last executing test programs: 3m4.168220307s ago: executing program 0 (id=2177): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x3) 3m4.157692798s ago: executing program 0 (id=2178): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$xdp(0x2c, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1a, 0x4, &(0x7f0000000200)=ANY=[@ANYRES64=r3], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002a20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x37000, 0x1000, 0x0, 0x1}, 0x20) 3m3.313186606s ago: executing program 0 (id=2207): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000500)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000440)=@gcm_128={{0x304}, "e453f079df21d540", "1ec2d524d78682576ec2d9e13dad1018", "993161e3", "be0692db0b429ee8"}, 0x28) write$binfmt_script(r2, &(0x7f0000001300), 0x8f) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, &(0x7f0000000180)) writev(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0x1}], 0x1) close(r2) 3m3.290263588s ago: executing program 0 (id=2210): ioperm(0x0, 0x5fd, 0x80000000) open(0x0, 0x14507e, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x103042, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000ffffffff080000000100000080000000ef26818df7847e020000006778cb7c05e7966ca033cc1c6cbb9a1e0e472650723c09d49174d337167e51", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x81001) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0/../file0/../file0/../file0\x00', &(0x7f00000000c0)='./file0\x00') r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000140)={0x19, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="02091e00020000000000000000000800"], 0x10}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r5 = getpid() sched_setaffinity(r5, 0x8, &(0x7f0000000040)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000001000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 3m3.115350519s ago: executing program 0 (id=2213): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x32) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x8, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) close(r3) 3m2.543041015s ago: executing program 0 (id=2218): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x3) 3m2.536579736s ago: executing program 32 (id=2218): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x3) 2m11.895691786s ago: executing program 1 (id=3373): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000540)=0x0, &(0x7f00000001c0)=0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_io_uring_submit(r2, r3, &(0x7f0000000240)=@IORING_OP_LINKAT={0x27, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffa4, 0x4000080, 0x0, 0x0) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 2m11.881049238s ago: executing program 1 (id=3374): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000280)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb02b, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x182, 0x0, 0x27) connect$netlink(r0, &(0x7f0000000000)=@unspec={0x0, 0xe803}, 0xc) 2m11.869071299s ago: executing program 1 (id=3375): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000000080021850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001}, 0x8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f0000001440)=ANY=[@ANYBLOB="0017"], 0xc0) sendmmsg$inet6(r2, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0x0, 0x0) 2m11.811888506s ago: executing program 1 (id=3376): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f00000004c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_generate\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x8, 0x3, 0x320, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x250, 0xffffffff, 0xffffffff, 0x250, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@unspec=@helper={{0x48}, {0x0, 'amanda\x00'}}, @common=@inet=@socket1={{0x28, 'socket\x00', 0x2}}]}, @unspec=@CT0={0x48}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) r3 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x50800) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000040)={0x0, 0x2, {0x0, 0x1, 0x3, 0x1, 0x6}}) r4 = syz_open_dev$evdev(&(0x7f0000000000), 0xa, 0x4300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80002, 0x88) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x7, 0x1200) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0xb, &(0x7f0000000100)=0x10000006, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d88c19e9ace5ffb2e9fc603dd282100000002ff02000000000000000000000000000104004e200023b0"], 0x0) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f00000007c0)={0x2, 0x4b, &(0x7f0000000740)="4e51ddbcfa37e1b4a66f4dc9ee4d7d31bba78d1ff04206772581e1cb518396e668a76988d32d9efd2fc81dade719ed6e9867d941d633c4c9da9fa9994f3a0dd20bb7d9e33f0e4df469dd79"}) 2m11.810456656s ago: executing program 1 (id=3378): socket$packet(0x11, 0xa, 0x300) socket$packet(0x11, 0xa, 0x300) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0, 0xffffffffffffffff}, &(0x7f0000000440), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000006500000008000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 2m11.60319157s ago: executing program 1 (id=3384): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000200)={0x1f, @none}, 0x8) listen(r0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x30100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="a3d84b0b15bdbb71e8c50e92c19b22b5b9ff097baa103918b8bb1461b0b9e07b1ce4431056c398df7e8978bb6972af90adb4261701f622486eb9b3f5d75d7343b3b9a0a2a695b0550b6b298239a18ac93f098ad86503bef85f0943d662bcda56c8c6c720108fe60b34eee111821c5df3e7232457ddad3d51aa38", @ANYRESHEX=r2, @ANYBLOB=',\x00']) 2m11.60295788s ago: executing program 33 (id=3384): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000200)={0x1f, @none}, 0x8) listen(r0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x30100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="a3d84b0b15bdbb71e8c50e92c19b22b5b9ff097baa103918b8bb1461b0b9e07b1ce4431056c398df7e8978bb6972af90adb4261701f622486eb9b3f5d75d7343b3b9a0a2a695b0550b6b298239a18ac93f098ad86503bef85f0943d662bcda56c8c6c720108fe60b34eee111821c5df3e7232457ddad3d51aa38", @ANYRESHEX=r2, @ANYBLOB=',\x00']) 1m0.378279732s ago: executing program 4 (id=5458): r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r3, &(0x7f0000000040)={0x23, 0x0, 0x0, 0x1}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) ioctl$SIOCPNENABLEPIPE(r3, 0x89ed, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@noblock_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_int(r6, &(0x7f0000000540), 0xfffffdd8) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x42, 0x0) write(r7, &(0x7f0000000540)="953820a61a166fd5dd4b4b", 0xfdef) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_GETFSLABEL(r8, 0x6611, 0x0) bind$tipc(r0, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r0, &(0x7f00000005c0)={&(0x7f0000000000), 0x10, &(0x7f0000000480)=[{0x0}], 0x1}, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r8, 0xb, &(0x7f00000001c0)=[@ioring_restriction_sqe_flags_required={0x3, 0x8}, @ioring_restriction_sqe_flags_allowed={0x2, 0x13}, @ioring_restriction_sqe_op={0x1, 0x2}], 0x3) 1m0.268416575s ago: executing program 4 (id=5460): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) r2 = syz_open_pts(r1, 0x0) r3 = dup(r2) fsetxattr$security_selinux(r3, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:event_device_t:s0\x00', 0x24, 0x0) 1m0.268262225s ago: executing program 4 (id=5461): r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8923, 0x0) 1m0.268067605s ago: executing program 4 (id=5462): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000200020"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='tlb_flush\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x20081e, &(0x7f0000000040)={[{@nodelalloc}, {@grpid}, {@auto_da_alloc}]}, 0x1, 0x4ef, &(0x7f00000003c0)="$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") r1 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./bus\x00', 0x0, 0x851800, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000200)={'pim6reg1\x00', {0x2, 0x0, @dev}}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, "ef359f413bb90152f7d6d1ce5d29c3ee5e5ca9000f7c41499dc2aac63a01000000000000004faa2ad9c084a003ea00", "036c47c67808200400000000000000335263bdbcef549ba197fce47ddfdd753abd950100002a00ffffffffffffffff00000000e8f20000000200", "b7326736181c208220000000b9000000000000000000f0fffffffff2ff00"}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0x40086610, &(0x7f0000000080)={@desc={0x4100, 0x0, @desc1}}) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2800006, 0xc3072, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600600, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) 1m0.043009021s ago: executing program 4 (id=5465): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r0}, 0x10) alarm(0xb95) alarm(0x7) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000480)='./file0\x00', 0x18000, &(0x7f0000000440)=ANY=[], 0x8, 0x307, &(0x7f0000000a00)="$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") r1 = creat(&(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x110) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0xffeeffffffffffff) r4 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000040)='FROZEN\x00', 0x7) socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r4, 0x0) pwritev2(r2, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x1}], 0x1, 0x7000, 0x0, 0x0) r7 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) sendfile(r1, r7, 0x0, 0x1000000201005) 59.895800378s ago: executing program 4 (id=5469): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x4b0}}, 0x0) 59.88166119s ago: executing program 34 (id=5469): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000d40000000000000000000000000a20000000000a03000000000000000000010000000900010073797a3000000000bc000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000009000038008000240000000007c00038014000100626f6e64300000000000000000000000140001006970766c616e31000000000000000000140001006970766c616e300000000000000000001400010073697430000000000000fbffffffffffffff0100776c616e300000000000000000000000140001006772653000000000000000000000040008000140000000005c000000180a01010000000000000000010000000900020073797a30000000000900010073797a3000000000300003802c00038014000100626f6e6430"], 0x4b0}}, 0x0) 20.382497721s ago: executing program 5 (id=6203): sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00', @ANYBLOB="000000000000000000000f0000000e0001006e657464617673696d0000000f0002"], 0x44}}, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r1, 0x4b49, 0x0) r2 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r2, &(0x7f0000003080)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000300)=[{&(0x7f00000007c0)="451fb88ae975f58b82298dca2a6ee73f3cb4da03d559c14582e34297893c5f4fee2bf9d29330a460441f8cf14b0db1f32807d00c8ebdd96da9", 0x39}, {&(0x7f00000008c0)}, {0x0}, {&(0x7f0000000b40)}, {&(0x7f0000000440)}, {0x0}], 0x6}}, {{&(0x7f0000002e40)={0xa, 0x0, 0x6, @mcast2, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="503b4ab352bc68fa93885b52030000005e4a27440bfce3a04b76edd9cfbef03981550950c85f378c83"], 0x18}}], 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f00000003c0)=ANY=[], 0x9) 20.369262923s ago: executing program 5 (id=6204): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x3, 0x0, 0x0, 0x5, 0x1, 0x98}]}}, 0x0, 0x26, 0x0, 0x8, 0xffffffff, 0x0, @void, @value}, 0x28) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x401) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_open_procfs(0x0, &(0x7f0000000280)='ns\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x101) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000002780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x15, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) sendmsg$inet(r2, 0x0, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) syz_emit_ethernet(0x4a, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) 20.352546194s ago: executing program 5 (id=6206): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f00000044c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f00000047c0)={0x20, r2, 0x405, 0x70bd27, 0x25dfdbfe, {}, [{{0x8}, {0x4}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000401}, 0x44084) 20.30256325s ago: executing program 5 (id=6208): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x80801c, &(0x7f0000000f40), 0x1, 0x503, &(0x7f0000000880)="$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") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000540)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000700)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r2, @ANYBLOB="01002c00", @ANYRES32=0x0, @ANYBLOB="0600ab000300000006001000cc05000019001300ec6c8b48a405a4844881b0b6830101c8609b0c82b00000000600120068ab000006003600020000004400810005000100810000000500020008000000050002007f000000050002000600000005000100ae000000050002000700000005000200020000000500020045000000050029000c0000000600ed00f08600000c0043000600000004000000"], 0xb8}, 0x1, 0x0, 0x0, 0x8c}, 0x8000) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)={0x78, r1, 0x309, 0x0, 0x0, {}, [@HEADER={0x4}, @HEADER={0x4}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x4}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x78}}, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r6, 0x84, 0x7d, &(0x7f0000000000)={r8, 0x2}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000300)={0x6, 0x35c, 0x203, 0xc32, 0x6, 0x1, 0x0, 0x4, r8}, 0x20) r9 = fsmount(0xffffffffffffffff, 