2fsck is recommended [ 465.062649][T18265] bond7: entered promiscuous mode [ 465.099631][T18263] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 465.100630][T18269] loop2: detected capacity change from 0 to 512 [ 465.114199][T18263] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.3715: corrupted in-inode xattr: invalid ea_ino [ 465.128053][T18263] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.3715: couldn't read orphan inode 15 (err -117) [ 465.143604][T18269] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 465.155225][T18269] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 465.165410][T18269] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3717: Corrupt directory, running e2fsck is recommended [ 465.231457][T18269] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 465.239794][T18269] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3717: corrupted in-inode xattr: invalid ea_ino [ 465.254130][T18269] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3717: couldn't read orphan inode 15 (err -117) [ 465.264922][T18263] bond13: entered promiscuous mode [ 465.275349][T18258] wg1 speed is unknown, defaulting to 1000 [ 465.285469][T18258] lo speed is unknown, defaulting to 1000 [ 465.385428][T18269] bond12: entered promiscuous mode [ 465.434341][T18263] EXT4-fs warning (device loop4): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 465.446015][T18263] EXT4-fs warning (device loop4): dx_probe:849: Enable large directory feature to access it [ 465.456255][T18263] EXT4-fs warning (device loop4): dx_probe:934: inode #2: comm syz.4.3715: Corrupt directory, running e2fsck is recommended [ 465.511199][T18279] loop1: detected capacity change from 0 to 512 [ 465.518625][T18269] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 465.530202][T18269] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 465.540359][T18269] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3717: Corrupt directory, running e2fsck is recommended [ 465.551514][T18263] EXT4-fs error (device loop4): ext4_readdir:264: inode #2: block 3: comm syz.4.3715: path /711/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 465.605372][T18279] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 465.615444][T18269] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 3: comm syz.2.3717: path /765/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 465.617062][T18279] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 465.647999][T18279] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3719: Corrupt directory, running e2fsck is recommended [ 465.722732][T18279] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 465.731148][T18279] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3719: corrupted in-inode xattr: invalid ea_ino [ 465.744911][T18279] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3719: couldn't read orphan inode 15 (err -117) [ 465.786080][T18283] bond5: entered promiscuous mode [ 465.791328][T18281] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3718'. [ 465.859723][T18279] bond9: entered promiscuous mode [ 465.912686][T18290] loop4: detected capacity change from 0 to 1024 [ 465.955430][T18290] EXT4-fs: Ignoring removed orlov option [ 465.977481][T18298] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 465.989107][T18298] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 465.999274][T18298] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3719: Corrupt directory, running e2fsck is recommended [ 466.016013][T18298] EXT4-fs error (device loop1): ext4_readdir:264: inode #2: block 3: comm syz.1.3719: path /730/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 466.058463][T18299] loop2: detected capacity change from 0 to 512 [ 466.086364][T18299] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 466.097972][T18299] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 466.108130][T18299] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3725: Corrupt directory, running e2fsck is recommended [ 466.139410][T18299] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 466.206237][T18299] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3725: corrupted in-inode xattr: invalid ea_ino [ 466.221787][T18305] loop1: detected capacity change from 0 to 512 [ 466.237004][T18299] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3725: couldn't read orphan inode 15 (err -117) [ 466.247680][T18305] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 466.260546][T18305] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 466.270723][T18305] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3726: Corrupt directory, running e2fsck is recommended [ 466.297631][T18306] loop4: detected capacity change from 0 to 128 [ 466.304779][T18305] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 466.313502][T18305] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3726: corrupted in-inode xattr: invalid ea_ino [ 466.328843][T18305] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3726: couldn't read orphan inode 15 (err -117) [ 466.384484][T18305] bond10: entered promiscuous mode [ 466.405019][T18299] bond13: entered promiscuous mode [ 466.459722][T18305] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 466.471524][T18305] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 466.481732][T18305] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3726: Corrupt directory, running e2fsck is recommended [ 466.509347][T18305] EXT4-fs error (device loop1): ext4_readdir:264: inode #2: block 3: comm syz.1.3726: path /731/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 466.560949][T18320] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3729'. [ 466.570037][T18320] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3729'. [ 466.590597][T18320] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 466.631647][T18327] netlink: 'syz.1.3732': attribute type 1 has an invalid length. [ 466.639589][T18327] netlink: 224 bytes leftover after parsing attributes in process `syz.1.3732'. [ 466.685996][T18306] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3728'. [ 467.053100][T18340] netlink: 28 bytes leftover after parsing attributes in process `syz.4.3738'. [ 467.062269][T18340] netlink: 28 bytes leftover after parsing attributes in process `syz.4.3738'. [ 467.075259][T18340] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 467.356341][ T29] kauditd_printk_skb: 1016 callbacks suppressed [ 467.356361][ T29] audit: type=1326 audit(467.347:81966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.3.