last executing test programs: 7.587103159s ago: executing program 2 (id=23526): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000380), 0x1, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f000001a240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r1, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000aedbe0ba0500000004000000000000000000000000000000000000003e578f4067038b44d885d4ac006dd008d48b98954d6e0740bb564a2109171fae9138fcb92bcac3c126f0f0fc29e007c60c91f6b3e70924bca2e5af4ba3fe1149920858207a85b35369c03a0dbd999a7bd4d632b454203a5394908ec60f2a1dee277068243edeffa847a5e081f908c0ded2edefed5217fc6ea22e3814f122538d704908cfc8f4db"], 0x50) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r3, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') ioctl$RTC_WIE_OFF(r3, 0x7010) pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r2, 0x20, &(0x7f0000000680)={&(0x7f0000000580)=""/128, 0x80, 0x0, &(0x7f0000000600)=""/100, 0x64}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0xd, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000200000000000000fcffffff18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000ff5f030006000000d95af0ffffffffff18110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70200000000000085000000861000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @lirc_mode2=0x10, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x6, 0x4, 0x3}, 0x10, r5, r2, 0x1, &(0x7f0000000a80)=[r1, r3, r4], &(0x7f0000000140)=[{0x3, 0x5, 0x9, 0x2}], 0x10, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x51031, 0xffffffffffffffff, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_NAME(0xf, &(0x7f0000000680)='+}[@\x00[$oB\xfa=\xee\xc4F\xba\xed\x97') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) io_pgetevents(0x0, 0x3, 0x0, &(0x7f00000002c0), &(0x7f00000004c0)={0x77359400}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x520, 0x340, 0x25, 0x148, 0x0, 0x60, 0x488, 0x2a8, 0x2a8, 0x488, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x0, 0x0, 0x9, 0x0, 0x80ffffff, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@set={{0x40}}, @common=@unspec=@statistic={{0x38}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x580) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0xe, 0x9f, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0xaac8c000) 7.50452822s ago: executing program 2 (id=23527): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) socket(0x40000000015, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000040)=0x8) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000010900010073797a310000000054000000030a01040000000000000000010000000900030073797a31000000000900010073797a3100000000280004800800014000000005080002401b2fd2c5140003006970366772653000000000000000000028000000000a05000000000000000000010000080900010073797a3100000000080002400000000114000000110001"], 0xc4}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000003c0)='&\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYRES32], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffde0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x72, 0x11cfa, 0x0, 0x8000008, 0x3, 0x4, 0x1, 0x0, 0x7cce8c743ee810df}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c0002800500010000000000080007"], 0x64}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2=0xe0000001}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x6c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x44, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x44}}, 0x0) 7.4834477s ago: executing program 2 (id=23528): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="b4050000200080066110000000000000c6000000000000009500d800000000009f33ef60916e55893f1eeb0b2ae13d922e6235592ce847e2566c43d72918a897323fd0723043c47c896ce0bce66a245ad9d6817fd98cd824498949714ffaac8a6f77ef0000ca5d82054d54d53cd2b6db714e75d9bdae214fa68a0557eb2c5ca683a4b6fcfcff0bffffffffffd47042eaebfa6fa26fa7a347c7faa8e700458c60897d4a6148a1c11428427c40de60beacf871ab5c2ff88a02084e5b5271e45f00003826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632f7a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffabe90ac5d08dd9d4e0359c41cf3626e1230bc1cd4c02c460ceb44276e9bd94d1c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd00000000000fbf940e6652d357474ed5f816f66ac3027460ae66317f83cdd7a7eb2a7003d1a6cf5478533584961c329fcf5a43e05c92bfef0dcd28000000003f2915a3039c9a78f63b8ec7e60a0000fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117c024185a062acb6b8eec31c21b3af8b9eedb4660ed2deb7acf2a33a376a5cb7d4266d5b0be14488d14b473502486ad8dd600000000000000000000c7766ea7c581782c0d90f42a85303835fc291c25d29e6bead5d7360f2e1929d7736ebc8558c4506407d3046022bdf25485bd5442169e9b4c1278343581b7a06f65e8ea6b042c4fd08381e5000000000000006398d6480000001a723b91030000006480304c66b217aea0156ce9eef911fe5b7370f79987303ecb3aabc53c60014a0101ab766754f596b41da9534d12b8306a1b36cf3b03f0d790879f523eabfbee83d8bd472ef69660cf6ec897106c51e54a17497f384c4956b41f3843e7c878b1e11316d8ddae1c6c3b85aaf7a9fcaf8f5d6186c42542d68ba72682c938d3c0a2e6"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 6.887813949s ago: executing program 2 (id=23531): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 5.087555736s ago: executing program 4 (id=23539): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 4.969964457s ago: executing program 0 (id=23540): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x1}}, {0x6, 0x1b, [0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) 4.890602649s ago: executing program 0 (id=23541): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 4.753218951s ago: executing program 3 (id=23542): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x65, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, 0x0, 0x8000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) execveat$binfmt(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r8, &(0x7f0000004200)='t', 0x1) sendfile(r8, r7, 0x0, 0x3ffff) sendfile(r8, r7, 0x0, 0x7ffff000) 4.407415895s ago: executing program 0 (id=23543): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 3.475005649s ago: executing program 0 (id=23544): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x65, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x8000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) execveat$binfmt(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r8, &(0x7f0000004200)='t', 0x1) sendfile(r8, r7, 0x0, 0x3ffff) sendfile(r8, r7, 0x0, 0x7ffff000) 3.251340693s ago: executing program 4 (id=23545): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x102, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c0002800500010000000000080007"], 0x64}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x48, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2=0xe0000001}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT={0x8}]}, 0x48}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0), 0xc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2=0xe0000001}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) 3.147983244s ago: executing program 1 (id=23546): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, 0x0) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="b4050000200080066110000000000000c6000000000000009500d800000000009f33ef60916e55893f1eeb0b2ae13d922e6235592ce847e2566c43d72918a897323fd0723043c47c896ce0bce66a245ad9d6817fd98cd824498949714ffaac8a6f77ef0000ca5d82054d54d53cd2b6db714e75d9bdae214fa68a0557eb2c5ca683a4b6fcfcff0bffffffffffd47042eaebfa6fa26fa7a347c7faa8e700458c60897d4a6148a1c11428427c40de60beacf871ab5c2ff88a02084e5b5271e45f00003826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632f7a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffabe90ac5d08dd9d4e0359c41cf3626e1230bc1cd4c02c460ceb44276e9bd94d1c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd00000000000fbf940e6652d357474ed5f816f66ac3027460ae66317f83cdd7a7eb2a7003d1a6cf5478533584961c329fcf5a43e05c92bfef0dcd28000000003f2915a3039c9a78f63b8ec7e60a0000fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117c024185a062acb6b8eec31c21b3af8b9eedb4660ed2deb7acf2a33a376a5cb7d4266d5b0be14488d14b473502486ad8dd600000000000000000000c7766ea7c581782c0d90f42a85303835fc291c25d29e6bead5d7360f2e1929d7736ebc8558c4506407d3046022bdf25485bd5442169e9b4c1278343581b7a06f65e8ea6b042c4fd08381e5000000000000006398d6480000001a723b91030000006480304c66b217aea0156ce9eef911fe5b7370f79987303ecb3aabc53c60014a0101ab766754f596b41da9534d12b8306a1b36cf3b03f0d790879f523eabfbee83d8bd472ef69660cf6ec897106c51e54a17497f384c4956b41f3843e7c878b1e11316d8ddae1c6c3b85aaf7a9fcaf8f5d6186c42542d68ba72682c938d3c0a2e6e10eed71b1d31c9f300b41745329bf34495c63e43fb896e4903fb0fae54a8f0fe3b48a5b29d279070647e65097c8ecf32a15080000000000000001007ba4a70a084bd994ac5e00000000000000000000000000351a30cd97f83d72631d0fe92efa974a53f4dc1eb9a86df632a6d463688123f64d42a919bcfc44a90ffd680200000091f842a91c977f6075d07e39e669b0713af0498a99bf5261cb3269d499a5202d7a08b33ade7b38829b9bd39619688d5e9af22170ef83e5b92cbb32b655c45de1c154aad81bf64351668a3f76d5afa958aff76249e0ffdf8e45155536a1a44bfcbfbfd232af000052f9002a"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r7, @ANYRES32=r6, @ANYBLOB="05"], 0x10) close(r6) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r7}, &(0x7f0000000500), &(0x7f0000000540)=r6}, 0x20) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r10, 0x0, 0x10000000006}, 0x18) r11 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r11, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r9, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 3.065917556s ago: executing program 3 (id=23547): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'syzkaller0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000400)=ANY=[], 0x28}}, 0x4040040) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=r3], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = syz_open_dev$sg(0x0, 0x0, 0x8002) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6}, &(0x7f0000000000), &(0x7f00000005c0)=r7}, 0x20) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0xe, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000300)={'syzkaller0\x00', 0x0}) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000100)={r9, 0x2, 0x6}, 0x10) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000080)={r9, 0x1, 0x6, @random="0b65c01cd7d3"}, 0x10) socket$packet(0x11, 0xf9c7aa07db766d7f, 0x300) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xb, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYRES64=r5], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000a80)='kfree\x00', r11, 0x0, 0x1d}, 0x18) r12 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r12, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) 2.851176229s ago: executing program 1 (id=23548): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 2.665003561s ago: executing program 3 (id=23549): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000380), 0x1, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f000001a240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r0, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000aedbe0ba0500000004000000000000000000000000000000000000003e578f4067038b44d885d4ac006dd008d48b98954d6e0740bb564a2109171fae9138fcb92bcac3c126f0f0fc29e007c60c91f6b3e70924bca2e5af4ba3fe1149920858207a85b35369c03a0dbd999a7bd4d632b454203a5394908ec60f2a1dee277068243edeffa847a5e081f908c0ded2edefed5217fc6ea22e3814f122538d704908cfc8f4db"], 0x50) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') ioctl$RTC_WIE_OFF(r2, 0x7010) pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r1, 0x20, &(0x7f0000000680)={&(0x7f0000000580)=""/128, 0x80, 0x0, &(0x7f0000000600)=""/100, 0x64}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0xd, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000200000000000000fcffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086000000ff5f030006000000d95af0ffffffffff18110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200000000000085000000861000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @lirc_mode2=0x10, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x6, 0x4, 0x3}, 0x10, r4, r1, 0x1, &(0x7f0000000a80)=[r3, r0, r2, r3], &(0x7f0000000140)=[{0x3, 0x5, 0x9, 0x2}], 0x10, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x51031, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_NAME(0xf, &(0x7f0000000680)='+}[@\x00[$oB\xfa=\xee\xc4F\xba\xed\x97') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) io_pgetevents(0x0, 0x3, 0x0, &(0x7f00000002c0), &(0x7f00000004c0)={0x77359400}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x520, 0x340, 0x25, 0x148, 0x0, 0x60, 0x488, 0x2a8, 0x2a8, 0x488, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x0, 0x0, 0x9, 0x0, 0x80ffffff, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@set={{0x40}}, @common=@unspec=@statistic={{0x38}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x580) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0xe, 0x9f, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0xaac8c000) 2.366031926s ago: executing program 4 (id=23550): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="b4050000200080066110000000000000c6000000000000009500d800000000009f33ef60916e55893f1eeb0b2ae13d922e6235592ce847e2566c43d72918a897323fd0723043c47c896ce0bce66a245ad9d6817fd98cd824498949714ffaac8a6f77ef0000ca5d82054d54d53cd2b6db714e75d9bdae214fa68a0557eb2c5ca683a4b6fcfcff0bffffffffffd47042eaebfa6fa26fa7a347c7faa8e700458c60897d4a6148a1c11428427c40de60beacf871ab5c2ff88a02084e5b5271e45f00003826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632f7a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffabe90ac5d08dd9d4e0359c41cf3626e1230bc1cd4c02c460ceb44276e9bd94d1c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd00000000000fbf940e6652d357474ed5f816f66ac3027460ae66317f83cdd7a7eb2a7003d1a6cf5478533584961c329fcf5a43e05c92bfef0dcd28000000003f2915a3039c9a78f63b8ec7e60a0000fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117c024185a062acb6b8eec31c21b3af8b9eedb4660ed2deb7acf2a33a376a5cb7d4266d5b0be14488d14b473502486ad8dd600000000000000000000c7766ea7c581782c0d90f42a85303835fc291c25d29e6bead5d7360f2e1929d7736ebc8558c4506407d3046022bdf25485bd5442169e9b4c1278343581b7a06f65e8ea6b042c4fd08381e5000000000000006398d6480000001a723b91030000006480304c66b217aea0156ce9eef911fe5b7370f79987303ecb3aabc53c60014a0101ab766754f596b41da9534d12b8306a1b36cf3b03f0d790879f523eabfbee83d8bd472ef69660cf6ec897106c51e54a17497f384c4956b41f3843e7c878b1e11316d8ddae1c6c3b85aaf7a9fcaf8f5d6186c42542d68ba72682c938d3c0a2e6e10eed71b1d31c9f300b41745329bf34495c63e43fb896e4903fb0fae54a8f0fe3b48a5b29d279070647e65097c8ecf32a15080000000000000001007ba4a70a084bd994ac5e00000000000000000000000000351a30cd97f83d72631d0fe92efa974a53f4dc1eb9a86df632a6d463688123f64d42a919bcfc44a90ffd680200000091f842a91c977f6075d07e39e669b0713af0498a99bf5261cb3269d499a5202d7a08b33ade7b38829b9bd39619688d5e"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 2.290104407s ago: executing program 1 (id=23551): r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x65, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x3c}}, 0x8000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) execveat$binfmt(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r8 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r9, &(0x7f0000004200)='t', 0x1) sendfile(r9, r8, 0x0, 0x3ffff) sendfile(r9, r8, 0x0, 0x7ffff000) 2.221753118s ago: executing program 0 (id=23552): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x65, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x8000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) execveat$binfmt(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r8, &(0x7f0000004200)='t', 0x1) sendfile(r8, r7, 0x0, 0x3ffff) sendfile(r8, r7, 0x0, 0x7ffff000) 1.883312083s ago: executing program 4 (id=23553): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 1.700693046s ago: executing program 3 (id=23554): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x65, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINK={0x8, 0x5, r6}]}, 0x28}}, 0x8000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) execveat$binfmt(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r8 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r9, &(0x7f0000004200)='t', 0x1) sendfile(r9, r8, 0x0, 0x3ffff) sendfile(r9, r8, 0x0, 0x7ffff000) 1.248225642s ago: executing program 4 (id=23555): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000380), 0x1, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f000001a240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r0, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000aedbe0ba0500000004000000000000000000000000000000000000003e578f4067038b44d885d4ac006dd008d48b98954d6e0740bb564a2109171fae9138fcb92bcac3c126f0f0fc29e007c60c91f6b3e70924bca2e5af4ba3fe1149920858207a85b35369c03a0dbd999a7bd4d632b454203a5394908ec60f2a1dee277068243edeffa847a5e081f908c0ded2edefed5217fc6ea22e3814f122538d704908cfc8f4db"], 0x50) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') ioctl$RTC_WIE_OFF(r2, 0x7010) pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r1, 0x20, &(0x7f0000000680)={&(0x7f0000000580)=""/128, 0x80, 0x0, &(0x7f0000000600)=""/100, 0x64}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0xd, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000200000000000000fcffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086000000ff5f030006000000d95af0ffffffffff18110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200000000000085000000861000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @lirc_mode2=0x10, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x6, 0x4, 0x3}, 0x10, r4, r1, 0x1, &(0x7f0000000a80)=[r3, r0, r2, r3], &(0x7f0000000140)=[{0x3, 0x5, 0x9, 0x2}], 0x10, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x51031, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_NAME(0xf, &(0x7f0000000680)='+}[@\x00[$oB\xfa=\xee\xc4F\xba\xed\x97') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) io_pgetevents(0x0, 0x3, 0x0, &(0x7f00000002c0), &(0x7f00000004c0)={0x77359400}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x520, 0x340, 0x25, 0x148, 0x0, 0x60, 0x488, 0x2a8, 0x2a8, 0x488, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x0, 0x0, 0x9, 0x0, 