0x1, 0x71) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)=0x0) ioctl$BINDER_FREEZE(r9, 0x400c620e, &(0x7f00000006c0)={r10, 0x1, 0xcd67}) r11 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r11, &(0x7f0000000200), 0xf642e7e) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r12}, 0x10) fallocate(r11, 0x8, 0x1800, 0x1000) r13 = socket$inet_udp(0x2, 0x2, 0x0) close(r13) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$binfmt_elf64(r14, &(0x7f0000000200)=ANY=[], 0x10132) r15 = creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r14, r15, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r15}, 0x2c, {'wfdno', 0x3d, r13}}) 20.200520662s ago: executing program 5 (id=6210): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000700)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) socket$kcm(0x10, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=ANY=[@ANYBLOB="340000001800dd8d00000000000000000200000000000006000000000600150006000000100016800c0002"], 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x8000) 20.153947237s ago: executing program 5 (id=6212): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010200000000000000020000000900010073797a300000000040000000030a01010000000000000000020000000900010073797a30000000000900030073797a320000000014000480080001400000000008000240000000002c00000003"], 0xb4}}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff0180"], 0x15) r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x30) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000001340)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid}], [], 0x6b}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x2) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000780)={0xac, r8, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x4}]}, 0xac}}, 0x28004400) 4.615107736s ago: executing program 35 (id=6212): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010200000000000000020000000900010073797a300000000040000000030a01010000000000000000020000000900010073797a30000000000900030073797a320000000014000480080001400000000008000240000000002c00000003"], 0xb4}}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff0180"], 0x15) r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x30) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000001340)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid}], [], 0x6b}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x2) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000780)={0xac, r8, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x4}]}, 0xac}}, 0x28004400) 3.297015968s ago: executing program 3 (id=6417): socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b00000005000000010001000700000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000a978d2adac4a1e55801d5a66a27ee2837f1557222dd2f7a789be27ba3b932bcfd11c32945dbda625ef7cbb49d04cedece71e7ce3a8a2e0e4e1a5bad3f9984566540b4462158c0a71f7acfa75a4e3690f037763bc7a8765f038ee2a5b456371283db45513dd070e73dcbc7f79c827dd23637bb109912e43aa5410f96866511cc5bf11643ae044771d80946911c3784fb73177f1b843089c93b04910ccd452affe3db6cdc0c83ffc5f82bdda63cc3c1559c70e1c1f4d3d180eac1ae188e8f6e5ee"], 0x50) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="500000000301010400000000000000000a0000003c0002800c00028005000100060000002c000180"], 0x50}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x14, r2, 0x601}, 0x14}}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000300)=ANY=[], 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_netdev_private(r3, 0x8922, &(0x7f0000000040)="f7618fc5e7ce492ceb4e3a") gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) readv(r4, &(0x7f0000002140)=[{&(0x7f00000010c0)=""/29, 0x1d}], 0x300) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETMODE(r5, 0x4bfb, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x3, &(0x7f0000000000), 0x1, 0x614, &(0x7f0000000ac0)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 2.440032298s ago: executing program 3 (id=6427): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) finit_module(r2, 0x0, 0x0) r3 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x381001, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000080), 0x1c) connect$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x40001}}}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080), 0x2000011a) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18070000000000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) fcntl$lock(r6, 0x6, &(0x7f0000002000)={0x1}) fcntl$lock(r6, 0x26, &(0x7f00000031c0)) 2.028034095s ago: executing program 8 (id=6435): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x99, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)={0x0, 0x5, 0x1, "fd"}, 0x9) sendto$inet6(r0, &(0x7f00000000c0)="eb", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 2.027334025s ago: executing program 8 (id=6436): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x80801c, &(0x7f0000000f40), 0x1, 0x503, &(0x7f0000000880)="$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") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000540)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000700)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r2, @ANYBLOB="01002c00", @ANYRES32=0x0, @ANYBLOB="0600ab000300000006001000cc05000019001300ec6c8b48a405a4844881b0b6830101c8609b0c82b00000000600120068ab000006003600020000004400810005000100810000000500020008000000050002007f000000050002000600000005000100ae000000050002000700000005000200020000000500020045000000050029000c0000000600ed00f08600000c0043000600000004000000"], 0xb8}, 0x1, 0x0, 0x0, 0x8c}, 0x8000) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)={0x78, r1, 0x309, 0x0, 0x0, {}, [@HEADER={0x4}, @HEADER={0x4}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x4}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x78}}, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r6, 0x84, 0x7d, &(0x7f0000000000)={r8, 0x2}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000300)={0x6, 0x35c, 0x203, 0xc32, 0x6, 0x1, 0x0, 0x4, r8}, 0x20) r9 = fsmount(0xffffffffffffffff, 0x1, 0x71) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)=0x0) ioctl$BINDER_FREEZE(r9, 0x400c620e, &(0x7f00000006c0)={r10, 0x1, 0xcd67}) r11 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r11, &(0x7f0000000200), 0xf642e7e) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r12}, 0x10) fallocate(r11, 0x8, 0x1800, 0x1000) r13 = socket$inet_udp(0x2, 0x2, 0x0) close(r13) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$binfmt_elf64(r14, &(0x7f0000000200)=ANY=[], 0x10132) r15 = creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r14, r15, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r15}, 0x2c, {'wfdno', 0x3d, r13}}) 1.924143327s ago: executing program 8 (id=6437): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) request_key(0x0, &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)='usrjquota=', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x99, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c3000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)={0x0, 0x5, 0x1, "fd"}, 0x9) sendto$inet6(r0, &(0x7f00000000c0)="eb", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000340)={0x0, 0x5}, 0x8) 1.855242155s ago: executing program 8 (id=6438): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) finit_module(r2, 0x0, 0x0) r3 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="b88c99f25627389b91133fdca5669989439f8599b9e2866ebf6f5a60a8b387dd8822bb30c849e1a4ddd4a83deb88c827603788d69e613c226806510eaedacf180de2bb2168b7f2e47b26754745f0635324db9361b5e5c9f5b99962fad1923d29db958ac9da5583f1adf1e8fd6c6f1155440b800a0c89601c189d3f9b18fdc7cc1eed491a5632af2b3616b44ca57e7a6fdfc0e501dd521c7256a923c38bb7adac009bf6ae08915f614ae724f4340243d83d9141a71d450708254fd774ed431b78208767", 0xc3}], 0x1}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x381001, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000080), 0x1c) connect$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x40001}}}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080), 0x2000011a) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18070000000000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) fcntl$lock(r6, 0x6, &(0x7f0000002000)={0x1}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$lock(r6, 0x26, &(0x7f00000031c0)) 1.587492536s ago: executing program 3 (id=6439): socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b00000005000000010001000700000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000a978d2adac4a1e55801d5a66a27ee2837f1557222dd2f7a789be27ba3b932bcfd11c32945dbda625ef7cbb49d04cedece71e7ce3a8a2e0e4e1a5bad3f9984566540b4462158c0a71f7acfa75a4e3690f037763bc7a8765f038ee2a5b456371283db45513dd070e73dcbc7f79c827dd23637bb109912e43aa5410f96866511cc5bf11643ae044771d80946911c3784fb73177f1b843089c93b04910ccd452affe3db6cdc0c83ffc5f82bdda63cc3c1559c70e1c1f4d3d180eac1ae188e8f6e5ee"], 0x50) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="500000000301010400000000000000000a0000003c0002800c00028005000100060000002c000180"], 0x50}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x14, r2, 0x601}, 0x14}}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000300)=ANY=[], 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_netdev_private(r3, 0x8922, &(0x7f0000000040)="f7618fc5e7ce492ceb4e3a") gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) readv(r4, &(0x7f0000002140)=[{&(0x7f00000010c0)=""/29, 0x1d}], 0x300) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETMODE(r5, 0x4bfb, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x3, &(0x7f0000000000), 0x1, 0x614, &(0x7f0000000ac0)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 1.399899147s ago: executing program 6 (id=6441): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000180)) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000040)=ANY=[], 0x2c}, 0x1, 0x0, 0x0, 0x400c840}, 0x80) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="060000000700"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r4, @ANYBLOB="c26cb9f586c3d3e179620ad7b53df98b9ab23fcce9ff5ea2f72dd1659ee80b63f58b3f607a2e0904bebdd355378a12972574f46e17e609fc629e74cde0a632c0bba8186472fdae56a2e1a6cdaeff87715ee8", @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x2000000000000014, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="e2552bbc9f7c9a007e7558e10fa01f990715a8499cf1b6bcaca26ac68ee8af8ab32df0215dfb9832dc9574334f1188742f43bd60c8b3a1721c468badd6fedf73ef52c793cc37eac4c92b2b5c8c0c76ec2e21ee52b9750d26e166f742e9c50851ed7816545d85e2359701ee0f2328b8d999c741bf432a4f4c0b40840d16c4fe717d2f0aab917b7b3125618886610b83a7fe7377a11d5d4720c15622991d63d1dd42e95bce56eb67aa4723cd763cfe515a051c", @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000020702500000000002020207b1af8ff00000000bfa100000000000007010000dbffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r9 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000009c0)=ANY=[@ANYBLOB="40000200c52a19f45234dd61a759ba0da3d9c07424b00f87ccbe234b1e0e12abaea468cee9a6c8e3294421f60fb3cc04", @ANYRES16=r8, @ANYBLOB="01000300000000000000020000001400020070696d367265673100000000000000000900010073797a31000000000900030073797a3200000000"], 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000980)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="270c000407020000000000000000"], 0x14}, 0x1, 0x40030000000000}, 0x0) sendto$inet(r6, &(0x7f0000000100)="ab", 0x1, 0xe61e2840a154b0c0, &(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10) r10 = socket$nl_route(0x10, 0x3, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r11 = socket$packet(0x11, 0x2, 0x300) sendmsg$xdp(r3, &(0x7f0000000800)={&(0x7f00000003c0)={0x2c, 0x4, 0x0, 0x15}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000400)="f19abf4d64153710cbf1", 0xa}, {&(0x7f0000000440)="21b490590c9dd6860e3ce52f6d992ac8c77ff6b778b57ccce004b5c066f9e7c5e74ff8f8b6c9ad684a602767448385b3f929588ac41e2bd850f9927d935f42e4ab0419040c4ce253a94dea74ecdc2b9538a3ddb3e8d4b705805108c708f76d0d6dabb0c92ae7aa8173aa1a659a378111c0841b3c82a6475c362fbd20a06df8e6c741da805de2dc6faec57556dfee932ed645f42b2cf8fdba7481eaa1fd", 0x9d}, {&(0x7f0000000500)="b4c70321b6ded2474ead2e363b5f6e91a82a1d02af841cc2851b2f1e5088172c1f3dce5fb0fc3ae2b3186711ad6024", 0x2f}, {&(0x7f0000000580)="aea275fc77a06b2f44fa9e5d39eb1139c1f65243f41c1bfa84d4feb2f0102b9df187792271eae12b68", 0x29}, {&(0x7f00000005c0)="e4b70ed3c78be564da65a2b22a393caf5c01249ee1cfa7c8341897eaf0783ac80b7658d8fe29f8d65779180b62d4403ee8efaeaa4c386cef5f8958cbd473bc0e5f82b8e146b915a5c17e2c2e9a8eafa2aa346e059559564b566103dcf65b607698fb37528b0941067433d45130", 0x6d}, {&(0x7f0000000640)="87c8ee104698f10c827f7ecb7b3823656a48a4239283b5cd7db56d09ddffa59fe8d8dc087d7885e3e7d18a43d84eed", 0x2f}], 0x6, 0x0, 0x0, 0x44854}, 0x8c0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r12}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 1.360972882s ago: executing program 6 (id=6442): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280c086, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x97, 0x2a9, &(0x7f0000000500)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) getpid() gettid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000540)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) 1.325134337s ago: executing program 2 (id=6444): socket$inet6_udp(0xa, 0x2, 0x0) creat(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) sched_getaffinity(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000200)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000a80)=ANY=[@ANYBLOB="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", @ANYRES16=r3], 