last executing test programs: 7m27.11943789s ago: executing program 1 (id=12030): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xfffffffeffffffff, 0x2}, 0x0, 0x10000, 0x0, 0xa, 0x9, 0x5, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r2) syz_usb_connect$cdc_ncm(0x6, 0xf3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x0) ioctl$EVIOCRMFF(r2, 0x41015500, &(0x7f0000000500)) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x8d40, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x0, 0x0, "00769a7d8200010000001495595915303d6000"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCFLSH(r4, 0x80045440, 0x2) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r5, 0xffffffffffffffff, 0x100000000000000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000640), 0x9e042, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x3) r7 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000001040), 0x1, 0x0) write$binfmt_register(r7, &(0x7f0000001080)={0x3a, 'syz1', 0x3a, 'E', 0x3a, 0x2, 0x3a, '-', 0x3a, ')', 0x3a, './file0', 0x3a, [0x46, 0x0]}, 0x2b) ioctl$KDFONTOP_SET(r6, 0x4b72, &(0x7f0000000080)={0x0, 0x3000000, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="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"}) r8 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000009c0)="010000000037a788a11d1f000000000000006923c63a4541062101b60a2156566de77062086575a59ea9cb", 0x2b, r8) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r10 = add_key$keyring(&(0x7f00000007c0), &(0x7f0000000800)={'syz', 0x3}, 0x0, 0x0, r9) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)=@newtclass={0x2c, 0x28, 0x2, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x1, 0x2}, {0x1}, {0xfff3, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x4, 0xb}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040840}, 0x20000000) keyctl$search(0xa, r8, &(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000500)={'syz', 0x3}, r10) 7m26.430063305s ago: executing program 1 (id=12036): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_emit_ethernet(0x33, &(0x7f0000000cc0)={@random="e90c610faca2", @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x25, 0x0, 0xe000, 0x3, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0x11, 0x0, @gue={{0x1, 0x1, 0x2, 0x4, 0x0, @void}, "1e94fc90f6"}}}}}}, 0x0) syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2, 0x0, 0x11, 0x0, @empty, @empty}, {0x4e22, 0x7, 0x18, 0x0, @wg=@data={0x4, 0x1, 0x6}}}}}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xe}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') preadv(r6, &(0x7f0000010540)=[{&(0x7f0000010680)=""/222, 0xde}], 0x1, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="05000000010000000900000002"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x7, 0x4, 0x8000004, 0x0, r7}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ff01000000000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r9, 0x0, 0x8}, 0x18) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) r10 = memfd_create(&(0x7f0000000780)='L\xc0\xd3V\x13L\xb2\xfcSZ\x7fF\xb6:\x8d\xd2\xee\xac\x1e$v\xcb\xe2w-\xa7W\xd9\xb1\xd0\x83?x\xd4\xbb\x9a\x89|g\xfei\xaf\xa1\x1f\xd1\xf80\x05\x19\x00\x00\x00\x00\xf8\x1c\x8a\\\x982\xb7\xb0\x8d2\xa5\xb3\xf1\xbc\xf5m{\x93\x12\x80n\x84B\x91\xb4\x10wO)\x81\xd8\xf6A\x1bz\xca9\xb2\x10\x97,\xd3k\xa6\xea+\xe0V\xe8E\xbd\xc3:;\x1b,\x87n\xd3`\xae\xf0\x12\xc2Lz\xc0\xfcT\xddA\xe9g\x1fT\xaa\x810S6\xf2h\xa5R6\xac\x11\xe8%Hjk\x1c!\xe8\xa4v\xfd\xb4\x9br?\xfa]z\xfe\x98}\to\xfe\x99kh\xbe9\xfb\x87\xe8\xa7\xd0w\xfeY\xbb\x8d6{\xddW\x90\x04ZH\t\xd3\x0f\x19\x95l_\xe5T\xc5\x02\x12GX9\xf1l\xaa\x8f+sf\xb2\xe8\xc6*\x8e\xef\xc8\x10\xa6!0\'\xf8\xa2\xad=\x19\x12\xb9N$\x05\xdeq\xe0<7-\xbd\xde\xffBDl(rT\xdaU\xabEL\x81\xc7$\xaf\xc9\f\xc2<\xe4\x9a)\b*\x00p\xdc\xdb\x06\xe2\x02*\xb1\x8a\xc1!\x83>\xec\xea\x8djj\xcc8\xfe\xabS\x94?\x1b4\xbc\xdb\xc0\x18jq:\x8a\xf8\x84a\x801\x18\xe1\x02\x90\x95\xf3\xed;\x10\xe3=\x00\x00\x00\x00\x00\x00(\x19\xf2\xcb\xdc\xc5O\n\xa7\xff$\x0f\x04\x94R\x1dW\x99\xae\x04\xb2\xb5\x0ey(\x15\x91<\x01$\xe2\xe3e{\xba\x95\xa2\xe8f\x03\n\xdf\x11\'}\x81\xea\xc0\x80N\x1e\x039\xc8@\xa5\x1a\xbfU\xb2JO%Wh-\xa7M>G\x97\xc8\x92\x93\xd1\xc4P]\b\x8ef\xed7\xd51\x90\xd8\xb4;\xf8\xe8\xday\xd8]\xa4\xea.V\x9a\xd5b_G\x86\x87\xe1S)u;\xae\xe3Y\xd8\x93\x97\x95\x15\x11Y\x8aq\x15\xac\xf4W\xcbk\x8f\x81\xf7_B\xbeK\xfb\xcb-\xe5\xa9)\x9a\r\xbf\x98\\\xb3d\xb3Jf\x9b\x9c\x87x\x18\xa8s\x10\xcb\x14\xb8\x03\x84/~f\xcc\x05\xab\x17\xa6P\x9f\xea1\xadg@\xf6\x1d\xb5\xde\xda\xb7\x9bk\xd2\xf5o`(\"5\xe3\xa5\xb9l\x97\xba\x06\xf8\xe6\xc0%\xef`;\x82]/\xa0\v\x1c;p\x8f\xbb\xcb\xe0=EA]\x9dq\xdc\xb7\xfa\xd4N\x03|\xbdv\x7f\xaf\xb5\xd1\xac\xf6;\xf1?K\xf7\xa8m{\x04\xc6\x87\xd1\xb6\x93W~\x88\x7f\x7fw1\x99\xdfT\x7f\x9d\xcarn/\x1d\xca\x06\x861<\xaa\xf7\tj1C+W.J!E\x97U*\xd9\xdf\xbd:7U\x1e\x1ePd\x01(\xe4\xf8\x91-\x05\xa4\x83\xd4\xf1\x02q\x83\xbe9\xc2\xa4\x1c\xed\xe5\x02\x00\xb3\x8a\x0e\xe1\x99\n3\xf9\x1fa\xff\x0ee\xd7\xd1\xcb\x8d\xd1\xf8\xa1HM\x81\xbaZ\x8d1:\x04TC\x12\x10\xb4\x82[)\x06|M\x8a', 0x0) splice(r2, 0x0, r10, 0x0, 0x408cd, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfffffe3e) 7m25.581536734s ago: executing program 1 (id=12047): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xfffffffeffffffff, 0x2}, 0x0, 0x10000, 0x0, 0xa, 0x9, 0x5, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r2) syz_usb_connect$cdc_ncm(0x6, 0xf3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x0) ioctl$EVIOCRMFF(r2, 0x41015500, &(0x7f0000000500)) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x8d40, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x0, 0x0, "00769a7d8200010000001495595915303d6000"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCFLSH(r4, 0x80045440, 0x2) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r5, 0xffffffffffffffff, 0x100000000000000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000640), 0x9e042, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x3) r7 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000001040), 0x1, 0x0) write$binfmt_register(r7, &(0x7f0000001080)={0x3a, 'syz1', 0x3a, 'E', 0x3a, 0x2, 0x3a, '-', 0x3a, ')', 0x3a, './file0', 0x3a, [0x46, 0x0]}, 0x2b) ioctl$KDFONTOP_SET(r6, 0x4b72, &(0x7f0000000080)={0x0, 0x3000000, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="387ed7626d850509a2d6c1aa38f15cd00f85c263cb226db671261fff7ce9c555f189afae3530db6dd493f28fd988721b9ae21b3e3b4523ae2594f47d8f62b480c4160b1f90ac9c41fae6ab12ac4c113fef588684ef495689092883b902a41cd75387ef6f7bc7d460d5e665f398ff95596dc94ec97003a3db08e500c2fb07e11aa4031a61c51caf7a65a2b613bda33f3eaeae635d7cd81761e74c38a7695800a15516eb337056e02335f9a7d10aa2eaf7beb7e1f7a1e850ecb3421143c5c4ded0f083a0c524dcf320827266819b6a952db5bc96141b26c54db857edbcbbc81c7af7aadf50bc549974b6401a19cdb130282b955592efa94242065a4c8d695a2cdd9ada350defd58c775b92d348305774d3a256c7520b285d8da0dbf5e20d604413ed2ddf9bcbf881caf811852806175d63892a15234fbcd7a88a2a0aea45d19148f0e7dada7d6d0d77881387fdeaa02863be90b88dfff412bff40c31c6415c54ae3335e54a49d315851feffe30d999c36def4df7df747695ef060000001bbe1b649f42f310859122c0d2c1e558dc6586958a28374f386ecf369274e43003a09b5159ea515eb44521901ef0d00baa91c10a8e44a76aac3468a15bd3d45ad389977467f306f9bcde071b30769795eed2f1580414d168f557cd90040c4bd2a3d6bc509254a12cece59181fcb5bad8c24bd9f8f78d17ab01831325501e80d899e9252f99d3a2666343392fda115048e4f4dd9f45657f8224fc78eb1168fe0527fac33466aadf48f16994d29a47778566e0f3945b2bf36b6eecc7fa18914beb66ac9e519bd3330000000000000009a3237aebbe3bed781e39d5a0fb0cdc60e196f2261305feb596b5b66ab89d2d6333f699b16db68986ab3eee7b199fefb5f79ffb2d1050e46982af1c14a88dd9b647ba812f56a8404755c73e74bb90e64bab9647c70ed5afca1c3d87907d14df8aa9df6f40a80ace2bb8a2aad3b0c66915927db4173181943d88c0c76d5969e2043db5bd77fd60ba0f012139929ccfec965c1f769785a4d23332d71f0875e3146afef5b20cc306d3ecee65944fe9829e0ad0c3f6bb2fdc1bc31152538db50f47dc38ba908a0d808687e478a609fe0daa0000000000000000e7f2e98597e27f3e1dba9c3c16e9fab3bda6ed33cb1c75513e2264b69d4794ded98eff9aa53d22eb77c9d93169c04ab2490bf28106f770e07eb7a9e8fd4e71929f918b98c4cbfcb11a90139264a9ee807c973167f493760278df0cc34be9e8f86f948d9a62e63ad6ca9d174d2465380b1a00ddc42915e4f3a5db640600000095a3d63904c9ecd1c313c08e29b814bd8fed1ab6d2846c73345962895d289ac77152cac2e04c93a5470774975b42091f218dd1e68a15f8226577bf9481ae0555db64a717eb23a811356d00000000ddffffff00"}) r8 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000009c0)="010000000037a788a11d1f000000000000006923c63a4541062101b60a2156566de77062086575a59ea9cb", 0x2b, r8) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r10 = add_key$keyring(&(0x7f00000007c0), &(0x7f0000000800)={'syz', 0x3}, 0x0, 0x0, r9) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)=@newtclass={0x2c, 0x28, 0x2, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x1, 0x2}, {0x1}, {0xfff3, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x4, 0xb}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040840}, 0x20000000) keyctl$search(0xa, r8, &(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000500)={'syz', 0x3}, r10) 7m24.829955434s ago: executing program 1 (id=12055): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000440)={[{@resuid}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x1}}, {@dioread_lock}, {@grpjquota}, {@quota}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@minixdf}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x42, 0x0) truncate(&(0x7f0000000900)='./file1\x00', 0x3000000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1, 0x0, 0x7}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9cab5f963645b00}, 0x2004, 0x4, 0x0, 0x0, 0x0, 0x6, 0x102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) write$binfmt_script(r2, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000580)={0xe080480, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x27ffff7, 0x4012011, r0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f00000000c0)={0x17c04, 0xffffffffffffffff, 0x7ff, 0x1003, 0x7}) 7m24.666445477s ago: executing program 1 (id=12058): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x4000, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010001fff00000000000000f6ff060000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xa1b96aadc3618c7a}, 0x94) r3 = gettid() ppoll(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) tkill(r3, 0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) prctl$PR_SET_THP_DISABLE(0x29, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0b00000007000000080000000800000005000000", @ANYRES32=r0, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000006fb9e231ffbdff6e480d8c876f5d114978e85cd853af0cd99fcbd2412871ab2faf4cf08d8029af5a21f1c1175062ef8ed84478d31b43329eed3c0fa1eac685b159e7e06c5e245e244a1aa6acde40085574c4125edfbb720edf38319ebdea36c484344c712816e08a66364f27f201f10ca9b92ccae92f00723bc383b2042053ffb4784a663a6f99dfc9cd75e6529c4370863ee4c89b98821485827c332c63048525fbcc34a262e773fd4a51722576bdb0133be4aa90e91549ef79e94459dddff66502c08e3de1c25e7bc7b1e4406cd9a7678e418ae6a26c"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000300), &(0x7f0000000200)=""/166}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) recvmsg$unix(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000002480)=""/195, 0xc3}], 0x1}, 0x2000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r7}, &(0x7f0000000280), &(0x7f0000000140)=r4}, 0x22) sendmsg$inet(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000380)}, 0x20044001) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00'}, 0x10) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x200, 0x1000, 0xd6e}}) 7m24.365579441s ago: executing program 1 (id=12064): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x4000, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010001fff00000000000000f6ff060000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xa1b96aadc3618c7a}, 0x94) r3 = gettid() ppoll(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) tkill(r3, 0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) prctl$PR_SET_THP_DISABLE(0x29, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0b00000007000000080000000800000005000000", @ANYRES32=r0, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000006fb9e231ffbdff6e480d8c876f5d114978e85cd853af0cd99fcbd2412871ab2faf4cf08d8029af5a21f1c1175062ef8ed84478d31b43329eed3c0fa1eac685b159e7e06c5e245e244a1aa6acde40085574c4125edfbb720edf38319ebdea36c484344c712816e08a66364f27f201f10ca9b92ccae92f00723bc383b2042053ffb4784a663a6f99dfc9cd75e6529c4370863ee4c89b98821485827c332c63048525fbcc34a262e773fd4a51722576bdb0133be4aa90e91549ef79e94459dddff66502c08e3de1c25e7bc7b1e4406cd9a7678e418ae6a26c"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000300), &(0x7f0000000200)=""/166}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) recvmsg$unix(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000002480)=""/195, 0xc3}], 0x1}, 0x2000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r7}, &(0x7f0000000280), &(0x7f0000000140)=r4}, 0x22) sendmsg$inet(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000380)}, 0x20044001) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) r9 = dup(r8) ioctl$TIOCL_SETSEL(r9, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x200, 0x1000, 0xd6e}}) 7m24.365053022s ago: executing program 32 (id=12064): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x4000, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010001fff00000000000000f6ff060000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xa1b96aadc3618c7a}, 0x94) r3 = gettid() ppoll(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) tkill(r3, 0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) prctl$PR_SET_THP_DISABLE(0x29, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0b00000007000000080000000800000005000000", @ANYRES32=r0, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000006fb9e231ffbdff6e480d8c876f5d114978e85cd853af0cd99fcbd2412871ab2faf4cf08d8029af5a21f1c1175062ef8ed84478d31b43329eed3c0fa1eac685b159e7e06c5e245e244a1aa6acde40085574c4125edfbb720edf38319ebdea36c484344c712816e08a66364f27f201f10ca9b92ccae92f00723bc383b2042053ffb4784a663a6f99dfc9cd75e6529c4370863ee4c89b98821485827c332c63048525fbcc34a262e773fd4a51722576bdb0133be4aa90e91549ef79e94459dddff66502c08e3de1c25e7bc7b1e4406cd9a7678e418ae6a26c"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000300), &(0x7f0000000200)=""/166}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) recvmsg$unix(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000002480)=""/195, 0xc3}], 0x1}, 0x2000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r7}, &(0x7f0000000280), &(0x7f0000000140)=r4}, 0x22) sendmsg$inet(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000380)}, 0x20044001) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) r9 = dup(r8) ioctl$TIOCL_SETSEL(r9, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x200, 0x1000, 0xd6e}}) 4m45.957483375s ago: executing program 3 (id=14107): socket$inet6_udp(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) prlimit64(0x0, 0xe, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b4000000", @ANYRES16=r4, @ANYBLOB="01000000000000000000010000008400088080000080580009801c000080060001000200000008000200ac1414aa05000300020000001c0000800600010002000000080002007f00000105000300030000001c0000800600010002000000080002000a0101020500030020000000240001000000000000000000000000000000000000000000000000000000000000000000080005000100000014000200776731"], 0xb4}, 0x1, 0x0, 0x0, 0x4084}, 0x20008040) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000f8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) socket$isdn(0x22, 0x3, 0x2) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) close(r5) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0x4) 4m45.018606931s ago: executing program 3 (id=14114): syz_open_procfs(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) prlimit64(0x0, 0xe, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b4000000", @ANYRES16, @ANYBLOB="01000000000000000000010000008400088080000080580009801c000080060001000200000008000200ac1414aa05000300020000001c0000800600010002000000080002007f00000105000300030000001c0000800600010002000000080002000a0101020500030020000000240001000000000000000000000000000000000000000000000000000000000000000000080005000100000014000200776731"], 0xb4}, 0x1, 0x0, 0x0, 0x4084}, 0x20008040) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) socket$isdn(0x22, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x8800, &(0x7f00000006c0)={[{@errors_remount}, {@sysvgroups}, {@minixdf}]}, 0x1, 0x50b, &(0x7f0000000700)="$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") 4m44.046076458s ago: executing program 3 (id=14126): ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40085507, &(0x7f00000000c0)=0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="440000001000ffff27bd", @ANYRES32=0x0, @ANYBLOB="fda65f0500000000140012800c0001006d616376746170000400028008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x44}, 0x1, 0x0, 0x0, 0x308}, 0x0) 4m43.954902956s ago: executing program 3 (id=14127): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x11, 0xb, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000010000000701a20bf8ffffffb702000008000000b703000000000000850000002d0000009517653f6f360194479afc9ee3947faf57a17ca4c4bc93b723a8acae719005d9e626815c062a134936330bb130cfcb4b75d04406421f3018c6b9007bd4b4bb9369e0b30f9bed3e7a6f87176d74248c644a47ec2893f470971aa330e000e863522078cba341e89fafdd516060f95b331072b458287b80e1927e38c3dc5ce3806391e1c02116c932873b6358a215e684061f2e"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="f6f4e9a10000502468da5eb1c6b2feff8833c0000000000000c548dc7914cb11ad63bf3707164aac031971c4be105eb953f86fbc6b204e076aa7a493e796123bbbd8e3b7e62d8fd097cf21d6d431a069ebc0aefd5fce80cc99fb38c771fa46e2c32a95fe99", 0x0, 0x86, 0x0, 0xffffffffffffff80, 0x0, &(0x7f0000000000)="daf9e846ab156efc71b59652333536dbfd26a6d0546366e36eb77dd0aaa2dbe567d168904cf0d5bce1771889c98ffc0abf", 0x0}, 0x15) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x210816, &(0x7f00000004c0)={[{@sysvgroups}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}, {@dioread_lock}, {@user_xattr}, {@jqfmt_vfsold}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@nojournal_checksum}]}, 0x5, 0x505, &(0x7f00000015c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSG0EmKPILUhcaModhzFTmlCD+mZKxKVOMGRP4BzT9y5ILhxKQckfkSgBomDVzOepE5qN1GT2FH8+UijeW/edL7vxZr3PM+1XwBD63pE7EbEWETcjYjp7Hgu2+KT9pac92zv4dL+3sOlXLRan/0rl5Ynx6Lj3ySuZdcsRsSPvhfx09yLcRvbO2uL1WplM8vPNmsbs43tnVurtcWVykplvVxemF+Y++j2h+Vza+s7tbEs9dWnf9z91s+Tak1lRzrbcZ7aTS8cxkmMRsQPLiLYAIxk7RkbdEV4JfmIeDMi3k3v/+kYSV9NAOAqa7WmozXdmQcArrp8OgeWy5eyuYCpyOdLpfYc3lsxma/WG82b9+pb68vtubKZKOTvrVYrc9lc4UwUckl+Pk0/z5eP5W9HxBsR8cvxiTRfWqpXlwf5xgcAhti1Y+P/f8fb4z8AcMUVB10BAKDvjo7/MwOrBwDQP57/AWD4GP8BYPi0x/+JQVcDAOgjz/8AMHyM/wAwVH746afJ1trPfv96+f721lr9/q3lSmOtVNtaKi3VNzdKK/X6SvqbPbWTrlet1zfmP4itBzPf3mg0ZxvbO3dq9a315p30d73vVArpWbt9aBkA0Msb7zz5Sy4ZkT+eSLfoWMuhMNCaARctP+gKAAMzMugKAANjtS8YXmd4xjc9AFdElyV6jyh2+4JQq9VqXVyVgAt240vm/2FYdcz/+1/AMGTM/8PwMv8Pw6vVyp12zf847YkAwOVmjh/o8fn/m9n+d9mHAz9ZPn7G44usFQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFxuB+v/lrK1wKciny+VIl6LiJko5O6tVitzEfF6RPx5vDCe5OcHXGcA4Kzyf89l63/dmH5/6kjR29cOk2MR8bNff/arB4vN5uafIsZy/x4/ON58nB0v97/2AMDJDsbpdN/xIP9s7+HSwdbP+vzjuxFRbMff3xuL/cP4ozGa7otRiIjJ/+SyfFuuY+7iLHYfRcQXu7U/F1PpHEh75dPj8ZPYr/U1fv5I/Hxa1t4nf4svnENdYNg8SfqfT7rdf/m4nu673//FtIc6u6z/Sy61tJ/2gc/jH/R/Iz36v+unjfHBH77fTk28WPYo4sujEQex9zv6n4P4uR7x3z9l/L9+5e13e5W1fhNxI7rH74w126xtzDa2d26t1hZXKiuV9XJ5YX5h7qPbH5Zn0znq2d6jwT8/vvl6r7Kk/ZM94hdPaP/XT9n+3/7/7o+/9pL433yvW/x8vPWS+MmY+I1Txl+c/H2xV1kSf7lH+096/W+eMv7Tv+28sGw4ADA4je2dtcVqtbIpIXGRiezddJztOskVLkVzuiS+069YY9G96Bfvtf/Ex4parVeK1avHOI9ZN+AyOLzpI+J/g64MAAAAAAAAAAAAAADQVT++sTToNgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHB1fR4AAP//NWPLuw==") r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000600)='fscache_volume\x00', r4, 0x0, 0x3}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0x40086602, &(0x7f0000000080)={@id={0x2, 0x0, @d}}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000019000100007f0000000094bc2d"], 0x1c}}, 0x10) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0x40086602, &(0x7f0000000080)={@desc={0x84c00, 0x0, @desc2}}) r6 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e21, @local}], 0x10) sendmsg$inet_sctp(r6, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000380)='N', 0x1}], 0x1, 0x0, 0x0, 0x804c040}, 0x0) unshare(0x12000100) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x5, 0x0, 0x8}]}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e06, @broadcast}}, 0x5, 0x2, 0x61d, 0x8, 0x6, 0x1, 0x5}, 0x9c) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)=ANY=[@ANYRES16=0x0], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000400000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095000000000000006cf42badfff31236b360d33f48a4cdbf7edb256a00ef397d401b25868dfb815d2ef93986498827da1224c32f2e4000641d85aa55260cad3b67f8757c2eabedd7354e5965d18f98d41d0beebdac24b26f3d54dc1129346e9cac8874f0b9be5b58e0f3b2cf19ca0300111d70d617af92fbd8eb0ca8a856965396364950b222098b3031678ac12bd8bff0125cba9433af7f38a3646c33dfe11b"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r8}, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r2, &(0x7f0000000400)={&(0x7f00000003c0), 0xc, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x84}, 0x4) r9 = socket$packet(0x11, 0x3, 0x300) fcntl$setlease(r9, 0x400, 0x0) 4m43.771255821s ago: executing program 3 (id=14128): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xffffdffb00000001}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32], 0x2c}], 0x1}, 0x0) 4m43.470555275s ago: executing program 3 (id=14133): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x2c, r3, 0x301, 0x70bd29, 0x25dfdbfc, {0x24}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}]}, 0x2c}}, 0x0) 4m43.470476835s ago: executing program 33 (id=14133): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x2c, r3, 0x301, 0x70bd29, 0x25dfdbfc, {0x24}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}]}, 0x2c}}, 0x0) 33.78717857s ago: executing program 6 (id=18132): bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002c80)={0xffffffffffffffff, 0x20, &(0x7f0000002c40)={0x0, 0x0, 0x0, &(0x7f00000004c0)=""/15, 0xf}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000002dc0)={0x1b, 0x53, &(0x7f0000000200)=ANY=[@ANYRES16=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) madvise(&(0x7f0000000000/0x600000)=nil, 0x60005f, 0x3) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800000, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40400, 0x0, 0x0, 0x0, 0x0, 0x0) 33.762047542s ago: executing program 6 (id=18133): r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000340), 0x1, 0x55e, &(0x7f0000001ac0)="$eJzs3c9vI1cdAPCvJz+cbrfNLhQJKmAXKCxotXbibaOql3YvIFRVQlQcEIdtSLxRiBOH2KmaEIlU/AkgFakn+BM4IHFA6okDN45IHBBSOSAtEIE2SCAZzXiSdbIO6629Nht/PtLszJvnme978Y7f87M9L4CxdTUi9iNiOiLeiojZfH8hX+K19pI+7t7B3tLhwd5SIVqtN/9WyPLTfdFxTOrp/JwzEfHNr0V8t/Bg3MbO7tpirVbdytPl5vpmubGze2N1fXGlulLdqFQW5hfmXr75UmVgdb2y/ou7X119/Vu//tVnPvzd/ld+kBbrYp7XWY++FE8m21WfOo6TmoyI1wcSbPQm8vX0iMvBR5NExMci4vPZ9T8bE9n/TgDgPGu1ZqM125kGAM67JBsDKySliEiS+NEn0k5AqT2G91xcSGr1RvP6nfr2xnJ7rOxSTCV3VmvVucvFP3w/6zFMFdL0fJaX5Wfpyqn0zYi4HBE/KT6VpUtL9dryyHo9ADDenu5s/yPin8UkKZV6OrTLp3oAwBNjZtQFAACGTvsPAONH+w8A46eH9j//sH//sZcFABgO7/8BYPw8avvvZk8A8OTz/h8Axso33ngjXVqH+f2vl9/e2V6rv31judpYK61vL5WW6lubpZV6fSW7Z8/7D/vRf61e35x/MbbfKTerjWa5sbN7e72+vdG8nd3X+3Z1ajjVAgD+h8tXPvh92qbvv/JUtkTH8L62Gs63ZNQFAEZm4mSy+EgH6yDAE81sXzC+emrCs07Cbx97WYDR6Pq53kzXzZN++ghBfM8I/q9c+1Tv4/++9g/ni/F/GF8TH+moVwdeDmD4jP/D+Gq1Cqfn/J8+zgIAzqU+vsLX+uGgOiHASD3sd70D+fwfAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAzpmLEfG9KCSlbC7wJP03KZUinomISzFVuLNaq85FxLNxJSKmiml6ftSFBgD6lPylkM//dW32hYunc6cL/ypm6/Qh77/53juLzebWfLr/70f7o3g0fVjl/nF9zCsIAAxY1n5X8nX2Rn4y23/vYG/paBlmee7eiv/kUxEvHR7sZUs7ZzLSnREzWV/iwj8KeUnbc5E+HxETA4i//25EfPK4/suViDx+IRsbuZTPfNoZP/LYzwwqfte//+n4yYn4SZbXXqedr48PoCwwbj64FRGvdbv+kriarbtf/zPHr5z9uXurfbKj177DjviTeaSJLvHTa/5qrzFe/M3XH9jZmm3nvRvx/GS3+IXj+IUz4r/QY/w/fvqzP371jLzWzyKuRff4nbHKzfXNcmNn98bq+uJKdaW6UakszC/MvXzzpUo5G6MuH41UP+ivr1x/Ns5oL9L6Xzgj/kzX+k8fH/vFHuv/83+/9Z3P3U8WT8f/8he6P//PdY3flraJX+ox/uKFX545fXcaf/mM+j/s+b/eY/wP/7y73ONDAYAhaOzsri3WatWtvjbSd6G9H/XexZ7PnBaxtwcfdRf7q86fYgB/jUFtTPVdnVFtTB73FQd75m+nZxxydZKB16KvjXvDijW61yRgOO5f9KMuCQAAAAAAAAAAAAAAcJZh/HRp1HUEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg/PpvAAAA///wjsrK") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x24, 0x24, 0x100, 0x2000, 0x25dfdbf8, {0x0, 0x0, 0x0, r3, {0x0, 0xffe0}, {0x0, 0xffff}, {0x0, 0xfff3}}}, 0x24}}, 0x20000004) r4 = socket$pppl2tp(0x18, 0x1, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x28}, 0x1c) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r5, 0x6, 0x2, 0x0, 0x0) r6 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r6, 0x2) r7 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r7, 0x2) r8 = open(&(0x7f0000000180)='.