0x80ffffff, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@set={{0x40}}, @common=@unspec=@statistic={{0x38}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x580) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0xe, 0x9f, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0xaac8c000) 1.102155244s ago: executing program 1 (id=23556): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000380), 0x1, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f000001a240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r1, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000aedbe0ba0500000004000000000000000000000000000000000000003e578f4067038b44d885d4ac006dd008d48b98954d6e0740bb564a2109171fae9138fcb92bcac3c126f0f0fc29e007c60c91f6b3e70924bca2e5af4ba3fe1149920858207a85b35369c03a0dbd999a7bd4d632b454203a5394908ec60f2a1dee277068243edeffa847a5e081f908c0ded2edefed5217fc6ea22e3814f122538d704908cfc8f4db"], 0x50) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r3, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') ioctl$RTC_WIE_OFF(r3, 0x7010) pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r2, 0x20, &(0x7f0000000680)={&(0x7f0000000580)=""/128, 0x80, 0x0, &(0x7f0000000600)=""/100, 0x64}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0xd, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000200000000000000fcffffff181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000ff5f030006000000d95af0ffffffffff18110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70200000000000085000000861000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @lirc_mode2=0x10, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x6, 0x4, 0x3}, 0x10, r5, r2, 0x1, &(0x7f0000000a80)=[r4, r1, r3, r4], &(0x7f0000000140)=[{0x3, 0x5, 0x9, 0x2}], 0x10, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x51031, 0xffffffffffffffff, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_NAME(0xf, &(0x7f0000000680)='+}[@\x00[$oB\xfa=\xee\xc4F\xba\xed\x97') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) io_pgetevents(0x0, 0x3, 0x0, &(0x7f00000002c0), &(0x7f00000004c0)={0x77359400}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x520, 0x340, 0x25, 0x148, 0x0, 0x60, 0x488, 0x2a8, 0x2a8, 0x488, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x0, 0x0, 0x9, 0x0, 0x80ffffff, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@set={{0x40}}, @common=@unspec=@statistic={{0x38}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x580) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0xe, 0x9f, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0xaac8c000) 1.016955835s ago: executing program 0 (id=23557): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 945.245417ms ago: executing program 1 (id=23558): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="b4050000200080066110000000000000c6000000000000009500d800000000009f33ef60916e55893f1eeb0b2ae13d922e6235592ce847e2566c43d72918a897323fd0723043c47c896ce0bce66a245ad9d6817fd98cd824498949714ffaac8a6f77ef0000ca5d82054d54d53cd2b6db714e75d9bdae214fa68a0557eb2c5ca683a4b6fcfcff0bffffffffffd47042eaebfa6fa26fa7a347c7faa8e700458c60897d4a6148a1c11428427c40de60beacf871ab5c2ff88a02084e5b5271e45f00003826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632f7a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffabe90ac5d08dd9d4e0359c41cf3626e1230bc1cd4c02c460ceb44276e9bd94d1c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd00000000000fbf940e6652d357474ed5f816f66ac3027460ae66317f83cdd7a7eb2a7003d1a6cf5478533584961c329fcf5a43e05c92bfef0dcd28000000003f2915a3039c9a78f63b8ec7e60a0000fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117c024185a062acb6b8eec31c21b3af8b9eedb4660ed2deb7acf2a33a376a5cb7d4266d5b0be14488d14b473502486ad8dd600000000000000000000c7766ea7c581782c0d90f42a85303835fc291c25d29e6bead5d7360f2e1929d7736ebc8558c4506407d3046022bdf25485bd5442169e9b4c1278343581b7a06f65e8ea6b042c4fd08381e5000000000000006398d6480000001a723b91030000006480304c66b217aea0156ce9eef911fe5b7370f79987303ecb3aabc53c60014a0101ab766754f596b41da9534d12b8306a1b36cf3b03f0d790879f523eabfbee83d8bd472ef69660cf6ec897106c51e54a17497f384c4956b41f3843e7c878b1e11316d8ddae1c6c3b85aaf7a9fcaf8f5d6186c42542d68ba72682c938d3c0a2e6e10eed71b1d31c9f300b41745329bf34495c63e43fb896e4903fb0fae54a8f0fe3b48a5b29d279070647e65097c8ecf32a15080000000000000001007ba4a70a084bd994ac5e00000000000000000000000000351a30cd97f83d72631d0fe92efa974a53f4dc1eb9a86df632a6d463688123f64d42a919bcfc44a90ffd680200000091f842a91c977f6075d07e39e669b0713af0498a99bf5261cb3269d499a5202d7a08b33ade7b38829b9bd39619688d5e9af22170ef83e5b92cbb32b655c45de1c154aad81bf64351668a3f76d5afa958aff76249e0ffdf8e45155536a1a44bfcbfbfd232af000052f9002a"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 522.981043ms ago: executing program 3 (id=23559): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="b4050000200080066110000000000000c6000000000000009500d800000000009f33ef60916e55893f1eeb0b2ae13d922e6235592ce847e2566c43d72918a897323fd0723043c47c896ce0bce66a245ad9d6817fd98cd824498949714ffaac8a6f77ef0000ca5d82054d54d53cd2b6db714e75d9bdae214fa68a0557eb2c5ca683a4b6fcfcff0bffffffffffd47042eaebfa6fa26fa7a347c7faa8e700458c60897d4a6148a1c11428427c40de60beacf871ab5c2ff88a02084e5b5271e45f00003826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632f7a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffabe90ac5d08dd9d4e0359c41cf3626e1230bc1cd4c02c460ceb44276e9bd94d1c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd00000000000fbf940e6652d357474ed5f816f66ac3027460ae66317f83cdd7a7eb2a7003d1a6cf5478533584961c329fcf5a43e05c92bfef0dcd28000000003f2915a3039c9a78f63b8ec7e60a0000fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117c024185a062acb6b8eec31c21b3af8b9eedb4660ed2deb7acf2a33a376a5cb7d4266d5b0be14488d14b473502486ad8dd600000000000000000000c7766ea7c581782c0d90f42a85303835fc291c25d29e6bead5d7360f2e1929d7736ebc8558c4506407d3046022bdf25485bd5442169e9b4c1278343581b7a06f65e8ea6b042c4fd08381e5000000000000006398d6480000001a723b91030000006480304c66b217aea0156ce9eef911fe5b7370f79987303ecb3aabc53c60014a0101ab766754f596b41da9534d12b8306a1b36cf3b03f0d790879f523eabfbee83d8bd472ef69660cf6ec897106c51e54a17497f384c4956b41f3843e7c878b1e11316d8ddae1c6c3b85aaf7a9fcaf8f5d6186c42542d68ba72682c938d3c0a2e6e10eed71b1d31c9f300b41745329bf34495c63e43fb896e4903fb0fae54a8f0fe3b48a5b29d279070647e65097c8ecf32a15080000000000000001007ba4a70a084bd994ac5e00000000000000000000000000351a30cd97f83d72631d0fe92efa974a53f4dc1eb9a86df632a6d463688123f64d42a919bcfc44a90ffd680200000091f842a91c977f6075d07e39e669b0713af0498a99bf5261cb3269d499a5202d7a08b33ade7b38829b9bd39619688d5e9af22170ef83e5b92cbb32b655c45de1c154aad81bf64351668a3f76d5afa958aff76249e0ffdf8e45155536a1a44bfcbfbfd232af000052f9002a"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 383.328985ms ago: executing program 1 (id=23560): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 364.432115ms ago: executing program 2 (id=23533): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) execveat$binfmt(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 226.248987ms ago: executing program 2 (id=23562): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 199.904338ms ago: executing program 4 (id=23563): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x65, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x8000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) execveat$binfmt(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r8, &(0x7f0000004200)='t', 0x1) sendfile(r8, r7, 0x0, 0x3ffff) sendfile(r8, r7, 0x0, 0x7ffff000) 0s ago: executing program 3 (id=23564): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) kernel console output (not intermixed with test programs): =root:sysadm_r:sysadm_t pid=8752 comm="syz.1.22386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1901.182836][ T29] audit: type=1326 audit(1747178413.158:83219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8752 comm="syz.1.22386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1901.209483][ T29] audit: type=1326 audit(1747178413.158:83220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8752 comm="syz.1.22386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1901.236587][ T29] audit: type=1326 audit(1747178413.158:83221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8752 comm="syz.1.22386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1901.262219][ T29] audit: type=1326 audit(1747178413.168:83222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8752 comm="syz.1.22386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1901.288236][ T29] audit: type=1326 audit(1747178413.168:83223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8752 comm="syz.1.22386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1901.316386][ T29] audit: type=1326 audit(1747178413.168:83224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8752 comm="syz.1.22386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1901.799252][ T8769] lo speed is unknown, defaulting to 1000 [ 1901.868222][ T8769] dummy0 speed is unknown, defaulting to 1000 [ 1902.608857][ T8767] netlink: 'syz.1.22392': attribute type 1 has an invalid length. [ 1902.653424][ T8772] lo speed is unknown, defaulting to 1000 [ 1902.724485][ T8772] dummy0 speed is unknown, defaulting to 1000 [ 1903.707682][ T8782] __nla_validate_parse: 6 callbacks suppressed [ 1903.707703][ T8782] netlink: 8 bytes leftover after parsing attributes in process `syz.0.22396'. [ 1903.766227][ T8784] netlink: 8 bytes leftover after parsing attributes in process `syz.2.22397'. [ 1903.787998][ T8782] netlink: 4 bytes leftover after parsing attributes in process `syz.0.22396'. [ 1903.840590][ T8784] netlink: 4 bytes leftover after parsing attributes in process `syz.2.22397'. [ 1904.076475][ T8798] xt_hashlimit: max too large, truncated to 1048576 [ 1904.095480][ T8796] lo speed is unknown, defaulting to 1000 [ 1904.102922][ T8798] Cannot find set identified by id 0 to match [ 1904.166960][ T8801] xt_hashlimit: max too large, truncated to 1048576 [ 1904.190505][ T8801] Cannot find set identified by id 0 to match [ 1904.407752][ T8796] dummy0 speed is unknown, defaulting to 1000 [ 1904.957791][ T8813] lo speed is unknown, defaulting to 1000 [ 1905.087912][ T8813] dummy0 speed is unknown, defaulting to 1000 [ 1906.044611][ T8816] xt_hashlimit: max too large, truncated to 1048576 [ 1906.208824][ T29] kauditd_printk_skb: 169 callbacks suppressed [ 1906.208842][ T29] audit: type=1326 audit(1747178418.565:83394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8821 comm="syz.4.22410" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1906.240869][ T29] audit: type=1326 audit(1747178418.565:83395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8821 comm="syz.4.22410" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1906.330331][ T29] audit: type=1326 audit(1747178418.628:83396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8821 comm="syz.4.22410" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1906.355344][ T29] audit: type=1326 audit(1747178418.628:83397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8821 comm="syz.4.22410" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1906.369172][ T8837] netlink: 'syz.2.22415': attribute type 1 has an invalid length. [ 1906.379134][ T29] audit: type=1326 audit(1747178418.628:83398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8821 comm="syz.4.22410" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1906.412119][ T29] audit: type=1326 audit(1747178418.659:83399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8828 comm="syz.0.22413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1906.438182][ T29] audit: type=1326 audit(1747178418.659:83400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8828 comm="syz.0.22413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1906.458133][ T8840] xt_hashlimit: max too large, truncated to 1048576 [ 1906.464752][ T29] audit: type=1326 audit(1747178418.659:83401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8828 comm="syz.0.22413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1906.464794][ T29] audit: type=1326 audit(1747178418.659:83402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8828 comm="syz.0.22413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1906.464849][ T29] audit: type=1326 audit(1747178418.659:83403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8828 comm="syz.0.22413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1906.491219][ T8840] Cannot find set identified by id 0 to match [ 1906.569329][ T8846] lo speed is unknown, defaulting to 1000 [ 1906.607819][ T8843] netlink: 32 bytes leftover after parsing attributes in process `syz.0.22416'. [ 1906.826496][ T8846] dummy0 speed is unknown, defaulting to 1000 [ 1907.115362][ T8863] xt_hashlimit: max too large, truncated to 1048576 [ 1907.746264][ T8880] lo speed is unknown, defaulting to 1000 [ 1907.879407][ T8880] dummy0 speed is unknown, defaulting to 1000 [ 1908.889130][ T8885] lo speed is unknown, defaulting to 1000 [ 1908.918335][ T8888] netlink: 32 bytes leftover after parsing attributes in process `syz.0.22434'. [ 1908.958931][ T8887] netlink: 'syz.3.22435': attribute type 1 has an invalid length. [ 1909.044651][ T8885] dummy0 speed is unknown, defaulting to 1000 [ 1909.096109][ T8897] lo speed is unknown, defaulting to 1000 [ 1909.209853][ T8911] netlink: 8 bytes leftover after parsing attributes in process `syz.0.22444'. [ 1909.305789][ T8897] dummy0 speed is unknown, defaulting to 1000 [ 1909.488598][ T8934] lo speed is unknown, defaulting to 1000 [ 1909.537595][ T8936] lo speed is unknown, defaulting to 1000 [ 1909.570519][ T8941] netlink: 32 bytes leftover after parsing attributes in process `syz.0.22454'. [ 1909.721565][ T8936] dummy0 speed is unknown, defaulting to 1000 [ 1909.733856][ T8934] dummy0 speed is unknown, defaulting to 1000 [ 1909.824459][ T8965] netlink: 'syz.3.22469': attribute type 1 has an invalid length. [ 1909.909735][ T8962] lo speed is unknown, defaulting to 1000 [ 1909.986350][ T8980] netlink: 8 bytes leftover after parsing attributes in process `syz.4.22474'. [ 1910.024251][ T8980] netlink: 4 bytes leftover after parsing attributes in process `syz.4.22474'. [ 1910.165522][ T8962] dummy0 speed is unknown, defaulting to 1000 [ 1910.306151][ T8999] lo speed is unknown, defaulting to 1000 [ 1910.318632][ T9003] lo speed is unknown, defaulting to 1000 [ 1910.424610][ T9003] dummy0 speed is unknown, defaulting to 1000 [ 1910.516689][ T9032] netlink: 8 bytes leftover after parsing attributes in process `syz.4.22494'. [ 1910.571544][ T9032] netlink: 4 bytes leftover after parsing attributes in process `syz.4.22494'. [ 1910.649663][ T9038] lo speed is unknown, defaulting to 1000 [ 1910.657432][ T8999] dummy0 speed is unknown, defaulting to 1000 [ 1910.834872][ T9038] dummy0 speed is unknown, defaulting to 1000 [ 1910.988851][ T9063] lo speed is unknown, defaulting to 1000 [ 1911.151672][ T9078] netlink: 8 bytes leftover after parsing attributes in process `syz.0.22513'. [ 1911.199616][ T9078] netlink: 4 bytes leftover after parsing attributes in process `syz.0.22513'. [ 1911.324913][ T9063] dummy0 speed is unknown, defaulting to 1000 [ 1911.506084][ T9087] lo speed is unknown, defaulting to 1000 [ 1911.764247][ T9096] lo speed is unknown, defaulting to 1000 [ 1911.836317][ T9087] dummy0 speed is unknown, defaulting to 1000 [ 1912.055909][ T9096] dummy0 speed is unknown, defaulting to 1000 [ 1912.118664][ T9114] netlink: 8 bytes leftover after parsing attributes in process `syz.3.22526'. [ 1912.396080][ T9122] lo speed is unknown, defaulting to 1000 [ 1912.560927][ T9122] dummy0 speed is unknown, defaulting to 1000 [ 1913.113104][ T29] kauditd_printk_skb: 122 callbacks suppressed [ 1913.113190][ T29] audit: type=1326 audit(1747178425.820:83526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9131 comm="syz.1.22531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1913.158700][ T9135] netlink: 'syz.3.22533': attribute type 1 has an invalid length. [ 1913.223154][ T29] audit: type=1326 audit(1747178425.851:83527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9131 comm="syz.1.22531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1913.247676][ T29] audit: type=1326 audit(1747178425.851:83528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9131 comm="syz.1.22531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1913.271332][ T29] audit: type=1326 audit(1747178425.851:83529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9131 comm="syz.1.22531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1913.294944][ T29] audit: type=1326 audit(1747178425.851:83530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9131 comm="syz.1.22531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1913.318761][ T29] audit: type=1326 audit(1747178425.851:83531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9131 comm="syz.1.22531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1913.342719][ T29] audit: type=1326 audit(1747178425.851:83532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9131 comm="syz.1.22531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1913.366653][ T29] audit: type=1326 audit(1747178425.851:83533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9131 comm="syz.1.22531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=225 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1913.390411][ T29] audit: type=1326 audit(1747178425.851:83534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9131 comm="syz.1.22531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1913.416195][ T29] audit: type=1326 audit(1747178425.851:83535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9131 comm="syz.1.22531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1913.484468][ T9141] lo speed is unknown, defaulting to 1000 [ 1913.591602][ T9146] lo speed is unknown, defaulting to 1000 [ 1913.717268][ T9141] dummy0 speed is unknown, defaulting to 1000 [ 1913.860513][ T9146] dummy0 speed is unknown, defaulting to 1000 [ 1914.099245][ T9176] __nla_validate_parse: 2 callbacks suppressed [ 1914.099266][ T9176] netlink: 8 bytes leftover after parsing attributes in process `syz.4.22547'. [ 1914.567109][ T9195] lo speed is unknown, defaulting to 1000 [ 1914.784627][ T9209] netlink: 8 bytes leftover after parsing attributes