0x1, 0x11dc, &(0x7f0000001280)="$eJzs3MGLG1UcB/Bf19rW1N2sWqstiA+96GVo9uBFL0G2IA0obSO0gjB1JxoyJiETFiJi9eTVv0M8ehPEm1724t/gbS8eexBHTNR2l3hYdDewfD6X/OD3vuQ9BgbeMG/23/jq40Gvynr5NNbOnIm1cUR6kCLFWvzt83j19R9/euHWnbs32p3O9s2Urrdvt15LKW28+P17n37z0g/Ti+9+u/Hd+djbfH//161f9i7vXdn//fZH/Sr1qzQcTVOe7o1G0/xeWaSdfjXIUnqnLPKqSP1hVUwO9HvlaDyepXy4s94YT4qqSvlwlgbFLE1HaTqZpfzDvD9MWZal9UbwX3S/flDXdURdPx7noq7r+oloxMV4MtZjI5qxGU/F0/FMXIpn43I8F8/HlfmoVc8bAAAAAAAAAAAAAAAAAAAAThfn/wEAAAAAAAAAAAAAAAAAAGD1bt25e6Pd6WzfTOlCRPnlbne3u/hd9Nu96EcZRVyLZvwW89P/C4v6+lud7WtpbjO+KO//lb+/233sYL41/5zA0nxrkU8H8+ej8Wh+K5pxaXl+a2n+Qrzy8iP5LJrx8wcxijJ24s/sw/xnrZTefLtzKH91Pg4AAABOgyz9Y+n+Pcv+rb/IH+H5wKH99dm4ena1ayeimn0yyMuymBxbcS6O/S8UCsX/XKz6zsRJeHjRVz0TAAAAAAAAAAAAjuIkXidc9RoBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIA/2IFjAQAAAABh/tZpdGwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBVAAAA//8xgdSv") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0x64, 0x30, 0xb, 0x3, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x80000001, 0x0, 0x0, 0x0, 0x400}}, @TCA_CT_ZONE={0x6, 0x4, 0x7}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x8890}, 0x40) 1.226245908s ago: executing program 6 (id=6445): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500000006", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x4e22, 0x7, @empty, 0xfffffffe}}, 0x1, 0x9, 0x6, 0x0, 0x7}, &(0x7f0000000700)=0x98) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000380)='./file2\x00', 0x1404, &(0x7f0000000d80)={[{@mblk_io_submit}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@prjquota}, {@nouser_xattr}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x0, 0x18c, 0x203, 0x4d000000, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x300, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x16}]}}, @common=@hl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'veth1_macvtap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) 1.200654881s ago: executing program 7 (id=6447): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x99, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)={0x0, 0x5, 0x1, "fd"}, 0x9) sendto$inet6(r0, &(0x7f00000000c0)="eb", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 1.200107641s ago: executing program 6 (id=6448): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x80801c, &(0x7f0000000f40), 0x1, 0x503, &(0x7f0000000880)="$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") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000540)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000700)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r2, @ANYBLOB="01002c00", @ANYRES32=0x0, @ANYBLOB="0600ab000300000006001000cc05000019001300ec6c8b48a405a4844881b0b6830101c8609b0c82b00000000600120068ab000006003600020000004400810005000100810000000500020008000000050002007f000000050002000600000005000100ae000000050002000700000005000200020000000500020045000000050029000c0000000600ed00f08600000c0043000600000004000000"], 0xb8}, 0x1, 0x0, 0x0, 0x8c}, 0x8000) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)={0x78, r1, 0x309, 0x0, 0x0, {}, [@HEADER={0x4}, @HEADER={0x4}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x4}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x78}}, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r6, 0x84, 0x7d, &(0x7f0000000000)={r8, 0x2}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000300)={0x6, 0x35c, 0x203, 0xc32, 0x6, 0x1, 0x0, 0x4, r8}, 0x20) r9 = fsmount(0xffffffffffffffff, 0x1, 0x71) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)=0x0) ioctl$BINDER_FREEZE(r9, 0x400c620e, &(0x7f00000006c0)={r10, 0x1, 0xcd67}) r11 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r11, &(0x7f0000000200), 0xf642e7e) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r12}, 0x10) fallocate(r11, 0x8, 0x1800, 0x1000) r13 = socket$inet_udp(0x2, 0x2, 0x0) close(r13) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$binfmt_elf64(r14, &(0x7f0000000200)=ANY=[], 0x10132) r15 = creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r14, r15, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r15}, 0x2c, {'wfdno', 0x3d, r13}}) 1.181472043s ago: executing program 7 (id=6449): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) (rerun: 64) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f0000000340)=""/193, 0xc1}], 0x1, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x5, 0x2, 0x1000, 0x1, r0, 0xfffffffb, '\x00', r1, r2, 0x0, 0x2, 0x5, 0x5, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r5 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') openat$binfmt(0xffffffffffffff9c, r5, 0x42, 0x1ff) (async, rerun: 32) r6 = openat$binfmt(0xffffffffffffff9c, r5, 0x2, 0x0) (rerun: 32) write(r6, &(0x7f0000000180)="01", 0x1) (async, rerun: 64) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x842, 0x0) (async, rerun: 64) fchmodat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x1ff) (async) execveat$binfmt(0xffffffffffffff9c, r5, 0x0, 0x0, 0x0) 955.164819ms ago: executing program 7 (id=6450): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) finit_module(r2, 0x0, 0x0) r3 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x381001, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000080), 0x1c) connect$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x40001}}}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080), 0x2000011a) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18070000000000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) fcntl$lock(r6, 0x6, &(0x7f0000002000)={0x1}) fcntl$lock(r6, 0x26, &(0x7f00000031c0)) 846.881642ms ago: executing program 8 (id=6451): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) finit_module(r2, 0x0, 0x0) r3 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="b88c99f25627389b91133fdca5669989439f8599b9e2866ebf6f5a60a8b387dd8822bb30c849e1a4ddd4a83deb88c827603788d69e613c226806510eaedacf180de2bb2168b7f2e47b26754745f0635324db9361b5e5c9f5b99962fad1923d29db958ac9da5583f1adf1e8fd6c6f1155440b800a0c89601c189d3f9b18fdc7cc1eed491a5632af2b3616b44ca57e7a6fdfc0e501dd521c7256a923c38bb7adac009bf6ae08915f614ae724f4340243d83d9141a71d450708254fd774ed431b78208767e1166f23f29a8e1aed0fbc9d581f8c6c8747b841c1001c18b7c4b3", 0xde}], 0x1}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x381001, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000080), 0x1c) connect$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x40001}}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18070000000000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) fcntl$lock(r6, 0x6, &(0x7f0000002000)={0x1}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000e80)=@newtaction={0x894, 0x30, 0xffff, 0x0, 0x0, {}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcd19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20000000]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x5, 0x0, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x5}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}}}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x4, 0x40, 0x228, 0x4, 0x1, 0x9, 0x2, 0x0, 0xfff, 0xbd, 0x100, 0x7, 0x1, 0x9, 0x5, 0x5, 0x7, 0x1, 0x3, 0x2, 0x100, 0x9, 0xf54, 0xfffffff9, 0x2, 0x7, 0x2, 0x9, 0xa018, 0x2cf, 0x0, 0x7, 0xfffffff9, 0x4, 0x4, 0x0, 0x3, 0xfffffffa, 0x7, 0x6, 0xd4, 0x7, 0x9993, 0x57c6, 0xff, 0x3, 0xa2e, 0x7, 0x276400, 0xdb6, 0x6, 0x8, 0xcf1, 0x101, 0xb, 0x4, 0x2, 0x908, 0xbeed, 0x90, 0x8, 0x2, 0x6, 0x0, 0x10001, 0x81, 0xfffffffb, 0xecd, 0x2, 0x4, 0x70, 0x31b4, 0x7fff, 0x8000, 0x7f, 0x2, 0xffff, 0xff, 0x79, 0x11ac18e0, 0x8, 0x9, 0x0, 0x2, 0x7, 0xfffffff7, 0x6, 0x2, 0x1, 0x5, 0x95a0, 0x7, 0x5, 0x1, 0xfffffffc, 0xf54, 0xd71, 0x2, 0x4, 0x100, 0x9, 0x1, 0x8, 0x3, 0x8, 0x5075, 0x0, 0x4, 0x0, 0x3, 0x8, 0x10, 0x6, 0x8, 0x10001, 0x10001, 0x200, 0x8, 0x7ff, 0x2, 0x0, 0x7, 0x6, 0x8, 0xfffeffff, 0x4f8, 0x6, 0x800, 0x6, 0x8, 0x6, 0xa618, 0x9, 0x1, 0xd, 0x4, 0x101, 0x0, 0x8, 0xffffffff, 0x2, 0x3, 0x10, 0x0, 0x7, 0x9, 0x3, 0x33b, 0xba, 0x24, 0x0, 0x2, 0x6, 0x200, 0x8001, 0x80, 0xb, 0x100, 0x2, 0xc964, 0x6, 0x3, 0x7ff, 0x2, 0x0, 0xfffffff8, 0x9bc7, 0x2, 0x1000, 0x4, 0xffffffff, 0x1, 0x5, 0x5, 0x6, 0x200, 0x1501, 0xf19a, 0xfffffffc, 0x8, 0xc7, 0x1, 0x8, 0x209d30f8, 0x2, 0x7, 0x1, 0xfffffff6, 0x1, 0x0, 0x277ca520, 0x200, 0x8, 0x4, 0xfffffffc, 0x9, 0x3, 0x2200, 0x4, 0x80000001, 0x1, 0x9, 0xfffff000, 0x7, 0x8, 0x8, 0x1, 0x91a, 0x9, 0x948, 0x7f, 0x80000001, 0x7, 0x5, 0xc3, 0x28000000, 0x3, 0x56, 0x5136, 0x2, 0xb9, 0xf, 0xcf, 0x4, 0x0, 0x2, 0xfff, 0x40, 0xffffffff, 0x3, 0xfffffbff, 0x5, 0xa, 0x9, 0x7b, 0x1, 0x2, 0x80000000, 0x3, 0x80, 0xf6c, 0x6, 0x708, 0xffff, 0x88b, 0x5, 0x5, 0x2, 0x30, 0x3, 0xa, 0x5, 0xff, 0x5, 0x1cd, 0x7f]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0xc3c}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x0, 0x3}}}}]}]}, 0x894}}, 0x40) fcntl$lock(r6, 0x26, &(0x7f00000031c0)) 846.133582ms ago: executing program 6 (id=6452): alarm(0x7) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000480)='./file0\x00', 0x18000, &(0x7f0000000440)=ANY=[], 0x8, 0x307, &(0x7f0000000a00)="$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") r0 = creat(&(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x110) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000040)='FROZEN\x00', 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r2, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x1}], 0x1, 0x7000, 0x0, 0x0) r6 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) sendfile(r0, r6, 0x0, 0x1000000201005) 722.188396ms ago: executing program 3 (id=6453): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000180)) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000040)=ANY=[], 0x2c}, 0x1, 0x0, 0x0, 0x400c840}, 0x80) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="060000000700"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r4, @ANYBLOB="c26cb9f586c3d3e179620ad7b53df98b9ab23fcce9ff5ea2f72dd1659ee80b63f58b3f607a2e0904bebdd355378a12972574f46e17e609fc629e74cde0a632c0bba8186472fdae56a2e1a6cdaeff87715ee8", @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x2000000000000014, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="e2552bbc9f7c9a007e7558e10fa01f990715a8499cf1b6bcaca26ac68ee8af8ab32df0215dfb9832dc9574334f1188742f43bd60c8b3a1721c468badd6fedf73ef52c793cc37eac4c92b2b5c8c0c76ec2e21ee52b9750d26e166f742e9c50851ed7816545d85e2359701ee0f2328b8d999c741bf432a4f4c0b40840d16c4fe717d2f0aab917b7b3125618886610b83a7fe7377a11d5d4720c15622991d63d1dd42e95bce56eb67aa4723cd763cfe515a051c", @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000020702500000000002020207b1af8ff00000000bfa100000000000007010000dbffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r9 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000009c0)=ANY=[@ANYBLOB="40000200c52a19f45234dd61a759ba0da3d9c07424b00f87ccbe234b1e0e12abaea468cee9a6c8e3294421f60fb3cc04", @ANYRES16=r8, @ANYBLOB="01000300000000000000020000001400020070696d367265673100000000000000000900010073797a31000000000900030073797a3200000000"], 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000980)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="270c000407020000000000000000"], 0x14}, 0x1, 0x40030000000000}, 0x0) sendto$inet(r6, &(0x7f0000000100)="ab", 0x1, 0xe61e2840a154b0c0, &(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10) r10 = socket$nl_route(0x10, 0x3, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r11 = socket$packet(0x11, 0x2, 0x300) sendmsg$xdp(r3, &(0x7f0000000800)={&(0x7f00000003c0)={0x2c, 0x4, 0x0, 0x15}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000400)="f19abf4d64153710cbf1", 0xa}, {&(0x7f0000000440)="21b490590c9dd6860e3ce52f6d992ac8c77ff6b778b57ccce004b5c066f9e7c5e74ff8f8b6c9ad684a602767448385b3f929588ac41e2bd850f9927d935f42e4ab0419040c4ce253a94dea74ecdc2b9538a3ddb3e8d4b705805108c708f76d0d6dabb0c92ae7aa8173aa1a659a378111c0841b3c82a6475c362fbd20a06df8e6c741da805de2dc6faec57556dfee932ed645f42b2cf8fdba7481eaa1fd", 0x9d}, {&(0x7f0000000500)="b4c70321b6ded2474ead2e363b5f6e91a82a1d02af841cc2851b2f1e5088172c1f3dce5fb0fc3ae2b3186711ad6024", 0x2f}, {&(0x7f0000000580)="aea275fc77a06b2f44fa9e5d39eb1139c1f65243f41c1bfa84d4feb2f0102b9df187792271eae12b68", 0x29}, {&(0x7f00000005c0)="e4b70ed3c78be564da65a2b22a393caf5c01249ee1cfa7c8341897eaf0783ac80b7658d8fe29f8d65779180b62d4403ee8efaeaa4c386cef5f8958cbd473bc0e5f82b8e146b915a5c17e2c2e9a8eafa2aa346e059559564b566103dcf65b607698fb37528b0941067433d45130", 0x6d}, {&(0x7f0000000640)="87c8ee104698f10c827f7ecb7b3823656a48a4239283b5cd7db56d09ddffa59fe8d8dc087d7885e3e7d18a43d84eed", 0x2f}], 0x6, 0x0, 0x0, 0x44854}, 0x8c0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r12}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 675.875602ms ago: executing program 6 (id=6454): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081000000bfa30000000000000703000003feffff720af0fff8ffffff71a4f0ff0000000071100000000000001d400500000000004704000001ed00000f030000000000001d44000000000000620a00fe040026ca7203000000000000b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51bf900000000000000d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba3a9508f9d6aba582a896a9f1e096df6ecea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350844ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b583cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6032399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00000000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c91024cf71126233cb8791c3c"], &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0xffffffffffffffb9, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r0 = syz_open_dev$mouse(&(0x7f0000000040), 0x9076, 0x200000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x6, &(0x7f0000002000)={0x1}) fcntl$lock(r2, 0x26, &(0x7f00000031c0)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000003840), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000003fc0)={0x0, 0x0, &(0x7f0000003f80)={&(0x7f00000002c0)={0x20, r4, 0x1, 0x0, 0x20000000, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x20}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c000000100003042cbd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000003c00128009000100766c616e000000002c00028006000100000000001c0003800c00010000010000800000000c00010000000000ffffff7f0400048008000a00", @ANYRES32=r7, @ANYBLOB="08000500", @ANYRES32=r7], 0x6c}, 0x1, 0xba01}, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1d, 0x10001, 0x6, 0x10000, 0x4000, r0, 0xfffffffc, '\x00', r7, r8, 0x1, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'geneve0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r11}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x84}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x110, r4, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x4}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xffff}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xa0}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x8}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x5}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x6}, @ETHTOOL_A_LINKMODES_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x6}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000}, 0x10) 666.693753ms ago: executing program 3 (id=6455): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f00000047c0)={0x20, r1, 0x405, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000401}, 0x44084) 654.594844ms ago: executing program 3 (id=6456): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) finit_module(r2, 0x0, 0x0) r3 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="b88c99f25627389b91133fdca5669989439f8599b9e2866ebf6f5a60a8b387dd8822bb30c849e1a4ddd4a83deb88c827603788d69e613c226806510eaedacf180de2bb2168b7f2e47b26754745f0635324db9361b5e5c9f5b99962fad1923d29db958ac9da5583f1adf1e8fd6c6f1155440b800a0c89601c189d3f9b18fdc7cc1eed491a5632af2b3616b44ca57e7a6fdfc0e501dd521c7256a923c38bb7adac009bf6ae08915f614ae724f4340243d83d9141a71d450708254fd774ed431b78208767e1166f23f29a8e1aed0fbc9d581f8c6c8747b841c1001c18b7c4b3", 0xde}], 0x1}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x381001, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18070000000000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) fcntl$lock(r6, 0x6, &(0x7f0000002000)={0x1}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000e80)=@newtaction={0x894, 0x30, 0xffff, 0x0, 0x0, {}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcd19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20000000]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x5, 0x0, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x5}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}}}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x4, 0x40, 0x228, 0x4, 0x1, 0x9, 0x2, 0x0, 0xfff, 0xbd, 0x100, 0x7, 0x1, 0x9, 0x5, 0x5, 0x7, 0x1, 0x3, 0x2, 0x100, 0x9, 0xf54, 0xfffffff9, 0x2, 0x7, 0x2, 0x9, 0xa018, 0x2cf, 0x0, 0x7, 0xfffffff9, 0x4, 0x4, 0x0, 0x3, 0xfffffffa, 0x7, 0x6, 0xd4, 0x7, 0x9993, 0x57c6, 0xff, 0x3, 0xa2e, 0x7, 0x276400, 0xdb6, 0x6, 0x8, 0xcf1, 0x101, 0xb, 0x4, 0x2, 0x908, 0xbeed, 0x90, 0x8, 0x2, 0x6, 0x0, 0x10001, 0x81, 0xfffffffb, 0xecd, 0x2, 0x4, 0x70, 0x31b4, 0x7fff, 0x8000, 0x7f, 0x2, 0xffff, 0xff, 0x79, 0x11ac18e0, 0x8, 0x9, 0x0, 0x2, 0x7, 0xfffffff7, 0x6, 0x2, 0x1, 0x5, 0x95a0, 0x7, 0x5, 0x1, 0xfffffffc, 0xf54, 0xd71, 0x2, 0x4, 0x100, 0x9, 0x1, 0x8, 0x3, 0x8, 0x5075, 0x0, 0x4, 0x0, 0x3, 0x8, 0x10, 0x6, 0x8, 0x10001, 0x10001, 0x200, 0x8, 0x7ff, 0x2, 0x0, 0x7, 0x6, 0x8, 0xfffeffff, 0x4f8, 0x6, 0x800, 0x6, 0x8, 0x6, 0xa618, 0x9, 0x1, 0xd, 0x4, 0x101, 0x0, 0x8, 0xffffffff, 0x2, 0x3, 0x10, 0x0, 0x7, 0x9, 0x3, 0x33b, 0xba, 0x24, 0x0, 0x2, 0x6, 0x200, 0x8001, 0x80, 0xb, 0x100, 0x2, 0xc964, 0x6, 0x3, 0x7ff, 0x2, 0x0, 0xfffffff8, 0x9bc7, 0x2, 0x1000, 0x4, 0xffffffff, 0x1, 0x5, 0x5, 0x6, 0x200, 0x1501, 0xf19a, 0xfffffffc, 0x8, 0xc7, 0x1, 0x8, 0x209d30f8, 0x2, 0x7, 0x1, 0xfffffff6, 0x1, 0x0, 0x277ca520, 0x200, 0x8, 0x4, 0xfffffffc, 0x9, 0x3, 0x2200, 0x4, 0x80000001, 0x1, 0x9, 0xfffff000, 0x7, 0x8, 0x8, 0x1, 0x91a, 0x9, 0x948, 0x7f, 0x80000001, 0x7, 0x5, 0xc3, 0x28000000, 0x3, 0x56, 0x5136, 0x2, 0xb9, 0xf, 0xcf, 0x4, 0x0, 0x2, 0xfff, 0x40, 0xffffffff, 0x3, 0xfffffbff, 0x5, 0xa, 0x9, 0x7b, 0x1, 0x2, 0x80000000, 0x3, 0x80, 0xf6c, 0x6, 0x708, 0xffff, 0x88b, 0x5, 0x5, 0x2, 0x30, 0x3, 0xa, 0x5, 0xff, 0x5, 0x1cd, 0x7f]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0xc3c}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x0, 0x3}}}}]}]}, 0x894}}, 0x40) fcntl$lock(r6, 0x26, &(0x7f00000031c0)) 452.365418ms ago: executing program 2 (id=6457): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000007000000050000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r1, r0}, 0xc) 411.597792ms ago: executing program 2 (id=6458): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280c086, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x97, 0x2a9, &(0x7f0000000500)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) getpid() gettid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000540)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) 411.102672ms ago: executing program 2 (id=6459): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500000006", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x4e22, 0x7, @empty, 0xfffffffe}}, 0x1, 0x9, 0x6, 0x0, 0x7}, &(0x7f0000000700)=0x98) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000380)='./file2\x00', 0x1404, &(0x7f0000000d80)={[{@mblk_io_submit}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@prjquota}, {@nouser_xattr}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x0, 0x18c, 0x203, 0x4d000000, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x300, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x16}]}}, @common=@hl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'veth1_macvtap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) 388.497805ms ago: executing program 2 (id=6460): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x99, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)={0x0, 0x5, 0x1, "fd"}, 0x9) sendto$inet6(r0, &(0x7f00000000c0)="eb", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 371.979967ms ago: executing program 2 (id=6461): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) finit_module(r2, 0x0, 0x0) r3 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="b88c99f25627389b91133fdca5669989439f8599b9e2866ebf6f5a60a8b387dd8822bb30c849e1a4ddd4a83deb88c827603788d69e613c226806510eaedacf180de2bb2168b7f2e47b26754745f0635324db9361b5e5c9f5b99962fad1923d29db958ac9da5583f1adf1e8fd6c6f1155440b800a0c89601c189d3f9b18fdc7cc1eed491a5632af2b3616b44ca57e7a6fdfc0e501dd521c7256a923c38bb7adac009bf6ae08915f614ae724f4340243d83d9141a71d450708254fd774ed431b78208767", 0xc3}], 0x1}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x381001, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000080), 0x1c) connect$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x40001}}}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080), 0x2000011a) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18070000000000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) fcntl$lock(r6, 0x6, &(0x7f0000002000)={0x1}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$lock(r6, 0x26, &(0x7f00000031c0)) 127.799865ms ago: executing program 7 (id=6462): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="001a000000000000001cb95e7c4f4b5c2c6361d327860618e1b5632e94ac854f3dddaaf54593fd3c4946f15939d0af0af3374daf2599d73db13d67891b7c35e7468117fdc7855174972c8e782186a85cc86fa1d880b8d3b1157fa19b3269929121ba9323bb3cb7b8952ba1c98733512df5c5d73d33ba942dbc2efe9236181fdc892b1597d25f34cd7e10442ccbf17a2dd6315c20b53aa666415c122f92ee99bd2b92ef5b3d22452d9b42a636e1b6", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000ec0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000e80)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141a82, 0x0) write$cgroup_int(r5, &(0x7f0000000040)=0x900, 0x12) openat$cgroup_ro(r5, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=@newsa={0x138, 0x10, 0xad0107152c5a2e33, 0x0, 0x0, {{@in=@dev, @in6=@empty}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6c}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x22}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000000c0)={0x13, 0x10, 0x8, {0x0, r3, 0x1}}, 0x18) 15.261568ms ago: executing program 7 (id=6463): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 14.924908ms ago: executing program 7 (id=6464): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) finit_module(r1, 0x0, 0x0) r2 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="b88c99f25627389b91133fdca5669989439f8599b9e2866ebf6f5a60a8b387dd8822bb30c849e1a4ddd4a83deb88c827603788d69e613c226806510eaedacf180de2bb2168b7f2e47b26754745f0635324db9361b5e5c9f5b99962fad1923d29db958ac9da5583f1adf1e8fd6c6f1155440b800a0c89601c189d3f9b18fdc7cc1eed491a5632af2b3616b44ca57e7a6fdfc0e501dd521c7256a923c38bb7adac009bf6ae08915f614ae724f4340243d83d9141a71d450708254fd774ed431b78", 0xc0}], 0x1}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r3, &(0x7f0000000080), 0x1c) connect$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x40001}}}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080), 0x2000011a) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18070000000000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) fcntl$lock(r5, 0x6, &(0x7f0000002000)={0x1}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) fcntl$lock(r5, 0x26, &(0x7f00000031c0)) 0s ago: executing program 8 (id=6465): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYBLOB="000000000000000500"/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="2100000000000000000000000000100000040000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000201000046c500000000000000"], 0x48) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x18, &(0x7f0000000540), 0x1, 0x4a3, &(0x7f0000000580)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b51811", @ANYRES32], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) prctl$PR_SET_SECUREBITS(0x1c, 0x1d) r6 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r9, 0x6, 0x0, 0x0, 0x0) fsmount(r9, 0x0, 0x0) close_range(r8, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket(0x22, 0x3, 0x0) kernel console output (not intermixed with test programs): yz.2.5987 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 247.654499][T19767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 247.664561][T19767] Call Trace: [ 247.667872][T19767] [ 247.670852][T19767] dump_stack_lvl+0xf2/0x150 [ 247.675522][T19767] dump_stack+0x15/0x20 [ 247.679719][T19767] should_fail_ex+0x223/0x230 [ 247.684391][T19767] should_fail+0xb/0x10 [ 247.688539][T19767] should_fail_usercopy+0x1a/0x20 [ 247.693548][T19767] _copy_from_user+0x20/0xe0 [ 247.698192][T19767] get_user_ifreq+0x8c/0x160 [ 247.702789][T19767] sock_do_ioctl+0xc6/0x260 [ 247.707347][T19767] sock_ioctl+0x46a/0x640 [ 247.711709][T19767] ? __pfx_sock_ioctl+0x10/0x10 [ 247.716585][T19767] __se_sys_ioctl+0xcd/0x140 [ 247.721168][T19767] __x64_sys_ioctl+0x43/0x50 [ 247.725769][T19767] x64_sys_call+0x15cc/0x2d60 [ 247.730825][T19767] do_syscall_64+0xc9/0x1c0 [ 247.735362][T19767] ? clear_bhb_loop+0x55/0xb0 [ 247.740034][T19767] ? clear_bhb_loop+0x55/0xb0 [ 247.744695][T19767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 247.750653][T19767] RIP: 0033:0x7f57a65ae719 [ 247.755107][T19767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.774715][T19767] RSP: 002b:00007f57a5227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 247.783124][T19767] RAX: ffffffffffffffda RBX: 00007f57a6765f80 RCX: 00007f57a65ae719 [ 247.791153][T19767] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 247.799151][T19767] RBP: 00007f57a5227090 R08: 0000000000000000 R09: 0000000000000000 [ 247.807125][T19767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.815098][T19767] R13: 0000000000000000 R14: 00007f57a6765f80 R15: 00007ffc2a7bc2e8 [ 247.823136][T19767] [ 247.868035][T19776] Invalid ELF header magic: != ELF [ 247.958744][T19778] loop3: detected capacity change from 0 to 128 [ 248.079995][T19790] Invalid ELF header magic: != ELF [ 248.170646][T19792] Invalid ELF header magic: != ELF [ 248.254985][T19794] loop5: detected capacity change from 0 to 512 [ 248.277353][T19796] loop5: detected capacity change from 0 to 512 [ 248.303931][T19798] loop5: detected capacity change from 0 to 1764 [ 248.377653][T19802] loop6: detected capacity change from 0 to 128 [ 248.419327][T19805] loop6: detected capacity change from 0 to 512 [ 248.453875][T19805] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 248.472396][T19805] ext4 filesystem being mounted at /429/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 248.552680][T19805] 9pnet_fd: Insufficient options for proto=fd [ 248.567688][T13143] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 248.718659][T19820] Invalid ELF header magic: != ELF [ 248.937047][T19822] bridge_slave_0: left allmulticast mode [ 248.942771][T19822] bridge_slave_0: left promiscuous mode [ 