\x00', 0x10000, 0x0) flock(r8, 0x1) unlink(&(0x7f0000000000)='./file1\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='c\x17\xce\xe6]\xfa\xab\xec}\xc2r\f6\x8a\x9bmO\xf52P\nH') statx(r8, 0x0, 0x400, 0x2, &(0x7f00000007c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x408e, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@debug}, {@nobh}, {@stripe={'stripe', 0x3d, 0x4000}}, {@errors_remount}, {@minixdf}]}, 0x3, 0x43a, &(0x7f0000000340)="$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") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000500)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) writev(r4, 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x8) 31.957974329s ago: executing program 6 (id=18153): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x41, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) r3 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x2000) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x300, 0x0, 0x0, 0x0}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7088c60897d4a6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r9, @ANYRES32=r8, @ANYBLOB='&'], 0x10) sendmsg$inet(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000780)='}', 0x1}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r9}, &(0x7f0000000000), &(0x7f00000002c0)=r5}, 0x20) sendmsg$inet(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) recvmsg$unix(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000800)=""/229, 0x8ec1}], 0x1}, 0x2002) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r10, 0x0, 0x178}, 0x18) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000001, 0x31, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 30.894071826s ago: executing program 6 (id=18167): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000100)={[{@journal_checksum}, {@discard}]}, 0x1, 0x553, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x0) pwritev2(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x14a) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000003, 0x110, 0xffffffffffffffff, 0xb6f8000) getxattr(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="e64a7bf5bff03f8f5263e9060582b11e6889cfa80947151bba393805353e1e351b2ca295ce1326424e11fec6ee2c42b3e7944889ecc71ee56a50023788da5ac882f1a872b65c9abde0a788344a299f65711a887f6f30691031b5cf3b26c5a128a303ba63ccd342cf76"], 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) mlockall(0x7) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x8}, 0xc8101339d8526c63, 0x0, 0x8}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) lsm_set_self_attr(0x64, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) r3 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r3, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000100)="03", 0x1}], 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r3, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000300)='5', 0x1}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c"], 0x30}], 0x1, 0x0) getpgrp(0x0) lsm_get_self_attr(0x66, &(0x7f0000000380)={0x0, 0x0, 0x65, 0x45, ""/69}, &(0x7f00000000c0)=0x65, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40082, 0x2, @perf_bp={0x0, 0x1}, 0x1100, 0x5, 0x3a65, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xe, 0x0, &(0x7f0000000080)="259a53f271a76d2688ca4c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000720c47720000000000000000", @ANYRES32], &(0x7f0000000a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$packet(0x11, 0x3, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x800, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x48a, &(0x7f0000000000)={[{@jqfmt_vfsold}, {@grpjquota, 0x22}, {@errors_continue}, {@noload}, {@nombcache}, {@usrjquota, 0x22}, {@errors_continue}, {@nombcache}, {@barrier}]}, 0x1, 0x455, &(0x7f0000000d80)="$eJzs3MtvG1UXAPAzdpy+v+Qr5dHSQqAgKh5Jkz7ogk0RSCxAQoJFEauQplWo26AkSLSKIGURlqgSe8QSib+ADWWDgBUSW9gjpICyobAyGnsmdRPbeTlxqX8/aZJ7fce693jm2sd3bAfQtQbSP0nE3oj4JSL6atU7dxio/bu1ODv29+LsWBKVyht/JtX9/lqcHct3ze+3p1apVFr0O/92xGi5PD6V1YdmLr83NH312nMTl0cvjl8cvzJy5szJE0d6T4+cakuc+9KxHvpw8vDBV9668drYuRvv/PBVOt69WXt9HO0yUHt0G3qy3Z112L66ctLTwYGwLsWISA9XqTr/+6IYu5ba+uLljzs6OGBLVSqFyo7mzXMV4B6WJupAN8pf6NP3v/m2TanHXWHhbCytY9zKtlpLTxSyfUrZe6StMBAR5+b++TzdYovWIQAA6t08GxHPNsr/CvFA3X7/y64N9UfE/yNif0TcFxEHIuL+iOq+D0bEQ2vsN19lXn6FZGX+U+nbcHBrkOZ/L2TXtu7M//LsL/qLWW1fNf5ScmGiPH48e0yORWlHWh9u0ce3L/38abO2+vwv3dL+81wwG8fvPcsW6M6PzoxuJuZ6C9cjDvU0ij9ZynnT/PhgRBzaYB8TT395uFnb6vG30IakvPJFxFO14z8Xy+LPJU2vTw4/f3rk1NDOKI8fH8rPipV+/Gn+9ay3ZHnbpuJvg4Wbldjd8PxfGmp/sjNi+uq1S9XrtdPr72P+10+avqfZ6Pnfm7xZLfdmt30wOjMzNRzRm7y68vaR2/fN6/n+6fl/7Gjj+b8/bj8SD0dEehIfiYhHIuLRbOyPRcTjEXG0Rfzfv/jEu+uPv8WqfBul8f9RWuX4R/3xX3+heOm7r9cffy49/ierpWPZLWt5/ms1rutTmzmbAQAA4L+nUP0MfFIYXCoXCoODtc/wH4jdhfLk9MwzFybfv3K+9ln5/igV8pWuvrr10OFsbTivjyyrn8jWjT8r7qrWB8cmy+c7HTx0uT1N5n/qt2KnRwdsOd/Xgu5l/kP3Mv+he5n/0L3Mf+hejeb/Rx0YB7D9Vnn937Vd4wC2n/wfupf5D93L/Ieu1PRL8oVNfeVfoUOFb3o391sNay9E4S4J+Z4plKJhU0/LH7NoQ2FHw6ZOPzMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0x78BAAD//0k+5Mg=") creat(&(0x7f0000000440)='./file0\x00', 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) socket(0x10, 0x803, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 30.817318682s ago: executing program 6 (id=18169): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000001400)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xa4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) close_range(r2, 0xffffffffffffffff, 0x0) 30.804269353s ago: executing program 6 (id=18170): r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, 0x0, 0x0) unshare(0x2040400) r1 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r2, 0x20, &(0x7f0000000180)={&(0x7f00000004c0)=""/113, 0x71, 0x0, &(0x7f0000000c00)=""/4096, 0x1000}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xd, &(0x7f0000000640)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800a5dc0002007b86f8ff00000000bfa20000000000f706020000f8ffc78eb703000008002010b7040000000000008500000001000000957a18f6edf170a91f4587cf1efbd3e09e4fe2dcfe7eec528e425317d8e5749032114fabb4fd16109c55000000", @ANYRESDEC=r0, @ANYRESDEC=r2, @ANYRES32=r1], &(0x7f00000008c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x24, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sigaltstack(0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r2) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r5, &(0x7f0000000340)={0x1d, r6, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000380)={0x1d, r6}, 0x10, &(0x7f0000000600)={&(0x7f0000000a00)=ANY=[@ANYBLOB="0700000080000000ff00000000000000", @ANYRES64=r9, @ANYRES64=r10/1000+10000, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0400008001000000030000000200000070d5ac0f9f14b5d2c0eb61c728bbe9514fb192af26af1ee705fa97f611c747513ad0ca8ca76a2dbc3ba90b3a76f7fc9834991b15e6e530ee8fbd77978a7f64292547fc5d89fc18cc41f7ad65c4e03244612d68a540774f777543a00b2178519099f2a9a598249e47a3ae8040e17d8b244585287e77de91a12311c2eead5a971c95157949eeec5113a80a728842c18a082cac34b78e3455783fa6336c5b0a791b661b58fda4a531114a90d48c41d5e1e13db5393e2eb5730f3640e8be9a7a020e9e0c839c64b13443e3f312a20ed1b7630a72d630d6441e"], 0x48}}, 0x4000) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r12, 0x0, 0x7fff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r8}, &(0x7f0000000200), &(0x7f0000000240)=r11}, 0x20) sendmsg$NFT_BATCH(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a0102000000000000"], 0xe8}, 0x1, 0x0, 0x0, 0x40040000}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x74, r6, {0xfffd, 0xffeb}, {0x1, 0x1}, {0xfff2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x4004850) 14.529891488s ago: executing program 34 (id=18170): r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, 0x0, 0x0) unshare(0x2040400) r1 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r2, 0x20, &(0x7f0000000180)={&(0x7f00000004c0)=""/113, 0x71, 0x0, &(0x7f0000000c00)=""/4096, 0x1000}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xd, &(0x7f0000000640)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800a5dc0002007b86f8ff00000000bfa20000000000f706020000f8ffc78eb703000008002010b7040000000000008500000001000000957a18f6edf170a91f4587cf1efbd3e09e4fe2dcfe7eec528e425317d8e5749032114fabb4fd16109c55000000", @ANYRESDEC=r0, @ANYRESDEC=r2, @ANYRES32=r1], &(0x7f00000008c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x24, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sigaltstack(0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r2) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r5, &(0x7f0000000340)={0x1d, r6, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000380)={0x1d, r6}, 0x10, &(0x7f0000000600)={&(0x7f0000000a00)=ANY=[@ANYBLOB="0700000080000000ff00000000000000", @ANYRES64=r9, @ANYRES64=r10/1000+10000, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0400008001000000030000000200000070d5ac0f9f14b5d2c0eb61c728bbe9514fb192af26af1ee705fa97f611c747513ad0ca8ca76a2dbc3ba90b3a76f7fc9834991b15e6e530ee8fbd77978a7f64292547fc5d89fc18cc41f7ad65c4e03244612d68a540774f777543a00b2178519099f2a9a598249e47a3ae8040e17d8b244585287e77de91a12311c2eead5a971c95157949eeec5113a80a728842c18a082cac34b78e3455783fa6336c5b0a791b661b58fda4a531114a90d48c41d5e1e13db5393e2eb5730f3640e8be9a7a020e9e0c839c64b13443e3f312a20ed1b7630a72d630d6441e"], 0x48}}, 0x4000) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r12, 0x0, 0x7fff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r8}, &(0x7f0000000200), &(0x7f0000000240)=r11}, 0x20) sendmsg$NFT_BATCH(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a0102000000000000"], 0xe8}, 0x1, 0x0, 0x0, 0x40040000}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x74, r6, {0xfffd, 0xffeb}, {0x1, 0x1}, {0xfff2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x4004850) 5.421581419s ago: executing program 4 (id=18467): socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x80, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_wakeup_irq', 0x0, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge0\x00'}) socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002, 0x6, @rand_addr, 0x5}, 0x1c) sendto$inet6(r2, 0x0, 0x91, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x3, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x406f413, 0x0) 4.505910364s ago: executing program 4 (id=18478): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa2, 0xa2, 0x3, [@datasec={0x3, 0x4, 0x0, 0xf, 0x2, [{0x4, 0x5, 0x8}, {0x1, 0x7, 0xfffffffa}, {0x4, 0x5, 0x5}, {0x1, 0x9, 0x712}], "158e"}, @struct={0x8, 0x3, 0x0, 0x4, 0x1, 0x0, [{0xb, 0x3, 0xfffffff2}, {0x6, 0x0, 0x6}, {0x5, 0x0, 0x7f}]}, @type_tag={0x5, 0x0, 0x0, 0x12, 0x4}, @struct={0xe, 0x1, 0x0, 0x4, 0x1, 0x87d, [{0x10, 0x4, 0x9}]}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x12, 0x0, 0x34}]}, {0x0, [0x30]}}, &(0x7f00000003c0)=""/160, 0xbf, 0xa0, 0x0, 0x526}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000ffffff7f000000000700000018110000", @ANYRES32=r0, @ANYBLOB="00000000000003000000000000000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000d7b70000ffffffffbf91000000000000b7020000010000008500000084000000b7000000000000009500000000000020"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f0000000080)=ANY=[], 0x0, 0x702, &(0x7f0000001140)="$eJzs3V2P21gZB/D/STJJJoWqAlStqm7ndMpKUzGkTmabKipIGOckY0jiyPbAjIS0KnRmNWqmQFskmpt2bniRli/A3d5wwYdYiQuu9lvAFUgrEBJiBUJGPrbzMnEykzbtbNn/b7Qbx358/Phl/axn7GMQERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERhNUwjIpA2+7u7MrZrIbrdJIvWUxNj1pbwc1o4Oa8Za6EywVE+A+KRbwVjX7rK6OQy+G/1nE1+nYVxfCjiMGFy5fufjmXSeafk/CLwKINPn46eHCv399/dIbYLBZu/jwhc4agluranmN3zJaStufIeq1m3NpuerJpt5W35/mqIy1XZXzHlRvWTVmp17ekKu85O91Ww2yrZOSdr1cNoya/U4h2NICyZ23b7bbdbemYcHIYc0d+8IMoQJkdKQ8O+/tbY/k8S9vGYVAlJfnMeHAYVD1tdatGtVqpVKuV2u367TuGkZsaYYSEMYSpiKUftPSGWe4JnOglZKzGf4w/CaCNIrrYwS5k6o+FBlw46MyYHkvq/zu31Nzljtf/pMqvjCZfga7/16Jv12bV/xm5SEg9Q9oUMWP8Yj8rOiOJx3iKAR7gHvroYx+PltC2hFx76RbyRrwll5LPzJ8WFLqw4cGBjQ5MtPBFyHiMRB011GDgPWyjCQ8STdhoQ8HDHjz4UOERlQ8zVTDhw4ELiQ1YuAmJCuqoYwsSCmXswcEOumihARP/CoLgAId6u2/F+TxPWWskQZUZK1FALjnu9lGds7az6v8Pn0Vzx/XfYP3/vIqOg0L08fG8GKLPgCC+/l/Q2qvJhoiIiIiIiIheBaF/+y70X+XfBhCgabeVMRFTOLfsiIiIiIiIiGgZBIICrkJEd+XjbYjp638iIiIiIiIierMJ/YydAFDSN/WL0eNSZ/klQPY1pEhEREREREREL0k/+X8tDwT6Lv81iIWu/4mIiIiIiIjoDfCrsT72c9m4j90g+bN+BsDanwvio78V4K6I497uV8WRGU4xj+KYqTsA/OYVcTHuqFd/5AHob5a6KuKlSeCfyW8fQp8cpPf1/zyICCHcEwnks+MNzEhAhEuu5eJv+ADXo1mux/3M3x9koKdEPQqXmnZblS2nfbcC07yY8dWu/7OHhz8H3OF6Hhz298s/+nH/vs7lOBx1fBQ2+mwinUz6xhjl8kT3t6CfuUjr3XgVzWSRv+52SkIv10jWPwvzKDO+oHk7oLYKRGv5C6xH+2w9iGJLg2GP+wJY050/VMp6l02svbsiRllUTq552o6YseZFncWNKObGxo3oI9kmYTsZUfxaFqiWp/fBRBbV8SxO3xbi7ye2//wsIIrhttgKs/hD2NCJLL7/UTTzVm836R7jLFlMHQVEROflYFSFdCfmU33sJ+UhOamdve4gB8RnuRnVfbSUIK4fSXV/8tsgqlBZIBf/bSJ9KUldQXhG3xC6nXzUoXvuSsoZ3Sh/GgSBebGI8TP6f4MgWSFjgep2HATByTP670fvQIrTnsri30EQ3K3oSvKbE1X1w3CGD2cu12tXsyiigCdHP9Ed4Ife339//2G1ulUz3jWM21Ws6P9ViD+yYO0hIqIpp79jR0dk5kSId3E9auP6/b++Ew1NVLwvxbcUaLeAPu5jM3mFwFp6qyUc4Jv/iG5D2IyuWoH1UvRZGsjLl+6GV7XD2EOR02942Zx5VadraRSrb2+oDmOT9w6dvAIcxW694r1ARET0eq3PqMPARP3HZP0vTtT/TWxEERtXUq+7S2O3FG4mV8fDS/rBhePU2MrpyX9ryRuDiIjoc0K5n4iS/0vhunbvvUq9XjH9bSVdx/qudO1GS0m76yvX2ja7LSV7ruM7ltOWPRcFe1V50tvp9RzXl03HlT3Hs3f1m99l/Op3T3XMrm9bXq+tTE9Jy+n6puXLhu1Zsrfz7bbtbStXz+z1lGU3bcv0bacrPWfHtVRZSk+psUC7obq+3bTDwa7suXbHdPfk95z2TkfJhvIs1+75TtRgsiy723Tcjm62jGDhFx0SERH9P3r8dPDgXr+//+jkwGp4aR6NOcaMmOmBfEqD7COIiIjoM2ZUrheYqfgKEyIiIiIiIiIiIiIiIiIiIiIiIiIiIiIioimnP9K34MBK2sOCwHDMTy/GY/Aco0cMp9oReNl8PnX/qDv2e5HZM4suNHkkYvDg4znBq8MxyeYfjzleZKG4BLzw9vnLF4ALegyiMbklHgDTz48uq+Wkx+LUmG8cRBNnza4npk4qDPdFbvn/OYQDD383PUmEaxEEQTB/9sLkNsyf/XgON9aj/JxdsHrK8fM6z0JEdB7+FwAA//9NXDc5") r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x160b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x6c}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000800)='ufshcd_uic_command\x00', r3, 0x0, 0xffff}, 0x18) futimesat(r2, &(0x7f0000000000)='./file1\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000340)=ANY=[@ANYRESDEC=r5, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r6, 0x0, 0x5}, 0x18) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000050000000000000000000024000a20000000000a1f000000000000000000010000000900010073797a300000000058000000030a0104000000000000000001000000090003803d2175fbe782c2002c00048008000240172af2e40800014000000003080002401c791e7108000240423930ce08000140000000030900010073797a300000000088000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000004c00048048000180080001"], 0x122}}, 0x4008090) 4.445021339s ago: executing program 4 (id=18481): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c00000000000000000000181100", @ANYRES16=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) semtimedop(0x0, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = socket(0x400000000010, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='kfree\x00', 0xffffffffffffffff, 0x0, 0x8000000000}, 0x18) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000002a00)=@newtfilter={0x30, 0x2c, 0xd27, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r7, {0x9, 0x9}, {}, {0xc, 0xe}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x20000880) 3.461545739s ago: executing program 7 (id=18501): bpf$MAP_CREATE(0x0, 0x0, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000001000)=ANY=[@ANYBLOB], 0x0, 0x28}, 0x28) r0 = msgget$private(0x0, 0x790) msgsnd(r0, &(0x7f0000000d00)=ANY=[@ANYRES8], 0x401, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') pread64(r1, &(0x7f0000000580)=""/150, 0x8f, 0x4c00) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000280)={0x6, &(0x7f0000000100)=[{0x1, 0x4, 0x9, 0x2}, {0x20, 0x2, 0xd1, 0xbe}, {0x80, 0x2, 0xd, 0x3}, {0xfffd, 0x7, 0x9, 0x7d}, {0x2, 0x3, 0xff, 0x4}, {0x196, 0xc7, 0xfd, 0xf}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) msgctl$IPC_RMID(r0, 0x0) close(0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x1}], 0x1, 0x0, 0x0, 0x4e) 3.424363962s ago: executing program 2 (id=18503): bpf$MAP_CREATE(0x0, 0x0, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0x1000000000000}, 0x18) r1 = msgget$private(0x0, 0x790) msgsnd(r1, &(0x7f0000000d00)=ANY=[@ANYRES8], 0x401, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') pread64(r2, &(0x7f0000000580)=""/150, 0x8f, 0x4c00) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000280)={0x6, &(0x7f0000000100)=[{0x1, 0x4, 0x9, 0x2}, {0x20, 0x2, 0xd1, 0xbe}, {0x80, 0x2, 0xd, 0x3}, {0xfffd, 0x7, 0x9, 0x7d}, {0x2, 0x3, 0xff, 0x4}, {0x196, 0xc7, 0xfd, 0xf}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r3, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x2) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) msgctl$IPC_RMID(r1, 0x0) close(0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x1}], 0x1, 0x0, 0x0, 0x4e) 2.810367562s ago: executing program 5 (id=18513): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @empty, 0x3}], 0x1c) sendto$inet6(r0, &(0x7f00000003c0)="bb918b", 0x3, 0x40040, &(0x7f0000000000)={0xa, 0x4e24, 0x7ff, @local, 0x3}, 0x1c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r2}, 0x10) sendmsg$inet6(r0, &(0x7f0000000800)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @loopback, 0x4}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000000c0)="88", 0x1}], 0x1}, 0x4048043) 2.799164843s ago: executing program 5 (id=18514): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb8500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xfffffffeffffffff, 0x2}, 0x0, 0x10000, 0x0, 0xa, 0x9, 0x5, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r1) syz_usb_connect$cdc_ncm(0x6, 0xf3, &(0x7f0000000840)=ANY=[@ANYBLOB="12011001020000402505a1a44000010203010902e10002011120050904000001020d000009240600014812987e052400df050d240f0101000000000003000580241a0104146e2413ee518feaf0692c135da9476dc0a5eef1567e69a81e949fcd31f4f7d3c3b4a03d43334ecee80f3f7f40ef9a41d4cc2b43f7aa3d305c6fc21a75f803abf2a9fa26b1f5b65555"], 0x0) ioctl$EVIOCRMFF(r1, 0x41015500, &(0x7f0000000500)) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000080)={0x0, 0x3000000, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="387ed7626d850509a2d6c1aa38f15cd00f85c263cb226db671261fff7ce9c555f189afae3530db6dd493f28fd988721b9ae21b3e3b4523ae2594f47d8f62b480c4160b1f90ac9c41fae6ab12ac4c113fef588684ef495689092883b902a41cd75387ef6f7bc7d460d5e665f398ff95596dc94ec97003a3db08e500c2fb07e11aa4031a61c51caf7a65a2b613bda33f3eaeae635d7cd81761e74c38a7695800a15516eb337056e02335f9a7d10aa2eaf7beb7e1f7a1e850ecb3421143c5c4ded0f083a0c524dcf320827266819b6a952db5bc96141b26c54db857edbcbbc81c7af7aadf50bc549974b6401a19cdb130282b955592efa94242065a4c8d695a2cdd9ada350defd58c775b92d348305774d3a256c7520b285d8da0dbf5e20d604413ed2ddf9bcbf881caf811852806175d63892a15234fbcd7a88a2a0aea45d19148f0e7dada7d6d0d77881387fdeaa02863be90b88dfff412bff40c31c6415c54ae3335e54a49d315851feffe30d999c36def4df7df747695ef060000001bbe1b649f42f310859122c0d2c1e558dc6586958a28374f386ecf369274e43003a09b5159ea515eb44521901ef0d00baa91c10a8e44a76aac3468a15bd3d45ad389977467f306f9bcde071b30769795eed2f1580414d168f557cd90040c4bd2a3d6bc509254a12cece59181fcb5bad8c24bd9f8f78d17ab01831325501e80d899e9252f99d3a2666343392fda115048e4f4dd9f45657f8224fc78eb1168fe0527fac33466aadf48f16994d29a47778566e0f3945b2bf36b6eecc7fa18914beb66ac9e519bd3330000000000000009a3237aebbe3bed781e39d5a0fb0cdc60e196f2261305feb596b5b66ab89d2d6333f699b16db68986ab3eee7b199fefb5f79ffb2d1050e46982af1c14a88dd9b647ba812f56a8404755c73e74bb90e64bab9647c70ed5afca1c3d87907d14df8aa9df6f40a80ace2bb8a2aad3b0c66915927db4173181943d88c0c76d5969e2043db5bd77fd60ba0f012139929ccfec965c1f769785a4d23332d71f0875e3146afef5b20cc306d3ecee65944fe9829e0ad0c3f6bb2fdc1bc31152538db50f47dc38ba908a0d808687e478a609fe0daa0000000000000000e7f2e98597e27f3e1dba9c3c16e9fab3bda6ed33cb1c75513e2264b69d4794ded98eff9aa53d22eb77c9d93169c04ab2490bf28106f770e07eb7a9e8fd4e71929f918b98c4cbfcb11a90139264a9ee807c973167f493760278df0cc34be9e8f86f948d9a62e63ad6ca9d174d2465380b1a00ddc42915e4f3a5db640600000095a3d63904c9ecd1c313c08e29b814bd8fed1ab6d2846c73345962895d289ac77152cac2e04c93a5470774975b42091f218dd1e68a15f8226577bf9481ae0555db64a717eb23a811356d00000000ddffffff00"}) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)=@newtclass={0x2c, 0x28, 0x2, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x1, 0x2}, {0x1}, {0xfff3, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x4, 0xb}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040840}, 0x20000000) keyctl$search(0xa, r2, &(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0) 2.525278355s ago: executing program 7 (id=18515): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010471bc30b0000000010000", @ANYRES32=0x0, @ANYBLOB="fff00000000000002c0012800e00010069703667726574617000000018000280140007002001001000000000000000000000000208000a00f0"], 0x54}}, 0x40000084) 2.497798347s ago: executing program 7 (id=18516): r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000340), 0x1, 0x55e, &(0x7f0000001ac0)="$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") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x24, 0x24, 0x100, 0x2000, 0x25dfdbf8, {0x0, 0x0, 0x0, r3, {0x0, 0xffe0}, {0x0, 0xffff}, {0x0, 0xfff3}}}, 0x24}}, 0x20000004) r4 = socket$pppl2tp(0x18, 0x1, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x28}, 0x1c) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r5, 0x6, 0x2, 0x0, 0x0) r6 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r6, 0x2) r7 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r7, 0x2) r8 = open(&(0x7f0000000180)='.