in process `syz.1.22559'. [ 1914.927487][ T9195] dummy0 speed is unknown, defaulting to 1000 [ 1915.188745][ T9225] netlink: 8 bytes leftover after parsing attributes in process `syz.3.22565'. [ 1915.247829][ T9225] netlink: 4 bytes leftover after parsing attributes in process `syz.3.22565'. [ 1915.525627][ T9241] netlink: 8 bytes leftover after parsing attributes in process `syz.2.22571'. [ 1915.853985][ T9258] lo speed is unknown, defaulting to 1000 [ 1915.934891][ T9260] lo speed is unknown, defaulting to 1000 [ 1916.109166][ T9258] dummy0 speed is unknown, defaulting to 1000 [ 1916.240829][ T9260] dummy0 speed is unknown, defaulting to 1000 [ 1916.936613][ T9307] netlink: 32 bytes leftover after parsing attributes in process `syz.4.22597'. [ 1917.176223][ T9314] lo speed is unknown, defaulting to 1000 [ 1917.309042][ T9314] dummy0 speed is unknown, defaulting to 1000 [ 1917.322790][ T9321] lo speed is unknown, defaulting to 1000 [ 1917.509292][ T9321] dummy0 speed is unknown, defaulting to 1000 [ 1917.563666][ T9337] netlink: 'syz.2.22608': attribute type 1 has an invalid length. [ 1917.727454][ T9347] netlink: 32 bytes leftover after parsing attributes in process `syz.1.22612'. [ 1917.913726][ T9355] lo speed is unknown, defaulting to 1000 [ 1918.045507][ T9365] xt_hashlimit: max too large, truncated to 1048576 [ 1918.069350][ T9365] Cannot find set identified by id 0 to match [ 1918.151464][ T29] kauditd_printk_skb: 321 callbacks suppressed [ 1918.151515][ T29] audit: type=1326 audit(1747178431.101:83857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9370 comm="syz.3.22621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1918.229027][ T9355] dummy0 speed is unknown, defaulting to 1000 [ 1918.244790][ T29] audit: type=1326 audit(1747178431.132:83858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9370 comm="syz.3.22621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1918.272117][ T29] audit: type=1326 audit(1747178431.143:83859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9370 comm="syz.3.22621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1918.285802][ T9379] netlink: 32 bytes leftover after parsing attributes in process `syz.0.22624'. [ 1918.296560][ T29] audit: type=1326 audit(1747178431.143:83860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9370 comm="syz.3.22621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1918.329916][ T29] audit: type=1326 audit(1747178431.143:83861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9370 comm="syz.3.22621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1918.353833][ T29] audit: type=1326 audit(1747178431.143:83862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9370 comm="syz.3.22621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1918.377757][ T29] audit: type=1326 audit(1747178431.143:83863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9370 comm="syz.3.22621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1918.401825][ T29] audit: type=1326 audit(1747178431.143:83864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9370 comm="syz.3.22621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1918.425924][ T29] audit: type=1326 audit(1747178431.153:83865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9370 comm="syz.3.22621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1918.449675][ T29] audit: type=1326 audit(1747178431.153:83866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9370 comm="syz.3.22621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1918.522857][ T9377] lo speed is unknown, defaulting to 1000 [ 1918.588710][ T9397] xt_hashlimit: max too large, truncated to 1048576 [ 1918.597298][ T9397] Cannot find set identified by id 0 to match [ 1918.641712][ T9401] netlink: 'syz.3.22634': attribute type 1 has an invalid length. [ 1918.699665][ T9377] dummy0 speed is unknown, defaulting to 1000 [ 1918.774225][ T9411] netlink: 28 bytes leftover after parsing attributes in process `syz.1.22637'. [ 1918.875800][ T9414] lo speed is unknown, defaulting to 1000 [ 1919.016902][ T9414] dummy0 speed is unknown, defaulting to 1000 [ 1919.415106][ T9448] lo speed is unknown, defaulting to 1000 [ 1919.481312][ T9454] netlink: 'syz.0.22654': attribute type 1 has an invalid length. [ 1919.682153][ T9448] dummy0 speed is unknown, defaulting to 1000 [ 1919.774146][ T9463] lo speed is unknown, defaulting to 1000 [ 1920.070420][ T9463] dummy0 speed is unknown, defaulting to 1000 [ 1920.306842][ T9482] netlink: 8 bytes leftover after parsing attributes in process `syz.3.22664'. [ 1920.355947][ T9482] netlink: 4 bytes leftover after parsing attributes in process `syz.3.22664'. [ 1920.497790][ T9500] netlink: 'syz.3.22672': attribute type 1 has an invalid length. [ 1920.616071][ T9509] lo speed is unknown, defaulting to 1000 [ 1920.764146][ T9522] xt_hashlimit: max too large, truncated to 1048576 [ 1920.820482][ T9528] netlink: 8 bytes leftover after parsing attributes in process `syz.0.22685'. [ 1920.841120][ T9509] dummy0 speed is unknown, defaulting to 1000 [ 1920.860659][ T9528] netlink: 4 bytes leftover after parsing attributes in process `syz.0.22685'. [ 1920.879098][ T9532] xt_hashlimit: max too large, truncated to 1048576 [ 1920.964214][ T9536] lo speed is unknown, defaulting to 1000 [ 1921.193705][ T9536] dummy0 speed is unknown, defaulting to 1000 [ 1921.461765][ T9568] netlink: 8 bytes leftover after parsing attributes in process `syz.4.22700'. [ 1921.487509][ T9570] xt_hashlimit: max too large, truncated to 1048576 [ 1921.499377][ T9570] Cannot find set identified by id 0 to match [ 1921.507655][ T9568] netlink: 4 bytes leftover after parsing attributes in process `syz.4.22700'. [ 1921.510042][ T9572] netlink: 'syz.1.22702': attribute type 1 has an invalid length. [ 1921.696607][ T9578] lo speed is unknown, defaulting to 1000 [ 1921.890861][ T9578] dummy0 speed is unknown, defaulting to 1000 [ 1922.323991][ T9602] xt_hashlimit: max too large, truncated to 1048576 [ 1922.337209][ T9602] Cannot find set identified by id 0 to match [ 1922.539608][ T9617] lo speed is unknown, defaulting to 1000 [ 1922.616784][ T9617] dummy0 speed is unknown, defaulting to 1000 [ 1922.784164][ T9629] lo speed is unknown, defaulting to 1000 [ 1922.922437][ T9629] dummy0 speed is unknown, defaulting to 1000 [ 1923.548331][ T9631] lo speed is unknown, defaulting to 1000 [ 1923.623523][ T9631] dummy0 speed is unknown, defaulting to 1000 [ 1923.696022][ T29] kauditd_printk_skb: 404 callbacks suppressed [ 1923.696042][ T29] audit: type=1326 audit(1747178436.928:84271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9649 comm="syz.2.22731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1923.734667][ T29] audit: type=1326 audit(1747178436.928:84272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9649 comm="syz.2.22731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1923.790859][ T9655] xt_hashlimit: max too large, truncated to 1048576 [ 1923.821734][ T29] audit: type=1326 audit(1747178436.970:84273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9649 comm="syz.2.22731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1923.845518][ T29] audit: type=1326 audit(1747178436.970:84274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9649 comm="syz.2.22731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1923.869496][ T29] audit: type=1326 audit(1747178436.970:84275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9649 comm="syz.2.22731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1923.893276][ T29] audit: type=1326 audit(1747178437.001:84276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9649 comm="syz.2.22731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1923.917303][ T29] audit: type=1326 audit(1747178437.001:84277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9649 comm="syz.2.22731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1923.941219][ T29] audit: type=1326 audit(1747178437.001:84278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9649 comm="syz.2.22731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1923.965613][ T29] audit: type=1326 audit(1747178437.001:84279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9649 comm="syz.2.22731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1923.989536][ T29] audit: type=1326 audit(1747178437.001:84280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9649 comm="syz.2.22731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1924.040697][ T9656] lo speed is unknown, defaulting to 1000 [ 1924.131622][ T9656] dummy0 speed is unknown, defaulting to 1000 [ 1924.282411][ T9672] xt_hashlimit: max too large, truncated to 1048576 [ 1924.359428][ T9682] netlink: 8 bytes leftover after parsing attributes in process `syz.2.22743'. [ 1924.389338][ T9686] netlink: 32 bytes leftover after parsing attributes in process `syz.4.22744'. [ 1924.512965][ T9688] lo speed is unknown, defaulting to 1000 [ 1924.728159][ T9702] lo speed is unknown, defaulting to 1000 [ 1924.918888][ T9688] dummy0 speed is unknown, defaulting to 1000 [ 1924.962446][ T9717] netlink: 8 bytes leftover after parsing attributes in process `syz.3.22756'. [ 1925.015341][ T9702] dummy0 speed is unknown, defaulting to 1000 [ 1925.146489][ T9727] netlink: 32 bytes leftover after parsing attributes in process `syz.4.22759'. [ 1925.705759][ T9750] netlink: 8 bytes leftover after parsing attributes in process `syz.3.22768'. [ 1925.895796][ T9753] xt_hashlimit: max too large, truncated to 1048576 [ 1925.944018][ T9753] Cannot find set identified by id 0 to match [ 1926.340791][ T9761] lo speed is unknown, defaulting to 1000 [ 1926.574754][ T9761] dummy0 speed is unknown, defaulting to 1000 [ 1926.626139][ T9774] netlink: 'syz.4.22777': attribute type 1 has an invalid length. [ 1927.349315][ T9806] lo speed is unknown, defaulting to 1000 [ 1927.591180][ T9806] dummy0 speed is unknown, defaulting to 1000 [ 1928.609971][ T29] kauditd_printk_skb: 322 callbacks suppressed [ 1928.609989][ T29] audit: type=1326 audit(1747178442.072:84603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.4.22804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1928.700318][ T29] audit: type=1326 audit(1747178442.125:84604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.4.22804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1928.724753][ T29] audit: type=1326 audit(1747178442.125:84605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.4.22804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1928.748599][ T29] audit: type=1326 audit(1747178442.125:84606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.4.22804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1928.772440][ T29] audit: type=1326 audit(1747178442.125:84607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.4.22804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1928.796236][ T29] audit: type=1326 audit(1747178442.125:84608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.4.22804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1928.820574][ T29] audit: type=1326 audit(1747178442.125:84609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.4.22804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1928.844315][ T29] audit: type=1326 audit(1747178442.125:84610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.4.22804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1928.868234][ T29] audit: type=1326 audit(1747178442.125:84611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.4.22804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1928.892603][ T29] audit: type=1326 audit(1747178442.125:84612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.4.22804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1928.994946][ T9862] lo speed is unknown, defaulting to 1000 [ 1930.627129][ T9862] dummy0 speed is unknown, defaulting to 1000 [ 1932.781121][ T9894] lo speed is unknown, defaulting to 1000 [ 1932.928524][ T9894] dummy0 speed is unknown, defaulting to 1000 [ 1933.597205][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 1933.597219][ T29] audit: type=1326 audit(1747178447.322:84640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9898 comm="syz.2.22817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1933.661409][ T29] audit: type=1326 audit(1747178447.354:84641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9898 comm="syz.2.22817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1933.685709][ T29] audit: type=1326 audit(1747178447.354:84642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9898 comm="syz.2.22817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1933.713008][ T29] audit: type=1326 audit(1747178447.354:84643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9898 comm="syz.2.22817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1933.738048][ T29] audit: type=1326 audit(1747178447.354:84644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9898 comm="syz.2.22817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1933.763128][ T29] audit: type=1326 audit(1747178447.354:84645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9898 comm="syz.2.22817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1933.788435][ T29] audit: type=1326 audit(1747178447.354:84646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9898 comm="syz.2.22817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1933.813022][ T29] audit: type=1326 audit(1747178447.354:84647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9898 comm="syz.2.22817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1933.837477][ T29] audit: type=1326 audit(1747178447.354:84648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9898 comm="syz.2.22817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1933.863124][ T29] audit: type=1326 audit(1747178447.354:84649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9898 comm="syz.2.22817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 1935.283853][ T9917] netlink: 'syz.4.22824': attribute type 1 has an invalid length. [ 1936.574642][ T9933] xt_hashlimit: max too large, truncated to 1048576 [ 1936.630196][ T9933] Cannot find set identified by id 0 to match [ 1936.824905][ T9945] syzkaller0: entered promiscuous mode [ 1936.831356][ T9941] netlink: 24 bytes leftover after parsing attributes in process `syz.0.22832'. [ 1936.842328][ T9945] syzkaller0 (unregistering): left promiscuous mode [ 1936.867838][ T9947] xt_hashlimit: max too large, truncated to 1048576 [ 1936.877354][ T9941] netlink: 'syz.0.22832': attribute type 13 has an invalid length. [ 1936.934512][ T9952] xt_hashlimit: max too large, truncated to 1048576 [ 1937.006031][ T9956] netlink: 24 bytes leftover after parsing attributes in process `syz.0.22837'. [ 1937.032457][ T9956] netlink: 'syz.0.22837': attribute type 13 has an invalid length. [ 1937.046768][ T9962] syzkaller0: entered allmulticast mode [ 1937.046883][ T9960] xt_hashlimit: max too large, truncated to 1048576 [ 1937.097015][ T9960] Cannot find set identified by id 0 to match [ 1937.165842][ T9966] syzkaller0 (unregistering): left allmulticast mode [ 1937.393049][ T9968] xt_hashlimit: max too large, truncated to 1048576 [ 1937.456523][ T9968] Cannot find set identified by id 0 to match [ 1937.607324][ T9970] syzkaller0: entered allmulticast mode [ 1937.662666][ T9972] syzkaller0: entered promiscuous mode [ 1937.721759][ T9970] syzkaller0 (unregistering): left promiscuous mode [ 1937.728564][ T9970] syzkaller0 (unregistering): left allmulticast mode [ 1938.369124][ T9976] lo speed is unknown, defaulting to 1000 [ 1938.506843][ T9976] dummy0 speed is unknown, defaulting to 1000 [ 1939.155545][ T9981] xt_hashlimit: max too large, truncated to 1048576 [ 1939.197758][ T9981] Cannot find set identified by id 0 to match [ 1939.216163][ T9979] netlink: 24 bytes leftover after parsing attributes in process `syz.1.22844'. [ 1939.265677][ T9979] netlink: 'syz.1.22844': attribute type 13 has an invalid length. [ 1939.301789][ T9984] netlink: 24 bytes leftover after parsing attributes in process `syz.3.22846'. [ 1939.318050][ T29] kauditd_printk_skb: 170 callbacks suppressed [ 1939.318067][ T29] audit: type=1326 audit(1747178453.328:84820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9985 comm="syz.0.22847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1939.349232][ T29] audit: type=1326 audit(1747178453.328:84821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9985 comm="syz.0.22847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1939.403681][ T9988] netlink: 'syz.3.22846': attribute type 13 has an invalid length. [ 1939.520211][ T29] audit: type=1326 audit(1747178453.422:84822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9985 comm="syz.0.22847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1939.544627][ T29] audit: type=1326 audit(1747178453.422:84823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9985 comm="syz.0.22847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1939.569492][ T29] audit: type=1326 audit(1747178453.422:84824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9985 comm="syz.0.22847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1939.593234][ T29] audit: type=1326 audit(1747178453.433:84825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9985 comm="syz.0.22847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1939.617247][ T29] audit: type=1326 audit(1747178453.433:84826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9985 comm="syz.0.22847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1939.641134][ T29] audit: type=1326 audit(1747178453.433:84827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9985 comm="syz.0.22847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1939.664933][ T29] audit: type=1326 audit(1747178453.433:84828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9985 comm="syz.0.22847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1939.689349][ T29] audit: type=1326 audit(1747178453.433:84829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9985 comm="syz.0.22847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1939.920677][ T9993] lo speed is unknown, defaulting to 1000 [ 1940.068479][T10005] netlink: 24 bytes leftover after parsing attributes in process `syz.1.22854'. [ 1940.080405][T10005] netlink: 'syz.1.22854': attribute type 13 has an invalid length. [ 1940.152282][ T9993] dummy0 speed is unknown, defaulting to 1000 [ 1940.702112][T10008] lo speed is unknown, defaulting to 1000 [ 1940.888606][T10008] dummy0 speed is unknown, defaulting to 1000 [ 1941.078401][T10014] netlink: 32 bytes leftover after parsing attributes in process `syz.3.22857'. [ 1941.197788][T10023] lo speed is unknown, defaulting to 1000 [ 1941.266980][T10023] dummy0 speed is unknown, defaulting to 1000 [ 1942.167798][T10029] lo speed is unknown, defaulting to 1000 [ 1942.245377][T10029] dummy0 speed is unknown, defaulting to 1000 [ 1944.179669][T10035] xt_hashlimit: max too large, truncated to 1048576 [ 1944.188955][T10035] Cannot find set identified by id 0 to match [ 1946.006645][T10041] xt_hashlimit: max too large, truncated to 1048576 [ 1946.154422][T10043] syzkaller0: entered allmulticast mode [ 1946.172775][T10043] syzkaller0: entered promiscuous mode [ 1946.211796][T10043] syzkaller0 (unregistering): left promiscuous mode [ 1946.218573][T10043] syzkaller0 (unregistering): left allmulticast mode [ 1946.463120][T10046] xt_hashlimit: max too large, truncated to 1048576 [ 1946.476327][T10046] Cannot find set identified by id 0 to match [ 1946.545144][T10049] xt_hashlimit: max too large, truncated to 1048576 [ 1946.788467][T10055] syzkaller0: entered promiscuous mode [ 1946.835701][T10055] syzkaller0 (unregistering): left promiscuous mode [ 1946.961660][T10056] lo speed is unknown, defaulting to 1000 [ 1947.097150][T10056] dummy0 speed is unknown, defaulting to 1000 [ 1947.860404][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 1947.860481][ T29] audit: type=1326 audit(1747178462.294:84912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10067 comm="syz.3.22874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1947.891603][ T29] audit: type=1326 audit(1747178462.294:84913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10067 comm="syz.3.22874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1947.972019][T10070] netlink: 24 bytes leftover after parsing attributes in process `syz.4.22875'. [ 1947.998052][ T29] audit: type=1326 audit(1747178462.357:84914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10067 comm="syz.3.22874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1948.022304][ T29] audit: type=1326 audit(1747178462.357:84915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10067 comm="syz.3.22874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1948.046651][ T29] audit: type=1326 audit(1747178462.357:84916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10067 comm="syz.3.22874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1948.070909][ T29] audit: type=1326 audit(1747178462.399:84917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10067 comm="syz.3.22874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1948.094841][ T29] audit: type=1326 audit(1747178462.399:84918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10067 comm="syz.3.22874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1948.119113][ T29] audit: type=1326 audit(1747178462.399:84919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10067 comm="syz.3.22874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1948.143520][ T29] audit: type=1326 audit(1747178462.399:84920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10067 comm="syz.3.22874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1948.169110][ T29] audit: type=1326 audit(1747178462.399:84921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10067 comm="syz.3.22874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1948.184011][T10077] xt_hashlimit: max too large, truncated to 1048576 [ 1948.247701][T10077] Cannot find set identified by id 0 to match [ 1948.272380][T10084] xt_hashlimit: max too large, truncated to 1048576 [ 1948.281104][T10084] Cannot find set identified by id 0 to match [ 1948.345668][T10083] syzkaller0: entered allmulticast mode [ 1948.354114][T10091] syzkaller0: entered promiscuous mode [ 1948.408007][T10083] syzkaller0 (unregistering): left promiscuous mode [ 1948.415448][T10083] syzkaller0 (unregistering): left allmulticast mode [ 1948.488317][T10088] syzkaller0: entered allmulticast mode [ 1948.494911][T10092] syzkaller0: entered promiscuous mode [ 1948.536394][T10088] syzkaller0 (unregistering): left promiscuous mode [ 1948.543464][T10088] syzkaller0 (unregistering): left allmulticast mode [ 1948.803038][T10106] syzkaller0: entered allmulticast mode [ 1948.833997][T10106] syzkaller0 (unregistering): left allmulticast mode [ 1948.960137][T10115] syzkaller0: entered allmulticast mode [ 1948.982348][T10115] syzkaller0: entered promiscuous mode [ 1949.007732][T10115] syzkaller0 (unregistering): left promiscuous mode [ 1949.015358][T10115] syzkaller0 (unregistering): left allmulticast mode [ 1949.208482][T10127] xt_hashlimit: max too large, truncated to 1048576 [ 1949.251351][T10127] Cannot find set identified by id 0 to match [ 1949.359373][T10135] netlink: 'syz.2.22892': attribute type 13 has an invalid length. [ 1949.431612][T10135] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1949.441025][T10135] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1949.449883][T10135] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1949.461054][T10135] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1949.764265][T10143] xt_hashlimit: max too large, truncated to 1048576 [ 1949.848599][T10147] netlink: 24 bytes leftover after parsing attributes in process `syz.2.22897'. [ 1949.864452][T10149] netlink: 24 bytes leftover after parsing attributes in process `syz.3.22898'. [ 1949.886310][T10147] netlink: 'syz.2.22897': attribute type 13 has an invalid length. [ 1949.899728][T10149] netlink: 'syz.3.22898': attribute type 13 has an invalid length. [ 1950.045565][T10156] netlink: 'syz.3.22901': attribute type 13 has an invalid length. [ 1950.064838][T10153] syzkaller0: entered promiscuous mode [ 1950.093202][T10153] syzkaller0 (unregistering): left promiscuous mode [ 1950.720585][T10168] xt_hashlimit: max too large, truncated to 1048576 [ 1951.230404][T26431] page_pool_release_retry() stalled pool shutdown: id 174, 47 inflight 424 sec [ 1952.017795][T10186] syzkaller0: entered allmulticast mode [ 1952.030940][T10190] syzkaller0: entered allmulticast mode [ 1952.044671][T10186] syzkaller0: entered promiscuous mode [ 1952.055161][T10190] syzkaller0: entered promiscuous mode [ 1952.066274][T10186] syzkaller0 (unregistering): left promiscuous mode [ 1952.073039][T10186] syzkaller0 (unregistering): left allmulticast mode [ 1952.196348][T10190] syzkaller0 (unregistering): left promiscuous mode [ 1952.204387][T10190] syzkaller0 (unregistering): left allmulticast mode [ 1954.296604][T10219] lo speed is unknown, defaulting to 1000 [ 1956.270941][T10226] syzkaller0: entered allmulticast mode [ 1956.289289][T10226] syzkaller0: entered promiscuous mode [ 1956.856901][T10226] syzkaller0 (unregistering): left promiscuous mode [ 1956.863839][T10226] syzkaller0 (unregistering): left allmulticast mode [ 1956.932133][ T29] kauditd_printk_skb: 122 callbacks suppressed [ 1956.932218][ T29] audit: type=1326 audit(1747178471.764:85044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10237 comm="syz.3.22924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1956.966070][ T29] audit: type=1326 audit(1747178471.764:85045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10237 comm="syz.3.22924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1956.992322][ T29] audit: type=1326 audit(1747178471.775:85046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10237 comm="syz.3.22924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1957.018299][ T29] audit: type=1326 audit(1747178471.775:85047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10237 comm="syz.3.22924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1957.045313][ T29] audit: type=1326 audit(1747178471.775:85048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10237 comm="syz.3.22924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1957.070096][ T29] audit: type=1326 audit(1747178471.775:85049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10237 comm="syz.3.22924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1957.095250][ T29] audit: type=1326 audit(1747178471.775:85050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10237 comm="syz.3.22924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1957.123415][ T29] audit: type=1326 audit(1747178471.775:85051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10237 comm="syz.3.22924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1957.150228][ T29] audit: type=1326 audit(1747178471.775:85052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10237 comm="syz.3.22924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1957.177558][ T29] audit: type=1326 audit(1747178471.775:85053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10237 comm="syz.3.22924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1957.209830][T10219] dummy0 speed is unknown, defaulting to 1000 [ 1957.353456][T10247] syzkaller0: entered allmulticast mode [ 1957.409110][T10252] syzkaller0: entered promiscuous mode [ 1957.477538][T10247] syzkaller0 (unregistering): left promiscuous mode [ 1957.485454][T10247] syzkaller0 (unregistering): left allmulticast mode [ 1957.674684][T10256] xt_hashlimit: max too large, truncated to 1048576 [ 1957.714118][T10264] netlink: 24 bytes leftover after parsing attributes in process `syz.2.22934'. [ 1958.687557][T10269] netlink: 'syz.2.22934': attribute type 13 has an invalid length. [ 1961.619796][T10288] syzkaller0: entered allmulticast mode [ 1961.626930][T10288] syzkaller0: entered promiscuous mode [ 1961.633996][T10287] syzkaller0: left promiscuous mode [ 1961.640721][T10287] syzkaller0: left allmulticast mode [ 1961.748164][T10295] netlink: 24 bytes leftover after parsing attributes in process `syz.0.22944'. [ 1962.656787][T10298] netlink: 'syz.0.22944': attribute type 13 has an invalid length. [ 1962.975068][T10300] xt_hashlimit: max too large, truncated to 1048576 [ 1963.605307][T10304] syzkaller0: entered allmulticast mode [ 1963.631538][T10304] syzkaller0: entered promiscuous mode [ 1963.653031][T10304] syzkaller0 (unregistering): left promiscuous mode [ 1963.659839][T10304] syzkaller0 (unregistering): left allmulticast mode [ 1963.685640][T10306] netlink: 24 bytes leftover after parsing attributes in process `syz.0.22948'. [ 1963.719482][T10306] netlink: 'syz.0.22948': attribute type 13 has an invalid length. [ 1963.859691][T10317] xt_hashlimit: max too large, truncated to 1048576 [ 1963.887710][T10317] Cannot find set identified by id 0 to match [ 1963.977793][T10320] syzkaller0: entered allmulticast mode [ 1963.997387][T10320] syzkaller0 (unregistering): left allmulticast mode [ 1964.454383][T10331] netlink: 24 bytes leftover after parsing attributes in process `syz.2.22955'. [ 1964.474344][T10333] netlink: 24 bytes leftover after parsing attributes in process `syz.4.22956'. [ 1964.501872][T10331] netlink: 'syz.2.22955': attribute type 13 has an invalid length. [ 1964.522941][T10333] netlink: 'syz.4.22956': attribute type 13 has an invalid length. [ 1964.894119][T10343] xt_hashlimit: max too large, truncated to 1048576 [ 1964.923390][T10343] Cannot find set identified by id 0 to match [ 1965.045579][T10346] xt_hashlimit: max too large, truncated to 1048576 [ 1965.081329][T10346] Cannot find set identified by id 0 to match [ 1965.365657][ T29] kauditd_printk_skb: 95 callbacks suppressed [ 1965.365676][ T29] audit: type=1326 audit(1747178480.678:85149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10353 comm="syz.0.22963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1965.422380][ T29] audit: type=1326 audit(1747178480.678:85150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10353 comm="syz.0.22963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1965.425399][T10352] syzkaller0: entered allmulticast mode [ 1965.449125][ T29] audit: type=1326 audit(1747178480.688:85151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10353 comm="syz.0.22963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1965.479404][ T29] audit: type=1326 audit(1747178480.688:85152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10353 comm="syz.0.22963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1965.479684][T10356] syzkaller0: entered promiscuous mode [ 1965.503632][ T29] audit: type=1326 audit(1747178480.688:85153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10353 comm="syz.0.22963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1965.533264][ T29] audit: type=1326 audit(1747178480.688:85154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10353 comm="syz.0.22963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1965.559066][ T29] audit: type=1326 audit(1747178480.688:85155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10353 comm="syz.0.22963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1965.587013][ T29] audit: type=1326 audit(1747178480.688:85156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10353 comm="syz.0.22963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1965.613474][ T29] audit: type=1326 audit(1747178480.688:85157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10353 comm="syz.0.22963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1965.641961][ T29] audit: type=1326 audit(1747178480.688:85158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10353 comm="syz.0.22963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1965.725402][T10352] syzkaller0 (unregistering): left promiscuous mode [ 1965.732344][T10352] syzkaller0 (unregistering): left allmulticast mode [ 1965.987899][T10372] lo speed is unknown, defaulting to 1000 [ 1966.226819][T10372] dummy0 speed is unknown, defaulting to 1000 [ 1967.388482][T10384] netlink: 24 bytes leftover after parsing attributes in process `syz.2.22972'. [ 1967.441642][T10385] netlink: 'syz.2.22972': attribute type 13 has an invalid length. [ 1969.279799][T10396] xt_hashlimit: max too large, truncated to 1048576 [ 1969.454128][T10403] lo speed is unknown, defaulting to 1000 [ 1969.773878][T10403] dummy0 speed is unknown, defaulting to 1000 [ 1970.146919][T10414] netlink: 24 bytes leftover after parsing attributes in process `syz.3.22982'. [ 1970.202504][T10414] netlink: 'syz.3.22982': attribute type 13 has an invalid length. [ 1970.275920][T10416] xt_hashlimit: max too large, truncated to 1048576 [ 1970.366339][T10416] Cannot find set identified by id 0 to match [ 1970.482361][T10420] netlink: 24 bytes leftover after parsing attributes in process `syz.3.22984'. [ 1970.564199][T10421] netlink: 'syz.3.22984': attribute type 13 has an invalid length. [ 1970.651078][T10423] netlink: 'syz.0.22985': attribute type 1 has an invalid length. [ 1970.768043][T10428] netlink: 12 bytes leftover after parsing attributes in process `syz.3.22986'. [ 1970.993088][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 1970.993104][ T29] audit: type=1326 audit(1747178486.578:85202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10436 comm="syz.1.22991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1971.075655][T10437] syzkaller0: entered promiscuous mode [ 1971.086182][ T29] audit: type=1326 audit(1747178486.620:85203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10436 comm="syz.1.22991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1971.089730][T10435] syzkaller0: left promiscuous mode [ 1971.110448][ T29] audit: type=1326 audit(1747178486.620:85204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10436 comm="syz.1.22991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1971.139542][ T29] audit: type=1326 audit(1747178486.620:85205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10436 comm="syz.1.22991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1971.164455][ T29] audit: type=1326 audit(1747178486.631:85206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10436 comm="syz.1.22991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1971.188208][ T29] audit: type=1326 audit(1747178486.631:85207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10436 comm="syz.1.22991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1971.212299][ T29] audit: type=1326 audit(1747178486.631:85208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10436 comm="syz.1.22991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1971.236283][ T29] audit: type=1326 audit(1747178486.631:85209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10436 comm="syz.1.22991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1971.260225][ T29] audit: type=1326 audit(1747178486.631:85210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10436 comm="syz.1.22991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1971.284253][ T29] audit: type=1326 audit(1747178486.631:85211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10436 comm="syz.1.22991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 1971.471814][T10450] netlink: 24 bytes leftover after parsing attributes in process `syz.4.22995'. [ 1971.509014][T10450] netlink: 'syz.4.22995': attribute type 13 has an invalid length. [ 1971.558299][T10453] netlink: 24 bytes leftover after parsing attributes in process `syz.0.22996'. [ 1971.575866][T10453] netlink: 'syz.0.22996': attribute type 13 has an invalid length. [ 1972.177714][T10461] lo speed is unknown, defaulting to 1000 [ 1972.749282][T10464] netlink: 12 bytes leftover after parsing attributes in process `syz.3.23000'. [ 1972.794774][T10466] netlink: 24 bytes leftover after parsing attributes in process `syz.0.23001'. [ 1972.845506][T10469] netlink: 'syz.0.23001': attribute type 13 has an invalid length. [ 1972.895692][T10471] syzkaller0: entered promiscuous mode [ 1972.910464][T10470] syzkaller0: left promiscuous mode [ 1972.976599][T10475] netlink: 'syz.0.23005': attribute type 1 has an invalid length. [ 1972.999152][T10473] netlink: 24 bytes leftover after parsing attributes in process `syz.3.23004'. [ 1973.035402][T10473] netlink: 'syz.3.23004': attribute type 13 has an invalid length. [ 1973.596346][T10481] syzkaller0: entered