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 467.386626][ T29] audit: type=1326 audit(467.347:81967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.3.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 467.409751][ T29] audit: type=1326 audit(467.347:81968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.3.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=277 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 467.432942][ T29] audit: type=1326 audit(467.347:81969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.3.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 467.433032][T18345] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3740'. [ 467.456061][ T29] audit: type=1326 audit(467.347:81970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.3.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 467.465045][T18345] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3740'. [ 467.488066][ T29] audit: type=1326 audit(467.347:81971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.3.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f18ad80df90 code=0x7ffc0000 [ 467.520033][ T29] audit: type=1326 audit(467.347:81972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.3.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 467.535695][T18347] bond2: left promiscuous mode [ 467.543856][ T29] audit: type=1326 audit(467.347:81973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.3.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f18ad80df90 code=0x7ffc0000 [ 467.548289][T18347] bond3: left promiscuous mode [ 467.570857][ T29] audit: type=1326 audit(467.347:81974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.3.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 467.575715][T18347] bond4: left promiscuous mode [ 467.598994][ T29] audit: type=1326 audit(467.347:81975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.3.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f18ad80f749 code=0x7ffc0000 [ 467.604019][T18347] bond5: left promiscuous mode [ 467.631840][T18347] bond6: left promiscuous mode [ 467.636952][T18347] bond7: left promiscuous mode [ 467.641884][T18347] bond8: left promiscuous mode [ 467.646813][T18347] bond9: left promiscuous mode [ 467.651684][T18347] bond10: left promiscuous mode [ 467.664285][T18345] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 467.823208][T18351] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3742'. [ 467.846716][T18351] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 467.869571][T18353] EXT4-fs: Ignoring removed orlov option [ 468.023771][T18358] EXT4-fs: Ignoring removed orlov option [ 468.149884][T18362] bond12: left promiscuous mode [ 468.154964][T18362] bond13: left promiscuous mode [ 468.202158][T18365] bond8: entered promiscuous mode [ 468.272674][T18371] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 468.305795][T18373] bond9: entered promiscuous mode [ 468.440918][T18378] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 468.691576][T18386] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 468.771930][T18388] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 469.133082][T18393] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 469.201862][T18396] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 469.366823][T18400] netlink: 'syz.3.3757': attribute type 13 has an invalid length. [ 469.488057][T18404] bond6: entered promiscuous mode [ 469.498013][T18406] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 469.764509][T18417] bond7: entered promiscuous mode [ 469.842846][T18420] bond8: entered promiscuous mode [ 469.969174][T18430] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 469.977993][T18429] set_capacity_and_notify: 4 callbacks suppressed [ 469.978017][T18429] loop2: detected capacity change from 0 to 2048 [ 470.019752][T18432] loop1: detected capacity change from 0 to 512 [ 470.032241][T18432] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 470.043881][T18432] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 470.054026][T18432] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3770: Corrupt directory, running e2fsck is recommended [ 470.083364][T18432] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 470.107072][T18432] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3770: corrupted in-inode xattr: invalid ea_ino [ 470.121542][T18432] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3770: couldn't read orphan inode 15 (err -117) [ 470.135614][T18432] EXT4-fs mount: 54 callbacks suppressed [ 470.135632][T18432] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 470.178876][T18432] bond11: entered promiscuous mode [ 470.235498][T18437] wg1 speed is unknown, defaulting to 1000 [ 470.241911][T18437] lo speed is unknown, defaulting to 1000 [ 470.249349][T18432] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 