\x00', 0x10000, 0x0) flock(r8, 0x1) unlink(&(0x7f0000000000)='./file1\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) statx(r8, 0x0, 0x400, 0x2, &(0x7f00000007c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x408e, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@debug}, {@nobh}, {@stripe={'stripe', 0x3d, 0x4000}}, {@errors_remount}, {@minixdf}]}, 0x3, 0x43a, &(0x7f0000000340)="$eJzs28tvG0UYAPBv13FKXySU8ugDCBRExCNp0gI9cAGBxAEkJDiUY0jSqtRtUBMkWlUQECpHVIk74ojEX8AJLgg4IXGFO6pUoVxaOBmtvZs4jp0mwY5L/ftJm8zsjjPzeXbs2Z1sAH1rJPuRROyJiN8jYqieXV1gpP7r5tLl6b+XLk8nUa2+9VdSK3dj6fJ0UbR43e48M5pGpJ8lcahFvfMXL52dqlRmL+T58YVz74/PX7z07JlzU6dnT8+enzxx4vixiReen3yuI3Fmbbpx8KO5wwdee+fqG9Mnr77787dJEX9THB0yst7BJ6rVDlfXW3sb0slADxvCppQiIuuucm38D0UpVjpvKF79tKeNA7qqWq1Wd7c/vFgF7mBJbLTk2fzzArgzFF/02fVvsW3T1OO2cP2l+gVQFvfNfKsfGYg0L1Nuur7tpJGIOLn4z1fZFt25DwEAsMr32fznmVbzvzTubyh3d742NBwR90TEvoi4NyL2R8R9EbWyD0TEg5usv3mRZO38J722pcA2KJv/vZivba2e/xWzvxgu5bm9tfjLyakzldmj+XsyGuUdWX5inTp+eOW3L9oda5z/ZVtWfzEXzNtxbWDH6tfMTC1M/ZeYG13/JOLgQKv4k+WVgCQiDkTEwS3Wceapbw63O9Yu/vJG/nAH1pmqX0c8We//xWiKv5Csvz45fldUZo+OF2fFWr/8euXNdvXfuv+7K+v/XS3P/+X4h5PG9dr5zddx5Y/P217TbPX8H0zerqUH830fTi0sXJiIGExerze6cf/kymuLfFE+i3/0SOvxvy9W3olDEZGdxA9FxMMR8Uje9kcj4rGIOLJO/D+9/Ph7W4+/u7L4ZzbV/yuJwWje0zpROvvjd6sqHd5M/Fn/H6+lRvM9G/n820i7tnY2AwAAwP9PGhF7IknHltNpOjZW/3/5/bErrczNLzx9au6D8zP1ZwSGo5wWd7qGGu6HTuSX9UV+sil/LL9v/GVpZy0/Nj1Xmel18NDndrcZ/5k/S71uHdB1nteC/mX8Q/8y/qF/Gf/Qv1qM/529aAew/Vp9/3/cg3YA269p/Fv2gz7i+h/6l/EP/cv4h740vzNu/ZC8hMSaRKS3RTMkupTo9ScTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAZ/wbAAD//9E940M=") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000500)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) writev(r4, 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x8) 2.455449911s ago: executing program 2 (id=18517): syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaa4e1daaaa86dd606410a600080000fe800000000000000000000000000000ff0200000000000000000000000000010000f5"], 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000020000000000000000085000000ae00000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x1000}, 0x18) r1 = socket(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000540)={'vcan0\x00', 0x46dc, 0x2}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f00000044c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f0000000100)={0x64, r5, 0x405, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r6}, {0x48, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000401}, 0x4040084) 2.375772157s ago: executing program 2 (id=18518): bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, &(0x7f00000003c0)) socket(0x2, 0x80805, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000300240248ff050005001200", 0x2e}], 0x1}, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffb000/0x4000)=nil) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) listen(r2, 0xfd) socket$inet_mptcp(0x2, 0x1, 0x106) accept(r2, 0x0, 0x0) 1.963896031s ago: executing program 5 (id=18520): r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) lstat(&(0x7f0000000740)='./file1\x00', &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000480)='kmem_cache_free\x00', r3}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) openat(0xffffffffffffff9c, 0x0, 0x105042, 0x40) rt_sigtimedwait(0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x90) write$cgroup_int(r5, &(0x7f0000000300)=0x4078c1d5, 0x12) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) syz_emit_ethernet(0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x291, &(0x7f0000000280)="$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") r9 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/cgroup.procs\x00', 0x20002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x800, 0x10}, 0xc) syz_clone3(&(0x7f0000004300)={0x200000000, 0x0, 0x0, 0x0, {0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, {r9}}, 0x58) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r10, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000280)='./file0\x00', &(0x7f0000000240)=[0x7], 0x0, 0x0, 0x1}}, 0x40) 1.926181824s ago: executing program 0 (id=18521): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1088d8b8588d72ec29c48f0af5f2d9f51c4b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465ad32b77a74e802a0dc6bf25cca242bc6099ad2300000480006ef6c1ff0900000000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767042361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b6c7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae645ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48fc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1fb8f72cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa7956488bef241875f3b4b6ab7929a57affe760e797724f4fce1093b62d7e8c7123d890decacec55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f870b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f154772f514216bdf57d2a40d40b51ab67903ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1594e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214d00000000d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c471c784ae7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec30cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd63bed8d31c31c37a373d4efd89f0000377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f0059161c5e0000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe34124172e436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fa03b84f63e022fe755f4007a4a899eaf52c4f491d8e97c862e29e457060000007ac691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104ebc1581848f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c716357d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c24936615ee68538e8fddd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426ca85e82ccf821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ad6acf5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba1c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63c41cbde2ba66ad81168070c8c6e18a6e452a31bdc4a60d637545ed4c8a1c649c3ce54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c5140200000054d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c7340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a3bc38613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f14eafe4b28ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1bfeef448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae0040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483f02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e9180100000000000000654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732e74dd690c57bdfdc1f069f9491bca7a8c59363799be70018c25ece5ad7307dc7a95c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272ab28a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece98c077b358e752b439132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae2676384ff799783f55d7e5a1a092a01b965dc99cb7a9d98440c355927629f2bcf9dc2396eb2f5d25829715b24327642ac48f1201014a95e0e65e12cdf27e19043e3c5d3e798375cead35b9a93190a52cdecaaccc854a1d41ef365303f0e9b4fc969c9dab6df5e8a795b140fcc09e8a7b694d12932917facd8ceaa4e2d0d16bb0b95387fcd5ff136d8abddf94daf442bbff744591931872a36cf921ad69f2127386e8b0f9afee4da8d3fbec809fbb3ca0fded2859cf25d4c6155d396c5b9bd1a928923123f63f4c40688eae69990a9419456247bbaeb7948de84d2ff875414883bb1e503d4bfebc01bc12a53ea06bf38e571157bd642dac25dbee7832c58378374a39483d6721eec96c28911db21c0c006b42afc90000000000000000000000700000000000000000008ce4ea442c1a207108b35511186c5e860278f6463f52f3990ce08b1bfccc3cff4b5ae27b610aa9ba11b47d4f94c439e055cdbb2b12c983885c93ea4ab4ca1e02d831ae162ee104"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff27}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000042000501"], 0x14}, 0x1, 0x0, 0x0, 0x68840}, 0x4) recvmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000004c0)=""/4091, 0xffb}], 0x1}}], 0x1, 0x2, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002d000b12d25a80648c2594f90124fc60100c02", 0x17}], 0x1}, 0x0) 1.886398987s ago: executing program 0 (id=18522): bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, &(0x7f00000003c0)) socket(0x2, 0x80805, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000300240248ff050005001200", 0x2e}], 0x1}, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffb000/0x4000)=nil) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) listen(r2, 0xfd) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) accept(r2, 0x0, 0x0) 1.861678039s ago: executing program 5 (id=18523): r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) lstat(&(0x7f0000000740)='./file1\x00', &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000480)='kmem_cache_free\x00', r3}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) openat(0xffffffffffffff9c, 0x0, 0x105042, 0x40) rt_sigtimedwait(0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x90) write$cgroup_int(r5, &(0x7f0000000300)=0x4078c1d5, 0x12) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) syz_emit_ethernet(0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x291, &(0x7f0000000280)="$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") r9 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/cgroup.procs\x00', 0x20002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x800, 0x10}, 0xc) syz_clone3(&(0x7f0000004300)={0x200000000, 0x0, 0x0, 0x0, {0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, {r9}}, 0x58) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r10, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000280)='./file0\x00', &(0x7f0000000240)=[0x7], 0x0, 0x0, 0x1}}, 0x40) 1.85003431s ago: executing program 0 (id=18524): r0 = socket$pppl2tp(0x18, 0x1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="00000000000057b6b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000f40)=""/4083, 0x0, 0xff32, 0x1, 0x1}, 0x28) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x34}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x4, 0x5}, 0x0, 0x10000, 0x8, 0x1, 0x9, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x2) munmap(&(0x7f0000001000/0x4000)=nil, 0x4000) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r3) syz_usb_connect(0x4, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$EVIOCRMFF(r3, 0x40095505, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f0000002380)=""/169, 0xa9}], 0x1, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000d00)=ANY=[@ANYRES8], 0x401, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0x78, 0x2, 0x7, 0x401, 0x0, 0x0, {0xb, 0x0, 0x8}, [@NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1000}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xd}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x692}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x3}]}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x40040) connect$pppl2tp(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r6, 0x8, 0x0, 0x2, 0x0, {0xa, 0x0, 0xf9d, @private2={0xfc, 0x2, '\x00', 0x1}}}}, 0x32) r7 = socket(0x400000000010, 0x3, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r9, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x3, 0x8}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001cc0)=@newtfilter={0x78, 0x2c, 0xd27, 0x70bd28, 0x6000000, {0x0, 0x0, 0x0, r9, {0x0, 0xfff1}, {}, {0x7, 0xe}}, [@filter_kind_options=@f_fw={{0x7}, {0x44, 0x2, [@TCA_FW_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x17000000, 0x5, 0x9, 0x5, 0x1c0000, {0x3, 0x2, 0x2, 0x0, 0x5, 0x8}, {0x8, 0x0, 0x1, 0x5, 0x7}, 0x8, 0x9, 0x3}}]}]}}, @TCA_RATE={0x6, 0x5, {0x11, 0x8}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) lsm_set_self_attr(0x65, &(0x7f0000000340)={0x69, 0x1, 0x107, 0xe7, "407cc41dd235ed366bbdaf0eaa5e1415b03a70ebca049ca7f083e3a791b27c1354946b05f7cb09509afc90fed782fac24013a67512fe70ac5b93be3abc9e42d7e566d0cdf32bf717b3dcd3c3409a918f744bf44db36c7668227a64e8cf4287b2c29493ceacb9d8f23d064c47487c7b29a11e770b4f868d61d4d3f1ef46acfcde991a39a003849bb7671e8eba0457c1b5fc3e20cbcdd586b2ebdfb219192f1f02a3e5e2a69a2037739011b620ff368b1a97872fe29f1857cbc16445bbdd651323dd094ec78f0a35f77392b8d5dbb87683e6ead78a431db4ab72cf7a1a55d1db340a23acc5af6e1b"}, 0x107, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34060}], 0x1) 1.771814097s ago: executing program 5 (id=18525): socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x1c, r4, 0x200, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x24010040) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r1, 0x2, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) socket$rds(0x15, 0x5, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000000071041d000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) fsopen(&(0x7f00000000c0)='hugetlbfs\x00', 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000080)) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) 1.454955272s ago: executing program 7 (id=18526): bpf$MAP_CREATE(0x0, 0x0, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000001000)=ANY=[@ANYBLOB], 0x0, 0x28}, 0x28) r0 = msgget$private(0x0, 0x790) msgsnd(r0, &(0x7f0000000d00)=ANY=[@ANYRES8], 0x401, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') pread64(r1, &(0x7f0000000580)=""/150, 0x8f, 0x4c00) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000280)={0x6, &(0x7f0000000100)=[{0x1, 0x4, 0x9, 0x2}, {0x20, 0x2, 0xd1, 0xbe}, {0x80, 0x2, 0xd, 0x3}, {0xfffd, 0x7, 0x9, 0x7d}, {0x2, 0x3, 0xff, 0x4}, {0x196, 0xc7, 0xfd, 0xf}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) msgctl$IPC_RMID(r0, 0x0) close(0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x1}], 0x1, 0x0, 0x0, 0x4e) 1.432313984s ago: executing program 2 (id=18527): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000002c0)=0x1) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000180)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) r2 = syz_io_uring_setup(0x88e, &(0x7f0000000200)={0x0, 0xfa61, 0x400, 0x3, 0x3b9}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) unshare(0x20040600) r5 = timerfd_create(0x0, 0x0) timerfd_gettime(r5, &(0x7f0000000040)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='sched_switch\x00', r6, 0x0, 0x3}, 0x18) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0x100, 0x9, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000), &(0x7f00000002c0), 0x8, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000003"], 0x0, 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x3, r7}, 0x38) kexec_load(0x3e00, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0xff600000, 0x1000000}], 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) poll(&(0x7f0000000040)=[{r2, 0x60f0}], 0x1, 0xf01) io_uring_enter(r2, 0x47f6, 0x0, 0x2, 0x0, 0x0) 1.431717404s ago: executing program 5 (id=18528): r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000340), 0x1, 0x55e, &(0x7f0000001ac0)="$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") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x24, 0x24, 0x100, 0x2000, 0x25dfdbf8, {0x0, 0x0, 0x0, r3, {0x0, 0xffe0}, {0x0, 0xffff}, {0x0, 0xfff3}}}, 0x24}}, 0x20000004) r4 = socket$pppl2tp(0x18, 0x1, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x28}, 0x1c) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r5, 0x6, 0x2, 0x0, 0x0) r6 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r6, 0x2) r7 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r7, 0x2) r8 = open(&(0x7f0000000180)='.\x00', 0x10000, 0x0) flock(r8, 0x1) unlink(&(0x7f0000000000)='./file1\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='c\x17\xce\xe6]\xfa\xab\xec}\xc2r\f6\x8a\x9bmO\xf52P\nH') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x408e, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@debug}, {@nobh}, {@stripe={'stripe', 0x3d, 0x4000}}, {@errors_remount}, {@minixdf}]}, 0x3, 0x43a, &(0x7f0000000340)="$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") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) flock(r8, 0x2) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000500)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) writev(r4, 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x8) 1.148278967s ago: executing program 4 (id=18529): bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, &(0x7f00000003c0)) socket(0x2, 0x80805, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000300240248ff050005001200", 0x2e}], 0x1}, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffb000/0x4000)=nil) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r3, &(0x7f00000000c0)="1c", 0x10002, 0x0, 0x0, 0x0) 1.12049003s ago: executing program 4 (id=18530): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb8500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xfffffffeffffffff, 0x2}, 0x0, 0x10000, 0x0, 0xa, 0x9, 0x5, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r1) syz_usb_connect$cdc_ncm(0x6, 0xf3, &(0x7f0000000840)=ANY=[@ANYBLOB="12011001020000402505a1a44000010203010902e10002011120050904000001020d000009240600014812987e052400df050d240f0101000000000003000580241a0104146e2413ee518feaf0692c135da9476dc0a5eef1567e69a81e949fcd31f4f7d3c3b4a03d43334ecee80f3f7f40ef9a41d4cc2b43f7aa3d305c6fc21a75f803abf2a9fa26b1f5b65555"], 0x0) ioctl$EVIOCRMFF(r1, 0x41015500, &(0x7f0000000500)) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000080)={0x0, 0x3000000, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="387ed7626d850509a2d6c1aa38f15cd00f85c263cb226db671261fff7ce9c555f189afae3530db6dd493f28fd988721b9ae21b3e3b4523ae2594f47d8f62b480c4160b1f90ac9c41fae6ab12ac4c113fef588684ef495689092883b902a41cd75387ef6f7bc7d460d5e665f398ff95596dc94ec97003a3db08e500c2fb07e11aa4031a61c51caf7a65a2b613bda33f3eaeae635d7cd81761e74c38a7695800a15516eb337056e02335f9a7d10aa2eaf7beb7e1f7a1e850ecb3421143c5c4ded0f083a0c524dcf320827266819b6a952db5bc96141b26c54db857edbcbbc81c7af7aadf50bc549974b6401a19cdb130282b955592efa94242065a4c8d695a2cdd9ada350defd58c775b92d348305774d3a256c7520b285d8da0dbf5e20d604413ed2ddf9bcbf881caf811852806175d63892a15234fbcd7a88a2a0aea45d19148f0e7dada7d6d0d77881387fdeaa02863be90b88dfff412bff40c31c6415c54ae3335e54a49d315851feffe30d999c36def4df7df747695ef060000001bbe1b649f42f310859122c0d2c1e558dc6586958a28374f386ecf369274e43003a09b5159ea515eb44521901ef0d00baa91c10a8e44a76aac3468a15bd3d45ad389977467f306f9bcde071b30769795eed2f1580414d168f557cd90040c4bd2a3d6bc509254a12cece59181fcb5bad8c24bd9f8f78d17ab01831325501e80d899e9252f99d3a2666343392fda115048e4f4dd9f45657f8224fc78eb1168fe0527fac33466aadf48f16994d29a47778566e0f3945b2bf36b6eecc7fa18914beb66ac9e519bd3330000000000000009a3237aebbe3bed781e39d5a0fb0cdc60e196f2261305feb596b5b66ab89d2d6333f699b16db68986ab3eee7b199fefb5f79ffb2d1050e46982af1c14a88dd9b647ba812f56a8404755c73e74bb90e64bab9647c70ed5afca1c3d87907d14df8aa9df6f40a80ace2bb8a2aad3b0c66915927db4173181943d88c0c76d5969e2043db5bd77fd60ba0f012139929ccfec965c1f769785a4d23332d71f0875e3146afef5b20cc306d3ecee65944fe9829e0ad0c3f6bb2fdc1bc31152538db50f47dc38ba908a0d808687e478a609fe0daa0000000000000000e7f2e98597e27f3e1dba9c3c16e9fab3bda6ed33cb1c75513e2264b69d4794ded98eff9aa53d22eb77c9d93169c04ab2490bf28106f770e07eb7a9e8fd4e71929f918b98c4cbfcb11a90139264a9ee807c973167f493760278df0cc34be9e8f86f948d9a62e63ad6ca9d174d2465380b1a00ddc42915e4f3a5db640600000095a3d63904c9ecd1c313c08e29b814bd8fed1ab6d2846c73345962895d289ac77152cac2e04c93a5470774975b42091f218dd1e68a15f8226577bf9481ae0555db64a717eb23a811356d00000000ddffffff00"}) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)=@newtclass={0x2c, 0x28, 0x2, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x1, 0x2}, {0x1}, {0xfff3, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x4, 0xb}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040840}, 0x20000000) keyctl$search(0xa, r2, &(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0) 957.759242ms ago: executing program 0 (id=18531): r0 = syz_io_uring_setup(0x497, &(0x7f0000000400)={0x0, 0x3f73, 0x100, 0x0, 0x4b}, &(0x7f0000000340)=0x0, &(0x7f0000000600)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000040)={&(0x7f0000001000)={[{0x0, 0xffffffffffffff3a, 0x3, 0xf4}]}, 0x1, 0x1}, 0x1) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x10, r3, 0x0, 0x0, 0x0, 0x262, 0x1, {0x1}}) io_uring_enter(r0, 0x3516, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x20008885) r4 = socket(0x10, 0x803, 0x0) process_vm_writev(0x0, &(0x7f0000000a80)=[{&(0x7f00000000c0)=""/45, 0x2d}, {&(0x7f00000006c0)=""/127, 0x7f}, {&(0x7f0000000780)=""/120, 0x78}, {&(0x7f0000000800)=""/79, 0x4f}, {&(0x7f0000000880)=""/165, 0xa5}, {&(0x7f0000000a00)=""/108, 0x6c}, {&(0x7f0000002000)=""/4096, 0x1000}], 0x7, &(0x7f0000000100)=[{&(0x7f0000000b00)=""/227, 0xe3}, {&(0x7f0000000c00)=""/103, 0x67}, {&(0x7f0000000c80)=""/119, 0x77}, {&(0x7f0000000d00)=""/92, 0x5c}], 0x4, 0x0) sendto(r4, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 871.350909ms ago: executing program 0 (id=18532): syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x34, 0x3, 0xffffffffffffffff, 0x0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0, 0x40000000, 0x1}) r0 = syz_io_uring_setup(0x74d, &(0x7f0000000100)={0x0, 0x59c4, 0x8, 0x1000, 0x5cc}, &(0x7f0000000300)=0x0, &(0x7f0000000080)=0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x30, 0x4, 0x0, 0x2}]}, 0xffffffffffffff0e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_ACCEPT={0xd, 0xc, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81800, 0x1}) io_uring_enter(r0, 0x749f, 0x4, 0x0, 0x0, 0xfffffffffffffef5) 793.141926ms ago: executing program 0 (id=18533): socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89b1, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0hF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r4) sendmsg$NFC_CMD_DEV_UP(r4, &(0x7f0000000540)={0x0, 0xfffffffffffffe89, &(0x7f0000000280)={&(0x7f00000004c0)={0x1c, r5, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x8040) sendmsg$nfc_llcp(r0, &(0x7f0000000640)={&(0x7f0000000180)={0x27, r3, 0x0, 0x3, 0x2, 0x0, "dc7b746979cc518014f330087908fde7da6b48d42f3f53a804bf20c2d2df888f3e8ecdccf075bf4c7ceaf0eb8eef1bded669e1405a3bb66a79311977a835ae", 0x6}, 0x60, &(0x7f00000005c0)=[{&(0x7f0000000200)="8e536652fd4e931222ca21afb6ed38d38e62c4877cef800e1f55d884c9c5853abe814914034d0e2ccf55426b057ca74311e10dcaa27ab5c45ff7cfce364bcdf71398539752b38b41b20eef06f8dc30e58c3a20886b88d0587f3a53f44fc522ecf8cba695613075cf2fe3dfbdba2ec018599980caa2dc7297aa4044061fdb08a76f2add7c8f7529d0c30a88c068eff052ae2ebd3e756a6544103e12ec54e27e50cefde29c087e3c9a18f74975237b7495d5acbb0b45d8341603b03b05968de97cf5f35cc0f07f8bba51b4ed7ca24498f330be169adaa6eb86572293b54b19e1937b14e757d2a84f33ac2080a842733b", 0xef}, {&(0x7f0000000300)="0d409119962c35d99292f49f0f94398306ba8d01c6ed1116f8de69a0700db5d193687a5c52d24448ffdd7d673a2818470312ac3a7e882e03e19d79d17eebb7d3ca9a3bb188310811336e20ef532915b579f9387b8151c06924212abd13783e125d4c84d9d6ce7f21315e76171bc0db7d531907d74bb3d94c428ccacd76728a5ecac2d80287cf87b4fd41050e5c9c8aa5b5f508c4bd54a8494f631a902247dcecf3f19498a0359235a1e07301418bd21fde08764e5112deecdb4821f1e4162d3f03d21917e3d15f4940ac07cc717db4d4a72efbf2ec", 0xd5}, {&(0x7f0000000400)="dfed560c283f8fdd75cf7230720f13a27fbfe9c0bbe40bcbcf1abdf73f231ed8f1511d574f9ff7e189e071b7e91320b17b156bd820937137c701a0afed9b36194d021236275c2b61d0e335026a3fba62970cd19aa9e916b3b96ed3c231821198f1049c9d290d08a1d741a179066efeee505d886abc0ddbd2b2a0041df1e36dbe7bad9f3a67fb5fc385039bf60d8a16ed942cda64ada1cca4655b9b17ecf898a0d1e74bafeba9229f04cf0888e56b09", 0xaf}, {&(0x7f0000000080)="514f0734f3d372ce10e72f56", 0xc}, {&(0x7f00000004c0)="03bdad516e7d98705770bd891d4c781885afe78736e02f8346a51fd95244823b", 0x20}, {&(0x7f0000000500)="e7cdc5f3a7499047a6d14d32e02b0d44dedce2d4d564028fe613b53e07fadbc7e5cb16349f490a6e8a96e1aab5ffc95fb398696d5a05459b00361a9b63e7aeda126a12c9094485223b506230c446339ca81d9cd97e915fae51010a69279f91e06df6402c430ddad4c6f14c711ee490fcb21c508822c062c0bcbcf4a7df3a516a8dd9a82d4e9414be4889a5a54e3c1d7d31a522eff9aaeaf0adb38f7f9792d1c411c1e2e8", 0xa4}], 0x6, &(0x7f0000000980)={0xb0, 0x3a, 0x6, "7e657e130461e41ea10fccfdcd4a7263735f0cdfb7edea3041987d4e4f86d704f125b2b10a8710146eea504bddcf3bbf08be6eae7f99183867573741f310d76723f791a8d2f10e4a86719a4243c260c6493d7c081f7bed587476e0b2b1d764c24b180caf21dcfb801e90beabf883b6683aac97ad67895e6ec8b27f0c0937647071cb2aa80ec8c232e0310ed08feca68f855c5eee9de5d1936bbb7cd6e9f065e5"}, 0xb0, 0x20040004}, 0xc044) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)=""/2, 0x61, 0x2, 0x1, 0x9}, 0x28) 463.205613ms ago: executing program 2 (id=18534): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d9"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb2, 0xb2, 0x3, [@decl_tag={0x1, 0x0, 0x0, 0x11, 0x2, 0x1}, @datasec={0x3, 0x4, 0x0, 0xf, 0x2, [{0x4, 0x5, 0x8}, {0x1, 0x7, 0xfffffffa}, {0x4, 0x5, 0x5}, {0x1, 0x9, 0x712}], "158e"}, @struct={0x8, 0x3, 0x0, 0x4, 0x1, 0x0, [{0xb, 0x3, 0xfffffff2}, {0x6, 0x0, 0x6}, {0x5, 0x0, 0x7f}]}, @type_tag={0x5, 0x0, 0x0, 0x12, 0x4}, @struct={0xe, 0x1, 0x0, 0x4, 0x1, 0x87d, [{0x10, 0x4, 0x9}]}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x12, 0x0, 0x34}]}, {0x0, [0x30]}}, &(0x7f00000003c0)=""/160, 0xcf, 0xa0, 0x0, 0x526}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000ffffff7f000000000700000018110000", @ANYRES32=r0, @ANYBLOB="00000000000003000000000000000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000d7b70000ffffffffbf91000000000000b7020000010000008500000084000000b7000000000000009500000000000020"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f0000000080)=ANY=[], 0x0, 0x702, &(0x7f0000001140)="$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") r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a3000000000090003007379"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x160b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x6c}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000800)='ufshcd_uic_command\x00', r3, 0x0, 0xffff}, 0x18) futimesat(r2, &(0x7f0000000000)='./file1\x00', 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000340)=ANY=[@ANYRESDEC=r6, @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000050000000000000000000024000a20000000000a1f000000000000000000010000000900010073797a300000000058000000030a0104000000000000000001000000090003803d2175fbe782c2002c00048008000240172af2e40800014000000003080002401c791e7108000240423930ce08000140000000030900010073797a300000000088000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000004c00048048000180080001"], 0x122}}, 0x4008090) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='block_bio_remap\x00', r9}, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000940)={&(0x7f0000000840)={0x50, 0x0, 0x4, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7, 0xfffffff9}}}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x16}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}]}, 0x50}, 0x1, 0x0, 0x0, 0x40008c0}, 0x4000010) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 379.01552ms ago: executing program 7 (id=18535): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d9"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb2, 0xb2, 0x3, [@decl_tag={0x1, 0x0, 0x0, 0x11, 0x2, 0x1}, @datasec={0x3, 0x4, 0x0, 0xf, 0x2, [{0x4, 0x5, 0x8}, {0x1, 0x7, 0xfffffffa}, {0x4, 0x5, 0x5}, {0x1, 0x9, 0x712}], "158e"}, @struct={0x8, 