248.948452][T19822] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.957802][T19822] bridge_slave_1: left allmulticast mode [ 248.963523][T19822] bridge_slave_1: left promiscuous mode [ 248.969265][T19822] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.979647][T19822] bond0: (slave bond_slave_0): Releasing backup interface [ 248.992405][T19822] bond0: (slave bond_slave_1): Releasing backup interface [ 249.006016][T19822] team0: Port device team_slave_0 removed [ 249.018910][T19822] team0: Port device team_slave_1 removed [ 249.029596][T19822] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 249.037100][T19822] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 249.046120][T19822] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 249.053683][T19822] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 249.061406][T19825] netlink: 40 bytes leftover after parsing attributes in process `syz.7.6009'. [ 249.084991][T19822] vlan2: left promiscuous mode [ 249.089817][T19822] batadv0: left promiscuous mode [ 249.095038][T19822] bridge0: port 3(vlan2) entered disabled state [ 249.139713][T19828] loop3: detected capacity change from 0 to 512 [ 249.177733][T19831] loop3: detected capacity change from 0 to 512 [ 249.184590][T19831] EXT4-fs: Ignoring removed mblk_io_submit option [ 249.192198][T19831] EXT4-fs error (device loop3): ext4_xattr_ibody_find:2240: inode #15: comm syz.3.6011: corrupted in-inode xattr: invalid ea_ino [ 249.206784][T19831] EXT4-fs error (device loop3): ext4_orphan_get:1393: comm syz.3.6011: couldn't read orphan inode 15 (err -117) [ 249.220928][T19831] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 249.237534][T19831] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 249.256640][T11946] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 249.291279][T19838] loop7: detected capacity change from 0 to 1024 [ 249.298253][T19838] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 249.308750][T19838] EXT4-fs (loop7): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 249.319362][T19838] EXT4-fs (loop7): invalid journal inode [ 249.342777][T19839] bridge0: port 1(vlan3) entered blocking state [ 249.349115][T19839] bridge0: port 1(vlan3) entered disabled state [ 249.355574][T19839] vlan3: entered allmulticast mode [ 249.361424][T19839] vlan3: left allmulticast mode [ 249.481572][T19842] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6014'. [ 249.490727][T19842] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6014'. [ 249.546375][T19844] loop6: detected capacity change from 0 to 512 [ 249.574678][T19844] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 249.587898][T19844] ext4 filesystem being mounted at /434/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 249.611828][T19852] Invalid ELF header magic: != ELF [ 249.634559][T19844] 9pnet_fd: Insufficient options for proto=fd [ 249.648261][T13143] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 249.677787][T19856] Invalid ELF header magic: != ELF [ 249.898029][T19858] bridge_slave_0: left allmulticast mode [ 249.903814][T19858] bridge_slave_0: left promiscuous mode [ 249.909539][T19858] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.918395][T19858] bridge_slave_1: left allmulticast mode [ 249.924144][T19858] bridge_slave_1: left promiscuous mode [ 249.929900][T19858] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.938979][T19858] bond0: (slave bond_slave_0): Releasing backup interface [ 249.949393][T19858] bond0: (slave bond_slave_1): Releasing backup interface [ 249.960728][T19858] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 249.968253][T19858] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 249.976696][T19858] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 249.984347][T19858] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 250.030436][T19863] loop7: detected capacity change from 0 to 512 [ 250.080053][T19867] bpf: Bad value for 'uid' [ 250.129773][T19876] Invalid ELF header magic: != ELF [ 250.143159][T19878] loop5: detected capacity change from 0 to 512 [ 250.154109][T19878] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 250.166752][T19878] ext4 filesystem being mounted at /159/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 250.210551][T19878] 9pnet_fd: Insufficient options for proto=fd [ 250.224153][T17770] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 250.258885][ T29] kauditd_printk_skb: 302 callbacks suppressed [ 250.258900][ T29] audit: type=1326 audit(1730253792.626:30200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19864 comm="syz.7.6023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6996c0e719 code=0x7ffc0000 [ 250.284951][T19888] netlink: 40 bytes leftover after parsing attributes in process `syz.5.6031'. [ 250.289333][ T29] audit: type=1326 audit(1730253792.626:30201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19864 comm="syz.7.6023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6996c0e719 code=0x7ffc0000 [ 250.322101][ T29] audit: type=1326 audit(1730253792.626:30202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19864 comm="syz.7.6023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6996c0e719 code=0x7ffc0000 [ 250.345869][ T29] audit: type=1326 audit(1730253792.626:30203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19864 comm="syz.7.6023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6996c0e719 code=0x7ffc0000 [ 250.369658][ T29] audit: type=1326 audit(1730253792.626:30204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19864 comm="syz.7.6023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6996c0e719 code=0x7ffc0000 [ 250.393296][ T29] audit: type=1400 audit(1730253792.636:30205): avc: denied { map } for pid=19884 comm="syz.5.6030" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 250.417794][ T29] audit: type=1400 audit(1730253792.636:30206): avc: denied { execute } for pid=19884 comm="syz.5.6030" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 250.417818][ T29] audit: type=1326 audit(1730253792.696:30207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19864 comm="syz.7.6023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6996c0e719 code=0x7ffc0000 [ 250.417890][ T29] audit: type=1326 audit(1730253792.696:30208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19864 comm="syz.7.6023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6996c0e719 code=0x7ffc0000 [ 250.417911][ T29] audit: type=1326 audit(1730253792.696:30209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19864 comm="syz.7.6023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6996c0e719 code=0x7ffc0000 [ 250.521667][T19893] loop5: detected capacity change from 0 to 1024 [ 250.522161][T19893] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 250.522195][T19893] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 250.525172][T19893] EXT4-fs (loop5): invalid journal inode [ 250.540810][T19895] bridge_slave_0: left allmulticast mode [ 250.557041][T19897] loop6: detected capacity change from 0 to 164 [ 250.559268][T19895] bridge_slave_0: left promiscuous mode [ 250.559362][T19895] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.567643][T19897] Unable to read rock-ridge attributes [ 250.591128][T19895] bridge_slave_1: left allmulticast mode [ 250.596896][T19895] bridge_slave_1: left promiscuous mode [ 250.602725][T19895] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.612756][T19895] bond0: (slave bond_slave_0): Releasing backup interface [ 250.623241][T19895] bond0: (slave bond_slave_1): Releasing backup interface [ 250.636895][T19895] team0: Port device team_slave_0 removed [ 250.645952][T19895] team0: Port device team_slave_1 removed [ 250.653092][T19895] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 250.660549][T19895] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 250.669178][T19895] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 250.676692][T19895] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 250.715508][T19902] loop2: detected capacity change from 0 to 512 [ 251.004052][T19912] Invalid ELF header magic: != ELF [ 251.139774][T19917] loop5: detected capacity change from 0 to 512 [ 251.154962][T19917] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 251.167801][T19917] ext4 filesystem being mounted at /162/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 251.220203][T19917] 9pnet_fd: Insufficient options for proto=fd [ 251.236007][T17770] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 251.253385][T19924] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6042'. [ 251.280071][T19926] loop5: detected capacity change from 0 to 2048 [ 251.296443][T19926] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 251.313841][T19926] program syz.5.6043 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 251.345428][T17770] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 251.396318][T19932] bridge_slave_0: left allmulticast mode [ 251.402066][T19932] bridge_slave_0: left promiscuous mode [ 251.407857][T19932] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.417382][T19932] bridge_slave_1: left allmulticast mode [ 251.423220][T19932] bridge_slave_1: left promiscuous mode [ 251.429007][T19932] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.438413][T19932] bond0: (slave bond_slave_0): Releasing backup interface [ 251.449368][T19932] bond0: (slave bond_slave_1): Releasing backup interface [ 251.464555][T19932] team0: Port device team_slave_0 removed [ 251.475489][T19932] team0: Port device team_slave_1 removed [ 251.482323][T19932] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 251.489816][T19932] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 251.499581][T19932] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 251.507208][T19932] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 251.549758][T19938] netlink: 'syz.5.6047': attribute type 10 has an invalid length. [ 251.561202][T19938] team0: Port device netdevsim1 added [ 251.569389][T19938] netlink: 'syz.5.6047': attribute type 10 has an invalid length. [ 251.581471][T19938] team0: Port device netdevsim1 removed [ 251.589803][T19938] bond0: (slave netdevsim1): Enslaving as an active interface with an up link [ 251.628778][T19942] Invalid ELF header magic: != ELF [ 251.662505][T19944] Falling back ldisc for ttyS3. [ 251.681542][T19946] netlink: 40 bytes leftover after parsing attributes in process `syz.5.6051'. [ 251.760982][T19949] loop5: detected capacity change from 0 to 1024 [ 251.767998][T19949] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 251.777984][T19949] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 251.788958][T19949] EXT4-fs (loop5): invalid journal inode [ 251.842093][T19951] loop3: detected capacity change from 0 to 512 [ 251.854619][T19951] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 251.867233][T19951] ext4 filesystem being mounted at /593/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 251.913811][T19951] 9pnet_fd: Insufficient options for proto=fd [ 251.920121][T19959] Invalid ELF header magic: != ELF [ 251.928735][T11946] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 252.004274][T19964] bridge0: port 1(vlan3) entered blocking state [ 252.010601][T19964] bridge0: port 1(vlan3) entered disabled state [ 252.017318][T19964] vlan3: entered allmulticast mode [ 252.023181][T19964] vlan3: left allmulticast mode [ 252.334701][T19967] bridge_slave_0: left allmulticast mode [ 252.340374][T19967] bridge_slave_0: left promiscuous mode [ 252.346058][T19967] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.355178][T19967] bridge_slave_1: left allmulticast mode [ 252.360881][T19967] bridge_slave_1: left promiscuous mode [ 252.366643][T19967] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.376420][T19967] bond0: (slave bond_slave_0): Releasing backup interface [ 252.386475][T19967] bond0: (slave bond_slave_1): Releasing backup interface [ 252.399172][T19967] team0: Port device team_slave_0 removed [ 252.406807][T19967] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 252.414332][T19967] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 252.423898][T19967] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 252.431375][T19967] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 252.457413][T19967] bond9: (slave bond10): Releasing backup interface [ 252.487582][T19970] loop6: detected capacity change from 0 to 512 [ 252.520129][T19974] hsr_slave_0: left promiscuous mode [ 252.536198][T19974] hsr_slave_1: left promiscuous mode [ 252.600609][T19986] Invalid ELF header magic: != ELF [ 252.639894][T19989] netlink: 'syz.2.6067': attribute type 21 has an invalid length. [ 252.648552][T19989] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6067'. [ 252.673158][T19991] Invalid ELF header magic: != ELF [ 252.765738][T19997] FAULT_INJECTION: forcing a failure. [ 252.765738][T19997] name failslab, interval 1, probability 0, space 0, times 0 [ 252.778496][T19997] CPU: 1 UID: 0 PID: 19997 Comm: syz.6.6071 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 252.789274][T19997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 252.799382][T19997] Call Trace: [ 252.802705][T19997] [ 252.805702][T19997] dump_stack_lvl+0xf2/0x150 [ 252.810395][T19997] dump_stack+0x15/0x20 [ 252.814555][T19997] should_fail_ex+0x223/0x230 [ 252.819253][T19997] ? dup_fd+0x3a/0x6a0 [ 252.823418][T19997] should_failslab+0x8f/0xb0 [ 252.828011][T19997] kmem_cache_alloc_noprof+0x4c/0x290 [ 252.833445][T19997] dup_fd+0x3a/0x6a0 [ 252.837347][T19997] copy_files+0x98/0xe0 [ 252.841574][T19997] copy_process+0xcbf/0x1f90 [ 252.846213][T19997] kernel_clone+0x167/0x5e0 [ 252.850719][T19997] ? vfs_write+0x596/0x920 [ 252.855199][T19997] ? __pfx_kfree_link+0x10/0x10 [ 252.860092][T19997] __x64_sys_clone+0xe8/0x120 [ 252.864940][T19997] x64_sys_call+0x2d23/0x2d60 [ 252.869624][T19997] do_syscall_64+0xc9/0x1c0 [ 252.874128][T19997] ? clear_bhb_loop+0x55/0xb0 [ 252.878894][T19997] ? clear_bhb_loop+0x55/0xb0 [ 252.883582][T19997] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 252.889621][T19997] RIP: 0033:0x7f717bede719 [ 252.894037][T19997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 252.914087][T19997] RSP: 002b:00007f717ab50fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 252.922533][T19997] RAX: ffffffffffffffda RBX: 00007f717c095f80 RCX: 00007f717bede719 [ 252.930523][T19997] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 252.938660][T19997] RBP: 00007f717ab51090 R08: 0000000000000000 R09: 0000000000000000 [ 252.946663][T19997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 252.954653][T19997] R13: 0000000000000000 R14: 00007f717c095f80 R15: 00007fffc875bf78 [ 252.962631][T19997] [ 252.997382][T20003] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6074'. [ 253.003221][T19999] loop7: detected capacity change from 0 to 512 [ 253.035978][T20010] loop7: detected capacity change from 0 to 128 [ 253.042799][T20010] vfat: Unknown parameter '' [ 253.060013][T20014] Invalid ELF header magic: != ELF [ 253.087879][T20017] loop3: detected capacity change from 0 to 1024 [ 253.090757][T20016] loop7: detected capacity change from 0 to 2048 [ 253.095232][T20017] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 253.110620][T20017] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 253.113880][T20016] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 253.121397][T20017] EXT4-fs (loop3): invalid journal inode [ 253.139865][T20016] FAULT_INJECTION: forcing a failure. [ 253.139865][T20016] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 253.153176][T20016] CPU: 0 UID: 0 PID: 20016 Comm: syz.7.6079 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 253.163946][T20016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 253.174055][T20016] Call Trace: [ 253.177387][T20016] [ 253.180305][T20016] dump_stack_lvl+0xf2/0x150 [ 253.184946][T20016] dump_stack+0x15/0x20 [ 253.189188][T20016] should_fail_ex+0x223/0x230 [ 253.193971][T20016] should_fail_alloc_page+0xfd/0x110 [ 253.199420][T20016] alloc_pages_bulk_noprof+0x106/0x6b0 [ 253.204906][T20016] copy_splice_read+0xfa/0x5d0 [ 253.209664][T20016] ? alloc_pipe_info+0x1cb/0x360 [ 253.214604][T20016] ? __kmalloc_noprof+0x2e8/0x370 [ 253.219669][T20016] ? __pfx_ext4_file_splice_read+0x10/0x10 [ 253.225490][T20016] splice_direct_to_actor+0x28b/0x670 [ 253.230938][T20016] ? __pfx_direct_splice_actor+0x10/0x10 [ 253.236581][T20016] do_splice_direct+0xd7/0x150 [ 253.241344][T20016] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 253.247317][T20016] do_sendfile+0x39b/0x970 [ 253.251785][T20016] __x64_sys_sendfile64+0x110/0x150 [ 253.257029][T20016] x64_sys_call+0xed5/0x2d60 [ 253.261687][T20016] do_syscall_64+0xc9/0x1c0 [ 253.266194][T20016] ? clear_bhb_loop+0x55/0xb0 [ 253.270875][T20016] ? clear_bhb_loop+0x55/0xb0 [ 253.275566][T20016] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 253.281474][T20016] RIP: 0033:0x7f6996c0e719 [ 253.285932][T20016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.305544][T20016] RSP: 002b:00007f6995887038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 253.313967][T20016] RAX: ffffffffffffffda RBX: 00007f6996dc5f80 RCX: 00007f6996c0e719 [ 253.321948][T20016] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000006 [ 253.329921][T20016] RBP: 00007f6995887090 R08: 0000000000000000 R09: 0000000000000000 [ 253.337981][T20016] R10: 0000000008800000 R11: 0000000000000246 R12: 0000000000000001 [ 253.345951][T20016] R13: 0000000000000000 R14: 00007f6996dc5f80 R15: 00007ffccef66ab8 [ 253.354133][T20016] [ 253.364647][T18312] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 253.413350][T20027] FAULT_INJECTION: forcing a failure. [ 253.413350][T20027] name failslab, interval 1, probability 0, space 0, times 0 [ 253.414193][T20021] bond0: (slave netdevsim1): Releasing backup interface [ 253.426017][T20027] CPU: 0 UID: 0 PID: 20027 Comm: syz.7.6083 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 253.426044][T20027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 253.426055][T20027] Call Trace: [ 253.426061][T20027] [ 253.460035][T20027] dump_stack_lvl+0xf2/0x150 [ 253.464631][T20027] dump_stack+0x15/0x20 [ 253.468837][T20027] should_fail_ex+0x223/0x230 [ 253.473680][T20027] ? audit_log_d_path+0x96/0x250 [ 253.478660][T20027] should_failslab+0x8f/0xb0 [ 253.483248][T20027] __kmalloc_cache_noprof+0x4b/0x2a0 [ 253.488548][T20027] audit_log_d_path+0x96/0x250 [ 253.493388][T20027] ? get_file_rcu+0xeb/0x100 [ 253.498032][T20027] ? __rcu_read_unlock+0x4e/0x70 [ 253.502967][T20027] audit_log_d_path_exe+0x42/0x70 [ 253.508001][T20027] audit_log_task+0x155/0x180 [ 253.512828][T20027] audit_seccomp+0x68/0x130 [ 253.517376][T20027] __seccomp_filter+0x6fa/0x1180 [ 253.522319][T20027] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 253.528032][T20027] ? vfs_write+0x596/0x920 [ 253.532495][T20027] ? __rcu_read_unlock+0x4e/0x70 [ 253.537462][T20027] __secure_computing+0x9f/0x1c0 [ 253.542428][T20027] syscall_trace_enter+0xd1/0x1f0 [ 253.547461][T20027] do_syscall_64+0xaa/0x1c0 [ 253.551963][T20027] ? clear_bhb_loop+0x55/0xb0 [ 253.556652][T20027] ? clear_bhb_loop+0x55/0xb0 [ 253.561408][T20027] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 253.567385][T20027] RIP: 0033:0x7f6996c0e719 [ 253.571850][T20027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.591502][T20027] RSP: 002b:00007f6995887038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 253.599935][T20027] RAX: ffffffffffffffda RBX: 00007f6996dc5f80 RCX: 00007f6996c0e719 [ 253.608131][T20027] RDX: 0000000000000001 RSI: 0000000020000240 RDI: 0000000000000003 [ 253.616152][T20027] RBP: 00007f6995887090 R08: 0000000000000000 R09: 0000000000000003 [ 253.624321][T20027] R10: 0000000000033000 R11: 0000000000000246 R12: 0000000000000001 [ 253.632378][T20027] R13: 0000000000000000 R14: 00007f6996dc5f80 R15: 00007ffccef66ab8 [ 253.640407][T20027] [ 253.661406][T20030] FAULT_INJECTION: forcing a failure. [ 253.661406][T20030] name failslab, interval 1, probability 0, space 0, times 0 [ 253.673611][T20032] loop5: detected capacity change from 0 to 512 [ 253.674093][T20030] CPU: 1 UID: 0 PID: 20030 Comm: syz.7.6084 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 253.691014][T20030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 253.701128][T20030] Call Trace: [ 253.704430][T20030] [ 253.707365][T20030] dump_stack_lvl+0xf2/0x150 [ 253.711961][T20030] dump_stack+0x15/0x20 [ 253.716153][T20030] should_fail_ex+0x223/0x230 [ 253.720845][T20030] ? assoc_array_insert+0x2b6/0x1960 [ 253.726216][T20030] should_failslab+0x8f/0xb0 [ 253.730808][T20030] __kmalloc_cache_noprof+0x4b/0x2a0 [ 253.736104][T20030] assoc_array_insert+0x2b6/0x1960 [ 253.741220][T20030] __key_link_begin+0x9a/0x150 [ 253.746027][T20030] __key_create_or_update+0x329/0x750 [ 253.751408][T20030] key_create_or_update+0x42/0x60 [ 253.756514][T20030] __se_sys_add_key+0x280/0x320 [ 253.761410][T20030] ? fput+0x14e/0x190 [ 253.765476][T20030] __x64_sys_add_key+0x67/0x80 [ 253.770306][T20030] x64_sys_call+0x157d/0x2d60 [ 253.775160][T20030] do_syscall_64+0xc9/0x1c0 [ 253.779668][T20030] ? clear_bhb_loop+0x55/0xb0 [ 253.784418][T20030] ? clear_bhb_loop+0x55/0xb0 [ 253.789092][T20030] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 253.795052][T20030] RIP: 0033:0x7f6996c0e719 [ 253.799507][T20030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.819170][T20030] RSP: 002b:00007f6995887038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 253.827592][T20030] RAX: ffffffffffffffda RBX: 00007f6996dc5f80 RCX: 00007f6996c0e719 [ 253.835579][T20030] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 253.843547][T20030] RBP: 00007f6995887090 R08: ffffffffffffffff R09: 0000000000000000 [ 253.851544][T20030] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000002 [ 253.859512][T20030] R13: 0000000000000001 R14: 00007f6996dc5f80 R15: 00007ffccef66ab8 [ 253.867487][T20030] [ 253.918577][T20032] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 253.932523][T20032] ext4 filesystem being mounted at /173/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 253.936811][T20041] Invalid ELF header magic: != ELF [ 253.955216][T20043] loop3: detected capacity change from 0 to 512 [ 253.996074][T20032] 9pnet_fd: Insufficient options for proto=fd [ 254.015004][T17770] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 254.028567][T20061] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6096'. [ 254.037587][T20061] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6096'. [ 254.046646][T20058] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6094'. [ 254.114712][T20069] netlink: 40 bytes leftover after parsing attributes in process `syz.7.6098'. [ 254.156081][ T11] netdevsim netdevsim3 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 254.166134][ T11] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.176922][T20077] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6100'. [ 254.234415][T20086] loop7: detected capacity change from 0 to 1024 [ 254.241392][T20086] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 254.241979][ T11] netdevsim netdevsim3 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 254.251311][T20086] EXT4-fs (loop7): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 254.260781][ T11] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.281680][T20086] EXT4-fs (loop7): invalid journal inode [ 254.314434][ T11] netdevsim netdevsim3 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 254.324316][ T11] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.336919][T20068] chnl_net:caif_netlink_parms(): no params data found [ 254.365659][ T11] netdevsim netdevsim3 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 254.375546][ T11] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.390947][T20068] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.398164][T20068] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.405484][T20068] bridge_slave_0: entered allmulticast mode [ 254.411900][T20068] bridge_slave_0: entered promiscuous mode [ 254.418929][T20068] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.426151][T20068] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.433619][T20068] bridge_slave_1: entered allmulticast mode [ 254.440276][T20068] bridge_slave_1: entered promiscuous mode [ 254.457716][T20068] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.468547][T20068] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.494208][T20068] team0: Port device team_slave_0 added [ 254.503297][T20068] team0: Port device team_slave_1 added [ 254.604291][ T11] bond0 (unregistering): Released all slaves [ 254.613006][ T11] bond1 (unregistering): Released all slaves [ 254.621751][ T11] bond2 (unregistering): Released all slaves [ 254.630336][ T11] bond3 (unregistering): Released all slaves [ 254.639375][ T11] bond4 (unregistering): Released all slaves [ 254.647954][ T11] bond5 (unregistering): Released all slaves [ 254.657280][ T11] bond6 (unregistering): Released all slaves [ 254.666292][ T11] bond7 (unregistering): Released all slaves [ 254.675351][ T11] bond8 (unregistering): Released all slaves [ 254.694821][T20068] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 254.701888][T20068] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.727819][T20068] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 254.739128][T20068] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 254.746219][T20068] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.772284][T20068] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 254.785890][ T11] tipc: Left network mode [ 254.797692][ T11] batadv0: left allmulticast mode [ 254.802803][ T11] veth1_macvtap: left promiscuous mode [ 254.808365][ T11] veth0_macvtap: left promiscuous mode [ 254.813867][ T11] veth1_vlan: left promiscuous mode [ 254.819063][ T11] veth0_vlan: left promiscuous mode [ 254.933422][T20068] hsr_slave_0: entered promiscuous mode [ 254.939608][T20068] hsr_slave_1: entered promiscuous mode [ 254.974711][T20101] loop7: detected capacity change from 0 to 512 [ 254.984949][T20100] loop2: detected capacity change from 0 to 2048 [ 255.007973][T20100] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 255.008216][T20105] FAULT_INJECTION: forcing a failure. [ 255.008216][T20105] name failslab, interval 1, probability 0, space 0, times 0 [ 255.033248][T20105] CPU: 0 UID: 0 PID: 20105 Comm: syz.7.6106 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 255.044054][T20105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 255.054202][T20105] Call Trace: [ 255.057586][T20105] [ 255.060511][T20105] dump_stack_lvl+0xf2/0x150 [ 255.065160][T20105] dump_stack+0x15/0x20 [ 255.069361][T20105] should_fail_ex+0x223/0x230 [ 255.074100][T20105] ? audit_log_d_path+0x96/0x250 [ 255.079132][T20105] should_failslab+0x8f/0xb0 [ 255.083732][T20105] __kmalloc_cache_noprof+0x4b/0x2a0 [ 255.089125][T20105] audit_log_d_path+0x96/0x250 [ 255.093967][T20105] ? get_file_rcu+0xeb/0x100 [ 255.098650][T20105] ? __rcu_read_unlock+0x4e/0x70 [ 