470.260902][T18432] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 470.271171][T18432] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3770: Corrupt directory, running e2fsck is recommended [ 470.284891][T18432] EXT4-fs error (device loop1): ext4_readdir:264: inode #2: block 3: comm syz.1.3770: path /737/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 470.345041][ T3316] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 470.376375][T18442] loop1: detected capacity change from 0 to 128 [ 470.384974][T18442] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 470.503998][T18447] loop4: detected capacity change from 0 to 2048 [ 470.694474][ T3316] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 470.727931][T18454] loop1: detected capacity change from 0 to 512 [ 470.736332][T18454] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 470.747905][T18454] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 470.758054][T18454] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3777: Corrupt directory, running e2fsck is recommended [ 470.788916][T18454] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 470.813106][T18454] EXT4-fs error (device loop1): ext4_iget_extra_inode:5073: inode #15: comm syz.1.3777: corrupted in-inode xattr: invalid ea_ino [ 470.839399][T18454] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.3777: couldn't read orphan inode 15 (err -117) [ 470.872431][T18445] __nla_validate_parse: 25 callbacks suppressed [ 470.872449][T18445] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3774'. [ 470.884144][T18454] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 470.935141][T18457] wg1 speed is unknown, defaulting to 1000 [ 470.968097][T18457] lo speed is unknown, defaulting to 1000 [ 470.980974][T18460] loop2: detected capacity change from 0 to 512 [ 470.991674][T18460] EXT4-fs warning (device loop2): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 471.003319][T18460] EXT4-fs warning (device loop2): dx_probe:849: Enable large directory feature to access it [ 471.013512][T18460] EXT4-fs warning (device loop2): dx_probe:934: inode #2: comm syz.2.3779: Corrupt directory, running e2fsck is recommended [ 471.044090][T18460] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 471.052374][T18460] EXT4-fs error (device loop2): ext4_iget_extra_inode:5073: inode #15: comm syz.2.3779: corrupted in-inode xattr: invalid ea_ino [ 471.066423][T18460] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.3779: couldn't read orphan inode 15 (err -117) [ 471.079106][T18460] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 471.124572][T18454] bond12: entered promiscuous mode [ 471.185120][T18460] bond14: entered promiscuous mode [ 471.202936][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 471.213255][T18465] EXT4-fs warning (device loop1): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 471.224954][T18465] EXT4-fs warning (device loop1): dx_probe:849: Enable large directory feature to access it [ 471.225045][ T2995] ================================================================== [ 471.235245][T18465] EXT4-fs warning (device loop1): dx_probe:934: inode #2: comm syz.1.3777: Corrupt directory, running e2fsck is recommended [ 471.243234][ T2995] BUG: KCSAN: data-race in _prb_read_valid / data_alloc [ 471.263043][ T2995] [ 471.265387][ T2995] write to 0xffffffff8686a958 of 8 bytes by task 18465 on cpu 0: [ 471.273119][ T2995] data_alloc+0x310/0x390 [ 471.277510][ T2995] prb_reserve+0x8d7/0xad0 [ 471.281959][ T2995] vprintk_store+0x53c/0x830 [ 471.286582][ T2995] vprintk_emit+0x15a/0x5c0 [ 471.291142][ T2995] vprintk_default+0x26/0x30 [ 471.295939][ T2995] vprintk+0x1d/0x30 [ 471.299860][ T2995] _printk+0x79/0xa0 [ 471.303768][ T2995] __ext4_warning+0x12b/0x140 [ 471.308475][ T2995] dx_probe+0x7d5/0x990 [ 471.312659][ T2995] ext4_htree_fill_tree+0x132/0xa10 [ 471.317883][ T2995] ext4_readdir+0x18b1/0x1f10 [ 471.322587][ T2995] iterate_dir+0x114/0x330 [ 471.327033][ T2995] __se_sys_getdents+0x88/0x1b0 [ 471.331917][ T2995] __x64_sys_getdents+0x43/0x50 [ 471.336799][ T2995] x64_sys_call+0xe03/0x3000 [ 471.341416][ T2995] do_syscall_64+0xca/0x2b0 [ 471.345981][ T2995] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 471.351924][ T2995] [ 471.354269][ T2995] read to 0xffffffff8686a958 of 16 bytes by task 2995 on cpu 1: [ 471.361913][ T2995] _prb_read_valid+0x1bc/0x920 [ 471.366707][ T2995] prb_read_valid+0x3c/0x60 [ 471.371276][ T2995] syslog_print+0x146/0x540 [ 471.375810][ T2995] do_syslog+0x52b/0x7e0 [ 471.380090][ T2995] __x64_sys_syslog+0x41/0x50 [ 471.384816][ T2995] x64_sys_call+0x27ce/0x3000 [ 471.389534][ T2995] do_syscall_64+0xca/0x2b0 [ 471.394086][ T2995] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 471.400097][ T2995] [ 471.402441][ T2995] Reported by Kernel Concurrency Sanitizer on: [ 471.408626][ T2995] CPU: 1 UID: 0 PID: 2995 Comm: klogd Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 471.419496][ T2995] Tainted: [W]=WARN [ 471.423311][ T2995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 471.433392][ T2995] ================================================================== [ 471.441903][T18465] EXT4-fs error (device loop1): ext4_readdir:264: inode #2: block 3: comm syz.1.3777: path /739/file0: bad entry in directory: directory entry overrun - offset=0, inode=4294967295, rec_len=65552, size=1024 fake=0 [ 471.542247][ T3316] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 471.568507][T18471] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3781'. [ 471.577748][T18471] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3781'. [ 471.587893][T18471] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3781'.