0x3, 0x0, 0x4, 0x1, 0x0, [{0xb, 0x3, 0xfffffff2}, {0x6, 0x0, 0x6}, {0x5, 0x0, 0x7f}]}, @type_tag={0x5, 0x0, 0x0, 0x12, 0x4}, @struct={0xe, 0x1, 0x0, 0x4, 0x1, 0x87d, [{0x10, 0x4, 0x9}]}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x12, 0x0, 0x34}]}, {0x0, [0x30]}}, &(0x7f00000003c0)=""/160, 0xcf, 0xa0, 0x0, 0x526}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000ffffff7f000000000700000018110000", @ANYRES32=r0, @ANYBLOB="00000000000003000000000000000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000d7b70000ffffffffbf91000000000000b7020000010000008500000084000000b7000000000000009500000000000020"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f0000000080)=ANY=[], 0x0, 0x702, &(0x7f0000001140)="$eJzs3V2P21gZB/D/STJJJoWqAlStqm7ndMpKUzGkTmabKipIGOckY0jiyPbAjIS0KnRmNWqmQFskmpt2bniRli/A3d5wwYdYiQuu9lvAFUgrEBJiBUJGPrbzMnEykzbtbNn/b7Qbx358/Phl/axn7GMQERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERhNUwjIpA2+7u7MrZrIbrdJIvWUxNj1pbwc1o4Oa8Za6EywVE+A+KRbwVjX7rK6OQy+G/1nE1+nYVxfCjiMGFy5fufjmXSeafk/CLwKINPn46eHCv399/dIbYLBZu/jwhc4agluranmN3zJaStufIeq1m3NpuerJpt5W35/mqIy1XZXzHlRvWTVmp17ekKu85O91Ww2yrZOSdr1cNoya/U4h2NICyZ23b7bbdbemYcHIYc0d+8IMoQJkdKQ8O+/tbY/k8S9vGYVAlJfnMeHAYVD1tdatGtVqpVKuV2u367TuGkZsaYYSEMYSpiKUftPSGWe4JnOglZKzGf4w/CaCNIrrYwS5k6o+FBlw46MyYHkvq/zu31Nzljtf/pMqvjCZfga7/16Jv12bV/xm5SEg9Q9oUMWP8Yj8rOiOJx3iKAR7gHvroYx+PltC2hFx76RbyRrwll5LPzJ8WFLqw4cGBjQ5MtPBFyHiMRB011GDgPWyjCQ8STdhoQ8HDHjz4UOERlQ8zVTDhw4ELiQ1YuAmJCuqoYwsSCmXswcEOumihARP/CoLgAId6u2/F+TxPWWskQZUZK1FALjnu9lGds7az6v8Pn0Vzx/XfYP3/vIqOg0L08fG8GKLPgCC+/l/Q2qvJhoiIiIiIiIheBaF/+y70X+XfBhCgabeVMRFTOLfsiIiIiIiIiGgZBIICrkJEd+XjbYjp638iIiIiIiIierMJ/YydAFDSN/WL0eNSZ/klQPY1pEhEREREREREL0k/+X8tDwT6Lv81iIWu/4mIiIiIiIjoDfCrsT72c9m4j90g+bN+BsDanwvio78V4K6I497uV8WRGU4xj+KYqTsA/OYVcTHuqFd/5AHob5a6KuKlSeCfyW8fQp8cpPf1/zyICCHcEwnks+MNzEhAhEuu5eJv+ADXo1mux/3M3x9koKdEPQqXmnZblS2nfbcC07yY8dWu/7OHhz8H3OF6Hhz298s/+nH/vs7lOBx1fBQ2+mwinUz6xhjl8kT3t6CfuUjr3XgVzWSRv+52SkIv10jWPwvzKDO+oHk7oLYKRGv5C6xH+2w9iGJLg2GP+wJY050/VMp6l02svbsiRllUTq552o6YseZFncWNKObGxo3oI9kmYTsZUfxaFqiWp/fBRBbV8SxO3xbi7ye2//wsIIrhttgKs/hD2NCJLL7/UTTzVm836R7jLFlMHQVEROflYFSFdCfmU33sJ+UhOamdve4gB8RnuRnVfbSUIK4fSXV/8tsgqlBZIBf/bSJ9KUldQXhG3xC6nXzUoXvuSsoZ3Sh/GgSBebGI8TP6f4MgWSFjgep2HATByTP670fvQIrTnsri30EQ3K3oSvKbE1X1w3CGD2cu12tXsyiigCdHP9Ed4Ife339//2G1ulUz3jWM21Ws6P9ViD+yYO0hIqIpp79jR0dk5kSId3E9auP6/b++Ew1NVLwvxbcUaLeAPu5jM3mFwFp6qyUc4Jv/iG5D2IyuWoH1UvRZGsjLl+6GV7XD2EOR02942Zx5VadraRSrb2+oDmOT9w6dvAIcxW694r1ARET0eq3PqMPARP3HZP0vTtT/TWxEERtXUq+7S2O3FG4mV8fDS/rBhePU2MrpyX9ryRuDiIjoc0K5n4iS/0vhunbvvUq9XjH9bSVdx/qudO1GS0m76yvX2ja7LSV7ruM7ltOWPRcFe1V50tvp9RzXl03HlT3Hs3f1m99l/Op3T3XMrm9bXq+tTE9Jy+n6puXLhu1Zsrfz7bbtbStXz+z1lGU3bcv0bacrPWfHtVRZSk+psUC7obq+3bTDwa7suXbHdPfk95z2TkfJhvIs1+75TtRgsiy723Tcjm62jGDhFx0SERH9P3r8dPDgXr+//+jkwGp4aR6NOcaMmOmBfEqD7COIiIjoM2ZUrheYqfgKEyIiIiIiIiIiIiIiIiIiIiIiIiIiIiIioimnP9K34MBK2sOCwHDMTy/GY/Aco0cMp9oReNl8PnX/qDv2e5HZM4suNHkkYvDg4znBq8MxyeYfjzleZKG4BLzw9vnLF4ALegyiMbklHgDTz48uq+Wkx+LUmG8cRBNnza4npk4qDPdFbvn/OYQDD383PUmEaxEEQTB/9sLkNsyf/XgON9aj/JxdsHrK8fM6z0JEdB7+FwAA//9NXDc5") r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a3000000000090003007379"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x160b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x6c}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000800)='ufshcd_uic_command\x00', r3, 0x0, 0xffff}, 0x18) futimesat(r2, &(0x7f0000000000)='./file1\x00', 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000340)=ANY=[@ANYRESDEC=r6, @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000050000000000000000000024000a20000000000a1f000000000000000000010000000900010073797a300000000058000000030a0104000000000000000001000000090003803d2175fbe782c2002c00048008000240172af2e40800014000000003080002401c791e7108000240423930ce08000140000000030900010073797a300000000088000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000004c00048048000180080001"], 0x122}}, 0x4008090) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='block_bio_remap\x00', r9}, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000940)={&(0x7f0000000840)={0x50, 0x0, 0x4, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7, 0xfffffff9}}}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x16}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}]}, 0x50}, 0x1, 0x0, 0x0, 0x40008c0}, 0x4000010) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) sendmsg$nl_route(r5, 0x0, 0x0) 226.049442ms ago: executing program 4 (id=18536): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d9"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb2, 0xb2, 0x3, [@decl_tag={0x1, 0x0, 0x0, 0x11, 0x2, 0x1}, @datasec={0x3, 0x4, 0x0, 0xf, 0x2, [{0x4, 0x5, 0x8}, {0x1, 0x7, 0xfffffffa}, {0x4, 0x5, 0x5}, {0x1, 0x9, 0x712}], "158e"}, @struct={0x8, 0x3, 0x0, 0x4, 0x1, 0x0, [{0xb, 0x3, 0xfffffff2}, {0x6, 0x0, 0x6}, {0x5, 0x0, 0x7f}]}, @type_tag={0x5, 0x0, 0x0, 0x12, 0x4}, @struct={0xe, 0x1, 0x0, 0x4, 0x1, 0x87d, [{0x10, 0x4, 0x9}]}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x12, 0x0, 0x34}]}, {0x0, [0x30]}}, &(0x7f00000003c0)=""/160, 0xcf, 0xa0, 0x0, 0x526}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000ffffff7f000000000700000018110000", @ANYRES32=r0, @ANYBLOB="00000000000003000000000000000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000d7b70000ffffffffbf91000000000000b7020000010000008500000084000000b7000000000000009500000000000020"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f0000000080)=ANY=[], 0x0, 0x702, &(0x7f0000001140)="$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") r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x160b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x6c}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000800)='ufshcd_uic_command\x00', r3, 0x0, 0xffff}, 0x18) futimesat(r2, &(0x7f0000000000)='./file1\x00', 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000340)=ANY=[@ANYRESDEC=r6, @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r8, 0x0, 0x5}, 0x18) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000050000000000000000000024000a20000000000a1f000000000000000000010000000900010073797a300000000058000000030a0104000000000000000001000000090003803d2175fbe782c2002c00048008000240172af2e40800014000000003080002401c791e7108000240423930ce08000140000000030900010073797a300000000088000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000004c00048048000180080001"], 0x122}}, 0x4008090) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='block_bio_remap\x00', r10}, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000940)={&(0x7f0000000840)={0x50, 0x0, 0x4, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7, 0xfffffff9}}}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x16}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}]}, 0x50}, 0x1, 0x0, 0x0, 0x40008c0}, 0x4000010) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a0079"], 0x44}}, 0x0) 136.784389ms ago: executing program 2 (id=18537): bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, &(0x7f00000003c0)) socket(0x2, 0x80805, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000300240248ff050005001200", 0x2e}], 0x1}, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffb000/0x4000)=nil) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) listen(r2, 0xfd) socket$inet_mptcp(0x2, 0x1, 0x106) accept(r2, 0x0, 0x0) 0s ago: executing program 7 (id=18538): socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x1c, r4, 0x200, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x24010040) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r1, 0x2, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) socket$rds(0x15, 0x5, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000000071041d000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) fsopen(&(0x7f00000000c0)='hugetlbfs\x00', 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000080)) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) kernel console output (not intermixed with test programs): interval 1, probability 0, space 0, times 0 [ 1041.552814][ T29] audit: type=1326 audit(1755398942.905:66077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24823 comm="syz.0.17681" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1041.565237][T24837] CPU: 1 UID: 0 PID: 24837 Comm: syz.4.17687 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1041.565271][T24837] Tainted: [W]=WARN [ 1041.565278][T24837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1041.565291][T24837] Call Trace: [ 1041.565297][T24837] [ 1041.565305][T24837] __dump_stack+0x1d/0x30 [ 1041.565326][T24837] dump_stack_lvl+0xe8/0x140 [ 1041.565345][T24837] dump_stack+0x15/0x1b [ 1041.565368][T24837] should_fail_ex+0x265/0x280 [ 1041.565389][T24837] should_failslab+0x8c/0xb0 [ 1041.565413][T24837] kmem_cache_alloc_noprof+0x50/0x310 [ 1041.565438][T24837] ? dup_fd+0x3a/0x540 [ 1041.565459][T24837] dup_fd+0x3a/0x540 [ 1041.565522][T24837] ? __fget_files+0x184/0x1c0 [ 1041.565614][T24837] ksys_unshare+0x346/0x6d0 [ 1041.565641][T24837] ? ksys_write+0x192/0x1a0 [ 1041.565664][T24837] __x64_sys_unshare+0x1f/0x30 [ 1041.565690][T24837] x64_sys_call+0x2911/0x2ff0 [ 1041.565720][T24837] do_syscall_64+0xd2/0x200 [ 1041.565744][T24837] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1041.565767][T24837] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1041.565806][T24837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1041.565826][T24837] RIP: 0033:0x7f4dfd2febe9 [ 1041.565842][T24837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1041.565858][T24837] RSP: 002b:00007f4dfbd5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1041.565898][T24837] RAX: ffffffffffffffda RBX: 00007f4dfd525fa0 RCX: 00007f4dfd2febe9 [ 1041.565911][T24837] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002040400 [ 1041.565923][T24837] RBP: 00007f4dfbd5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1041.565935][T24837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1041.565947][T24837] R13: 00007f4dfd526038 R14: 00007f4dfd525fa0 R15: 00007ffe2640fa48 [ 1041.565966][T24837] [ 1041.571230][T24838] 9pnet_fd: Insufficient options for proto=fd [ 1041.842937][T24849] netlink: 'syz.5.17691': attribute type 10 has an invalid length. [ 1041.860097][T24849] team0: Port device dummy0 added [ 1041.861476][T24851] FAULT_INJECTION: forcing a failure. [ 1041.861476][T24851] name failslab, interval 1, probability 0, space 0, times 0 [ 1041.877871][T24851] CPU: 1 UID: 0 PID: 24851 Comm: syz.4.17692 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1041.877904][T24851] Tainted: [W]=WARN [ 1041.877912][T24851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1041.877923][T24851] Call Trace: [ 1041.877929][T24851] [ 1041.877941][T24851] __dump_stack+0x1d/0x30 [ 1041.877962][T24851] dump_stack_lvl+0xe8/0x140 [ 1041.878006][T24851] dump_stack+0x15/0x1b [ 1041.878022][T24851] should_fail_ex+0x265/0x280 [ 1041.878122][T24851] should_failslab+0x8c/0xb0 [ 1041.878173][T24851] kmem_cache_alloc_noprof+0x50/0x310 [ 1041.878275][T24851] ? skb_clone+0x151/0x1f0 [ 1041.878295][T24851] skb_clone+0x151/0x1f0 [ 1041.878315][T24851] __netlink_deliver_tap+0x2c9/0x500 [ 1041.878390][T24851] netlink_unicast+0x66b/0x690 [ 1041.878421][T24851] netlink_sendmsg+0x58b/0x6b0 [ 1041.878585][T24851] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1041.878604][T24851] __sock_sendmsg+0x142/0x180 [ 1041.878627][T24851] ____sys_sendmsg+0x31e/0x4e0 [ 1041.878648][T24851] ___sys_sendmsg+0x17b/0x1d0 [ 1041.878742][T24851] __x64_sys_sendmsg+0xd4/0x160 [ 1041.878765][T24851] x64_sys_call+0x191e/0x2ff0 [ 1041.878783][T24851] do_syscall_64+0xd2/0x200 [ 1041.878829][T24851] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1041.878854][T24851] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1041.878951][T24851] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1041.879013][T24851] RIP: 0033:0x7f4dfd2febe9 [ 1041.879029][T24851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1041.879047][T24851] RSP: 002b:00007f4dfbd5f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1041.879068][T24851] RAX: ffffffffffffffda RBX: 00007f4dfd525fa0 RCX: 00007f4dfd2febe9 [ 1041.879081][T24851] RDX: 0000000000000040 RSI: 0000200000000280 RDI: 0000000000000003 [ 1041.879094][T24851] RBP: 00007f4dfbd5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1041.879105][T24851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1041.879188][T24851] R13: 00007f4dfd526038 R14: 00007f4dfd525fa0 R15: 00007ffe2640fa48 [ 1041.879208][T24851] [ 1041.889633][T24849] netlink: 'syz.5.17691': attribute type 10 has an invalid length. [ 1042.107254][T24849] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 1042.122747][T24849] team0: Failed to send options change via netlink (err -105) [ 1042.130482][T24849] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 1042.139539][T24849] team0: Port device dummy0 removed [ 1042.147408][T24849] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 1044.258974][T24973] bond2: entered promiscuous mode [ 1044.264066][T24973] bond2: entered allmulticast mode [ 1044.269628][T24973] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1044.293625][T24973] bond2 (unregistering): Released all slaves [ 1044.409345][T25053] veth0_vlan: left promiscuous mode [ 1044.416119][T25053] veth0_vlan: entered promiscuous mode [ 1045.260009][T25085] veth0_vlan: left promiscuous mode [ 1045.266746][T25085] veth0_vlan: entered promiscuous mode [ 1045.321952][T25095] __nla_validate_parse: 25 callbacks suppressed [ 1045.321965][T25095] netlink: 8 bytes leftover after parsing attributes in process `syz.2.17761'. [ 1046.591366][T25146] netlink: 60 bytes leftover after parsing attributes in process `syz.6.17778'. [ 1046.600532][T25146] netlink: 60 bytes leftover after parsing attributes in process `syz.6.17778'. [ 1046.842490][T25146] netlink: 60 bytes leftover after parsing attributes in process `syz.6.17778'. [ 1046.851661][T25146] netlink: 60 bytes leftover after parsing attributes in process `syz.6.17778'. [ 1046.885487][ T29] kauditd_printk_skb: 521 callbacks suppressed [ 1046.885501][ T29] audit: type=1326 audit(1755398948.045:66599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25147 comm="syz.2.17779" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1046.915582][ T29] audit: type=1326 audit(1755398948.045:66600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25147 comm="syz.2.17779" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1046.997843][T25157] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17781'. [ 1047.006928][T25157] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17781'. [ 1047.142199][T25157] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17781'. [ 1047.151301][T25157] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17781'. [ 1047.169132][T25146] netlink: 60 bytes leftover after parsing attributes in process `syz.6.17778'. [ 1047.183824][ T29] audit: type=1326 audit(1755398948.230:66601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25159 comm="syz.2.17782" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1047.207785][ T29] audit: type=1326 audit(1755398948.230:66602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25159 comm="syz.2.17782" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1047.231478][ T29] audit: type=1326 audit(1755398948.230:66603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25159 comm="syz.2.17782" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1047.255235][ T29] audit: type=1326 audit(1755398948.230:66604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25159 comm="syz.2.17782" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1047.279042][ T29] audit: type=1326 audit(1755398948.230:66605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25159 comm="syz.2.17782" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1047.302715][ T29] audit: type=1326 audit(1755398948.230:66606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25159 comm="syz.2.17782" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1047.326450][ T29] audit: type=1326 audit(1755398948.230:66607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25159 comm="syz.2.17782" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1047.350178][ T29] audit: type=1326 audit(1755398948.230:66608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25159 comm="syz.2.17782" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1047.388741][T25161] bond2: entered promiscuous mode [ 1047.393813][T25161] bond2: entered allmulticast mode [ 1047.433966][T25161] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1047.447609][T25161] bond2 (unregistering): Released all slaves [ 1047.587211][T25238] netlink: 'syz.6.17785': attribute type 1 has an invalid length. [ 1047.672392][T25239] lo speed is unknown, defaulting to 1000 [ 1048.940304][T25309] FAULT_INJECTION: forcing a failure. [ 1048.940304][T25309] name failslab, interval 1, probability 0, space 0, times 0 [ 1048.952994][T25309] CPU: 1 UID: 0 PID: 25309 Comm: syz.5.17801 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1048.953096][T25309] Tainted: [W]=WARN [ 1048.953102][T25309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1048.953113][T25309] Call Trace: [ 1048.953119][T25309] [ 1048.953126][T25309] __dump_stack+0x1d/0x30 [ 1048.953163][T25309] dump_stack_lvl+0xe8/0x140 [ 1048.953189][T25309] dump_stack+0x15/0x1b [ 1048.953207][T25309] should_fail_ex+0x265/0x280 [ 1048.953229][T25309] should_failslab+0x8c/0xb0 [ 1048.953251][T25309] kmem_cache_alloc_noprof+0x50/0x310 [ 1048.953323][T25309] ? skb_clone+0x151/0x1f0 [ 1048.953347][T25309] skb_clone+0x151/0x1f0 [ 1048.953368][T25309] __netlink_deliver_tap+0x2c9/0x500 [ 1048.953390][T25309] netlink_unicast+0x66b/0x690 [ 1048.953450][T25309] netlink_sendmsg+0x58b/0x6b0 [ 1048.953474][T25309] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1048.953496][T25309] __sock_sendmsg+0x142/0x180 [ 1048.953521][T25309] ____sys_sendmsg+0x31e/0x4e0 [ 1048.953604][T25309] ___sys_sendmsg+0x17b/0x1d0 [ 1048.953638][T25309] __x64_sys_sendmsg+0xd4/0x160 [ 1048.953689][T25309] x64_sys_call+0x191e/0x2ff0 [ 1048.953708][T25309] do_syscall_64+0xd2/0x200 [ 1048.953733][T25309] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1048.953765][T25309] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1048.953787][T25309] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1048.953809][T25309] RIP: 0033:0x7fd32a4debe9 [ 1048.953879][T25309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1048.953897][T25309] RSP: 002b:00007fd328f47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1048.953916][T25309] RAX: ffffffffffffffda RBX: 00007fd32a705fa0 RCX: 00007fd32a4debe9 [ 1048.953930][T25309] RDX: 0000000004000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 1048.953944][T25309] RBP: 00007fd328f47090 R08: 0000000000000000 R09: 0000000000000000 [ 1048.954009][T25309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1048.954021][T25309] R13: 00007fd32a706038 R14: 00007fd32a705fa0 R15: 00007ffed4468a38 [ 1048.954041][T25309] [ 1049.873039][T25346] 9pnet_fd: Insufficient options for proto=fd [ 1050.450672][T25367] 9pnet_fd: Insufficient options for proto=fd [ 1050.496448][T25380] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1051.005859][T25400] __nla_validate_parse: 18 callbacks suppressed [ 1051.005887][T25400] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17837'. [ 1051.021875][T25400] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17837'. [ 1051.047455][T25400] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17837'. [ 1051.056559][T25400] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17837'. [ 1051.092664][T25400] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17837'. [ 1051.102252][T25400] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17837'. [ 1051.307159][T25411] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17841'. [ 1051.316533][T25411] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17841'. [ 1051.358394][T25411] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17841'. [ 1051.367531][T25411] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17841'. [ 1051.629742][T25424] 9pnet_fd: Insufficient options for proto=fd [ 1051.640940][T25429] bond2: entered promiscuous mode [ 1051.646022][T25429] bond2: entered allmulticast mode [ 1051.657443][T25429] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1051.669356][T25429] bond2 (unregistering): Released all slaves [ 1051.738180][T25508] 9pnet_fd: Insufficient options for proto=fd [ 1052.433004][ T29] kauditd_printk_skb: 1012 callbacks suppressed [ 1052.433018][ T29] audit: type=1326 audit(1755398953.167:67621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25517 comm="syz.5.17857" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd32a4debe9 code=0x7ffc0000 [ 1052.462985][ T29] audit: type=1326 audit(1755398953.167:67622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25517 comm="syz.5.17857" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd32a4debe9 code=0x7ffc0000 [ 1052.486685][ T29] audit: type=1326 audit(1755398953.186:67623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25517 comm="syz.5.17857" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd32a4debe9 code=0x7ffc0000 [ 1052.510448][ T29] audit: type=1326 audit(1755398953.186:67624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25517 comm="syz.5.17857" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd32a4debe9 code=0x7ffc0000 [ 1052.534178][ T29] audit: type=1326 audit(1755398953.186:67625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25517 comm="syz.5.17857" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd32a4debe9 code=0x7ffc0000 [ 1052.557853][ T29] audit: type=1326 audit(1755398953.186:67626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25517 comm="syz.5.17857" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd32a4debe9 code=0x7ffc0000 [ 1052.581568][ T29] audit: type=1326 audit(1755398953.186:67627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25517 comm="syz.5.17857" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd32a4debe9 code=0x7ffc0000 [ 1052.605297][ T29] audit: type=1326 audit(1755398953.186:67628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25517 comm="syz.5.17857" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd32a4debe9 code=0x7ffc0000 [ 1052.629103][ T29] audit: type=1326 audit(1755398953.186:67629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25517 comm="syz.5.17857" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd32a4debe9 code=0x7ffc0000 [ 1052.652810][ T29] audit: type=1326 audit(1755398953.186:67630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25517 comm="syz.5.17857" exe="/root/syz-executor" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7fd32a4debe9 code=0x7ffc0000 [ 1052.779761][T25531] bond0: entered promiscuous mode [ 1052.785341][T25531] bond_slave_0: entered promiscuous mode [ 1052.791134][T25531] bond_slave_1: entered promiscuous mode [ 1052.798356][T25531] bond0: left promiscuous mode [ 1052.803152][T25531] bond_slave_0: left promiscuous mode [ 1052.808832][T25531] bond_slave_1: left promiscuous mode [ 1053.738128][T25554] 9pnet_fd: Insufficient options for proto=fd [ 1054.152672][T25578] FAULT_INJECTION: forcing a failure. [ 1054.152672][T25578] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.165374][T25578] CPU: 1 UID: 0 PID: 25578 Comm: syz.4.17877 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1054.165507][T25578] Tainted: [W]=WARN [ 1054.165515][T25578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1054.165527][T25578] Call Trace: [ 1054.165531][T25578] [ 1054.165536][T25578] __dump_stack+0x1d/0x30 [ 1054.165550][T25578] dump_stack_lvl+0xe8/0x140 [ 1054.165560][T25578] dump_stack+0x15/0x1b [ 1054.165569][T25578] should_fail_ex+0x265/0x280 [ 1054.165622][T25578] ? rtnl_newlink+0x5c/0x12d0 [ 1054.165644][T25578] should_failslab+0x8c/0xb0 [ 1054.165667][T25578] __kmalloc_cache_noprof+0x4c/0x320 [ 1054.165740][T25578] rtnl_newlink+0x5c/0x12d0 [ 1054.165886][T25578] ? bpf_get_stackid+0xee/0x120 [ 1054.165902][T25578] ? bpf_prog_8f4d9728dfbc680e+0x2a/0x32 [ 1054.165990][T25578] ? bpf_get_stackid_raw_tp+0xf6/0x120 [ 1054.166003][T25578] ? __rcu_read_unlock+0x34/0x70 [ 1054.166015][T25578] ? bpf_trace_run3+0x12c/0x1d0 [ 1054.166028][T25578] ? __kfree_skb+0x109/0x150 [ 1054.166098][T25578] ? __rcu_read_unlock+0x4f/0x70 [ 1054.166109][T25578] ? __kfree_skb+0x109/0x150 [ 1054.166119][T25578] ? __rcu_read_unlock+0x4f/0x70 [ 1054.166140][T25578] ? avc_has_perm_noaudit+0x1b1/0x200 [ 1054.166227][T25578] ? cred_has_capability+0x210/0x280 [ 1054.166240][T25578] ? selinux_capable+0x31/0x40 [ 1054.166255][T25578] ? security_capable+0x83/0x90 [ 1054.166337][T25578] ? ns_capable+0x7d/0xb0 [ 1054.166349][T25578] ? __pfx_rtnl_newlink+0x10/0x10 [ 1054.166362][T25578] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 1054.166378][T25578] netlink_rcv_skb+0x123/0x220 [ 1054.166444][T25578] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1054.166462][T25578] rtnetlink_rcv+0x1c/0x30 [ 1054.166475][T25578] netlink_unicast+0x5bd/0x690 [ 1054.166494][T25578] netlink_sendmsg+0x58b/0x6b0 [ 1054.166541][T25578] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1054.166552][T25578] __sock_sendmsg+0x142/0x180 [ 1054.166651][T25578] ____sys_sendmsg+0x31e/0x4e0 [ 1054.166667][T25578] ___sys_sendmsg+0x17b/0x1d0 [ 1054.166686][T25578] __x64_sys_sendmsg+0xd4/0x160 [ 1054.166700][T25578] x64_sys_call+0x191e/0x2ff0 [ 1054.166711][T25578] do_syscall_64+0xd2/0x200 [ 1054.166804][T25578] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1054.166877][T25578] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1054.166891][T25578] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1054.166903][T25578] RIP: 0033:0x7f4dfd2febe9 [ 1054.166912][T25578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1054.166922][T25578] RSP: 002b:00007f4dfbd5f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1054.166975][T25578] RAX: ffffffffffffffda RBX: 00007f4dfd525fa0 RCX: 00007f4dfd2febe9 [ 1054.166982][T25578] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1054.166989][T25578] RBP: 00007f4dfbd5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1054.166996][T25578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1054.167003][T25578] R13: 00007f4dfd526038 R14: 00007f4dfd525fa0 R15: 00007ffe2640fa48 [ 1054.167013][T25578] [ 1054.968408][T25608] bond2: entered promiscuous mode [ 1054.973956][T25608] bond2: entered allmulticast mode [ 1054.981434][T25608] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1054.992395][T25608] bond2 (unregistering): Released all slaves [ 1055.371548][T25694] 9pnet_fd: Insufficient options for proto=fd [ 1055.849694][T25711] lo speed is unknown, defaulting to 1000 [ 1055.973765][T25738] netlink: 'syz.2.17903': attribute type 1 has an invalid length. [ 1056.236575][T25751] 9pnet_fd: Insufficient options for proto=fd [ 1056.416499][T25761] FAULT_INJECTION: forcing a failure. [ 1056.416499][T25761] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1056.429857][T25761] CPU: 1 UID: 0 PID: 25761 Comm: syz.0.17912 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1056.429910][T25761] Tainted: [W]=WARN [ 1056.429917][T25761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1056.429952][T25761] Call Trace: [ 1056.429958][T25761] [ 1056.429965][T25761] __dump_stack+0x1d/0x30 [ 1056.429988][T25761] dump_stack_lvl+0xe8/0x140 [ 1056.430008][T25761] dump_stack+0x15/0x1b [ 1056.430026][T25761] should_fail_ex+0x265/0x280 [ 1056.430077][T25761] should_fail_alloc_page+0xf2/0x100 [ 1056.430104][T25761] __alloc_frozen_pages_noprof+0xff/0x360 [ 1056.430140][T25761] alloc_pages_mpol+0xb3/0x250 [ 1056.430191][T25761] folio_alloc_mpol_noprof+0x39/0x80 [ 1056.430222][T25761] shmem_get_folio_gfp+0x3cf/0xd60 [ 1056.430270][T25761] shmem_write_begin+0xa8/0x190 [ 1056.430292][T25761] generic_perform_write+0x181/0x490 [ 1056.430320][T25761] shmem_file_write_iter+0xc5/0xf0 [ 1056.430345][T25761] iter_file_splice_write+0x669/0x9e0 [ 1056.430383][T25761] ? __pfx_iter_file_splice_write+0x10/0x10 [ 1056.430468][T25761] do_splice+0x974/0x10b0 [ 1056.430490][T25761] ? __rcu_read_unlock+0x4f/0x70 [ 1056.430511][T25761] ? __fget_files+0x184/0x1c0 [ 1056.430572][T25761] __se_sys_splice+0x26c/0x3a0 [ 1056.430592][T25761] __x64_sys_splice+0x78/0x90 [ 1056.430610][T25761] x64_sys_call+0x28a3/0x2ff0 [ 1056.430628][T25761] do_syscall_64+0xd2/0x200 [ 1056.430711][T25761] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1056.430730][T25761] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1056.430750][T25761] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1056.430838][T25761] RIP: 0033:0x7fefe9ffebe9 [ 1056.430892][T25761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1056.430906][T25761] RSP: 002b:00007fefe8a3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1056.430927][T25761] RAX: ffffffffffffffda RBX: 00007fefea226090 RCX: 00007fefe9ffebe9 [ 1056.430938][T25761] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000005 [ 1056.431028][T25761] RBP: 00007fefe8a3e090 R08: 00000000000408cd R09: 0000000000000000 [ 1056.431040][T25761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1056.431051][T25761] R13: 00007fefea226128 R14: 00007fefea226090 R15: 00007fff5c415ee8 [ 1056.431136][T25761] [ 1056.799059][T25774] __nla_validate_parse: 29 callbacks suppressed [ 1056.799077][T25774] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17916'. [ 1056.807744][T25777] netlink: 181064 bytes leftover after parsing attributes in process `syz.5.17915'. [ 1056.878397][T25784] netlink: 16 bytes leftover after parsing attributes in process `syz.4.17919'. [ 1056.887768][T25784] netlink: 24 bytes leftover after parsing attributes in process `syz.4.17919'. [ 1057.048520][T25790] lo speed is unknown, defaulting to 1000 [ 1057.123246][ T3498] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1057.150942][T25790] chnl_net:caif_netlink_parms(): no params data found [ 1057.180441][ T3498] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1057.227292][ T3498] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1057.246377][T25790] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.253467][T25790] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.260722][T25790] bridge_slave_0: entered allmulticast mode [ 1057.267838][T25790] bridge_slave_0: entered promiscuous mode [ 1057.275459][T25790] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.282575][T25790] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.289833][T25790] bridge_slave_1: entered allmulticast mode [ 1057.296333][T25790] bridge_slave_1: entered promiscuous mode [ 1057.331966][T25790] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1057.344004][T25790] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1057.355242][ T3498] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1057.388264][T25790] team0: Port device team_slave_0 added [ 1057.395726][T25790] team0: Port device team_slave_1 added [ 1057.426983][T25790] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1057.434032][T25790] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1057.459919][T25790] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1057.478044][T25790] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1057.485064][T25790] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1057.510977][T25790] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1057.565785][T25790] hsr_slave_0: entered promiscuous mode [ 1057.572054][T25790] hsr_slave_1: entered promiscuous mode [ 1057.582350][T25790] debugfs: 'hsr0' already exists in 'hsr' [ 1057.588125][T25790] Cannot create hsr debugfs directory [ 1057.617080][ T3498] bridge_slave_1: left allmulticast mode [ 1057.622748][ T3498] bridge_slave_1: left promiscuous mode [ 1057.629257][ T3498] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.687981][ T3498] bridge_slave_0: left promiscuous mode [ 1057.693728][ T3498] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.702910][T26075] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17924'. [ 1057.712007][T26075] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17924'. [ 1057.726265][ T3498] bond_slave_0: left promiscuous mode [ 1057.731730][ T3498] bond_slave_1: left promiscuous mode [ 1057.740771][T26075] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17924'. [ 1057.749966][T26075] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17924'. [ 1057.782914][T26075] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17924'. [ 1057.792007][T26075] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17924'. [ 1057.825319][ T3498] bond0 (unregistering): left allmulticast mode [ 1057.831621][ T3498] bond_slave_0: left allmulticast mode [ 1057.837174][ T3498] bond_slave_1: left allmulticast mode [ 1057.851178][ T3498] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1057.861581][ T3498] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1057.873781][ T3498] bond0 (unregistering): Released all slaves [ 1057.884643][ T3498] bond1 (unregistering): Released all slaves [ 1057.947909][ T3498] hsr_slave_0: left promiscuous mode [ 1057.955592][ T3498] hsr_slave_1: left promiscuous mode [ 1057.961578][ T3498] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1057.969118][ T3498] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1057.978644][ T3498] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1057.986126][ T3498] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1058.005182][ T3498] veth1_vlan: left promiscuous mode [ 1058.010527][ T3498] veth0_vlan: left promiscuous mode [ 1058.124688][ T3498] team0 (unregistering): Port device team_slave_1 removed [ 1058.174881][ T3498] team0 (unregistering): Port device team_slave_0 removed [ 1058.432004][ T29] kauditd_printk_skb: 391 callbacks suppressed [ 1058.432019][ T29] audit: type=1326 audit(1755398958.705:68022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26178 comm="syz.2.17937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1058.462218][ T29] audit: type=1326 audit(1755398958.705:68023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26178 comm="syz.2.17937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=220 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1058.486221][ T29] audit: type=1326 audit(1755398958.705:68024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26178 comm="syz.2.17937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1058.510091][ T29] audit: type=1326 audit(1755398958.705:68025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26178 comm="syz.2.17937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7fcd56a2ebe9 code=0x7ffc0000 [ 1058.779959][T26233] 9pnet_fd: Insufficient options for proto=fd [ 1058.899474][T25790] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1058.922379][T25790] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1058.942018][T25790] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1058.964742][T25790] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1059.107497][T25790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1059.131380][T25790] 8021q: adding VLAN 0 to HW filter on device team0 [ 1059.152053][ T3547] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.159147][ T3547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.200665][ T3547] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.207737][ T3547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.548070][T26293] bond0: entered promiscuous mode [ 1059.553114][T26293] bond_slave_0: entered promiscuous mode [ 1059.559177][T26293] bond_slave_1: entered promiscuous mode [ 1059.603825][T26293] bond0: left promiscuous mode [ 1059.608626][T26293] bond_slave_0: left promiscuous mode [ 1059.614209][T26293] bond_slave_1: left promiscuous mode [ 1059.748424][T25790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1060.481108][T26342] veth0_vlan: left promiscuous mode [ 1060.499756][T26342] veth0_vlan: entered promiscuous mode [ 1060.600233][T25790] veth0_vlan: entered promiscuous mode [ 1060.649286][T25790] veth1_vlan: entered promiscuous mode [ 1060.697936][T26358] netlink: 'syz.0.17959': attribute type 1 has an invalid length. [ 1060.708864][T25790] veth0_macvtap: entered promiscuous mode [ 1060.723135][T25790] veth1_macvtap: entered promiscuous mode [ 1060.768219][T25790] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1060.794052][T25790] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1060.847626][T25068] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.897859][T25068] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.943072][T25068] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.971310][T25068] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1061.116436][T26365] lo speed is unknown, defaulting to 1000 [ 1061.891988][T26404] lo speed is unknown, defaulting to 1000 [ 1062.055461][T26404] chnl_net:caif_netlink_parms(): no params data found [ 1062.149206][T26404] bridge0: port 1(bridge_slave_0) entered blocking state [ 1062.156322][T26404] bridge0: port 1(bridge_slave_0) entered disabled state [ 1062.163827][T26404] bridge_slave_0: entered allmulticast mode [ 1062.191978][T26404] bridge_slave_0: entered promiscuous mode [ 1062.306587][T26404] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.314626][T26404] bridge0: port 2(bridge_slave_1) entered disabled state [ 1062.334403][ T29] audit: type=1326 audit(1755398962.295:68026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26575 comm="syz.0.17970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1062.349067][T26404] bridge_slave_1: entered allmulticast mode [ 1062.358101][ T29] audit: type=1326 audit(1755398962.295:68027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26575 comm="syz.0.17970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1062.387812][ T29] audit: type=1326 audit(1755398962.295:68028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26575 comm="syz.0.17970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1062.406600][T26404] bridge_slave_1: entered promiscuous mode [ 1062.411474][ T29] audit: type=1326 audit(1755398962.295:68029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26575 comm="syz.0.17970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1062.440894][ T29] audit: type=1326 audit(1755398962.295:68030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26575 comm="syz.0.17970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1062.514046][ T29] audit: type=1326 audit(1755398962.332:68031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26575 comm="syz.0.17970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1062.568423][T26580] __nla_validate_parse: 25 callbacks suppressed [ 1062.568439][T26580] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17972'. [ 1062.583972][T26580] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17972'. [ 1062.648590][T26580] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17972'. [ 1062.658030][T26580] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17972'. [ 1062.669803][T26404] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1062.681241][T26404] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1062.746420][T26404] team0: Port device team_slave_0 added [ 1062.808628][T26404] team0: Port device team_slave_1 added [ 1062.893759][T26580] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17972'. [ 1062.902826][T26580] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17972'. [ 1062.913347][T26404] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1062.920343][T26404] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1062.946497][T26404] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1062.984366][T26404] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1062.991571][T26404] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1063.017629][T26404] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1063.176827][T26689] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17976'. [ 1063.186115][T26689] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17976'. [ 1063.251817][T25068] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1063.279037][T26689] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17976'. [ 1063.288205][T26689] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17976'. [ 1063.318765][T26404] hsr_slave_0: entered promiscuous mode [ 1063.340530][T26404] hsr_slave_1: entered promiscuous mode [ 1063.488144][T25068] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1064.208900][T26725] lo speed is unknown, defaulting to 1000 [ 1064.272940][T25068] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1064.372654][T25068] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1064.592668][T25068] bridge_slave_1: left allmulticast mode [ 1064.598631][T25068] bridge_slave_1: left promiscuous mode [ 1064.604737][T25068] bridge0: port 2(bridge_slave_1) entered disabled state [ 1064.632742][T25068] bridge_slave_0: left promiscuous mode [ 1064.638464][T25068] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.857404][T25068] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 1065.301653][T25068] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1065.327847][T25068] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1065.402571][T25068] bond0 (unregistering): Released all slaves [ 1065.531491][T25068] hsr_slave_0: left promiscuous mode [ 1065.538808][T25068] hsr_slave_1: left promiscuous mode [ 1065.545227][T25068] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1065.552637][T25068] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1065.564280][T25068] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1065.571706][T25068] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1065.583534][T25068] veth1_vlan: left promiscuous mode [ 1065.588904][T25068] veth0_vlan: left promiscuous mode [ 1065.651687][T25068] team0 (unregistering): Port device team_slave_1 removed [ 1065.662131][T25068] team0 (unregistering): Port device team_slave_0 removed [ 1065.696203][T26821] bridge_slave_0: left promiscuous mode [ 1065.702407][T26821] bridge0: port 1(bridge_slave_0) entered disabled state [ 1065.710673][T26821] bridge_slave_1: left allmulticast mode [ 1065.716768][T26821] bridge_slave_1: left promiscuous mode [ 1065.723079][T26821] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.732866][T26821] bond0: (slave bond_slave_0): Releasing backup interface [ 1065.741263][T26821] bond0: (slave bond_slave_1): Releasing backup interface [ 1065.750460][T26821] team0: Port device team_slave_0 removed [ 1065.759282][T26821] team0: Port device team_slave_1 removed [ 1065.770039][T26829] team0: Mode changed to "activebackup" [ 1065.990124][T25068] IPVS: stop unused estimator thread 0... [ 1066.029536][T26404] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1066.046342][T26404] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1066.083484][T26889] bond2: entered promiscuous mode [ 1066.088540][T26889] bond2: entered allmulticast mode [ 1066.094016][T26889] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1066.106222][T26889] bond2 (unregistering): Released all slaves [ 1066.114886][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 1066.114897][ T29] audit: type=1400 audit(1755398965.793:68050): avc: denied { connect } for pid=26916 comm="syz.4.17997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1066.142597][T26404] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1066.146553][ T29] audit: type=1400 audit(1755398965.820:68051): avc: denied { ioctl } for pid=26916 comm="syz.4.17997" path="socket:[190740]" dev="sockfs" ino=190740 ioctlcmd=0x89ed scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1066.184926][T26404] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1066.282291][ T29] audit: type=1326 audit(1755398965.940:68052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.0.18001" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1066.306317][ T29] audit: type=1326 audit(1755398965.940:68053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.0.18001" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1066.358879][ T29] audit: type=1326 audit(1755398965.996:68054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.0.18001" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1066.380814][T26404] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1066.382775][ T29] audit: type=1326 audit(1755398965.996:68055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.0.18001" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1066.400236][T26404] 8021q: adding VLAN 0 to HW filter on device team0 [ 1066.413020][ T29] audit: type=1326 audit(1755398965.996:68056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.0.18001" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefe9ffebe9 code=0x7ffc0000 [ 1066.478431][ T3530] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.485534][ T3530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1066.509790][ T3498] bridge0: port 2(bridge_slave_1) entered blocking state [ 1066.516938][ T3498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1066.654890][ T29] audit: type=1400 audit(1755398966.273:68057): avc: denied { create } for pid=27041 comm="syz.6.18009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1066.673920][T26404] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1066.674683][ T29] audit: type=1326 audit(1755398966.282:68058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27041 comm="syz.6.18009" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f307f2cebe9 code=0x7ffc0000 [ 1066.708810][ T29] audit: type=1326 audit(1755398966.282:68059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27041 comm="syz.6.18009" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f307f2cebe9 code=0x7ffc0000 [ 1066.737989][T26404] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1066.869351][T27059] lo speed is unknown, defaulting to 1000 [ 1067.027845][T26404] veth0_vlan: entered promiscuous mode [ 1067.070070][T26404] veth1_vlan: entered promiscuous mode [ 1067.114907][T26404] veth0_macvtap: entered promiscuous mode [ 1067.125808][T26404] veth1_macvtap: entered promiscuous mode [ 1067.143406][T26404] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1067.158034][T26404] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1067.219914][T25286] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1067.230946][T25286] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1067.294975][T25286] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1067.308865][T25286] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1067.328587][T27094] veth0_vlan: entered allmulticast mode [ 1067.341324][T27094] veth0_vlan: left promiscuous mode [ 1067.348481][T27094] veth0_vlan: entered promiscuous mode [ 1067.392113][T27097] bond4: entered promiscuous mode [ 1067.397188][T27097] bond4: entered allmulticast mode [ 1067.403189][T27097] 8021q: adding VLAN 0 to HW filter on device bond4 [ 1067.413979][T27097] bond4 (unregistering): Released all slaves [ 1067.724874][T27196] veth0_vlan: left promiscuous mode [ 1067.742167][T27196] veth0_vlan: entered promiscuous mode [ 1067.792086][T27200] team0: Unable to change to the same mode the team is in [ 1068.017335][T27213] lo speed is unknown, defaulting to 1000 [ 1068.175808][T27236] bond2: entered promiscuous mode [ 1068.181235][T27236] bond2: entered allmulticast mode [ 1068.237036][T27236] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1068.284303][T27236] bond2 (unregistering): Released all slaves [ 1068.305967][T27210] __nla_validate_parse: 40 callbacks suppressed [ 1068.305983][T27210] netlink: 60 bytes leftover after parsing attributes in process `syz.0.18033'. [ 1068.321339][T27210] netlink: 60 bytes leftover after parsing attributes in process `syz.0.18033'. [ 1068.558756][T27312] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=27312 comm=syz.5.18038 [ 1068.650524][ T3547] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1068.677107][T27318] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18035'. [ 1068.686430][T27318] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18035'. [ 1068.705798][T27318] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18035'. [ 1068.715119][T27318] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18035'. [ 1068.725736][ T3547] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1068.803235][T27326] bond1: entered promiscuous mode [ 1068.808303][T27326] bond1: entered allmulticast mode [ 1068.813714][T27318] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18035'. [ 1068.815753][T27326] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1068.822948][T27318] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18035'. [ 1068.840847][T27366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27366 