allmulticast mode [ 1973.623287][T10481] syzkaller0: entered promiscuous mode [ 1973.645237][T10481] syzkaller0 (unregistering): left promiscuous mode [ 1973.652943][T10481] syzkaller0 (unregistering): left allmulticast mode [ 1973.869756][T10461] dummy0 speed is unknown, defaulting to 1000 [ 1974.331081][T10494] netlink: 12 bytes leftover after parsing attributes in process `syz.1.23012'. [ 1974.504037][T10503] xt_hashlimit: max too large, truncated to 1048576 [ 1974.642535][T10510] netlink: 24 bytes leftover after parsing attributes in process `syz.4.23019'. [ 1974.695019][T10510] netlink: 'syz.4.23019': attribute type 13 has an invalid length. [ 1974.760959][T10514] xt_hashlimit: max too large, truncated to 1048576 [ 1974.778380][T10514] Cannot find set identified by id 0 to match [ 1974.860341][T10518] lo speed is unknown, defaulting to 1000 [ 1974.904933][T10522] xt_hashlimit: max too large, truncated to 1048576 [ 1974.927644][T10522] Cannot find set identified by id 0 to match [ 1975.061830][T10537] __nla_validate_parse: 1 callbacks suppressed [ 1975.061845][T10537] netlink: 32 bytes leftover after parsing attributes in process `syz.4.23028'. [ 1975.100372][T10518] dummy0 speed is unknown, defaulting to 1000 [ 1975.156944][T10539] syzkaller0: entered allmulticast mode [ 1975.162690][T10544] syzkaller0: entered promiscuous mode [ 1975.216136][T10539] syzkaller0 (unregistering): left promiscuous mode [ 1975.223201][T10539] syzkaller0 (unregistering): left allmulticast mode [ 1975.275711][T10554] netlink: 24 bytes leftover after parsing attributes in process `syz.1.23034'. [ 1975.300849][T10554] netlink: 'syz.1.23034': attribute type 13 has an invalid length. [ 1975.330557][T10560] netlink: 'syz.0.23037': attribute type 1 has an invalid length. [ 1975.379294][T10562] xt_hashlimit: max too large, truncated to 1048576 [ 1975.462474][T10565] lo speed is unknown, defaulting to 1000 [ 1975.493090][T10571] netlink: 32 bytes leftover after parsing attributes in process `syz.4.23041'. [ 1975.746287][T10565] dummy0 speed is unknown, defaulting to 1000 [ 1975.762379][T10580] lo speed is unknown, defaulting to 1000 [ 1975.802054][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 1975.802070][ T29] audit: type=1326 audit(1747178491.628:85373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10583 comm="syz.0.23046" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1975.833616][ T29] audit: type=1326 audit(1747178491.628:85374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10583 comm="syz.0.23046" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1975.873096][ T29] audit: type=1326 audit(1747178491.639:85375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10583 comm="syz.0.23046" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1975.899354][ T29] audit: type=1326 audit(1747178491.639:85376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10583 comm="syz.0.23046" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1975.925746][ T29] audit: type=1326 audit(1747178491.639:85377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10583 comm="syz.0.23046" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1975.951854][ T29] audit: type=1326 audit(1747178491.639:85378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10583 comm="syz.0.23046" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1975.977544][ T29] audit: type=1326 audit(1747178491.639:85379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10583 comm="syz.0.23046" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1976.002837][ T29] audit: type=1326 audit(1747178491.639:85380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10583 comm="syz.0.23046" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1976.029155][ T29] audit: type=1326 audit(1747178491.639:85381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10583 comm="syz.0.23046" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1976.056167][ T29] audit: type=1326 audit(1747178491.639:85382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10583 comm="syz.0.23046" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 1976.249395][T10580] dummy0 speed is unknown, defaulting to 1000 [ 1976.417143][T10596] netlink: 24 bytes leftover after parsing attributes in process `syz.2.23051'. [ 1976.471793][T10601] netlink: 'syz.2.23051': attribute type 13 has an invalid length. [ 1976.536847][T10603] netlink: 32 bytes leftover after parsing attributes in process `syz.4.23053'. [ 1978.189596][T10623] syzkaller0: entered allmulticast mode [ 1978.208814][T10623] syzkaller0: entered promiscuous mode [ 1978.227012][T10623] syzkaller0 (unregistering): left promiscuous mode [ 1978.234079][T10623] syzkaller0 (unregistering): left allmulticast mode [ 1978.296854][T10629] netlink: 8 bytes leftover after parsing attributes in process `syz.3.23064'. [ 1978.405364][T10638] netlink: 4 bytes leftover after parsing attributes in process `syz.3.23064'. [ 1978.420850][T10636] xt_hashlimit: max too large, truncated to 1048576 [ 1978.431582][T10636] Cannot find set identified by id 0 to match [ 1978.530251][T10647] netlink: 4 bytes leftover after parsing attributes in process `syz.0.23070'. [ 1978.952010][T10653] netlink: 24 bytes leftover after parsing attributes in process `syz.3.23071'. [ 1978.981897][T10653] netlink: 'syz.3.23071': attribute type 13 has an invalid length. [ 1980.733706][T10685] netlink: 4 bytes leftover after parsing attributes in process `syz.1.23083'. [ 1980.776809][ T29] kauditd_printk_skb: 204 callbacks suppressed [ 1980.776824][ T29] audit: type=1326 audit(1747178496.857:85587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.4.23084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1980.813445][ T29] audit: type=1326 audit(1747178496.857:85588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.4.23084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1980.978607][T10691] xt_hashlimit: max too large, truncated to 1048576 [ 1981.058207][ T29] audit: type=1326 audit(1747178496.952:85589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.4.23084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1981.088960][ T29] audit: type=1326 audit(1747178496.962:85590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.4.23084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1981.118047][ T29] audit: type=1326 audit(1747178496.962:85591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.4.23084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1981.144614][ T29] audit: type=1326 audit(1747178496.962:85592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.4.23084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1981.173455][ T29] audit: type=1326 audit(1747178496.962:85593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.4.23084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1981.200102][ T29] audit: type=1326 audit(1747178496.962:85594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.4.23084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1981.229284][ T29] audit: type=1326 audit(1747178496.962:85595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.4.23084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1981.257821][ T29] audit: type=1326 audit(1747178496.962:85596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.4.23084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1981.405107][T10694] lo speed is unknown, defaulting to 1000 [ 1981.518953][T10694] dummy0 speed is unknown, defaulting to 1000 [ 1982.804625][T10716] xt_hashlimit: max too large, truncated to 1048576 [ 1982.850405][T10716] Cannot find set identified by id 0 to match [ 1984.605671][T10757] syzkaller0: entered allmulticast mode [ 1984.623159][T10757] syzkaller0: entered promiscuous mode [ 1984.633134][T10757] syzkaller0 (unregistering): left promiscuous mode [ 1984.639951][T10757] syzkaller0 (unregistering): left allmulticast mode [ 1984.828167][T10763] netlink: 24 bytes leftover after parsing attributes in process `syz.3.23108'. [ 1984.912221][T10763] netlink: 'syz.3.23108': attribute type 13 has an invalid length. [ 1984.937095][T10768] netlink: 8 bytes leftover after parsing attributes in process `syz.2.23110'. [ 1985.040911][T10778] netlink: 24 bytes leftover after parsing attributes in process `syz.1.23113'. [ 1985.061563][T10778] netlink: 'syz.1.23113': attribute type 13 has an invalid length. [ 1985.177037][T10784] syzkaller0: entered allmulticast mode [ 1985.183854][T10784] syzkaller0: entered promiscuous mode [ 1985.196202][T10784] syzkaller0 (unregistering): left promiscuous mode [ 1985.203202][T10784] syzkaller0 (unregistering): left allmulticast mode [ 1985.335592][T10793] syzkaller0: entered promiscuous mode [ 1985.360142][T10793] syzkaller0 (unregistering): left promiscuous mode [ 1985.431102][T10798] lo speed is unknown, defaulting to 1000 [ 1985.572572][T10803] lo speed is unknown, defaulting to 1000 [ 1985.646519][T10809] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23122'. [ 1985.726774][T10798] dummy0 speed is unknown, defaulting to 1000 [ 1985.771261][T10813] netlink: 24 bytes leftover after parsing attributes in process `syz.4.23123'. [ 1985.806200][T10813] netlink: 'syz.4.23123': attribute type 13 has an invalid length. [ 1985.841263][T10803] dummy0 speed is unknown, defaulting to 1000 [ 1985.921088][T10819] xt_hashlimit: max too large, truncated to 1048576 [ 1985.987549][ T29] kauditd_printk_skb: 108 callbacks suppressed [ 1985.987568][ T29] audit: type=1326 audit(1747178502.327:85705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10824 comm="syz.3.23126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1986.075150][ T29] audit: type=1326 audit(1747178502.359:85706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10824 comm="syz.3.23126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1986.099507][ T29] audit: type=1326 audit(1747178502.359:85707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10824 comm="syz.3.23126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1986.123679][ T29] audit: type=1326 audit(1747178502.359:85708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10824 comm="syz.3.23126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1986.148256][ T29] audit: type=1326 audit(1747178502.369:85709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10824 comm="syz.3.23126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1986.173249][ T29] audit: type=1326 audit(1747178502.369:85710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10824 comm="syz.3.23126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1986.198781][ T29] audit: type=1326 audit(1747178502.369:85711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10824 comm="syz.3.23126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1986.223244][ T29] audit: type=1326 audit(1747178502.380:85712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10824 comm="syz.3.23126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1986.247685][ T29] audit: type=1326 audit(1747178502.380:85713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10824 comm="syz.3.23126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1986.271807][ T29] audit: type=1326 audit(1747178502.380:85714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10824 comm="syz.3.23126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1986.418182][T10841] xt_hashlimit: max too large, truncated to 1048576 [ 1986.608074][T10852] lo speed is unknown, defaulting to 1000 [ 1986.777991][T10852] dummy0 speed is unknown, defaulting to 1000 [ 1987.495077][T10905] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23153'. [ 1987.511405][T10905] netlink: 4 bytes leftover after parsing attributes in process `syz.4.23153'. [ 1987.557432][T10907] lo speed is unknown, defaulting to 1000 [ 1987.609741][T10914] xt_hashlimit: max too large, truncated to 1048576 [ 1987.625679][T10914] Cannot find set identified by id 0 to match [ 1987.684870][T10916] netlink: 32 bytes leftover after parsing attributes in process `syz.0.23158'. [ 1987.736764][T10907] dummy0 speed is unknown, defaulting to 1000 [ 1987.989323][T10937] netlink: 8 bytes leftover after parsing attributes in process `syz.2.23166'. [ 1988.022087][T10939] xt_hashlimit: max too large, truncated to 1048576 [ 1988.038669][T10939] Cannot find set identified by id 0 to match [ 1988.050634][T10937] netlink: 4 bytes leftover after parsing attributes in process `syz.2.23166'. [ 1988.869383][T10960] xt_hashlimit: max too large, truncated to 1048576 [ 1988.905106][T10960] Cannot find set identified by id 0 to match [ 1989.425917][T10971] netlink: 8 bytes leftover after parsing attributes in process `syz.2.23180'. [ 1989.453931][T10971] netlink: 4 bytes leftover after parsing attributes in process `syz.2.23180'. [ 1989.527781][T10976] netlink: 8 bytes leftover after parsing attributes in process `syz.0.23181'. [ 1989.551167][T10975] netlink: 'syz.2.23182': attribute type 13 has an invalid length. [ 1989.681765][T10980] xt_hashlimit: max too large, truncated to 1048576 [ 1989.981427][T10988] xt_hashlimit: max too large, truncated to 1048576 [ 1990.039643][T10990] netlink: 'syz.3.23188': attribute type 13 has an invalid length. [ 1990.145817][T10994] syzkaller0: entered allmulticast mode [ 1990.165372][T10994] syzkaller0: entered promiscuous mode [ 1990.186848][T10994] syzkaller0 (unregistering): left promiscuous mode [ 1990.193919][T10994] syzkaller0 (unregistering): left allmulticast mode [ 1990.371619][T11005] netlink: 'syz.0.23195': attribute type 13 has an invalid length. [ 1990.475390][T11009] xt_hashlimit: max too large, truncated to 1048576 [ 1990.523016][T11011] lo speed is unknown, defaulting to 1000 [ 1990.618854][T11014] xt_hashlimit: max too large, truncated to 1048576 [ 1990.835662][T11011] dummy0 speed is unknown, defaulting to 1000 [ 1991.046306][T11023] __nla_validate_parse: 6 callbacks suppressed [ 1991.046371][T11023] netlink: 148 bytes leftover after parsing attributes in process `syz.4.23201'. [ 1991.211976][T11033] netlink: 8 bytes leftover after parsing attributes in process `syz.3.23202'. [ 1991.234061][ T29] kauditd_printk_skb: 228 callbacks suppressed [ 1991.234082][ T29] audit: type=1326 audit(1747178507.829:85943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11034 comm="syz.4.23203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1991.268330][ T29] audit: type=1326 audit(1747178507.829:85944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11034 comm="syz.4.23203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1991.295823][ T29] audit: type=1326 audit(1747178507.829:85945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11034 comm="syz.4.23203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1991.323241][ T29] audit: type=1326 audit(1747178507.829:85946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11034 comm="syz.4.23203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1991.361033][T11033] netlink: 8 bytes leftover after parsing attributes in process `syz.3.23202'. [ 1991.438590][ T29] audit: type=1326 audit(1747178507.965:85947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11034 comm="syz.4.23203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1991.465790][ T29] audit: type=1326 audit(1747178507.965:85948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11034 comm="syz.4.23203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1991.497412][ T29] audit: type=1326 audit(1747178507.986:85949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11034 comm="syz.4.23203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1991.524311][ T29] audit: type=1326 audit(1747178507.986:85950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11034 comm="syz.4.23203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1991.551599][ T29] audit: type=1326 audit(1747178507.986:85951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11034 comm="syz.4.23203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1991.579026][ T29] audit: type=1326 audit(1747178507.986:85952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11034 comm="syz.4.23203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=225 compat=0 ip=0x7f6eb404e969 code=0x7ffc0000 [ 1991.795835][T11043] netlink: 8 bytes leftover after parsing attributes in process `syz.2.23205'. [ 1991.843971][T11043] netlink: 4 bytes leftover after parsing attributes in process `syz.2.23205'. [ 1991.911375][T11046] netlink: 148 bytes leftover after parsing attributes in process `syz.4.23207'. [ 1992.020835][T11056] netlink: 32 bytes leftover after parsing attributes in process `syz.3.23210'. [ 1992.299849][T11065] netlink: 24 bytes leftover after parsing attributes in process `syz.3.23211'. [ 1992.380138][T11065] netlink: 'syz.3.23211': attribute type 13 has an invalid length. [ 1992.536117][T11071] xt_hashlimit: max too large, truncated to 1048576 [ 1992.574092][T11071] Cannot find set identified by id 0 to match [ 1993.206549][T11084] xt_hashlimit: max too large, truncated to 1048576 [ 1993.210163][T11088] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23220'. [ 1993.214943][T11084] Cannot find set identified by id 0 to match [ 1993.232907][T11088] netlink: 4 bytes leftover after parsing attributes in process `syz.4.23220'. [ 1993.260373][T11087] lo speed is unknown, defaulting to 1000 [ 1993.368736][T11094] syzkaller0: entered allmulticast mode [ 1993.385054][T11094] syzkaller0: entered promiscuous mode [ 1993.405847][T11094] syzkaller0 (unregistering): left promiscuous mode [ 1993.413186][T11094] syzkaller0 (unregistering): left allmulticast mode [ 1993.473437][T11087] dummy0 speed is unknown, defaulting to 1000 [ 1993.487739][T11098] netlink: 'syz.3.23224': attribute type 13 has an invalid length. [ 1994.226476][T11118] netlink: 'syz.1.23231': attribute type 13 has an invalid length. [ 1994.664194][T11128] syzkaller0: entered allmulticast mode [ 1994.700347][T11128] syzkaller0: entered promiscuous mode [ 1994.714252][T11128] syzkaller0 (unregistering): left promiscuous mode [ 1994.721679][T11128] syzkaller0 (unregistering): left allmulticast mode [ 1995.340745][T11147] netlink: 'syz.2.23240': attribute type 13 has an invalid length. [ 1995.599350][T11155] syzkaller0: entered allmulticast mode [ 