comm=syz.6.18041 [ 1068.856752][T27326] bond1 (unregistering): Released all slaves [ 1068.874258][ T3547] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1068.895856][T27315] lo speed is unknown, defaulting to 1000 [ 1068.910220][T27410] netlink: 181064 bytes leftover after parsing attributes in process `syz.6.18041'. [ 1068.949093][T27425] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18042'. [ 1068.976126][ T3547] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1069.056179][T27315] chnl_net:caif_netlink_parms(): no params data found [ 1069.100710][ T3547] bridge_slave_1: left allmulticast mode [ 1069.106705][ T3547] bridge_slave_1: left promiscuous mode [ 1069.112457][ T3547] bridge0: port 2(bridge_slave_1) entered disabled state [ 1069.133887][ T3547] bridge_slave_0: left promiscuous mode [ 1069.139547][ T3547] bridge0: port 1(bridge_slave_0) entered disabled state [ 1069.375153][ T3547] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1069.384862][ T3547] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1069.395511][ T3547] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 1069.404558][ T3547] bond0 (unregistering): Released all slaves [ 1069.413197][ T3547] bond1 (unregistering): Released all slaves [ 1069.422053][ T3547] bond2 (unregistering): Released all slaves [ 1069.430463][ T3547] bond3 (unregistering): Released all slaves [ 1069.470019][T27558] bond1: entered promiscuous mode [ 1069.475085][T27558] bond1: entered allmulticast mode [ 1069.481252][T27558] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1069.492439][T27558] bond1 (unregistering): Released all slaves [ 1069.548791][ T3547] hsr_slave_0: left promiscuous mode [ 1069.560988][ T3547] hsr_slave_1: left promiscuous mode [ 1069.568877][ T3547] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1069.576275][ T3547] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1069.587560][ T3547] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1069.595095][ T3547] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1069.609513][ T3547] veth1_vlan: left promiscuous mode [ 1069.615439][ T3547] veth0_vlan: left promiscuous mode [ 1069.737884][ T3547] team0 (unregistering): Port device team_slave_1 removed [ 1069.773709][ T3547] team0 (unregistering): Port device team_slave_0 removed [ 1069.822031][T27315] bridge0: port 1(bridge_slave_0) entered blocking state [ 1069.829163][T27315] bridge0: port 1(bridge_slave_0) entered disabled state [ 1069.836992][T27315] bridge_slave_0: entered allmulticast mode [ 1069.843937][T27315] bridge_slave_0: entered promiscuous mode [ 1069.856327][T27315] bridge0: port 2(bridge_slave_1) entered blocking state [ 1069.863617][T27315] bridge0: port 2(bridge_slave_1) entered disabled state [ 1069.873875][T27315] bridge_slave_1: entered allmulticast mode [ 1069.880441][T27315] bridge_slave_1: entered promiscuous mode [ 1069.955267][T27315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1069.969714][T27315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1069.987368][T27708] bond2: entered promiscuous mode [ 1069.992750][T27708] bond2: entered allmulticast mode [ 1070.006658][T27708] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1070.015918][T27708] bond2 (unregistering): Released all slaves [ 1070.090134][T27315] team0: Port device team_slave_0 added [ 1070.105663][T27315] team0: Port device team_slave_1 added [ 1070.122338][T27830] bond0: entered promiscuous mode [ 1070.127431][T27830] bond_slave_0: entered promiscuous mode [ 1070.133362][T27830] bond_slave_1: entered promiscuous mode [ 1070.140720][T27830] bond0: left promiscuous mode [ 1070.145642][T27830] bond_slave_0: left promiscuous mode [ 1070.147258][T27856] 9pnet_fd: Insufficient options for proto=fd [ 1070.151144][T27830] bond_slave_1: left promiscuous mode [ 1070.183637][T27315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1070.190849][T27315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1070.216973][T27315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1070.231636][T27315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1070.238593][T27315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1070.264666][T27315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1070.310510][T27315] hsr_slave_0: entered promiscuous mode [ 1070.318310][T27315] hsr_slave_1: entered promiscuous mode [ 1070.324358][T27315] debugfs: 'hsr0' already exists in 'hsr' [ 1070.330277][T27315] Cannot create hsr debugfs directory [ 1070.647326][T27315] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1070.656865][T27315] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1070.666608][T27315] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1070.676878][T27315] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1070.807310][T27315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1070.824287][T27315] 8021q: adding VLAN 0 to HW filter on device team0 [ 1070.855164][T27315] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1070.865644][T27315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1071.092588][T27315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1071.167351][ T3528] bridge0: port 1(bridge_slave_0) entered blocking state [ 1071.174504][ T3528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1071.200445][ T3528] bridge0: port 2(bridge_slave_1) entered blocking state [ 1071.207565][ T3528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1071.273101][T28074] veth0_vlan: left promiscuous mode [ 1071.280022][T28074] veth0_vlan: entered promiscuous mode [ 1071.510635][T27315] veth0_vlan: entered promiscuous mode [ 1071.545000][T27315] veth1_vlan: entered promiscuous mode [ 1071.645300][ T29] kauditd_printk_skb: 220 callbacks suppressed [ 1071.645313][ T29] audit: type=1326 audit(1755398970.850:68280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28092 comm="syz.2.18077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1071.675498][ T29] audit: type=1326 audit(1755398970.850:68281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28092 comm="syz.2.18077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1071.704836][T27315] veth0_macvtap: entered promiscuous mode [ 1071.711720][ T29] audit: type=1326 audit(1755398970.933:68282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28092 comm="syz.2.18077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1071.735459][ T29] audit: type=1326 audit(1755398970.933:68283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28092 comm="syz.2.18077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1071.743857][T27315] veth1_macvtap: entered promiscuous mode [ 1071.759265][ T29] audit: type=1326 audit(1755398970.933:68284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28092 comm="syz.2.18077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1071.788564][ T29] audit: type=1326 audit(1755398970.933:68285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28092 comm="syz.2.18077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1071.812203][ T29] audit: type=1326 audit(1755398970.933:68286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28092 comm="syz.2.18077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1071.835888][ T29] audit: type=1326 audit(1755398970.933:68287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28092 comm="syz.2.18077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1071.859738][ T29] audit: type=1326 audit(1755398970.933:68288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28092 comm="syz.2.18077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=271 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1071.883747][T27315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1071.926868][T27315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1071.943495][ T3530] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1071.979017][ T3530] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1071.991522][ T3530] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1072.009095][ T3530] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1072.104854][ T29] audit: type=1326 audit(1755398971.321:68289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28125 comm="syz.5.18085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1072.193897][T28128] 9pnet_fd: Insufficient options for proto=fd [ 1072.321313][T28137] lo speed is unknown, defaulting to 1000 [ 1072.713052][T28249] bridge_slave_0: left allmulticast mode [ 1072.718733][T28249] bridge_slave_0: left promiscuous mode [ 1072.724454][T28249] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.751363][T28249] bridge_slave_1: left allmulticast mode [ 1072.757081][T28249] bridge_slave_1: left promiscuous mode [ 1072.762744][T28249] bridge0: port 2(bridge_slave_1) entered disabled state [ 1072.772481][T28249] bond0: (slave bond_slave_0): Releasing backup interface [ 1072.783560][T28249] bond0: (slave bond_slave_1): Releasing backup interface [ 1072.805656][T28249] team0: Port device team_slave_0 removed [ 1072.817301][T28249] team0: Port device team_slave_1 removed [ 1072.824437][T28249] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1072.831834][T28249] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1072.841528][T28249] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1072.848947][T28249] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1072.865222][T28253] team0: Mode changed to "activebackup" [ 1072.899202][T28264] bridge_slave_0: left allmulticast mode [ 1072.905008][T28264] bridge_slave_0: left promiscuous mode [ 1072.910719][T28264] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.920447][T28264] bridge_slave_1: left allmulticast mode [ 1072.926097][T28264] bridge_slave_1: left promiscuous mode [ 1072.931823][T28264] bridge0: port 2(bridge_slave_1) entered disabled state [ 1072.943111][T28264] bond0: (slave bond_slave_0): Releasing backup interface [ 1072.953994][T28264] bond0: (slave bond_slave_1): Releasing backup interface [ 1072.966088][T28264] team0: Port device team_slave_0 removed [ 1072.974852][T28264] team0: Port device team_slave_1 removed [ 1072.981673][T28264] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1072.989039][T28264] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1072.997645][T28264] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1073.005087][T28264] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1073.027180][T28137] chnl_net:caif_netlink_parms(): no params data found [ 1073.053451][T28265] team0: Mode changed to "activebackup" [ 1073.080520][T28267] bond1: entered promiscuous mode [ 1073.085577][T28267] bond1: entered allmulticast mode [ 1073.092854][T28267] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1073.104188][T28267] bond1 (unregistering): Released all slaves [ 1073.201257][T28366] bond2: entered promiscuous mode [ 1073.206299][T28366] bond2: entered allmulticast mode [ 1073.213639][T28366] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1073.239309][T28366] bond2 (unregistering): Released all slaves [ 1073.315570][T28137] bridge0: port 1(bridge_slave_0) entered blocking state [ 1073.322752][T28137] bridge0: port 1(bridge_slave_0) entered disabled state [ 1073.341515][T28137] bridge_slave_0: entered allmulticast mode [ 1073.360836][T28137] bridge_slave_0: entered promiscuous mode [ 1073.407080][T28483] bond1: entered promiscuous mode [ 1073.412161][T28483] bond1: entered allmulticast mode [ 1073.435555][T28483] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1073.448401][T28483] bond1 (unregistering): Released all slaves [ 1073.463825][T28137] bridge0: port 2(bridge_slave_1) entered blocking state [ 1073.471064][T28137] bridge0: port 2(bridge_slave_1) entered disabled state [ 1073.478376][T28137] bridge_slave_1: entered allmulticast mode [ 1073.484958][T28137] bridge_slave_1: entered promiscuous mode [ 1073.522504][T28137] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1073.600730][ T3530] bond0 (unregistering): Released all slaves [ 1073.610006][ T3530] bond1 (unregistering): Released all slaves [ 1073.620621][T28137] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1073.679178][T28137] team0: Port device team_slave_0 added [ 1073.696467][T28137] team0: Port device team_slave_1 added [ 1073.704470][ T3530] hsr_slave_0: left promiscuous mode [ 1073.717684][ T3530] hsr_slave_1: left promiscuous mode [ 1073.723722][ T3530] veth0_vlan: left promiscuous mode [ 1073.727712][T28631] 9pnet_fd: Insufficient options for proto=fd [ 1073.808582][T28137] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1073.815806][T28137] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1073.841772][T28137] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1073.853398][T28137] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1073.860405][T28137] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1073.886285][T28137] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1073.939146][T28137] hsr_slave_0: entered promiscuous mode [ 1073.945728][T28137] hsr_slave_1: entered promiscuous mode [ 1073.951770][T28137] debugfs: 'hsr0' already exists in 'hsr' [ 1073.957553][T28137] Cannot create hsr debugfs directory [ 1074.080382][T28764] 9pnet_fd: Insufficient options for proto=fd [ 1074.201546][T28795] __nla_validate_parse: 63 callbacks suppressed [ 1074.201573][T28795] netlink: 14 bytes leftover after parsing attributes in process `syz.5.18109'. [ 1074.253007][T28813] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18110'. [ 1074.262165][T28813] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18110'. [ 1074.287078][T28813] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18110'. [ 1074.296197][T28813] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18110'. [ 1074.327547][T28813] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18110'. [ 1074.336676][T28813] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18110'. [ 1074.347421][T28821] bond2: entered promiscuous mode [ 1074.352480][T28821] bond2: entered allmulticast mode [ 1074.357886][T28821] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1074.368265][T28821] bond2 (unregistering): Released all slaves [ 1074.477898][T28137] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1074.491492][T28137] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1074.511631][T28137] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1074.521252][T28137] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1074.578694][T28945] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18114'. [ 1074.587869][T28945] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18114'. [ 1074.599162][T28137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1074.611289][T28137] 8021q: adding VLAN 0 to HW filter on device team0 [ 1074.621029][ T3494] bridge0: port 1(bridge_slave_0) entered blocking state [ 1074.628149][ T3494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1074.642278][ T3494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1074.649353][ T3494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1074.665233][T28945] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18114'. [ 1074.678717][T28137] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1074.689207][T28137] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1074.751607][T28137] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1074.814099][T28137] veth0_vlan: entered promiscuous mode [ 1074.824671][T28137] veth1_vlan: entered promiscuous mode [ 1074.848990][T28137] veth0_macvtap: entered promiscuous mode [ 1074.860883][T28137] veth1_macvtap: entered promiscuous mode [ 1074.879242][T28137] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1074.908398][T28137] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1074.945420][ T3494] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1074.959730][ T3494] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1074.999649][ T3494] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1075.015496][ T3494] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1075.095038][T28977] bond1: entered promiscuous mode [ 1075.100136][T28977] bond1: entered allmulticast mode [ 1075.115004][T28977] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1075.142788][T28977] bond1 (unregistering): Released all slaves [ 1075.702035][T29063] bond1: entered promiscuous mode [ 1075.707157][T29063] bond1: entered allmulticast mode [ 1075.713587][T29063] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1075.724716][T29063] bond1 (unregistering): Released all slaves [ 1075.763725][T29137] 9pnet_fd: Insufficient options for proto=fd [ 1076.160722][T29152] 9pnet_fd: Insufficient options for proto=fd [ 1076.233252][T29154] team0: Unable to change to the same mode the team is in [ 1077.451809][T29197] bond0: entered promiscuous mode [ 1077.459536][T29197] bond0: left promiscuous mode [ 1077.893392][ T29] kauditd_printk_skb: 502 callbacks suppressed [ 1077.893407][ T29] audit: type=1326 audit(1755398976.664:68792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.0.18148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1078.067429][ T29] audit: type=1326 audit(1755398976.664:68793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.0.18148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1078.091296][ T29] audit: type=1326 audit(1755398976.692:68794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.0.18148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1078.115104][ T29] audit: type=1326 audit(1755398976.692:68795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.0.18148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1078.138886][ T29] audit: type=1326 audit(1755398976.692:68796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.0.18148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1078.162656][ T29] audit: type=1326 audit(1755398976.692:68797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.0.18148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1078.186404][ T29] audit: type=1326 audit(1755398976.692:68798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.0.18148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1078.210155][ T29] audit: type=1326 audit(1755398976.692:68799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.0.18148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1078.233888][ T29] audit: type=1326 audit(1755398976.692:68800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.0.18148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1078.257633][ T29] audit: type=1326 audit(1755398976.692:68801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.0.18148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1078.284062][T29238] 9pnet_fd: Insufficient options for proto=fd [ 1079.000723][T29281] 9pnet_fd: Insufficient options for proto=fd [ 1079.096949][T29298] bond0: entered promiscuous mode [ 1079.102017][T29298] bond_slave_0: entered promiscuous mode [ 1079.107817][T29298] bond_slave_1: entered promiscuous mode [ 1079.118055][T29298] bond0: left promiscuous mode [ 1079.122855][T29298] bond_slave_0: left promiscuous mode [ 1079.128384][T29298] bond_slave_1: left promiscuous mode [ 1079.304192][T29308] FAULT_INJECTION: forcing a failure. [ 1079.304192][T29308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1079.317344][T29308] CPU: 1 UID: 0 PID: 29308 Comm: syz.0.18166 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1079.317437][T29308] Tainted: [W]=WARN [ 1079.317464][T29308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1079.317471][T29308] Call Trace: [ 1079.317520][T29308] [ 1079.317525][T29308] __dump_stack+0x1d/0x30 [ 1079.317539][T29308] dump_stack_lvl+0xe8/0x140 [ 1079.317550][T29308] dump_stack+0x15/0x1b [ 1079.317559][T29308] should_fail_ex+0x265/0x280 [ 1079.317571][T29308] should_fail+0xb/0x20 [ 1079.317580][T29308] should_fail_usercopy+0x1a/0x20 [ 1079.317644][T29308] _copy_from_user+0x1c/0xb0 [ 1079.317659][T29308] ___sys_sendmsg+0xc1/0x1d0 [ 1079.317678][T29308] __x64_sys_sendmsg+0xd4/0x160 [ 1079.317767][T29308] x64_sys_call+0x191e/0x2ff0 [ 1079.317780][T29308] do_syscall_64+0xd2/0x200 [ 1079.317885][T29308] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1079.317899][T29308] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1079.317998][T29308] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1079.318014][T29308] RIP: 0033:0x7fece712ebe9 [ 1079.318024][T29308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1079.318034][T29308] RSP: 002b:00007fece5b97038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1079.318047][T29308] RAX: ffffffffffffffda RBX: 00007fece7355fa0 RCX: 00007fece712ebe9 [ 1079.318071][T29308] RDX: 0000000004004850 RSI: 00002000000002c0 RDI: 0000000000000004 [ 1079.318078][T29308] RBP: 00007fece5b97090 R08: 0000000000000000 R09: 0000000000000000 [ 1079.318085][T29308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1079.318115][T29308] R13: 00007fece7356038 R14: 00007fece7355fa0 R15: 00007ffccaad4948 [ 1079.318126][T29308] [ 1079.573450][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811a313200: rx timeout, send abort [ 1079.664392][T29318] __nla_validate_parse: 49 callbacks suppressed [ 1079.664411][T29318] netlink: 64 bytes leftover after parsing attributes in process `syz.6.18170'. [ 1079.680186][T29318] netlink: 4 bytes leftover after parsing attributes in process `syz.6.18170'. [ 1079.798832][T29324] 9pnet_fd: Insufficient options for proto=fd [ 1080.115291][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811a312400: rx timeout, send abort [ 1080.124861][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811a313200: abort rx timeout. Force session deactivation [ 1080.214756][T29336] netlink: 181064 bytes leftover after parsing attributes in process `syz.0.18176'. [ 1080.665387][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811a312400: abort rx timeout. Force session deactivation [ 1080.906396][T29356] 9pnet_fd: Insufficient options for proto=fd [ 1080.922506][T29364] veth0_vlan: left promiscuous mode [ 1080.928945][T29364] veth0_vlan: entered promiscuous mode [ 1080.930194][T29362] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18185'. [ 1080.943670][T29362] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18185'. [ 1080.962381][T29362] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18185'. [ 1080.971489][T29362] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18185'. [ 1080.993509][T29362] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18185'. [ 1081.002779][T29362] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18185'. [ 1081.795292][T29400] netlink: 96 bytes leftover after parsing attributes in process `syz.5.18194'. [ 1083.306140][T29413] veth0_vlan: entered allmulticast mode [ 1083.348057][T29413] veth0_vlan: left promiscuous mode [ 1083.367799][T29413] veth0_vlan: entered promiscuous mode [ 1083.507702][ T29] kauditd_printk_skb: 458 callbacks suppressed [ 1083.507718][ T29] audit: type=1326 audit(1755398981.842:69260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29429 comm="syz.5.18205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1083.537827][ T29] audit: type=1326 audit(1755398981.842:69261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29429 comm="syz.5.18205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1083.591356][ T29] audit: type=1326 audit(1755398981.925:69262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29429 comm="syz.5.18205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1083.615131][ T29] audit: type=1326 audit(1755398981.925:69263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29429 comm="syz.5.18205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1083.655967][ T29] audit: type=1326 audit(1755398981.925:69264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29429 comm="syz.5.18205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1083.679668][ T29] audit: type=1326 audit(1755398981.925:69265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29429 comm="syz.5.18205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1083.703356][ T29] audit: type=1326 audit(1755398981.925:69266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29429 comm="syz.5.18205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1083.727066][ T29] audit: type=1326 audit(1755398981.925:69267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29429 comm="syz.5.18205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1083.750728][ T29] audit: type=1326 audit(1755398981.971:69268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29429 comm="syz.5.18205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1083.774427][ T29] audit: type=1326 audit(1755398981.971:69269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29429 comm="syz.5.18205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1083.814990][T29431] bond1: entered promiscuous mode [ 1083.820113][T29431] bond1: entered allmulticast mode [ 1083.836868][T29431] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1083.848213][T29431] bond1 (unregistering): Released all slaves [ 1083.852212][T29430] 9pnet_fd: Insufficient options for proto=fd [ 1085.031571][T29548] veth0_vlan: entered allmulticast mode [ 1085.045463][T29551] veth0_vlan: left promiscuous mode [ 1085.052010][T29551] veth0_vlan: entered promiscuous mode [ 1085.372675][T29559] __nla_validate_parse: 15 callbacks suppressed [ 1085.372693][T29559] netlink: 148 bytes leftover after parsing attributes in process `syz.4.18217'. [ 1085.511087][T29566] netlink: 8 bytes leftover after parsing attributes in process `syz.4.18218'. [ 1085.642840][T29568] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18219'. [ 1085.651986][T29568] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18219'. [ 1085.762033][T29570] bond1: entered promiscuous mode [ 1085.767173][T29570] bond1: entered allmulticast mode [ 1085.775976][T29568] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18219'. [ 1085.785095][T29568] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18219'. [ 1085.794570][T29570] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1085.805849][T29570] bond1 (unregistering): Released all slaves [ 1085.886505][T29568] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18219'. [ 1085.895644][T29568] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18219'. [ 1085.962934][T29649] netlink: 14 bytes leftover after parsing attributes in process `syz.0.18223'. [ 1085.965074][T29645] netlink: 4 bytes leftover after parsing attributes in process `syz.4.18222'. [ 1086.130953][T29672] bond1: entered promiscuous mode [ 1086.136086][T29672] bond1: entered allmulticast mode [ 1086.141433][T29672] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1086.151693][T29672] bond1 (unregistering): Released all slaves [ 1086.182584][T29700] bond1: entered promiscuous mode [ 1086.187657][T29700] bond1: entered allmulticast mode [ 1086.193522][T29700] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1086.203736][T29700] bond1 (unregistering): Released all slaves [ 1086.254783][T29818] bridge_slave_0: left allmulticast mode [ 1086.260462][T29818] bridge_slave_0: left promiscuous mode [ 1086.266190][T29818] bridge0: port 1(bridge_slave_0) entered disabled state [ 1086.275089][T29818] bridge_slave_1: left allmulticast mode [ 1086.280788][T29818] bridge_slave_1: left promiscuous mode [ 1086.286574][T29818] bridge0: port 2(bridge_slave_1) entered disabled state [ 1086.296142][T29818] bond0: (slave bond_slave_0): Releasing backup interface [ 1086.307845][T29818] bond0: (slave bond_slave_1): Releasing backup interface [ 1086.321325][T29818] team0: Port device team_slave_0 removed [ 1086.330535][T29818] team0: Port device team_slave_1 removed [ 1086.337159][T29818] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1086.344611][T29818] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1086.353459][T29818] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1086.360848][T29818] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1086.488739][T29840] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1086.528005][T29840] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1086.592926][T29840] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1086.656815][T29840] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1086.724299][ T3530] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1086.742416][ T3530] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1086.750647][ T3530] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1086.761067][ T3530] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1087.016951][T29925] 9pnet_fd: Insufficient options for proto=fd [ 1087.029721][T29927] bridge_slave_0: left allmulticast mode [ 1087.035482][T29927] bridge_slave_0: left promiscuous mode [ 1087.041373][T29927] bridge0: port 1(bridge_slave_0) entered disabled state [ 1087.052389][T29927] bridge_slave_1: left allmulticast mode [ 1087.058093][T29927] bridge_slave_1: left promiscuous mode [ 1087.063890][T29927] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.076239][T29927] bond0: (slave bond_slave_0): Releasing backup interface [ 1087.090232][T29927] bond0: (slave bond_slave_1): Releasing backup interface [ 1087.104286][T29927] team0: Port device team_slave_0 removed [ 1087.113994][T29927] team0: Port device team_slave_1 removed [ 1087.120899][T29927] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1087.128294][T29927] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1087.137450][T29927] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1087.145072][T29927] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1087.711306][T29949] FAULT_INJECTION: forcing a failure. [ 1087.711306][T29949] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1087.724607][T29949] CPU: 1 UID: 0 PID: 29949 Comm: syz.2.18274 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1087.724640][T29949] Tainted: [W]=WARN [ 1087.724716][T29949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1087.724729][T29949] Call Trace: [ 1087.724737][T29949] [ 1087.724858][T29949] __dump_stack+0x1d/0x30 [ 1087.724924][T29949] dump_stack_lvl+0xe8/0x140 [ 1087.724999][T29949] dump_stack+0x15/0x1b [ 1087.725008][T29949] should_fail_ex+0x265/0x280 [ 1087.725020][T29949] should_fail_alloc_page+0xf2/0x100 [ 1087.725035][T29949] __alloc_frozen_pages_noprof+0xff/0x360 [ 1087.725082][T29949] alloc_pages_mpol+0xb3/0x250 [ 1087.725140][T29949] vma_alloc_folio_noprof+0x1aa/0x300 [ 1087.725243][T29949] handle_mm_fault+0xec2/0x2c20 [ 1087.725313][T29949] do_user_addr_fault+0x636/0x1090 [ 1087.725332][T29949] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1087.725348][T29949] exc_page_fault+0x62/0xa0 [ 1087.725361][T29949] asm_exc_page_fault+0x26/0x30 [ 1087.725388][T29949] RIP: 0033:0x7fd6c57ac20b [ 1087.725398][T29949] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 1087.725408][T29949] RSP: 002b:00007fd6c425ce10 EFLAGS: 00010246 [ 1087.725418][T29949] RAX: 00007fd6c425ef30 RBX: 00007fd6c59f7640 RCX: 0000000000000000 [ 1087.725504][T29949] RDX: 00007fd6c425ef78 RSI: 00007fd6c585eca8 RDI: 00007fd6c425ce30 [ 1087.725511][T29949] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 1087.725517][T29949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1087.725524][T29949] R13: 00007fd6c5a26038 R14: 00007fd6c5a25fa0 R15: 00007fff13963698 [ 1087.725595][T29949] [ 1087.725602][T29949] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1088.145249][T29975] bond1: entered promiscuous mode [ 1088.150366][T29975] bond1: entered allmulticast mode [ 1088.155887][T29975] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1088.165686][T29975] bond1 (unregistering): Released all slaves [ 1088.415767][T30071] 9pnet_fd: Insufficient options for proto=fd [ 1089.022212][ T29] kauditd_printk_skb: 332 callbacks suppressed [ 1089.022228][ T29] audit: type=1326 audit(1755398986.936:69602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30078 comm="syz.2.18288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1089.075556][ T29] audit: type=1326 audit(1755398986.964:69603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30078 comm="syz.2.18288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1089.099531][ T29] audit: type=1326 audit(1755398986.964:69604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30078 comm="syz.2.18288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1089.123447][ T29] audit: type=1326 audit(1755398986.964:69605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30078 comm="syz.2.18288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1089.147103][ T29] audit: type=1326 audit(1755398986.964:69606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30078 comm="syz.2.18288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1089.170774][ T29] audit: type=1326 audit(1755398986.964:69607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30078 comm="syz.2.18288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1089.194257][ T29] audit: type=1326 audit(1755398986.964:69608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30078 comm="syz.2.18288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1089.218050][ T29] audit: type=1326 audit(1755398986.964:69609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30078 comm="syz.2.18288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1089.241737][ T29] audit: type=1326 audit(1755398986.964:69610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30078 comm="syz.2.18288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1089.265522][ T29] audit: type=1326 audit(1755398986.964:69611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30078 comm="syz.2.18288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1089.896369][T30120] bond0: entered promiscuous mode [ 1089.902620][T30120] bond0: left promiscuous mode [ 1089.965566][T30128] bond1: entered promiscuous mode [ 1089.970698][T30128] bond1: entered allmulticast mode [ 1089.976102][T30128] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1089.986220][T30128] bond1 (unregistering): Released all slaves [ 1090.285295][T30211] 9pnet_fd: Insufficient options for proto=fd [ 1091.025089][T30220] __nla_validate_parse: 107 callbacks suppressed [ 1091.025144][T30220] netlink: 14 bytes leftover after parsing attributes in process `syz.4.18306'. [ 1091.042230][T30220] netlink: 16 bytes leftover after parsing attributes in process `syz.4.18306'. [ 1091.307366][T30265] 9pnet_fd: Insufficient options for proto=fd [ 1091.997446][T30305] netlink: 60 bytes leftover after parsing attributes in process `syz.0.18316'. [ 1092.006534][T30305] netlink: 60 bytes leftover after parsing attributes in process `syz.0.18316'. [ 1092.036578][T30305] netlink: 60 bytes leftover after parsing attributes in process `syz.0.18316'. [ 1092.045725][T30305] netlink: 60 bytes leftover after parsing attributes in process `syz.0.18316'. [ 1092.073985][T30305] netlink: 60 bytes leftover after parsing attributes in process `syz.0.18316'. [ 1092.083088][T30305] netlink: 60 bytes leftover after parsing attributes in process `syz.0.18316'. [ 1092.261971][T30305] bond1: entered promiscuous mode [ 1092.267218][T30305] bond1: entered allmulticast mode [ 1092.286203][T30305] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1092.297336][T30305] bond1 (unregistering): Released all slaves [ 1092.414067][T30385] netlink: 14 bytes leftover after parsing attributes in process `syz.2.18319'. [ 1092.428765][T30385] netlink: 16 bytes leftover after parsing attributes in process `syz.2.18319'. [ 1092.485431][T30390] netlink: 'syz.0.18320': attribute type 1 has an invalid length. [ 1092.590110][T30412] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 1092.599378][ T9718] IPVS: starting estimator thread 0... [ 1092.672414][T30418] 9pnet_fd: Insufficient options for proto=fd [ 1092.700945][T30416] IPVS: using max 2880 ests per chain, 144000 per kthread [ 1093.214550][T30393] syz.2.18321 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 1093.228871][T30393] CPU: 1 UID: 0 PID: 30393 Comm: syz.2.18321 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1093.228910][T30393] Tainted: [W]=WARN [ 1093.228917][T30393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1093.228971][T30393] Call Trace: [ 1093.228977][T30393] [ 1093.228984][T30393] __dump_stack+0x1d/0x30 [ 1093.229007][T30393] dump_stack_lvl+0xe8/0x140 [ 1093.229028][T30393] dump_stack+0x15/0x1b [ 1093.229084][T30393] dump_header+0x81/0x220 [ 1093.229113][T30393] oom_kill_process+0x342/0x400 [ 1093.229141][T30393] out_of_memory+0x979/0xb80 [ 1093.229235][T30393] try_charge_memcg+0x5e6/0x9e0 [ 1093.229266][T30393] obj_cgroup_charge_pages+0xa6/0x150 [ 1093.229295][T30393] __memcg_kmem_charge_page+0x9f/0x170 [ 1093.229324][T30393] __alloc_frozen_pages_noprof+0x188/0x360 [ 1093.229356][T30393] alloc_pages_mpol+0xb3/0x250 [ 1093.229431][T30393] alloc_pages_noprof+0x90/0x130 [ 1093.229457][T30393] __vmalloc_node_range_noprof+0x6f2/0xe00 [ 1093.229498][T30393] ? sysvec_reschedule_ipi+0x4f/0x70 [ 1093.229554][T30393] __kvmalloc_node_noprof+0x30f/0x4e0 [ 1093.229635][T30393] ? ip_set_alloc+0x1f/0x30 [ 1093.229670][T30393] ? ip_set_alloc+0x1f/0x30 [ 1093.229730][T30393] ip_set_alloc+0x1f/0x30 [ 1093.229757][T30393] hash_netiface_create+0x282/0x740 [ 1093.229787][T30393] ? __pfx_hash_netiface_create+0x10/0x10 [ 1093.229883][T30393] ip_set_create+0x3cc/0x960 [ 1093.229910][T30393] ? __nla_parse+0x40/0x60 [ 1093.229935][T30393] nfnetlink_rcv_msg+0x4c3/0x590 [ 1093.229979][T30393] netlink_rcv_skb+0x123/0x220 [ 1093.230022][T30393] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 1093.230059][T30393] nfnetlink_rcv+0x16b/0x1690 [ 1093.230104][T30393] ? nlmon_xmit+0x4f/0x60 [ 1093.230182][T30393] ? consume_skb+0x49/0x150 [ 1093.230202][T30393] ? nlmon_xmit+0x4f/0x60 [ 1093.230251][T30393] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 1093.230320][T30393] ? __dev_queue_xmit+0x1200/0x2000 [ 1093.230340][T30393] ? __dev_queue_xmit+0x182/0x2000 [ 1093.230431][T30393] ? ref_tracker_free+0x37d/0x3e0 [ 1093.230455][T30393] ? __netlink_deliver_tap+0x4dc/0x500 [ 1093.230535][T30393] netlink_unicast+0x5bd/0x690 [ 1093.230631][T30393] netlink_sendmsg+0x58b/0x6b0 [ 1093.230653][T30393] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1093.230677][T30393] __sock_sendmsg+0x142/0x180 [ 1093.230776][T30393] ____sys_sendmsg+0x31e/0x4e0 [ 1093.230801][T30393] ___sys_sendmsg+0x17b/0x1d0 [ 1093.230831][T30393] __x64_sys_sendmsg+0xd4/0x160 [ 1093.230853][T30393] x64_sys_call+0x191e/0x2ff0 [ 1093.230936][T30393] do_syscall_64+0xd2/0x200 [ 1093.230960][T30393] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1093.231051][T30393] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1093.231100][T30393] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1093.231118][T30393] RIP: 0033:0x7fd6c57febe9 [ 1093.231133][T30393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1093.231151][T30393] RSP: 002b:00007fd6c425f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1093.231173][T30393] RAX: ffffffffffffffda RBX: 00007fd6c5a25fa0 RCX: 00007fd6c57febe9 [ 1093.231185][T30393] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000003 [ 1093.231260][T30393] RBP: 00007fd6c5881e19 R08: 0000000000000000 R09: 0000000000000000 [ 1093.231271][T30393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1093.231282][T30393] R13: 00007fd6c5a26038 R14: 00007fd6c5a25fa0 R15: 00007fff13963698 [ 1093.231301][T30393] [ 1093.231309][T30393] memory: usage 307200kB, limit 307200kB, failcnt 9578 [ 1093.575306][T30393] memory+swap: usage 307216kB, limit 9007199254740988kB, failcnt 0 [ 1093.583229][T30393] kmem: usage 270712kB, limit 9007199254740988kB, failcnt 0 [ 1093.590571][T30393] Memory cgroup stats for /syz2: [ 1093.590846][T30393] cache 7876608 [ 1093.599216][T30393] rss 29458432 [ 1093.602606][T30393] shmem 12288 [ 1093.605928][T30393] mapped_file 7876608 [ 1093.609893][T30393] dirty 8192 [ 1093.613115][T30393] writeback 0 [ 1093.616393][T30393] workingset_refault_anon 22574 [ 1093.621242][T30393] workingset_refault_file 6609 [ 1093.626025][T30393] swap 16384 [ 1093.629204][T30393] swapcached 28672 [ 1093.632936][T30393] pgpgin 1931281 [ 1093.636473][T30393] pgpgout 1922159 [ 1093.640216][T30393] pgfault 1706182 [ 1093.643870][T30393] pgmajfault 2806 [ 1093.647520][T30393] inactive_anon 28672 [ 1093.651554][T30393] active_anon 0 [ 1093.655032][T30393] inactive_file 0 [ 1093.658647][T30393] active_file 0 [ 1093.662086][T30393] unevictable 37335040 [ 1093.666178][T30393] hierarchical_memory_limit 314572800 [ 1093.671541][T30393] hierarchical_memsw_limit 9223372036854771712 [ 1093.677784][T30393] total_cache 7876608 [ 1093.681747][T30393] total_rss 29458432 [ 1093.685665][T30393] total_shmem 12288 [ 1093.689478][T30393] total_mapped_file 7876608 [ 1093.693959][T30393] total_dirty 8192 [ 1093.697670][T30393] total_writeback 0 [ 1093.701498][T30393] total_workingset_refault_anon 22574 [ 1093.706893][T30393] total_workingset_refault_file 6609 [ 1093.712267][T30393] total_swap 16384 [ 1093.715969][T30393] total_swapcached 28672 [ 1093.720209][T30393] total_pgpgin 1931281 [ 1093.724277][T30393] total_pgpgout 1922159 [ 1093.728412][T30393] total_pgfault 1706182 [ 1093.732575][T30393] total_pgmajfault 2806 [ 1093.736719][T30393] total_inactive_anon 28672 [ 1093.741275][T30393] total_active_anon 0 [ 1093.745238][T30393] total_inactive_file 0 [ 1093.749453][T30393] total_active_file 0 [ 1093.753506][T30393] total_unevictable 37335040 [ 1093.758088][T30393] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.18321,pid=30392,uid=0 [ 1093.772905][T30393] Memory cgroup out of memory: Killed process 30392 (syz.2.18321) total-vm:93892kB, anon-rss:29616kB, file-rss:63944kB, shmem-rss:0kB, UID:0 pgtables:248kB oom_score_adj:1000 [ 1093.931498][T30437] bond1: entered promiscuous mode [ 1093.936609][T30437] bond1: entered allmulticast mode [ 1093.948810][T30437] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1093.964348][T30437] bond1 (unregistering): Released all slaves [ 1094.360227][T30528] FAULT_INJECTION: forcing a failure. [ 1094.360227][T30528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1094.373478][T30528] CPU: 1 UID: 0 PID: 30528 Comm: syz.2.18336 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1094.373529][T30528] Tainted: [W]=WARN [ 1094.373536][T30528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1094.373549][T30528] Call Trace: [ 1094.373598][T30528] [ 1094.373605][T30528] __dump_stack+0x1d/0x30 [ 1094.373626][T30528] dump_stack_lvl+0xe8/0x140 [ 1094.373645][T30528] dump_stack+0x15/0x1b [ 1094.373662][T30528] should_fail_ex+0x265/0x280 [ 1094.373680][T30528] should_fail+0xb/0x20 [ 1094.373768][T30528] should_fail_usercopy+0x1a/0x20 [ 1094.373786][T30528] _copy_to_user+0x20/0xa0 [ 1094.373809][T30528] simple_read_from_buffer+0xb5/0x130 [ 1094.373907][T30528] proc_fail_nth_read+0x10e/0x150 [ 1094.373929][T30528] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1094.373973][T30528] vfs_read+0x1a5/0x770 [ 1094.373989][T30528] ? __rcu_read_unlock+0x4f/0x70 [ 1094.374009][T30528] ? __fget_files+0x184/0x1c0 [ 1094.374032][T30528] ? ldsem_up_read+0x8a/0xd0 [ 1094.374127][T30528] ksys_read+0xda/0x1a0 [ 1094.374150][T30528] __x64_sys_read+0x40/0x50 [ 1094.374172][T30528] x64_sys_call+0x27bc/0x2ff0 [ 1094.374194][T30528] do_syscall_64+0xd2/0x200 [ 1094.374223][T30528] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1094.374247][T30528] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1094.374348][T30528] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1094.374370][T30528] RIP: 0033:0x7fd6c57fd5fc [ 1094.374387][T30528] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1094.374403][T30528] RSP: 002b:00007fd6c425f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1094.374423][T30528] RAX: ffffffffffffffda RBX: 00007fd6c5a25fa0 RCX: 00007fd6c57fd5fc [ 1094.374435][T30528] RDX: 000000000000000f RSI: 00007fd6c425f0a0 RDI: 0000000000000004 [ 1094.374446][T30528] RBP: 00007fd6c425f090 R08: 0000000000000000 R09: 0000000000000000 [ 1094.374456][T30528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1094.374574][T30528] R13: 00007fd6c5a26038 R14: 00007fd6c5a25fa0 R15: 00007fff13963698 [ 1094.374590][T30528] [ 1095.082754][ T29] kauditd_printk_skb: 321 callbacks suppressed [ 1095.082768][ T29] audit: type=1326 audit(1755398992.520:69933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30569 comm="syz.0.18342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1095.112708][ T29] audit: type=1326 audit(1755398992.520:69934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30569 comm="syz.0.18342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1095.136812][ T29] audit: type=1326 audit(1755398992.520:69935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30569 comm="syz.0.18342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1095.160549][ T29] audit: type=1326 audit(1755398992.520:69936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30569 comm="syz.0.18342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1095.164234][T30570] audit: audit_lost=16 audit_rate_limit=0 audit_backlog_limit=64 [ 1095.184292][ T29] audit: type=1326 audit(1755398992.520:69937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30569 comm="syz.0.18342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1095.191944][T30570] audit: out of memory in audit_log_start [ 1095.221429][ T29] audit: type=1326 audit(1755398992.520:69938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30569 comm="syz.0.18342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fece712ebe9 code=0x7ffc0000 [ 1095.312062][ T29] audit: type=1326 audit(1755398992.603:69939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30569 comm="syz.0.18342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fece712d550 code=0x7ffc0000 [ 1095.335903][ T29] audit: type=1326 audit(1755398992.603:69940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30569 comm="syz.0.18342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fece712d69f code=0x7ffc0000 [ 1095.414212][T30578] 9pnet_fd: Insufficient options for proto=fd [ 1095.460064][T30588] veth0_vlan: left promiscuous mode [ 1095.468021][T30588] veth0_vlan: entered promiscuous mode [ 1095.485494][T30590] bond1: entered promiscuous mode [ 1095.490756][T30590] bond1: entered allmulticast mode [ 1095.504715][T30590] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1095.515255][T30590] bond1 (unregistering): Released all slaves [ 1096.121980][T30737] team0: Mode changed to "activebackup" [ 1096.132197][T30686] chnl_net:caif_netlink_parms(): no params data found [ 1096.178247][T30686] bridge0: port 1(bridge_slave_0) entered blocking state [ 1096.185382][T30686] bridge0: port 1(bridge_slave_0) entered disabled state [ 1096.192646][T30686] bridge_slave_0: entered allmulticast mode [ 1096.199140][T30686] bridge_slave_0: entered promiscuous mode [ 1096.206691][T30686] bridge0: port 2(bridge_slave_1) entered blocking state [ 1096.213871][T30686] bridge0: port 2(bridge_slave_1) entered disabled state [ 1096.221620][T30686] bridge_slave_1: entered allmulticast mode [ 1096.228929][T30686] bridge_slave_1: entered promiscuous mode [ 1096.246971][T30686] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1096.257268][T30686] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1096.277691][T30686] team0: Port device team_slave_0 added [ 1096.284229][T30686] team0: Port device team_slave_1 added [ 1096.301007][T30686] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1096.308038][T30686] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1096.333990][T30686] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1096.348173][T30686] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1096.355210][T30686] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1096.381121][T30686] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1096.409474][T30941] veth0_vlan: left promiscuous mode [ 1096.415904][T30941] veth0_vlan: entered promiscuous mode [ 1096.452342][T30686] hsr_slave_0: entered promiscuous mode [ 1096.458614][T30686] hsr_slave_1: entered promiscuous mode [ 1096.466165][T30686] debugfs: 'hsr0' already exists in 'hsr' [ 1096.472056][T30686] Cannot create hsr debugfs directory [ 1096.602715][T30686] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1096.616275][T30686] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1096.627258][T30686] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1096.637567][T30686] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1096.691882][T30686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1096.722856][T31054] FAULT_INJECTION: forcing a failure. [ 1096.722856][T31054] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.735612][T31054] CPU: 1 UID: 0 PID: 31054 Comm: syz.2.18373 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1096.735678][T31054] Tainted: [W]=WARN [ 