1995.625272][T11155] syzkaller0: entered promiscuous mode [ 1995.669026][T11155] syzkaller0 (unregistering): left promiscuous mode [ 1995.677079][T11155] syzkaller0 (unregistering): left allmulticast mode [ 1996.027364][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 1996.027382][ T29] audit: type=1326 audit(1747178512.868:86053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11167 comm="syz.3.23248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1996.059857][ T29] audit: type=1326 audit(1747178512.868:86054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11167 comm="syz.3.23248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1996.085436][ T29] audit: type=1326 audit(1747178512.868:86055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11167 comm="syz.3.23248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1996.196803][ T29] audit: type=1326 audit(1747178512.984:86056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11167 comm="syz.3.23248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1996.223010][ T29] audit: type=1326 audit(1747178512.994:86057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11167 comm="syz.3.23248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1996.248160][ T29] audit: type=1326 audit(1747178512.994:86058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11167 comm="syz.3.23248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1996.272990][ T29] audit: type=1326 audit(1747178513.005:86059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11167 comm="syz.3.23248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1996.299721][ T29] audit: type=1326 audit(1747178513.005:86060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11167 comm="syz.3.23248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1996.326502][ T29] audit: type=1326 audit(1747178513.005:86061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11167 comm="syz.3.23248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1996.351216][ T29] audit: type=1326 audit(1747178513.026:86062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11167 comm="syz.3.23248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f481f39e969 code=0x7ffc0000 [ 1996.390953][T11176] xt_hashlimit: max too large, truncated to 1048576 [ 1996.441842][T11178] __nla_validate_parse: 9 callbacks suppressed [ 1996.441862][T11178] netlink: 24 bytes leftover after parsing attributes in process `syz.1.23252'. [ 1996.513365][T11178] netlink: 'syz.1.23252': attribute type 13 has an invalid length. [ 1996.587115][T11186] netlink: 8 bytes leftover after parsing attributes in process `syz.3.23254'. [ 1996.691368][T11186] netlink: 4 bytes leftover after parsing attributes in process `syz.3.23254'. [ 1996.806546][T11200] xt_hashlimit: max too large, truncated to 1048576 [ 1996.877230][T11204] syzkaller0: entered allmulticast mode [ 1996.889834][T11204] syzkaller0: entered promiscuous mode [ 1996.908729][T11204] syzkaller0 (unregistering): left promiscuous mode [ 1996.915871][T11204] syzkaller0 (unregistering): left allmulticast mode [ 1997.058675][T11210] netlink: 32 bytes leftover after parsing attributes in process `syz.4.23265'. [ 1997.089920][T11211] syzkaller0: entered allmulticast mode [ 1997.104343][T11211] syzkaller0: entered promiscuous mode [ 1997.121115][T11211] syzkaller0 (unregistering): left promiscuous mode [ 1997.128685][T11211] syzkaller0 (unregistering): left allmulticast mode [ 1997.351361][T11220] netlink: 24 bytes leftover after parsing attributes in process `syz.3.23269'. [ 1997.391531][T11220] netlink: 'syz.3.23269': attribute type 13 has an invalid length. [ 1997.767629][T11232] xt_hashlimit: max too large, truncated to 1048576 [ 1997.797040][T11235] netlink: 8 bytes leftover after parsing attributes in process `syz.1.23275'. [ 1997.803904][T11232] Cannot find set identified by id 0 to match [ 1997.845286][T11237] netlink: 4 bytes leftover after parsing attributes in process `syz.1.23275'. [ 1997.914084][T11239] netlink: 32 bytes leftover after parsing attributes in process `syz.0.23276'. [ 1998.222073][T11247] netlink: 24 bytes leftover after parsing attributes in process `syz.4.23279'. [ 1998.272294][T11247] netlink: 'syz.4.23279': attribute type 13 has an invalid length. [ 1998.443781][T11251] netlink: 24 bytes leftover after parsing attributes in process `syz.2.23281'. [ 1998.488492][T11251] netlink: 'syz.2.23281': attribute type 13 has an invalid length. [ 1998.594208][T11254] syzkaller0: entered allmulticast mode [ 1998.607951][T11254] syzkaller0: entered promiscuous mode [ 1998.635893][T11254] syzkaller0 (unregistering): left promiscuous mode [ 1998.643561][T11254] syzkaller0 (unregistering): left allmulticast mode [ 1998.780890][T11261] xt_hashlimit: max too large, truncated to 1048576 [ 1998.816090][T11261] Cannot find set identified by id 0 to match [ 1999.080951][T11271] xt_hashlimit: max too large, truncated to 1048576 [ 1999.159440][T11281] netlink: 'syz.3.23293': attribute type 13 has an invalid length. [ 1999.408717][T11296] syzkaller0: entered allmulticast mode [ 1999.433668][T11296] syzkaller0: entered promiscuous mode [ 1999.456311][T11296] syzkaller0 (unregistering): left promiscuous mode [ 1999.463055][T11296] syzkaller0 (unregistering): left allmulticast mode [ 2000.027074][T11318] syzkaller0: entered allmulticast mode [ 2000.050892][T11318] syzkaller0: entered promiscuous mode [ 2000.081399][T11318] syzkaller0 (unregistering): left promiscuous mode [ 2000.088869][T11318] syzkaller0 (unregistering): left allmulticast mode [ 2000.320512][T11322] xt_hashlimit: max too large, truncated to 1048576 [ 2000.331985][T11322] Cannot find set identified by id 0 to match [ 2000.400083][T11326] netlink: 'syz.4.23311': attribute type 13 has an invalid length. [ 2000.754786][T11346] lo speed is unknown, defaulting to 1000 [ 2000.850447][T11346] dummy0 speed is unknown, defaulting to 1000 [ 2000.995225][T11351] syzkaller0: entered allmulticast mode [ 2001.004404][T11351] syzkaller0: entered promiscuous mode [ 2001.020202][T11358] syzkaller0: entered allmulticast mode [ 2001.034822][T11360] netlink: 'syz.4.23323': attribute type 13 has an invalid length. [ 2001.045610][T11351] syzkaller0 (unregistering): left promiscuous mode [ 2001.054200][T11351] syzkaller0 (unregistering): left allmulticast mode [ 2001.102270][T11358] syzkaller0: entered promiscuous mode [ 2001.144789][T11364] syzkaller0 (unregistering): left promiscuous mode [ 2001.152111][T11364] syzkaller0 (unregistering): left allmulticast mode [ 2001.260060][ T29] kauditd_printk_skb: 124 callbacks suppressed [ 2001.260075][ T29] audit: type=1326 audit(1747178518.359:86187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.2.23326" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2001.329310][ T29] audit: type=1326 audit(1747178518.401:86188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.2.23326" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2001.354176][ T29] audit: type=1326 audit(1747178518.401:86189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.2.23326" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2001.379029][ T29] audit: type=1326 audit(1747178518.401:86190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.2.23326" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2001.406824][ T29] audit: type=1326 audit(1747178518.401:86191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.2.23326" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2001.431521][ T29] audit: type=1326 audit(1747178518.401:86192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.2.23326" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2001.457671][ T29] audit: type=1326 audit(1747178518.401:86193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.2.23326" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2001.483488][ T29] audit: type=1326 audit(1747178518.401:86194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.2.23326" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2001.509558][ T29] audit: type=1326 audit(1747178518.401:86195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.2.23326" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2001.534340][ T29] audit: type=1326 audit(1747178518.401:86196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.2.23326" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2001.615407][T11387] xt_hashlimit: max too large, truncated to 1048576 [ 2001.624897][T11387] Cannot find set identified by id 0 to match [ 2001.716526][T11392] __nla_validate_parse: 4 callbacks suppressed [ 2001.716549][T11392] netlink: 4 bytes leftover after parsing attributes in process `syz.4.23331'. [ 2001.734717][T11394] lo speed is unknown, defaulting to 1000 [ 2001.776776][T11401] netlink: 24 bytes leftover after parsing attributes in process `syz.4.23334'. [ 2001.799797][T11401] netlink: 'syz.4.23334': attribute type 13 has an invalid length. [ 2001.900175][T11406] netlink: 24 bytes leftover after parsing attributes in process `syz.4.23336'. [ 2001.936550][T11394] dummy0 speed is unknown, defaulting to 1000 [ 2001.945606][T11409] xt_hashlimit: max too large, truncated to 1048576 [ 2001.956324][T11406] netlink: 'syz.4.23336': attribute type 13 has an invalid length. [ 2002.125958][T11414] netlink: 24 bytes leftover after parsing attributes in process `syz.2.23338'. [ 2002.153543][T11414] netlink: 'syz.2.23338': attribute type 13 has an invalid length. [ 2002.243961][T11421] syzkaller0: entered allmulticast mode [ 2002.299312][T11421] syzkaller0: entered promiscuous mode [ 2002.308732][T11423] syzkaller0: entered allmulticast mode [ 2002.316406][T11425] netlink: 4 bytes leftover after parsing attributes in process `syz.4.23344'. [ 2002.329538][T11426] syzkaller0: entered promiscuous mode [ 2002.344119][T11421] syzkaller0 (unregistering): left promiscuous mode [ 2002.351151][T11421] syzkaller0 (unregistering): left allmulticast mode [ 2002.435952][T11423] syzkaller0 (unregistering): left promiscuous mode [ 2002.444015][T11423] syzkaller0 (unregistering): left allmulticast mode [ 2002.568708][T11433] netlink: 24 bytes leftover after parsing attributes in process `syz.3.23347'. [ 2002.623281][T11437] netlink: 'syz.3.23347': attribute type 13 has an invalid length. [ 2002.701636][T11436] netlink: 24 bytes leftover after parsing attributes in process `syz.2.23348'. [ 2002.714709][T11440] netlink: 8 bytes leftover after parsing attributes in process `syz.1.23349'. [ 2002.743858][T11436] netlink: 'syz.2.23348': attribute type 13 has an invalid length. [ 2002.823475][T11442] syzkaller0: entered allmulticast mode [ 2002.831385][T11442] syzkaller0: entered promiscuous mode [ 2002.843917][T11444] netlink: 16 bytes leftover after parsing attributes in process `syz.1.23351'. [ 2002.864575][T11442] syzkaller0 (unregistering): left promiscuous mode [ 2002.872033][T11442] syzkaller0 (unregistering): left allmulticast mode [ 2003.050121][T11446] lo speed is unknown, defaulting to 1000 [ 2003.062344][T11457] netlink: 24 bytes leftover after parsing attributes in process `syz.3.23354'. [ 2003.068651][T11454] xt_hashlimit: max too large, truncated to 1048576 [ 2003.088771][T11457] netlink: 'syz.3.23354': attribute type 13 has an invalid length. [ 2003.101800][T11454] Cannot find set identified by id 0 to match [ 2003.127535][T11459] lo speed is unknown, defaulting to 1000 [ 2003.247532][T11446] dummy0 speed is unknown, defaulting to 1000 [ 2003.360361][T11459] dummy0 speed is unknown, defaulting to 1000 [ 2003.443834][T11474] netlink: 'syz.2.23360': attribute type 13 has an invalid length. [ 2003.676981][T11478] lo speed is unknown, defaulting to 1000 [ 2003.942291][T11478] dummy0 speed is unknown, defaulting to 1000 [ 2004.242953][T11491] syzkaller0: entered allmulticast mode [ 2004.272883][T11491] syzkaller0: entered promiscuous mode [ 2004.309314][T11491] syzkaller0 (unregistering): left promiscuous mode [ 2004.316216][T11491] syzkaller0 (unregistering): left allmulticast mode [ 2004.969795][T11499] xt_hashlimit: max too large, truncated to 1048576 [ 2004.977240][T11499] Cannot find set identified by id 0 to match [ 2005.147900][T11505] lo speed is unknown, defaulting to 1000 [ 2005.351387][T11505] dummy0 speed is unknown, defaulting to 1000 [ 2005.579358][T11522] xt_hashlimit: max too large, truncated to 1048576 [ 2005.671724][T11524] syzkaller0: entered allmulticast mode [ 2005.691614][T11524] syzkaller0: entered promiscuous mode [ 2005.733988][T11524] syzkaller0 (unregistering): left promiscuous mode [ 2005.741604][T11524] syzkaller0 (unregistering): left allmulticast mode [ 2006.071581][T11540] lo speed is unknown, defaulting to 1000 [ 2006.351023][T11540] dummy0 speed is unknown, defaulting to 1000 [ 2006.358084][T11546] syzkaller0: entered allmulticast mode [ 2006.379926][T11546] syzkaller0: entered promiscuous mode [ 2006.429015][T11546] syzkaller0 (unregistering): left promiscuous mode [ 2006.436812][T11546] syzkaller0 (unregistering): left allmulticast mode [ 2006.626807][ T29] kauditd_printk_skb: 91 callbacks suppressed [ 2006.626825][ T29] audit: type=1326 audit(1747178523.997:86288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11550 comm="syz.1.23389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 2006.658168][ T29] audit: type=1326 audit(1747178523.997:86289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11550 comm="syz.1.23389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 2006.667149][T11554] __nla_validate_parse: 4 callbacks suppressed [ 2006.667170][T11554] netlink: 4 bytes leftover after parsing attributes in process `syz.3.23390'. [ 2006.835811][ T29] audit: type=1326 audit(1747178524.071:86290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11550 comm="syz.1.23389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 2006.863313][ T29] audit: type=1326 audit(1747178524.071:86291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11550 comm="syz.1.23389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 2006.890365][ T29] audit: type=1326 audit(1747178524.071:86292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11550 comm="syz.1.23389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 2006.915982][ T29] audit: type=1326 audit(1747178524.071:86293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11550 comm="syz.1.23389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 2006.941099][ T29] audit: type=1326 audit(1747178524.071:86294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11550 comm="syz.1.23389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 2006.968795][ T29] audit: type=1326 audit(1747178524.071:86295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11550 comm="syz.1.23389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 2006.996415][ T29] audit: type=1326 audit(1747178524.071:86296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11550 comm="syz.1.23389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 2007.025149][ T29] audit: type=1326 audit(1747178524.071:86297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11550 comm="syz.1.23389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e98dfe969 code=0x7ffc0000 [ 2007.094670][T11561] syzkaller0: entered allmulticast mode [ 2007.101715][T11561] syzkaller0: entered promiscuous mode [ 2007.139943][T11561] syzkaller0 (unregistering): left promiscuous mode [ 2007.148284][T11561] syzkaller0 (unregistering): left allmulticast mode [ 2007.245217][T11566] netlink: 24 bytes leftover after parsing attributes in process `syz.3.23395'. [ 2007.290207][T11566] netlink: 'syz.3.23395': attribute type 13 has an invalid length. [ 2007.402311][T11571] netlink: 8 bytes leftover after parsing attributes in process `syz.3.23397'. [ 2007.597404][T11580] xt_hashlimit: max too large, truncated to 1048576 [ 2007.619997][T11580] Cannot find set identified by id 0 to match [ 2007.651525][T11582] lo speed is unknown, defaulting to 1000 [ 2007.839738][T11589] syzkaller0: entered allmulticast mode [ 2007.848873][T11589] syzkaller0: entered promiscuous mode [ 2007.868431][T11589] syzkaller0 (unregistering): left promiscuous mode [ 2007.876254][T11589] syzkaller0 (unregistering): left allmulticast mode [ 2007.921906][T11582] dummy0 speed is unknown, defaulting to 1000 [ 2008.016825][T11599] syzkaller0: entered allmulticast mode [ 2008.038810][T11599] syzkaller0: entered promiscuous mode [ 2008.061391][T11599] syzkaller0 (unregistering): left promiscuous mode [ 2008.068481][T11599] syzkaller0 (unregistering): left allmulticast mode [ 2008.295120][T11608] netlink: 24 bytes leftover after parsing attributes in process `syz.4.23410'. [ 2008.307210][T11606] netlink: 148 bytes leftover after parsing attributes in process `syz.1.23409'. [ 2008.320104][T11608] netlink: 'syz.4.23410': attribute type 13 has an invalid length. [ 2008.491834][T11612] netlink: 24 bytes leftover after parsing attributes in process `syz.4.23411'. [ 2008.521843][T11612] netlink: 'syz.4.23411': attribute type 13 has an invalid length. [ 2008.987565][T26431] page_pool_release_retry() stalled pool shutdown: id 174, 47 inflight 485 sec [ 2009.555550][T11636] syzkaller0: entered allmulticast mode [ 2009.580997][T11636] syzkaller0: entered promiscuous mode [ 2009.637188][T11636] syzkaller0 (unregistering): left promiscuous mode [ 2009.645201][T11636] syzkaller0 (unregistering): left allmulticast mode [ 2009.745699][T11640] xt_hashlimit: max too large, truncated to 1048576 [ 2009.846055][T11645] xt_hashlimit: max too large, truncated to 1048576 [ 2009.963461][T11649] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23424'. [ 2009.978632][T11647] xt_hashlimit: max too large, truncated to 1048576 [ 2009.997894][T11649] netlink: 4 bytes leftover after parsing attributes in process `syz.4.23424'. [ 2010.105462][T11653] netlink: 24 bytes leftover after parsing attributes in process `syz.4.23426'. [ 2010.149239][T11653] netlink: 'syz.4.23426': attribute type 13 has an invalid length. [ 2010.491272][T11659] xt_hashlimit: max too large, truncated to 1048576 [ 2010.985692][T11666] netlink: 24 bytes leftover after parsing attributes in process `syz.3.23431'. [ 2011.045497][T11666] netlink: 'syz.3.23431': attribute type 13 has an invalid length. [ 2011.307522][T11673] netlink: 'syz.0.23434': attribute type 13 has an