1096.735725][T31054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1096.735738][T31054] Call Trace: [ 1096.735744][T31054] [ 1096.735753][T31054] __dump_stack+0x1d/0x30 [ 1096.735837][T31054] dump_stack_lvl+0xe8/0x140 [ 1096.735853][T31054] dump_stack+0x15/0x1b [ 1096.735923][T31054] should_fail_ex+0x265/0x280 [ 1096.735957][T31054] should_failslab+0x8c/0xb0 [ 1096.735978][T31054] kmem_cache_alloc_noprof+0x50/0x310 [ 1096.736038][T31054] ? getname_flags+0x80/0x3b0 [ 1096.736067][T31054] getname_flags+0x80/0x3b0 [ 1096.736164][T31054] do_sys_openat2+0x60/0x110 [ 1096.736196][T31054] __x64_sys_openat+0xf2/0x120 [ 1096.736320][T31054] x64_sys_call+0x2e9c/0x2ff0 [ 1096.736342][T31054] do_syscall_64+0xd2/0x200 [ 1096.736392][T31054] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1096.736416][T31054] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1096.736436][T31054] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1096.736454][T31054] RIP: 0033:0x7fd6c57febe9 [ 1096.736467][T31054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1096.736569][T31054] RSP: 002b:00007fd6c425f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1096.736590][T31054] RAX: ffffffffffffffda RBX: 00007fd6c5a25fa0 RCX: 00007fd6c57febe9 [ 1096.736699][T31054] RDX: 0000000000105480 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 1096.736710][T31054] RBP: 00007fd6c425f090 R08: 0000000000000000 R09: 0000000000000000 [ 1096.736721][T31054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1096.736783][T31054] R13: 00007fd6c5a26038 R14: 00007fd6c5a25fa0 R15: 00007fff13963698 [ 1096.736801][T31054] [ 1096.740252][T30686] 8021q: adding VLAN 0 to HW filter on device team0 [ 1096.938357][ T3530] bridge0: port 1(bridge_slave_0) entered blocking state [ 1096.945428][ T3530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1096.957677][ T3530] bridge0: port 2(bridge_slave_1) entered blocking state [ 1096.964767][ T3530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1096.996838][T31059] FAULT_INJECTION: forcing a failure. [ 1096.996838][T31059] name failslab, interval 1, probability 0, space 0, times 0 [ 1097.009593][T31059] CPU: 1 UID: 0 PID: 31059 Comm: syz.4.18375 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1097.009681][T31059] Tainted: [W]=WARN [ 1097.009687][T31059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1097.009697][T31059] Call Trace: [ 1097.009704][T31059] [ 1097.009711][T31059] __dump_stack+0x1d/0x30 [ 1097.009815][T31059] dump_stack_lvl+0xe8/0x140 [ 1097.009842][T31059] dump_stack+0x15/0x1b [ 1097.009859][T31059] should_fail_ex+0x265/0x280 [ 1097.009881][T31059] should_failslab+0x8c/0xb0 [ 1097.009983][T31059] kmem_cache_alloc_node_noprof+0x57/0x320 [ 1097.010079][T31059] ? __alloc_skb+0x101/0x320 [ 1097.010107][T31059] __alloc_skb+0x101/0x320 [ 1097.010136][T31059] ? audit_log_start+0x365/0x6c0 [ 1097.010173][T31059] audit_log_start+0x380/0x6c0 [ 1097.010199][T31059] audit_seccomp+0x48/0x100 [ 1097.010271][T31059] ? __seccomp_filter+0x68c/0x10d0 [ 1097.010290][T31059] __seccomp_filter+0x69d/0x10d0 [ 1097.010310][T31059] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1097.010345][T31059] ? vfs_write+0x7e8/0x960 [ 1097.010428][T31059] ? __rcu_read_unlock+0x4f/0x70 [ 1097.010450][T31059] ? __fget_files+0x184/0x1c0 [ 1097.010474][T31059] __secure_computing+0x82/0x150 [ 1097.010495][T31059] syscall_trace_enter+0xcf/0x1e0 [ 1097.010520][T31059] do_syscall_64+0xac/0x200 [ 1097.010605][T31059] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1097.010629][T31059] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1097.010663][T31059] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1097.010772][T31059] RIP: 0033:0x7f9d699febe9 [ 1097.010789][T31059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1097.010828][T31059] RSP: 002b:00007f9d6845f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1097.010849][T31059] RAX: ffffffffffffffda RBX: 00007f9d69c25fa0 RCX: 00007f9d699febe9 [ 1097.010863][T31059] RDX: 0000200000000000 RSI: 0000000040082406 RDI: 0000000000000006 [ 1097.010877][T31059] RBP: 00007f9d6845f090 R08: 0000000000000000 R09: 0000000000000000 [ 1097.010888][T31059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1097.010900][T31059] R13: 00007f9d69c26038 R14: 00007f9d69c25fa0 R15: 00007ffe81e2ec18 [ 1097.010978][T31059] [ 1097.320548][T31065] __nla_validate_parse: 39 callbacks suppressed [ 1097.320646][T31065] netlink: 96 bytes leftover after parsing attributes in process `syz.2.18377'. [ 1097.354511][T31072] netlink: 60 bytes leftover after parsing attributes in process `syz.5.18378'. [ 1097.363613][T31072] netlink: 60 bytes leftover after parsing attributes in process `syz.5.18378'. [ 1097.380601][T31072] netlink: 60 bytes leftover after parsing attributes in process `syz.5.18378'. [ 1097.389738][T31072] netlink: 60 bytes leftover after parsing attributes in process `syz.5.18378'. [ 1097.437119][T30686] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1097.455127][T31080] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18380'. [ 1097.464326][T31080] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18380'. [ 1097.493821][T31077] bond1: entered promiscuous mode [ 1097.498054][T31080] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18380'. [ 1097.498883][T31077] bond1: entered allmulticast mode [ 1097.507939][T31080] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18380'. [ 1097.531746][T31072] netlink: 60 bytes leftover after parsing attributes in process `syz.5.18378'. [ 1097.531842][T31077] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1097.554736][T31077] bond1 (unregistering): Released all slaves [ 1097.775805][T30686] veth0_vlan: entered promiscuous mode [ 1097.795515][T30686] veth1_vlan: entered promiscuous mode [ 1097.843271][T30686] veth0_macvtap: entered promiscuous mode [ 1097.862608][T30686] veth1_macvtap: entered promiscuous mode [ 1097.907338][T30686] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1097.921117][T31177] bond0: entered promiscuous mode [ 1097.934417][T31177] bond0: left promiscuous mode [ 1097.947913][T30686] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1097.960600][ T3498] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1097.992573][ T3498] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.022446][T31183] $Hÿ: renamed from bond0 (while UP) [ 1098.033504][T31183] $Hÿ: entered promiscuous mode [ 1098.062648][T31185] bond0: entered promiscuous mode [ 1098.082242][T31185] bond0: left promiscuous mode [ 1098.097082][ T3498] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.173301][ T3498] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.265208][T31207] 9pnet_fd: Insufficient options for proto=fd [ 1099.383440][T31276] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1099.459931][T31276] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1099.472738][T31274] team0: Mode changed to "activebackup" [ 1099.531680][T31276] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1099.595228][T31276] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1099.703987][ T3506] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1099.715723][ T3506] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1099.739955][ T3506] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1099.763244][ T3506] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1099.961841][T31334] loop7: detected capacity change from 0 to 164 [ 1100.016574][T31334] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 1100.101544][T31334] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 1100.143761][T31334] Symlink component flag not implemented [ 1100.149456][T31334] Symlink component flag not implemented [ 1100.170091][T31349] team0: Unable to change to the same mode the team is in [ 1100.198909][T31334] Symlink component flag not implemented (7) [ 1100.204962][T31334] Symlink component flag not implemented (116) [ 1100.276824][T31355] bond1: entered promiscuous mode [ 1100.281889][T31355] bond1: entered allmulticast mode [ 1100.314568][T31355] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1100.325862][T31355] bond1 (unregistering): Released all slaves [ 1100.483189][T31450] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1100.760983][T31456] team0: Unable to change to the same mode the team is in [ 1100.883977][ T29] kauditd_printk_skb: 647 callbacks suppressed [ 1100.883991][ T29] audit: type=1326 audit(1755398997.882:70586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31472 comm="syz.5.18423" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1100.919025][T31475] $Hÿ: renamed from bond0 (while UP) [ 1100.961379][T31475] $Hÿ: entered promiscuous mode [ 1101.040705][ T29] audit: type=1326 audit(1755398997.882:70587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31472 comm="syz.5.18423" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1101.064709][ T29] audit: type=1326 audit(1755398997.882:70588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31472 comm="syz.5.18423" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1101.088520][ T29] audit: type=1326 audit(1755398997.882:70589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31472 comm="syz.5.18423" exe="/root/syz-executor" sig=0 arch=c000003e syscall=128 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1101.112456][ T29] audit: type=1326 audit(1755398997.882:70590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31472 comm="syz.5.18423" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1101.136479][ T29] audit: type=1326 audit(1755398997.882:70591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31472 comm="syz.5.18423" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1101.160553][ T29] audit: type=1326 audit(1755398997.882:70592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31472 comm="syz.5.18423" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1101.184305][ T29] audit: type=1326 audit(1755398997.882:70593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31472 comm="syz.5.18423" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1101.208005][ T29] audit: type=1326 audit(1755398997.882:70594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31472 comm="syz.5.18423" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1101.231757][ T29] audit: type=1326 audit(1755398997.882:70595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31472 comm="syz.5.18423" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc3ae8ebe9 code=0x7ffc0000 [ 1101.307354][T31450] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1101.362112][T31450] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1101.394403][T31481] 9pnet_fd: Insufficient options for proto=fd [ 1101.589313][T31450] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1101.762028][ T3530] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1101.809111][ T3530] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1101.844325][ T3530] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1101.852623][ T3530] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1102.164360][T31525] loop7: detected capacity change from 0 to 512 [ 1102.180609][T31525] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1102.193410][T31525] ext4 filesystem being mounted at /3/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 1102.544690][T31537] FAULT_INJECTION: forcing a failure. [ 1102.544690][T31537] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.557446][T31537] CPU: 0 UID: 0 PID: 31537 Comm: syz.4.18435 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1102.557479][T31537] Tainted: [W]=WARN [ 1102.557486][T31537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1102.557540][T31537] Call Trace: [ 1102.557546][T31537] [ 1102.557570][T31537] __dump_stack+0x1d/0x30 [ 1102.557591][T31537] dump_stack_lvl+0xe8/0x140 [ 1102.557609][T31537] dump_stack+0x15/0x1b [ 1102.557624][T31537] should_fail_ex+0x265/0x280 [ 1102.557643][T31537] should_failslab+0x8c/0xb0 [ 1102.557706][T31537] __kmalloc_noprof+0xa5/0x3e0 [ 1102.557729][T31537] ? iovec_from_user+0x84/0x210 [ 1102.557819][T31537] ? mntput_no_expire+0x6f/0x460 [ 1102.557849][T31537] iovec_from_user+0x84/0x210 [ 1102.557928][T31537] __import_iovec+0xf3/0x540 [ 1102.558027][T31537] import_iovec+0x61/0x80 [ 1102.558089][T31537] ___sys_recvmsg+0x358/0x370 [ 1102.558121][T31537] do_recvmmsg+0x1ef/0x540 [ 1102.558146][T31537] ? get_timespec64+0xc9/0x100 [ 1102.558163][T31537] __x64_sys_recvmmsg+0xfb/0x170 [ 1102.558197][T31537] x64_sys_call+0x27a6/0x2ff0 [ 1102.558282][T31537] do_syscall_64+0xd2/0x200 [ 1102.558304][T31537] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1102.558332][T31537] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1102.558354][T31537] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1102.558372][T31537] RIP: 0033:0x7f9d699febe9 [ 1102.558388][T31537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1102.558485][T31537] RSP: 002b:00007f9d6845f038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1102.558504][T31537] RAX: ffffffffffffffda RBX: 00007f9d69c25fa0 RCX: 00007f9d699febe9 [ 1102.558581][T31537] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 1102.558593][T31537] RBP: 00007f9d6845f090 R08: 0000200000003700 R09: 0000000000000000 [ 1102.558607][T31537] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 1102.558619][T31537] R13: 00007f9d69c26038 R14: 00007f9d69c25fa0 R15: 00007ffe81e2ec18 [ 1102.558638][T31537] [ 1102.559613][T31534] Unsupported ieee802154 address type: 0 [ 1102.591463][T31535] team0: Unable to change to the same mode the team is in [ 1102.822726][T30686] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1102.842351][T31549] __nla_validate_parse: 30 callbacks suppressed [ 1102.842364][T31549] netlink: 96 bytes leftover after parsing attributes in process `syz.7.18439'. [ 1102.900877][T31556] loop7: detected capacity change from 0 to 128 [ 1102.907653][T31556] msdos: Bad value for 'gid' [ 1102.912314][T31556] msdos: Bad value for 'gid' [ 1102.953171][T31571] loop7: detected capacity change from 0 to 512 [ 1102.960203][T31571] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1102.973857][T31571] EXT4-fs error (device loop7): ext4_orphan_get:1392: inode #15: comm syz.7.18444: casefold flag without casefold feature [ 1102.987503][T31571] EXT4-fs error (device loop7): ext4_orphan_get:1397: comm syz.7.18444: couldn't read orphan inode 15 (err -117) [ 1103.001489][T31578] netlink: 52 bytes leftover after parsing attributes in process `syz.5.18446'. [ 1103.012733][T31571] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1103.029447][T31571] EXT4-fs error (device loop7): ext4_map_blocks:778: inode #2: block 4: comm syz.7.18444: lblock 0 mapped to illegal pblock 4 (length 1) [ 1103.046392][T31571] netlink: 'syz.7.18444': attribute type 10 has an invalid length. [ 1103.058799][T31571] team0 (unregistering): Port device team_slave_0 removed [ 1103.067653][T31571] team0 (unregistering): Port device team_slave_1 removed [ 1103.442318][T31618] team0: Unable to change to the same mode the team is in [ 1103.698311][T31639] netlink: 16 bytes leftover after parsing attributes in process `syz.2.18452'. [ 1103.710314][T31639] bond0: entered promiscuous mode [ 1103.716593][T31639] bond0: left promiscuous mode [ 1104.658516][T31681] team0: Unable to change to the same mode the team is in [ 1104.770156][T31687] veth0_vlan: entered allmulticast mode [ 1104.783354][T31687] veth0_vlan: left promiscuous mode [ 1104.789292][T31687] veth0_vlan: entered promiscuous mode [ 1105.720606][T31711] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18469'. [ 1105.729730][T31711] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18469'. [ 1105.745017][T31711] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18469'. [ 1105.754186][T31711] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18469'. [ 1105.775207][T31711] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18469'. [ 1105.784306][T31711] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18469'. [ 1105.884320][T31720] team0: Unable to change to the same mode the team is in [ 1105.898862][T31724] veth0_vlan: left promiscuous mode [ 1105.905098][T31724] veth0_vlan: entered promiscuous mode [ 1105.965891][T31732] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18478'. [ 1106.082662][T31744] bond0: entered promiscuous mode [ 1106.087777][T31744] bond0: entered allmulticast mode [ 1106.093100][T31744] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1106.102773][T31744] bond0 (unregistering): Released all slaves [ 1106.538139][T31856] $Hÿ: renamed from bond0 (while UP) [ 1106.546062][T31856] $Hÿ: entered promiscuous mode [ 1106.556526][ T29] kauditd_printk_skb: 223 callbacks suppressed [ 1106.556541][ T29] audit: type=1326 audit(1755399003.115:70819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31855 comm="syz.2.18490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1106.607359][ T29] audit: type=1326 audit(1755399003.152:70820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31855 comm="syz.2.18490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1106.631161][ T29] audit: type=1326 audit(1755399003.152:70821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31855 comm="syz.2.18490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1106.654884][ T29] audit: type=1326 audit(1755399003.152:70822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31855 comm="syz.2.18490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1106.678576][ T29] audit: type=1326 audit(1755399003.152:70823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31855 comm="syz.2.18490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1106.702174][ T29] audit: type=1326 audit(1755399003.152:70824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31855 comm="syz.2.18490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1106.725881][ T29] audit: type=1326 audit(1755399003.152:70825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31855 comm="syz.2.18490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1106.734953][T31858] veth0_vlan: left promiscuous mode [ 1106.749539][ T29] audit: type=1326 audit(1755399003.152:70826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31855 comm="syz.2.18490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=50 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1106.778312][ T29] audit: type=1326 audit(1755399003.152:70827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31855 comm="syz.2.18490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1106.798867][T31858] veth0_vlan: entered promiscuous mode [ 1106.802011][ T29] audit: type=1326 audit(1755399003.152:70828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31855 comm="syz.2.18490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c57febe9 code=0x7ffc0000 [ 1106.832232][T30686] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1107.421991][T31915] veth0_vlan: left promiscuous mode [ 1107.428441][T31915] veth0_vlan: entered promiscuous mode [ 1107.601907][T31924] 9pnet_fd: Insufficient options for proto=fd [ 1107.972934][T31936] loop7: detected capacity change from 0 to 512 [ 1108.022428][T31936] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1108.035082][T31936] ext4 filesystem being mounted at /16/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 1108.038931][T31940] team0: Unable to change to the same mode the team is in [ 1108.159442][T31947] EXT4-fs error (device loop7): ext4_map_blocks:778: inode #2: block 18: comm syz.7.18516: lblock 23 mapped to illegal pblock 18 (length 1) [ 1108.698219][T31963] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1108.777211][T31963] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1108.830053][T31963] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1108.903363][T31963] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1108.962563][ T3494] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1108.978469][ T3494] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1108.990745][ T3494] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1109.005579][T30686] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1109.014555][ T3494] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1110.049352][T32057] loop7: detected capacity change from 0 to 164 [ 1110.055928][T32052] __nla_validate_parse: 20 callbacks suppressed [ 1110.055944][T32052] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18534'. [ 1110.071396][T32052] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18534'. [ 1110.094816][T32057] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 1110.138132][T32052] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18534'. [ 1110.147394][T32052] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18534'. [ 1110.167861][T32057] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 1110.193011][T32052] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18534'. [ 1110.202119][T32052] netlink: 60 bytes leftover after parsing attributes in process `syz.2.18534'. [ 1110.216507][T32057] Symlink component flag not implemented [ 1110.222215][T32057] Symlink component flag not implemented [ 1110.242027][T32071] netlink: 60 bytes leftover after parsing attributes in process `syz.7.18535'. [ 1110.247823][T32057] Symlink component flag not implemented (7) [ 1110.251131][T32071] netlink: 60 bytes leftover after parsing attributes in process `syz.7.18535'. [ 1110.257074][T32057] Symlink component flag not implemented (116) [ 1110.304260][T32071] netlink: 60 bytes leftover after parsing attributes in process `syz.7.18535'. [ 1110.304546][T32074] netlink: 60 bytes leftover after parsing attributes in process `syz.4.18536'. [ 1110.434923][T32083] bond0: entered promiscuous mode [ 1110.440040][T32083] bond0: entered allmulticast mode [ 1110.486745][T32083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1110.549948][T32083] bond0 (unregistering): Released all slaves [ 1110.584429][ T3506] ================================================================== [ 1110.592532][ T3506] BUG: KCSAN: data-race in alloc_pid / copy_process [ 1110.599126][ T3506] [ 1110.601436][ T3506] read-write to 0xffffffff8685fc48 of 4 bytes by task 3530 on cpu 0: [ 1110.609493][ T3506] alloc_pid+0x539/0x720 [ 1110.613717][ T3506] copy_process+0xe25/0x2000 [ 1110.618290][ T3506] kernel_clone+0x16c/0x5c0 [ 1110.622777][ T3506] user_mode_thread+0x7d/0xb0 [ 1110.627441][ T3506] call_usermodehelper_exec_work+0x41/0x160 [ 1110.633323][ T3506] process_scheduled_works+0x4cb/0x9d0 [ 1110.638770][ T3506] worker_thread+0x582/0x770 [ 1110.643349][ T3506] kthread+0x489/0x510 [ 1110.647400][ T3506] ret_from_fork+0xda/0x150 [ 1110.651889][ T3506] ret_from_fork_asm+0x1a/0x30 [ 1110.656641][ T3506] [ 1110.658943][ T3506] read to 0xffffffff8685fc48 of 4 bytes by task 3506 on cpu 1: [ 1110.666461][ T3506] copy_process+0x14a6/0x2000 [ 1110.671294][ T3506] kernel_clone+0x16c/0x5c0 [ 1110.675783][ T3506] user_mode_thread+0x7d/0xb0 [ 1110.680445][ T3506] call_usermodehelper_exec_work+0x41/0x160 [ 1110.686327][ T3506] process_scheduled_works+0x4cb/0x9d0 [ 1110.691774][ T3506] worker_thread+0x582/0x770 [ 1110.696352][ T3506] kthread+0x489/0x510 [ 1110.700405][ T3506] ret_from_fork+0xda/0x150 [ 1110.704890][ T3506] ret_from_fork_asm+0x1a/0x30 [ 1110.709641][ T3506] [ 1110.711947][ T3506] value changed: 0x80000103 -> 0x80000104 [ 1110.717641][ T3506] [ 1110.719942][ T3506] Reported by Kernel Concurrency Sanitizer on: [ 1110.726074][ T3506] CPU: 1 UID: 0 PID: 3506 Comm: kworker/u8:22 Tainted: G W 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(voluntary) [ 1110.740292][ T3506] Tainted: [W]=WARN [ 1110.744073][ T3506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1110.754111][ T3506] Workqueue: events_unbound call_usermodehelper_exec_work [ 1110.761220][ T3506] ================================================================== [ 1110.781971][T32127] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1110.873633][T32127] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1110.916822][T32127] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1110.981806][T32127] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1111.040333][ T3530] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1111.051428][ T3506] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1111.062029][ T3506] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1111.073240][ T3506] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0