invalid length. [ 2011.526869][T11684] __nla_validate_parse: 3 callbacks suppressed [ 2011.526889][T11684] netlink: 8 bytes leftover after parsing attributes in process `syz.0.23447'. [ 2012.979140][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 2012.979159][ T29] audit: type=1326 audit(1747178530.654:86331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11709 comm="syz.0.23445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 2013.010485][ T29] audit: type=1326 audit(1747178530.654:86332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11709 comm="syz.0.23445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 2013.151918][T11718] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23448'. [ 2013.168000][ T29] audit: type=1326 audit(1747178530.664:86333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11709 comm="syz.0.23445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 2013.192661][ T29] audit: type=1326 audit(1747178530.664:86334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11709 comm="syz.0.23445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 2013.199195][T11700] lo speed is unknown, defaulting to 1000 [ 2013.217049][ T29] audit: type=1326 audit(1747178530.664:86335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11709 comm="syz.0.23445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 2013.247590][ T29] audit: type=1326 audit(1747178530.664:86336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11709 comm="syz.0.23445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 2013.249888][T11718] netlink: 4 bytes leftover after parsing attributes in process `syz.4.23448'. [ 2013.271845][ T29] audit: type=1326 audit(1747178530.664:86337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11709 comm="syz.0.23445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 2013.305244][ T29] audit: type=1326 audit(1747178530.664:86338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11709 comm="syz.0.23445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 2013.329237][ T29] audit: type=1326 audit(1747178530.664:86339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11709 comm="syz.0.23445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 2013.354100][ T29] audit: type=1326 audit(1747178530.664:86340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11709 comm="syz.0.23445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f210517e969 code=0x7ffc0000 [ 2013.413010][T11728] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23452'. [ 2013.486296][T11722] netlink: 24 bytes leftover after parsing attributes in process `syz.2.23449'. [ 2013.521956][T11732] netlink: 24 bytes leftover after parsing attributes in process `syz.1.23450'. [ 2013.531251][T11735] xt_hashlimit: max too large, truncated to 1048576 [ 2013.540754][T11735] Cannot find set identified by id 0 to match [ 2013.543806][T11732] netlink: 'syz.1.23450': attribute type 13 has an invalid length. [ 2013.741538][ T8184] $Hÿ (unregistering): Released all slaves [ 2013.750435][ T8184] bond0 (unregistering): Released all slaves [ 2013.760241][ T8184] bond1 (unregistering): Released all slaves [ 2013.769270][ T8184] bond2 (unregistering): Released all slaves [ 2013.778124][ T8184] bond3 (unregistering): Released all slaves [ 2013.786987][ T8184] bond4 (unregistering): Released all slaves [ 2013.796054][ T8184] bond5 (unregistering): Released all slaves [ 2013.805797][ T8184] bond6 (unregistering): Released all slaves [ 2013.814864][ T8184] bond7 (unregistering): Released all slaves [ 2013.849316][ T8184] tipc: Disabling bearer [ 2013.855365][ T8184] tipc: Disabling bearer [ 2013.860721][ T8184] tipc: Left network mode [ 2013.907492][T11700] dummy0 speed is unknown, defaulting to 1000 [ 2014.199717][T11764] netlink: 24 bytes leftover after parsing attributes in process `syz.1.23461'. [ 2014.354409][ T8184] IPVS: stop unused estimator thread 0... [ 2014.357280][T11700] chnl_net:caif_netlink_parms(): no params data found [ 2014.396794][T11768] netlink: 24 bytes leftover after parsing attributes in process `syz.1.23462'. [ 2014.437868][T11768] netlink: 'syz.1.23462': attribute type 13 has an invalid length. [ 2014.446087][T11768] netlink: 'syz.1.23462': attribute type 27 has an invalid length. [ 2014.480613][T11700] bridge0: port 1(bridge_slave_0) entered blocking state [ 2014.487951][T11700] bridge0: port 1(bridge_slave_0) entered disabled state [ 2014.495397][T11700] bridge_slave_0: entered allmulticast mode [ 2014.501959][T11700] bridge_slave_0: entered promiscuous mode [ 2014.511109][T11700] bridge0: port 2(bridge_slave_1) entered blocking state [ 2014.518417][T11700] bridge0: port 2(bridge_slave_1) entered disabled state [ 2014.540498][T11700] bridge_slave_1: entered allmulticast mode [ 2014.548051][T11700] bridge_slave_1: entered promiscuous mode [ 2014.571276][T11700] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2014.584983][T11700] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2014.636060][T11700] team0: Port device team_slave_0 added [ 2014.650648][T11700] team0: Port device team_slave_1 added [ 2014.672347][T11774] xt_hashlimit: max too large, truncated to 1048576 [ 2014.692821][T11700] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2014.699920][T11700] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2014.727056][T11700] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2014.788317][T11781] netlink: 8 bytes leftover after parsing attributes in process `syz.1.23466'. [ 2014.927307][T11700] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2014.934854][T11700] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2014.964077][T11700] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2015.125189][T11788] netlink: 24 bytes leftover after parsing attributes in process `syz.1.23467'. [ 2015.236912][T11700] hsr_slave_0: entered promiscuous mode [ 2015.264508][T11700] hsr_slave_1: entered promiscuous mode [ 2015.277138][T11794] syzkaller0: entered allmulticast mode [ 2015.294897][T11794] syzkaller0: entered promiscuous mode [ 2015.317951][T11794] syzkaller0 (unregistering): left promiscuous mode [ 2015.325116][T11794] syzkaller0 (unregistering): left allmulticast mode [ 2015.765681][T11700] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2015.774155][T11812] xt_hashlimit: max too large, truncated to 1048576 [ 2015.792079][T11700] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2015.801769][T11812] Cannot find set identified by id 0 to match [ 2015.818866][T11700] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2015.853113][T11700] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2015.998739][T11700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2016.051694][T11700] 8021q: adding VLAN 0 to HW filter on device team0 [ 2016.103013][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 2016.110456][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2016.164076][T30506] bridge0: port 2(bridge_slave_1) entered blocking state [ 2016.171435][T30506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2016.274834][T11700] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2016.411153][T11834] __nla_validate_parse: 2 callbacks suppressed [ 2016.411170][T11834] netlink: 32 bytes leftover after parsing attributes in process `syz.1.23486'. [ 2016.445143][T11834] netlink: 4 bytes leftover after parsing attributes in process `syz.1.23486'. [ 2016.498076][T11700] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2016.575977][T11843] netlink: 8 bytes leftover after parsing attributes in process `syz.1.23488'. [ 2016.711096][T11700] veth0_vlan: entered promiscuous mode [ 2016.758757][T11700] veth1_vlan: entered promiscuous mode [ 2016.827139][T11700] veth0_macvtap: entered promiscuous mode [ 2016.853936][T11700] veth1_macvtap: entered promiscuous mode [ 2016.895144][T11700] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2016.923460][T11700] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2016.951503][T11700] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2016.960354][T11700] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2016.969108][T11700] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2016.978012][T11700] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2017.836069][T11865] xt_hashlimit: max too large, truncated to 1048576 [ 2017.903479][ T29] kauditd_printk_skb: 213 callbacks suppressed [ 2017.903497][ T29] audit: type=1326 audit(1747178535.840:86554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11869 comm="syz.2.23494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2017.953603][ T29] audit: type=1326 audit(1747178535.872:86555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11869 comm="syz.2.23494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2017.977870][ T29] audit: type=1326 audit(1747178535.872:86556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11869 comm="syz.2.23494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2018.002409][ T29] audit: type=1326 audit(1747178535.872:86557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11869 comm="syz.2.23494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2018.026464][ T29] audit: type=1326 audit(1747178535.872:86558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11869 comm="syz.2.23494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2018.052663][ T29] audit: type=1326 audit(1747178535.872:86559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11869 comm="syz.2.23494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2018.078250][ T29] audit: type=1326 audit(1747178535.872:86560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11869 comm="syz.2.23494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2018.102945][ T29] audit: type=1326 audit(1747178535.872:86561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11869 comm="syz.2.23494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2018.116671][T11876] netlink: 32 bytes leftover after parsing attributes in process `syz.3.23497'. [ 2018.129100][ T29] audit: type=1326 audit(1747178535.872:86562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11869 comm="syz.2.23494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2018.163717][ T29] audit: type=1326 audit(1747178535.872:86563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11869 comm="syz.2.23494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25c3ee969 code=0x7ffc0000 [ 2018.363674][T11886] netlink: 8 bytes leftover after parsing attributes in process `syz.2.23499'. [ 2018.364736][T11887] netlink: 4 bytes leftover after parsing attributes in process `syz.3.23497'. [ 2018.486469][T30506]  (unregistering): Released all slaves [ 2018.497840][T30506] bond1 (unregistering): Released all slaves [ 2018.517316][T30506] bond2 (unregistering): Released all slaves [ 2018.537394][T30506] bond3 (unregistering): Released all slaves [ 2018.557101][T30506] bond0 (unregistering): Released all slaves [ 2018.575620][T30506] bond4 (unregistering): Released all slaves [ 2018.622760][T11861] lo speed is unknown, defaulting to 1000 [ 2018.653690][T30506] tipc: Disabling bearer [ 2018.658836][T30506] tipc: Disabling bearer [ 2018.664424][T30506] tipc: Left network mode [ 2018.723538][T11895] syzkaller0: entered allmulticast mode [ 2018.739696][T11895] syzkaller0: entered promiscuous mode [ 2018.762347][T11898] syzkaller0: entered allmulticast mode [ 2018.781621][T11895] syzkaller0 (unregistering): left promiscuous mode [ 2018.789192][T11895] syzkaller0 (unregistering): left allmulticast mode [ 2018.847691][T11898] syzkaller0: entered promiscuous mode [ 2018.853632][T11861] dummy0 speed is unknown, defaulting to 1000 [ 2019.000314][T11899] syzkaller0 (unregistering): left promiscuous mode [ 2019.007178][T11899] syzkaller0 (unregistering): left allmulticast mode [ 2019.173010][T30506] IPVS: stop unused estimator thread 0... [ 2019.279876][T11861] chnl_net:caif_netlink_parms(): no params data found [ 2019.351727][T11917] netlink: 8 bytes leftover after parsing attributes in process `syz.3.23510'. [ 2019.469117][T11915] syzkaller0: entered allmulticast mode [ 2019.478728][T11915] syzkaller0: entered promiscuous mode [ 2019.490806][T11915] syzkaller0 (unregistering): left promiscuous mode [ 2019.497930][T11915] syzkaller0 (unregistering): left allmulticast mode [ 2019.556198][T11925] netlink: 32 bytes leftover after parsing attributes in process `syz.1.23512'. [ 2019.598748][T11861] bridge0: port 1(bridge_slave_0) entered blocking state [ 2019.606061][T11861] bridge0: port 1(bridge_slave_0) entered disabled state [ 2019.623891][T11925] netlink: 4 bytes leftover after parsing attributes in process `syz.1.23512'. [ 2019.645952][T11861] bridge_slave_0: entered allmulticast mode [ 2019.652762][T11861] bridge_slave_0: entered promiscuous mode [ 2019.700604][T11931] xt_hashlimit: max too large, truncated to 1048576 [ 2019.706313][T11861] bridge0: port 2(bridge_slave_1) entered blocking state [ 2019.717280][T11861] bridge0: port 2(bridge_slave_1) entered disabled state [ 2019.726186][T11931] Cannot find set identified by id 0 to match [ 2019.732611][T11933] xt_hashlimit: max too large, truncated to 1048576 [ 2019.744931][T11861] bridge_slave_1: entered allmulticast mode [ 2019.766842][T11861] bridge_slave_1: entered promiscuous mode [ 2019.837325][T11861] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2019.863907][T11861] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2019.934733][T11861] team0: Port device team_slave_0 added [ 2019.949968][T11861] team0: Port device team_slave_1 added [ 2019.990968][T11861] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2019.998044][T11861] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2020.024560][T11861] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2020.080666][T11861] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2020.087847][T11861] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2020.114540][T11861] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2020.213269][T11861] hsr_slave_0: entered promiscuous mode [ 2020.235682][T11861] hsr_slave_1: entered promiscuous mode [ 2020.253759][T11861] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2020.277954][T11861] Cannot create hsr debugfs directory [ 2020.561959][T11950] loop3: detected capacity change from 0 to 1024 [ 2020.578953][T11950] EXT4-fs: Ignoring removed orlov option [ 2020.602527][T11950] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2020.770632][T11861] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 2020.829106][T11861] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 2020.859936][T11861] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 2020.901898][T11861] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 2021.088566][T11861] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2021.112526][T11958] netlink: 8 bytes leftover after parsing attributes in process `syz.1.23521'. [ 2021.132760][T11861] 8021q: adding VLAN 0 to HW filter on device team0 [ 2021.151113][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 2021.158782][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2021.202217][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 2021.209691][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2021.496615][T11861] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2021.715608][T11700] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2021.815873][T11979] netlink: 32 bytes leftover after parsing attributes in process `syz.3.23525'. [ 2021.856012][T11979] netlink: 4 bytes leftover after parsing attributes in process `syz.3.23525'. [ 2021.875934][T11979] bridge0: port 1(bridge_slave_0) entered disabled state [ 2021.887200][T11984] xt_hashlimit: max too large, truncated to 1048576 [ 2021.897296][T11979] bridge_slave_0 (unregistering): left allmulticast mode [ 2021.904525][T11979] bridge_slave_0 (unregistering): left promiscuous mode [ 2021.911628][T11979] bridge0: port 1(bridge_slave_0) entered disabled state [ 2022.024979][T11992] loop3: detected capacity change from 0 to 1024 [ 2022.049661][T11861] veth0_vlan: entered promiscuous mode [ 2022.049731][T11992] EXT4-fs: Ignoring removed orlov option [ 2022.057848][T11992] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2022.119992][T11861] veth1_vlan: entered promiscuous mode [ 2022.238960][T11861] veth0_macvtap: entered promiscuous mode [ 2022.279299][T11861] veth1_macvtap: entered promiscuous mode [ 2022.348829][T11861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2022.359482][T11861] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2022.389073][T11861] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2022.445228][T11861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2022.456007][T11861] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2022.466907][T11861] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2022.508032][T11861] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2022.518133][T11861] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2022.527061][T11861] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2022.536036][T11861] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2022.675419][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 2022.675437][ T29] audit: type=1326 audit(1747178540.848:86642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12002 comm="syz.4.23492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7fec8ba5e9f7 code=0x7ffc0000 [ 2022.712673][T12003] loop4: detected capacity change from 0 to 4096 [ 2022.746000][T12003] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2022.779208][ T29] audit: type=1326 audit(1747178540.890:86643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12002 comm="syz.4.23492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fec8ba5d2d0 code=0x7ffc0000 [ 2022.803152][ T29] audit: type=1326 audit(1747178540.890:86644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12002 comm="syz.4.23492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fec8ba5e56b code=0x7ffc0000 [ 2022.826928][ T29] audit: type=1326 audit(1747178540.890:86645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12002 comm="syz.4.23492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fec8ba5d5ca code=0x7ffc0000 [ 2022.850572][ T29] audit: type=1326 audit(1747178540.890:86646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12002 comm="syz.4.23492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fec8ba5d5ca code=0x7ffc0000 [ 2022.874183][ T29] audit: type=1326 audit(1747178540.890:86647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12002 comm="syz.4.23492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7fec8ba5d1d7 code=0x7ffc0000 [ 2022.898197][ T29] audit: type=1326 audit(1747178540.890:86648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12002 comm="syz.4.23492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7fec8ba6010a code=0x7ffc0000 [ 2022.922787][ T29] audit: type=1326 audit(1747178540.932:86649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12002 comm="syz.4.23492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fec8ba5d2d0 code=0x7ffc0000 [ 2022.946761][ T29] audit: type=1326 audit(1747178540.932:86650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12002 comm="syz.4.23492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=80 compat=0 ip=0x7fec8ba5d6b7 code=0x7ffc0000 [ 2022.970664][ T29] audit: type=1326 audit(1747178540.932:86651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12002 comm="syz.4.23492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fec8ba5d2d0 code=0x7ffc0000 [ 2023.027213][T11861] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2023.263582][T11700] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2023.271654][T12010] loop4: detected capacity change from 0 to 1024 [ 2023.305915][T12010] EXT4-fs: Ignoring removed orlov option [ 2023.336033][T12010] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2023.612204][ T8184] veth11: left allmulticast mode [ 2023.617578][ T8184] bridge0: port 2(veth11) entered disabled state [ 2023.691603][T12027] xt_hashlimit: max too large, truncated to 1048576 [ 2023.711710][ T8184] ip6gretap2: left allmulticast mode [ 2023.717400][ T8184] ip6gretap2: left promiscuous mode [ 2023.723276][ T8184] bridge0: port 1(ip6gretap2) entered disabled state [ 2023.743548][T12027] Cannot find set identified by id 0 to match [ 2024.351881][T11861] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2024.487170][T12033] netlink: 'syz.0.23540': attribute type 13 has an invalid length. [ 2024.495306][T12033] netlink: 'syz.0.23540': attribute type 27 has an invalid length. [ 2024.751096][T12038] loop3: detected capacity change from 0 to 1024 [ 2024.761247][ T8184] pu_sys (unregistering): Released all slaves [ 2024.770797][T12038] EXT4-fs: Ignoring removed orlov option [ 2024.782942][ T8184] bond0 (unregistering): Released all slaves [ 2024.808253][T12038] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2024.825651][ T8184] bond1 (unregistering): Released all slaves [ 2024.859644][ T8184] bond2 (unregistering): Released all slaves [ 2024.895431][ T8184] bond3 (unregistering): Released all slaves [ 2025.055043][ T8184] tipc: Disabling bearer [ 2025.060969][ T8184] tipc: Disabling bearer [ 2025.066741][ T8184] tipc: Disabling bearer [ 2025.072880][ T8184] tipc: Left network mode [ 2025.185333][T12011] lo speed is unknown, defaulting to 1000 [ 2025.597635][T12011] dummy0 speed is unknown, defaulting to 1000 [ 2026.228584][T12011] chnl_net:caif_netlink_parms(): no params data found [ 2026.373027][T11700] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2026.394208][ T8184] IPVS: stop unused estimator thread 0... [ 2026.476164][T12011] bridge0: port 1(bridge_slave_0) entered blocking state [ 2026.484848][T12011] bridge0: port 1(bridge_slave_0) entered disabled state [ 2026.492836][T12011] bridge_slave_0: entered allmulticast mode [ 2026.502806][T12011] bridge_slave_0: entered promiscuous mode [ 2026.528266][T12011] bridge0: port 2(bridge_slave_1) entered blocking state [ 2026.535526][T12011] bridge0: port 2(bridge_slave_1) entered disabled state [ 2026.543040][T12011] bridge_slave_1: entered allmulticast mode [ 2026.550003][T12011] bridge_slave_1: entered promiscuous mode [ 2026.615808][T12011] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2026.628370][T12068] syzkaller0: entered allmulticast mode [ 2026.639801][T12011] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2026.650914][T12068] syzkaller0: entered promiscuous mode [ 2026.659684][T12068] syzkaller0 (unregistering): left promiscuous mode [ 2026.666805][T12068] syzkaller0 (unregistering): left allmulticast mode [ 2026.729506][T12011] team0: Port device team_slave_0 added [ 2026.743144][T12011] team0: Port device team_slave_1 added [ 2026.813913][T12011] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2026.821017][T12011] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2026.847762][T12011] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2026.892486][T12011] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2026.899661][T12011] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2026.925790][T12011] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2026.953495][T12078] xt_hashlimit: max too large, truncated to 1048576 [ 2026.962111][T12078] Cannot find set identified by id 0 to match [ 2027.009957][T12011] hsr_slave_0: entered promiscuous mode [ 2027.017815][T12011] hsr_slave_1: entered promiscuous mode [ 2027.037746][T12011] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2027.072660][T12011] Cannot create hsr debugfs directory [ 2027.491169][T12011] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2027.517225][T12011] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2027.574418][T12011] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2027.611736][T12011] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2027.794742][T12011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2027.805960][T12093] loop3: detected capacity change from 0 to 1024 [ 2027.823354][T12093] EXT4-fs: Ignoring removed orlov option [ 2027.841932][T12011] 8021q: adding VLAN 0 to HW filter on device team0 [ 2027.866059][T12093] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2027.882272][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 2027.889600][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2027.918203][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 2027.925470][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2028.164146][T12011] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2028.364489][T12106] xt_hashlimit: max too large, truncated to 1048576 [ 2028.406058][T12106] Cannot find set identified by id 0 to match [ 2028.417853][T12109] xt_hashlimit: max too large, truncated to 1048576 [ 2028.524565][T12011] veth0_vlan: entered promiscuous mode [ 2028.564414][T12011] veth1_vlan: entered promiscuous mode [ 2028.620453][T12011] veth0_macvtap: entered promiscuous mode [ 2028.658028][T12011] veth1_macvtap: entered promiscuous mode [ 2028.714994][T12011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2028.725975][T12011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2028.736074][T12011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2028.747106][T12011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2028.834695][T12011] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2028.851377][T12011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2028.862777][T12011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2028.872985][T12011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2028.884059][T12011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2028.906459][T12011] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2028.917108][T12011] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2028.918786][T11700] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2028.927048][T12011] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2028.927155][T12011] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2028.955618][T12011] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2029.301672][T12133] loop4: detected capacity change from 0 to 1024 [ 2029.320751][T12133] EXT4-fs: Ignoring removed orlov option [ 2029.355704][T12133] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2029.508858][T12147] ================================================================== [ 2029.517010][T12147] BUG: KCSAN: data-race in __filemap_remove_folio / filemap_write_and_wait_range [ 2029.526434][T12147] [ 2029.528774][T12147] read-write to 0xffff888105740760 of 8 bytes by task 12133 on cpu 1: [ 2029.537060][T12147] __filemap_remove_folio+0x1bc/0x2a0 [ 2029.542666][T12147] folio_unmap_invalidate+0x1dd/0x360 [ 2029.548194][T12147] invalidate_inode_pages2_range+0x27c/0x3d0 [ 2029.554322][T12147] filemap_invalidate_pages+0x16d/0x1a0 [ 2029.560023][T12147] kiocb_invalidate_pages+0x6e/0x80 [ 2029.565271][T12147] __iomap_dio_rw+0x5d4/0x1250 [ 2029.569102][T12135] lo speed is unknown, defaulting to 1000 [ 2029.570151][T12147] iomap_dio_rw+0x40/0x90 [ 2029.570182][T12147] ext4_file_write_iter+0xad9/0xf00 [ 2029.585929][T12147] iter_file_splice_write+0x5ef/0x970 [ 2029.591350][T12147] direct_splice_actor+0x156/0x2a0 [ 2029.596514][T12147] splice_direct_to_actor+0x312/0x680 [ 2029.601931][T12147] do_splice_direct+0xda/0x150 [ 2029.607779][T12147] do_sendfile+0x380/0x640 [ 2029.612231][T12147] __x64_sys_sendfile64+0x105/0x150 [ 2029.617476][T12147] x64_sys_call+0xb39/0x2fb0 [ 2029.622126][T12147] do_syscall_64+0xd0/0x1a0 [ 2029.626688][T12147] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2029.632635][T12147] [ 2029.635135][T12147] read to 0xffff888105740760 of 8 bytes by task 12147 on cpu 0: [ 2029.643099][T12147] filemap_write_and_wait_range+0x59/0x340 [ 2029.649889][T12147] ext4_file_write_iter+0xe04/0xf00 [ 2029.656187][T12147] iter_file_splice_write+0x5ef/0x970 [ 2029.661681][T12147] direct_splice_actor+0x156/0x2a0 [ 2029.666831][T12147] splice_direct_to_actor+0x312/0x680 [ 2029.672349][T12147] do_splice_direct+0xda/0x150 [ 2029.677419][T12147] do_sendfile+0x380/0x640 [ 2029.681884][T12147] __x64_sys_sendfile64+0x105/0x150 [ 2029.687121][T12147] x64_sys_call+0xb39/0x2fb0 [ 2029.691814][T12147] do_syscall_64+0xd0/0x1a0 [ 2029.696365][T12147] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2029.702273][T12147] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2029.704614][T12147] value changed: 0x0000000000000001 -> 0x0000000000000000 [ 2029.711825][T12147] [ 2029.714160][T12147] Reported by Kernel Concurrency Sanitizer on: [ 2029.720670][T12147] CPU: 0 UID: 0 PID: 12147 Comm: syz.4.23563 Not tainted 6.15.0-rc6-syzkaller-00051-g405e6c37c89e #0 PREEMPT(voluntary) [ 2029.733520][T12147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 2029.743596][T12147] ================================================================== [ 2029.808201][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 2029.808271][ T29] audit: type=1400 audit(1747178548.282:86685): avc: denied { write } for pid=3302 comm="syz-executor" path="pipe:[769]" dev="pipefs" ino=769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2030.420846][ T8184] $Hÿ (unregistering): Released all slaves [ 2030.429393][ T8184] bond1 (unregistering): Released all slaves [ 2030.438311][ T8184] bond2 (unregistering): Released all slaves [ 2030.447279][ T8184] bond3 (unregistering): Released all slaves [ 2030.455637][ T8184] bond4 (unregistering): Released all slaves [ 2030.464365][ T8184] bond5 (unregistering): Released all slaves [ 2030.472726][ T8184] bond0 (unregistering): Released all slaves [ 2030.539318][ T8184] tipc: Disabling bearer [ 2030.544643][ T8184] tipc: Disabling bearer [ 2030.549982][ T8184] tipc: Disabling bearer [ 2030.555519][ T8184] tipc: Left network mode [ 2030.641122][ T8184] pim6reg (unregistering): left allmulticast mode [ 2030.685344][T30487] smc: removing ib device syz! [ 2030.690617][ T884] smc: removing ib device syo1 [ 2030.724150][T12132] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2031.042932][ T8184] IPVS: stop unused estimator thread 0... [ 2031.090836][ T8184] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2031.602464][ T8184] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2031.658574][ T8184] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2031.706547][ T8184] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2031.778572][ T8184] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2031.830402][ T8184] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2031.887236][ T8184] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2031.934778][ T8184] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2031.995994][ T8184] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2032.039888][ T8184] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2032.106577][ T8184] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2032.164019][ T8184] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2032.422385][ T8184] bridge_slave_1: left allmulticast mode [ 2032.428617][ T8184] bridge_slave_1: left promiscuous mode [ 2032.434488][ T8184] bridge0: port 2(bridge_slave_1) entered disabled state [ 2032.442480][ T8184] bridge_slave_0: left allmulticast mode [ 2032.448364][ T8184] bridge_slave_0: left promiscuous mode [ 2032.454110][ T8184] bridge0: port 1(bridge_slave_0) entered disabled state [ 2032.462247][ T8184] bridge_slave_1: left allmulticast mode [ 2032.468090][ T8184] bridge_slave_1: left promiscuous mode [ 2032.473799][ T8184] bridge0: port 2(bridge_slave_1) entered disabled state [ 2032.481832][ T8184] bridge_slave_1: left allmulticast mode [ 2032.487678][ T8184] bridge_slave_1: left promiscuous mode [ 2032.493428][ T8184] bridge0: port 2(bridge_slave_1) entered disabled state [ 2032.501507][ T8184] bridge_slave_0: left allmulticast mode [ 2032.507439][ T8184] bridge_slave_0: left promiscuous mode [ 2032.513266][ T8184] bridge0: port 1(bridge_slave_0) entered disabled state [ 2032.523159][ T8184] veth13: left allmulticast mode [ 2032.528791][ T8184] bridge0: port 2(veth13) entered disabled state [ 2032.536766][ T8184] ip6gretap2: left allmulticast mode [ 2032.542147][ T8184] ip6gretap2: left promiscuous mode [ 2032.547819][ T8184] bridge0: port 1(ip6gretap2) entered disabled state [ 2032.644088][ T8184] bond10 (unregistering): (slave ip6erspan0): Releasing backup interface [ 2033.202113][ T8184] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2033.212963][ T8184] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2033.223659][ T8184] bond0 (unregistering): Released all slaves [ 2033.233385][ T8184] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2033.244583][ T8184] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2033.255034][ T8184] bond0 (unregistering): Released all slaves [ 2033.264879][ T8184] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2033.275175][ T8184] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2033.285333][ T8184] bond0 (unregistering): Released all slaves [ 2033.298060][ T8184]  (unregistering): Released all slaves [ 2033.307023][ T8184] bond1 (unregistering): Released all slaves [ 2033.315959][ T8184] bond0 (unregistering): Released all slaves [ 2033.324617][ T8184] bond2 (unregistering): Released all slaves [ 2033.334082][ T8184] bond3 (unregistering): Released all slaves [ 2033.343959][ T8184] bond4 (unregistering): Released all slaves [ 2033.353208][ T8184] bond5 (unregistering): Released all slaves [ 2033.362669][ T8184] bond6 (unregistering): Released all slaves [ 2033.371504][ T8184] bond7 (unregistering): (slave batadv0): Releasing active interface [ 2033.381991][ T8184] bond7 (unregistering): Released all slaves [ 2033.390911][ T8184] bond8 (unregistering): Released all slaves [ 2033.402099][ T8184] bond9 (unregistering): Released all slaves [ 2033.416002][ T8184] bond10 (unregistering): Released all slaves [ 2033.463316][ T8184] tipc: Disabling bearer [ 2033.468853][ T8184] tipc: Disabling bearer [ 2033.474399][ T8184] tipc: Left network mode [ 2033.489232][ T8184] hsr_slave_0: left promiscuous mode [ 2033.495205][ T8184] hsr_slave_1: left promiscuous mode [ 2033.501321][ T8184] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2033.509272][ T8184] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2033.518796][ T8184] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2033.527976][ T8184] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2033.539912][ T8184] hsr_slave_0: left promiscuous mode [ 2033.547079][ T8184] hsr_slave_1: left promiscuous mode [ 2033.553778][ T8184] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2033.562465][ T8184] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2033.571996][ T8184] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2033.580591][ T8184] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2033.593748][ T8184] hsr_slave_0: left promiscuous mode [ 2033.600823][ T8184] hsr_slave_1: left promiscuous mode [ 2033.608017][ T8184] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2033.616136][ T8184] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2033.623807][ T8184] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2033.632338][ T8184] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2033.648677][ T8184] veth1_macvtap: left promiscuous mode [ 2033.654294][ T8184] veth0_macvtap: left promiscuous mode [ 2033.660142][ T8184] veth1_vlan: left promiscuous mode [ 2033.665948][ T8184] veth0_vlan: left promiscuous mode [ 2033.671904][ T8184] veth1_macvtap: left promiscuous mode [ 2033.678023][ T8184] veth0_macvtap: left promiscuous mode [ 2033.683729][ T8184] veth1_vlan: left promiscuous mode [ 2033.689222][ T8184] veth0_vlan: left promiscuous mode [ 2033.695202][ T8184] veth1_macvtap: left promiscuous mode [ 2033.700874][ T8184] veth0_macvtap: left promiscuous mode [ 2033.706623][ T8184] veth1_vlan: left promiscuous mode [ 2033.712041][ T8184] veth0_vlan: left promiscuous mode [ 2033.846951][ T8184] team0 (unregistering): Port device team_slave_1 removed [ 2033.857075][ T8184] team0 (unregistering): Port device team_slave_0 removed [ 2033.910978][ T8184] team0 (unregistering): Port device team_slave_1 removed [ 2033.921742][ T8184] team0 (unregistering): Port device team_slave_0 removed [ 2033.972879][ T8184] team0 (unregistering): Port device team_slave_1 removed [ 2033.982490][ T8184] team0 (unregistering): Port device team_slave_0 removed [ 2034.708322][ T8184] IPVS: stop unused estimator thread 0...