255.103594][T20105] audit_log_d_path_exe+0x42/0x70 [ 255.108616][T20105] audit_log_task+0x155/0x180 [ 255.113355][T20105] audit_seccomp+0x68/0x130 [ 255.117851][T20105] __seccomp_filter+0x6fa/0x1180 [ 255.122883][T20105] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 255.128516][T20105] ? vfs_write+0x596/0x920 [ 255.133003][T20105] ? __rcu_read_unlock+0x4e/0x70 [ 255.137944][T20105] __secure_computing+0x9f/0x1c0 [ 255.142883][T20105] syscall_trace_enter+0xd1/0x1f0 [ 255.147913][T20105] do_syscall_64+0xaa/0x1c0 [ 255.152538][T20105] ? clear_bhb_loop+0x55/0xb0 [ 255.157210][T20105] ? clear_bhb_loop+0x55/0xb0 [ 255.161881][T20105] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 255.167806][T20105] RIP: 0033:0x7f6996c0e719 [ 255.172245][T20105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 255.191865][T20105] RSP: 002b:00007f6995887038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 255.200280][T20105] RAX: ffffffffffffffda RBX: 00007f6996dc5f80 RCX: 00007f6996c0e719 [ 255.208322][T20105] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 255.216290][T20105] RBP: 00007f6995887090 R08: 0000000000000000 R09: 0000000000000000 [ 255.224279][T20105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 255.232299][T20105] R13: 0000000000000000 R14: 00007f6996dc5f80 R15: 00007ffccef66ab8 [ 255.240289][T20105] [ 255.263691][ T29] kauditd_printk_skb: 140 callbacks suppressed [ 255.263705][ T29] audit: type=1326 audit(1730253797.636:30350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20098 comm="syz.2.6105" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 255.293534][ T29] audit: type=1326 audit(1730253797.636:30351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20098 comm="syz.2.6105" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 255.317590][ T29] audit: type=1326 audit(1730253797.636:30352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20098 comm="syz.2.6105" exe="/root/syz-executor" sig=0 arch=c000003e syscall=237 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 255.326398][T20108] netlink: 'syz.7.6108': attribute type 21 has an invalid length. [ 255.341222][ T29] audit: type=1326 audit(1730253797.636:30353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20098 comm="syz.2.6105" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 255.341249][ T29] audit: type=1326 audit(1730253797.636:30354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20098 comm="syz.2.6105" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 255.382242][T20108] netlink: 132 bytes leftover after parsing attributes in process `syz.7.6108'. [ 255.405545][T20111] netlink: 'syz.5.6109': attribute type 21 has an invalid length. [ 255.415715][T20111] netlink: 132 bytes leftover after parsing attributes in process `syz.5.6109'. [ 255.426658][T19510] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 255.470951][ T29] audit: type=1326 audit(1730253797.836:30355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20118 comm="syz.5.6113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f409856e719 code=0x7ffc0000 [ 255.470996][T20119] FAULT_INJECTION: forcing a failure. [ 255.470996][T20119] name failslab, interval 1, probability 0, space 0, times 0 [ 255.494602][ T29] audit: type=1326 audit(1730253797.836:30356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20118 comm="syz.5.6113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f409856d0b0 code=0x7ffc0000 [ 255.509562][ T29] audit: type=1326 audit(1730253797.836:30357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20118 comm="syz.5.6113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f409856d1ff code=0x7ffc0000 [ 255.530875][T20119] CPU: 0 UID: 0 PID: 20119 Comm: syz.5.6113 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 255.563751][T20123] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6114'. [ 255.564940][T20119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 255.564954][T20119] Call Trace: [ 255.564961][T20119] [ 255.590205][T20119] dump_stack_lvl+0xf2/0x150 [ 255.594942][T20119] dump_stack+0x15/0x20 [ 255.599090][T20119] should_fail_ex+0x223/0x230 [ 255.603822][T20119] ? audit_log_d_path+0x96/0x250 [ 255.608796][T20119] should_failslab+0x8f/0xb0 [ 255.613387][T20119] __kmalloc_cache_noprof+0x4b/0x2a0 [ 255.618680][T20119] audit_log_d_path+0x96/0x250 [ 255.623525][T20119] ? get_file_rcu+0xeb/0x100 [ 255.628190][T20119] ? __rcu_read_unlock+0x4e/0x70 [ 255.633131][T20119] audit_log_d_path_exe+0x42/0x70 [ 255.638170][T20119] audit_log_task+0x155/0x180 [ 255.642922][T20119] audit_seccomp+0x68/0x130 [ 255.647493][T20119] __seccomp_filter+0x6fa/0x1180 [ 255.652452][T20119] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 255.658091][T20119] ? vfs_write+0x596/0x920 [ 255.662516][T20119] ? __pfx_kfree_link+0x10/0x10 [ 255.667419][T20119] ? __rcu_read_unlock+0x4e/0x70 [ 255.672361][T20119] ? __fget_files+0x1d4/0x210 [ 255.677061][T20119] __secure_computing+0x9f/0x1c0 [ 255.682032][T20119] syscall_trace_enter+0xd1/0x1f0 [ 255.687244][T20119] ? fpregs_assert_state_consistent+0x83/0xa0 [ 255.693382][T20119] do_syscall_64+0xaa/0x1c0 [ 255.697954][T20119] ? clear_bhb_loop+0x55/0xb0 [ 255.702804][T20119] ? clear_bhb_loop+0x55/0xb0 [ 255.707491][T20119] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 255.713414][T20119] RIP: 0033:0x7f409856e719 [ 255.717878][T20119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 255.737614][T20119] RSP: 002b:00007f40971e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000126 [ 255.746029][T20119] RAX: ffffffffffffffda RBX: 00007f4098725f80 RCX: 00007f409856e719 [ 255.754014][T20119] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 255.762353][T20119] RBP: 00007f40971e7090 R08: 0000000000000000 R09: 0000000000000000 [ 255.770324][T20119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 255.778466][T20119] R13: 0000000000000000 R14: 00007f4098725f80 R15: 00007ffe5d1b5af8 [ 255.786440][T20119] [ 255.793829][ T29] audit: type=1326 audit(1730253797.836:30358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20118 comm="syz.5.6113" exe="" sig=0 arch=c000003e syscall=294 compat=0 ip=0x7f409856e719 code=0x7ffc0000 [ 255.810665][T20125] loop6: detected capacity change from 0 to 512 [ 255.819098][ T29] audit: type=1326 audit(1730253798.186:30359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20118 comm="syz.5.6113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f409856d15c code=0x7ffc0000 [ 255.876519][T20128] netlink: 16186 bytes leftover after parsing attributes in process `syz.6.6116'. [ 255.953875][T20122] random: crng reseeded on system resumption [ 255.965966][T20123] loop2: detected capacity change from 0 to 1024 [ 255.977233][T20123] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 255.989182][T20123] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 256.000404][T20123] EXT4-fs (loop2): invalid journal inode [ 256.010239][T20131] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6117'. [ 256.021792][T20131] ipvlan2: entered allmulticast mode [ 256.027232][T20131] veth0_vlan: entered allmulticast mode [ 256.058817][T20133] loop5: detected capacity change from 0 to 512 [ 256.087436][T20068] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 256.097639][T20068] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 256.102448][T20113] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 256.106030][T20133] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 256.118534][T20068] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 256.130392][T20133] ext4 filesystem being mounted at /183/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 256.144364][T20068] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 256.181808][T20068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.194527][T20068] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.195991][T20133] 9pnet_fd: Insufficient options for proto=fd [ 256.208525][ T130] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.215673][ T130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.224818][ T130] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.232006][ T130] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.240697][T17770] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 256.254723][T20068] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 256.265134][T20068] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 256.283196][T20142] loop5: detected capacity change from 0 to 512 [ 256.305147][T20142] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 256.317662][T20068] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 256.325685][T20142] ext4 filesystem being mounted at /184/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 256.357272][T20153] netlink: 8 bytes leftover after parsing attributes in process `syz.7.6122'. [ 256.366220][T20153] netlink: 12 bytes leftover after parsing attributes in process `syz.7.6122'. [ 256.375323][T20155] netlink: 'syz.2.6121': attribute type 21 has an invalid length. [ 256.384865][T20155] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6121'. [ 256.423089][T20162] loop7: detected capacity change from 0 to 164 [ 256.431940][T20162] Unable to read rock-ridge attributes [ 256.459425][T20068] veth0_vlan: entered promiscuous mode [ 256.463953][T20142] 9pnet_fd: Insufficient options for proto=fd [ 256.469693][T20068] veth1_vlan: entered promiscuous mode [ 256.490975][T20068] veth0_macvtap: entered promiscuous mode [ 256.498142][T20169] loop2: detected capacity change from 0 to 512 [ 256.505461][T20068] veth1_macvtap: entered promiscuous mode [ 256.505882][T17770] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 256.516241][T20068] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 256.537215][T20173] FAULT_INJECTION: forcing a failure. [ 256.537215][T20173] name failslab, interval 1, probability 0, space 0, times 0 [ 256.549907][T20173] CPU: 0 UID: 0 PID: 20173 Comm: syz.7.6127 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 256.551737][T20068] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 256.560725][T20173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 256.560741][T20173] Call Trace: [ 256.560747][T20173] [ 256.572064][T20068] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.577999][T20173] dump_stack_lvl+0xf2/0x150 [ 256.581336][T20068] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.584240][T20173] dump_stack+0x15/0x20 [ 256.584260][T20173] should_fail_ex+0x223/0x230 [ 256.584289][T20173] ? alloc_empty_file+0xd0/0x2f0 [ 256.584359][T20173] should_failslab+0x8f/0xb0 [ 256.593047][T20068] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.597579][T20173] kmem_cache_alloc_noprof+0x4c/0x290 [ 256.606354][T20068] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.610359][T20173] alloc_empty_file+0xd0/0x2f0 [ 256.652090][T20173] alloc_file_pseudo+0xc3/0x140 [ 256.657096][T20173] anon_inode_getfile+0xa3/0x120 [ 256.662038][T20173] __se_sys_perf_event_open+0x17cd/0x21f0 [ 256.667751][T20173] __x64_sys_perf_event_open+0x67/0x80 [ 256.673219][T20173] x64_sys_call+0x18d7/0x2d60 [ 256.678035][T20173] do_syscall_64+0xc9/0x1c0 [ 256.682536][T20173] ? clear_bhb_loop+0x55/0xb0 [ 256.687214][T20173] ? clear_bhb_loop+0x55/0xb0 [ 256.691882][T20173] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 256.697773][T20173] RIP: 0033:0x7f6996c0e719 [ 256.702186][T20173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.721784][T20173] RSP: 002b:00007f6995887038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 256.730186][T20173] RAX: ffffffffffffffda RBX: 00007f6996dc5f80 RCX: 00007f6996c0e719 [ 256.738154][T20173] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 256.746285][T20173] RBP: 00007f6995887090 R08: 0000000000000000 R09: 0000000000000000 [ 256.754258][T20173] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 256.762239][T20173] R13: 0000000000000000 R14: 00007f6996dc5f80 R15: 00007ffccef66ab8 [ 256.770221][T20173] [ 256.790904][T20181] FAULT_INJECTION: forcing a failure. [ 256.790904][T20181] name failslab, interval 1, probability 0, space 0, times 0 [ 256.797060][T20184] syz.7.6129[20184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.803578][T20181] CPU: 0 UID: 0 PID: 20181 Comm: syz.5.6126 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 256.803725][T20184] syz.7.6129[20184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.814992][T20181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 256.815005][T20181] Call Trace: [ 256.815011][T20181] [ 256.815018][T20181] dump_stack_lvl+0xf2/0x150 [ 256.815044][T20181] dump_stack+0x15/0x20 [ 256.825929][T20184] syz.7.6129[20184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.837144][T20181] should_fail_ex+0x223/0x230 [ 256.837180][T20181] ? security_file_alloc+0x32/0x100 [ 256.862779][T20188] Invalid ELF header magic: != ELF [ 256.873527][T20181] should_failslab+0x8f/0xb0 [ 256.873557][T20181] kmem_cache_alloc_noprof+0x4c/0x290 [ 256.898784][T20181] security_file_alloc+0x32/0x100 [ 256.903901][T20181] alloc_empty_file_noaccount+0x86/0x1b0 [ 256.909617][T20181] alloc_file_pseudo_noaccount+0xc3/0x140 [ 256.915412][T20181] bdev_file_open_by_dev+0x185/0x220 [ 256.920789][T20181] ? __pfx_resume_store+0x10/0x10 [ 256.925828][T20181] swsusp_check+0x3f/0x240 [ 256.930306][T20181] software_resume+0x43/0x2e0 [ 256.934992][T20181] resume_store+0x34e/0x3a0 [ 256.939502][T20181] kobj_attr_store+0x47/0x70 [ 256.944111][T20181] ? __pfx_kobj_attr_store+0x10/0x10 [ 256.949414][T20181] sysfs_kf_write+0xae/0xd0 [ 256.953991][T20181] ? __pfx_sysfs_kf_write+0x10/0x10 [ 256.959198][T20181] kernfs_fop_write_iter+0x1c8/0x2c0 [ 256.964604][T20181] vfs_write+0x77f/0x920 [ 256.968955][T20181] ? __pfx_kfree_link+0x10/0x10 [ 256.973842][T20181] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 256.979670][T20181] ksys_write+0xeb/0x1b0 [ 256.983938][T20181] __x64_sys_write+0x42/0x50 [ 256.988619][T20181] x64_sys_call+0x27dd/0x2d60 [ 256.993381][T20181] do_syscall_64+0xc9/0x1c0 [ 256.997886][T20181] ? clear_bhb_loop+0x55/0xb0 [ 257.002563][T20181] ? clear_bhb_loop+0x55/0xb0 [ 257.007236][T20181] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 257.013186][T20181] RIP: 0033:0x7f409856e719 [ 257.017593][T20181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.037254][T20181] RSP: 002b:00007f40971e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 257.045699][T20181] RAX: ffffffffffffffda RBX: 00007f4098725f80 RCX: 00007f409856e719 [ 257.053707][T20181] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000006 [ 257.061673][T20181] RBP: 00007f40971e7090 R08: 0000000000000000 R09: 0000000000000000 [ 257.069650][T20181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 257.077758][T20181] R13: 0000000000000000 R14: 00007f4098725f80 R15: 00007ffe5d1b5af8 [ 257.085731][T20181] [ 257.106721][T20191] netlink: 40 bytes leftover after parsing attributes in process `syz.6.6131'. [ 257.145049][T20196] Invalid ELF header magic: != ELF [ 257.187589][T20198] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6132'. [ 257.191353][T20199] loop6: detected capacity change from 0 to 1024 [ 257.218770][T20202] Invalid ELF header magic: != ELF [ 257.219748][T20199] EXT4-fs (loop6): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 257.233867][T20199] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 257.245384][T20199] EXT4-fs (loop6): invalid journal inode [ 257.321958][T20206] loop5: detected capacity change from 0 to 4096 [ 257.329166][T20206] EXT4-fs (loop5): can't mount with journal_checksum, fs mounted w/o journal [ 257.361342][T20211] FAULT_INJECTION: forcing a failure. [ 257.361342][T20211] name failslab, interval 1, probability 0, space 0, times 0 [ 257.374036][T20211] CPU: 0 UID: 0 PID: 20211 Comm: syz.5.6136 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 257.384823][T20211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 257.394900][T20211] Call Trace: [ 257.398171][T20211] [ 257.401092][T20211] dump_stack_lvl+0xf2/0x150 [ 257.405680][T20211] dump_stack+0x15/0x20 [ 257.409859][T20211] should_fail_ex+0x223/0x230 [ 257.414569][T20211] ? skb_clone+0x154/0x1f0 [ 257.419032][T20211] should_failslab+0x8f/0xb0 [ 257.423764][T20211] kmem_cache_alloc_noprof+0x4c/0x290 [ 257.429214][T20211] skb_clone+0x154/0x1f0 [ 257.433459][T20211] __netlink_deliver_tap+0x2bd/0x4c0 [ 257.438753][T20211] netlink_unicast+0x64a/0x670 [ 257.443515][T20211] netlink_sendmsg+0x5cc/0x6e0 [ 257.448344][T20211] ? __pfx_netlink_sendmsg+0x10/0x10 [ 257.453617][T20211] __sock_sendmsg+0x140/0x180 [ 257.458296][T20211] ____sys_sendmsg+0x312/0x410 [ 257.463102][T20211] __sys_sendmsg+0x1d9/0x270 [ 257.467800][T20211] __x64_sys_sendmsg+0x46/0x50 [ 257.472572][T20211] x64_sys_call+0x2689/0x2d60 [ 257.477331][T20211] do_syscall_64+0xc9/0x1c0 [ 257.481824][T20211] ? clear_bhb_loop+0x55/0xb0 [ 257.486601][T20211] ? clear_bhb_loop+0x55/0xb0 [ 257.491324][T20211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 257.497251][T20211] RIP: 0033:0x7f409856e719 [ 257.501660][T20211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.521342][T20211] RSP: 002b:00007f40971e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 257.529793][T20211] RAX: ffffffffffffffda RBX: 00007f4098725f80 RCX: 00007f409856e719 [ 257.537759][T20211] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 257.545769][T20211] RBP: 00007f40971e7090 R08: 0000000000000000 R09: 0000000000000000 [ 257.553731][T20211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 257.561691][T20211] R13: 0000000000000000 R14: 00007f4098725f80 R15: 00007ffe5d1b5af8 [ 257.569723][T20211] [ 257.588399][T20213] loop5: detected capacity change from 0 to 512 [ 257.658775][T20220] FAULT_INJECTION: forcing a failure. [ 257.658775][T20220] name failslab, interval 1, probability 0, space 0, times 0 [ 257.671519][T20220] CPU: 0 UID: 0 PID: 20220 Comm: syz.5.6140 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 257.682346][T20220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 257.692467][T20220] Call Trace: [ 257.695750][T20220] [ 257.698695][T20220] dump_stack_lvl+0xf2/0x150 [ 257.703371][T20220] dump_stack+0x15/0x20 [ 257.707536][T20220] should_fail_ex+0x223/0x230 [ 257.712233][T20220] ? __d_alloc+0x3d/0x340 [ 257.716600][T20220] should_failslab+0x8f/0xb0 [ 257.721179][T20220] kmem_cache_alloc_lru_noprof+0x51/0x2a0 [ 257.726949][T20220] ? ktime_get_coarse_real_ts64+0xf3/0x100 [ 257.732757][T20220] __d_alloc+0x3d/0x340 [ 257.736967][T20220] d_alloc_pseudo+0x1e/0x80 [ 257.741470][T20220] alloc_file_pseudo+0x70/0x140 [ 257.746325][T20220] hugetlb_file_setup+0x290/0x3c0 [ 257.751344][T20220] ksys_mmap_pgoff+0x172/0x330 [ 257.756102][T20220] x64_sys_call+0x1884/0x2d60 [ 257.760834][T20220] do_syscall_64+0xc9/0x1c0 [ 257.765424][T20220] ? clear_bhb_loop+0x55/0xb0 [ 257.770095][T20220] ? clear_bhb_loop+0x55/0xb0 [ 257.774890][T20220] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 257.780966][T20220] RIP: 0033:0x7f409856e719 [ 257.785375][T20220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.804979][T20220] RSP: 002b:00007f40971e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 257.813447][T20220] RAX: ffffffffffffffda RBX: 00007f4098725f80 RCX: 00007f409856e719 [ 257.821413][T20220] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: 0000000020400000 [ 257.829379][T20220] RBP: 00007f40971e7090 R08: ffffffffffffffff R09: 0000000000000000 [ 257.837344][T20220] R10: 000000000005d032 R11: 0000000000000246 R12: 0000000000000001 [ 257.845440][T20220] R13: 0000000000000000 R14: 00007f4098725f80 R15: 00007ffe5d1b5af8 [ 257.853412][T20220] [ 257.949177][T20235] FAULT_INJECTION: forcing a failure. [ 257.949177][T20235] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.962475][T20235] CPU: 0 UID: 0 PID: 20235 Comm: syz.5.6145 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 257.973311][T20235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 257.983378][T20235] Call Trace: [ 257.986657][T20235] [ 257.989580][T20235] dump_stack_lvl+0xf2/0x150 [ 257.994161][T20235] dump_stack+0x15/0x20 [ 257.998321][T20235] should_fail_ex+0x223/0x230 [ 258.002994][T20235] should_fail+0xb/0x10 [ 258.007170][T20235] should_fail_usercopy+0x1a/0x20 [ 258.012230][T20235] _copy_from_user+0x20/0xe0 [ 258.016877][T20235] memdup_user+0x64/0xc0 [ 258.021116][T20235] strndup_user+0x68/0xa0 [ 258.025448][T20235] __se_sys_request_key+0x117/0x290 [ 258.030778][T20235] ? fput+0x14e/0x190 [ 258.034810][T20235] __x64_sys_request_key+0x55/0x70 [ 258.039935][T20235] x64_sys_call+0x2643/0x2d60 [ 258.044604][T20235] do_syscall_64+0xc9/0x1c0 [ 258.049188][T20235] ? clear_bhb_loop+0x55/0xb0 [ 258.053906][T20235] ? clear_bhb_loop+0x55/0xb0 [ 258.058601][T20235] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 258.064495][T20235] RIP: 0033:0x7f409856e719 [ 258.068947][T20235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 258.088546][T20235] RSP: 002b:00007f40971e7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 258.096950][T20235] RAX: ffffffffffffffda RBX: 00007f4098725f80 RCX: 00007f409856e719 [ 258.104986][T20235] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000040 [ 258.112947][T20235] RBP: 00007f40971e7090 R08: 0000000000000000 R09: 0000000000000000 [ 258.120967][T20235] R10: fffffffffffffffe R11: 0000000000000246 R12: 0000000000000001 [ 258.128932][T20235] R13: 0000000000000000 R14: 00007f4098725f80 R15: 00007ffe5d1b5af8 [ 258.136911][T20235] [ 258.173066][T20248] Invalid ELF header magic: != ELF [ 258.185587][T20246] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=20246 comm=syz.5.6150 [ 258.194800][T20250] Invalid ELF header magic: != ELF [ 258.241251][T20257] bridge0: port 3(vlan2) entered blocking state [ 258.247849][T20257] bridge0: port 3(vlan2) entered disabled state [ 258.264699][T20257] vlan2: entered allmulticast mode [ 258.276988][T20257] vlan2: left allmulticast mode [ 258.382298][T20260] FAULT_INJECTION: forcing a failure. [ 258.382298][T20260] name failslab, interval 1, probability 0, space 0, times 0 [ 258.394979][T20260] CPU: 0 UID: 0 PID: 20260 Comm: syz.5.6154 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 258.405742][T20260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 258.415790][T20260] Call Trace: [ 258.419106][T20260] [ 258.422028][T20260] dump_stack_lvl+0xf2/0x150 [ 258.426651][T20260] dump_stack+0x15/0x20 [ 258.430855][T20260] should_fail_ex+0x223/0x230 [ 258.435534][T20260] ? __mpol_dup+0x43/0x1b0 [ 258.439988][T20260] should_failslab+0x8f/0xb0 [ 258.444652][T20260] kmem_cache_alloc_noprof+0x4c/0x290 [ 258.450038][T20260] __mpol_dup+0x43/0x1b0 [ 258.454353][T20260] mbind_range+0x208/0x490 [ 258.458784][T20260] __se_sys_mbind+0x915/0x1160 [ 258.463557][T20260] __x64_sys_mbind+0x78/0x90 [ 258.468283][T20260] x64_sys_call+0x2b4d/0x2d60 [ 258.473021][T20260] do_syscall_64+0xc9/0x1c0 [ 258.477518][T20260] ? clear_bhb_loop+0x55/0xb0 [ 258.482196][T20260] ? clear_bhb_loop+0x55/0xb0 [ 258.486935][T20260] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 258.492830][T20260] RIP: 0033:0x7f409856e719 [ 258.497238][T20260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 258.516842][T20260] RSP: 002b:00007f40971a5038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 258.525336][T20260] RAX: ffffffffffffffda RBX: 00007f4098726130 RCX: 00007f409856e719 [ 258.533316][T20260] RDX: 0000000000008003 RSI: 0000000000600000 RDI: 0000000020000000 [ 258.541282][T20260] RBP: 00007f40971a5090 R08: 0000000000000008 R09: 0000000000000000 [ 258.549247][T20260] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 258.557232][T20260] R13: 0000000000000000 R14: 00007f4098726130 R15: 00007ffe5d1b5af8 [ 258.565221][T20260] [ 258.613426][T20255] loop6: detected capacity change from 0 to 32768 [ 258.674559][T20255] loop6: p1 p3 < p5 p6 p7 > p4 [ 258.802062][T20267] pim6reg1: entered promiscuous mode [ 258.807455][T20267] pim6reg1: entered allmulticast mode [ 258.910592][T20269] FAULT_INJECTION: forcing a failure. [ 258.910592][T20269] name failslab, interval 1, probability 0, space 0, times 0 [ 258.923342][T20269] CPU: 1 UID: 0 PID: 20269 Comm: syz.6.6158 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 258.934131][T20269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 258.944187][T20269] Call Trace: [ 258.947525][T20269] [ 258.950465][T20269] dump_stack_lvl+0xf2/0x150 [ 258.955080][T20269] dump_stack+0x15/0x20 [ 258.959316][T20269] should_fail_ex+0x223/0x230 [ 258.964123][T20269] ? cond_policydb_dup+0xa0/0x710 [ 258.969164][T20269] should_failslab+0x8f/0xb0 [ 258.973766][T20269] __kmalloc_noprof+0xa5/0x370 [ 258.978633][T20269] cond_policydb_dup+0xa0/0x710 [ 258.983502][T20269] ? __kmalloc_node_track_caller_noprof+0x17e/0x380 [ 258.990156][T20269] security_set_bools+0xa8/0x350 [ 258.995181][T20269] ? sel_commit_bools_write+0x164/0x260 [ 259.000799][T20269] sel_commit_bools_write+0x1de/0x260 [ 259.006283][T20269] vfs_writev+0x3fb/0x880 [ 259.010632][T20269] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 259.016531][T20269] ? mutex_lock+0xd/0x40 [ 259.020780][T20269] do_writev+0xf8/0x220 [ 259.025000][T20269] __x64_sys_writev+0x45/0x50 [ 259.029761][T20269] x64_sys_call+0x1f18/0x2d60 [ 259.034449][T20269] do_syscall_64+0xc9/0x1c0 [ 259.039002][T20269] ? clear_bhb_loop+0x55/0xb0 [ 259.043698][T20269] ? clear_bhb_loop+0x55/0xb0 [ 259.048388][T20269] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 259.054290][T20269] RIP: 0033:0x7f717bede719 [ 259.058702][T20269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.078389][T20269] RSP: 002b:00007f717ab51038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 259.086796][T20269] RAX: ffffffffffffffda RBX: 00007f717c095f80 RCX: 00007f717bede719 [ 259.094763][T20269] RDX: 0000000000000002 RSI: 00000000200025c0 RDI: 0000000000000003 [ 259.102729][T20269] RBP: 00007f717ab51090 R08: 0000000000000000 R09: 0000000000000000 [ 259.110792][T20269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.118757][T20269] R13: 0000000000000000 R14: 00007f717c095f80 R15: 00007fffc875bf78 [ 259.126766][T20269] [ 259.174545][T20271] Invalid ELF header magic: != ELF [ 259.200443][T20275] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 259.209339][T20275] vhci_hcd: invalid port number 23 [ 259.245507][T20279] loop7: detected capacity change from 0 to 128 [ 259.286456][T20279] bio_check_eod: 2 callbacks suppressed [ 259.286469][T20279] syz.7.6164: attempt to access beyond end of device [ 259.286469][T20279] loop7: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 259.307677][T20279] syz.7.6164: attempt to access beyond end of device [ 259.307677][T20279] loop7: rw=2049, sector=153, nr_sectors = 24 limit=128 [ 259.321922][T20279] syz.7.6164: attempt to access beyond end of device [ 259.321922][T20279] loop7: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 259.335541][T20279] Buffer I/O error on dev loop7, logical block 177, lost async page write [ 259.414820][T20252] syz.5.6154 (20252) used greatest stack depth: 7464 bytes left [ 259.444060][T20296] Invalid ELF header magic: != ELF [ 259.458516][T20298] FAULT_INJECTION: forcing a failure. [ 259.458516][T20298] name failslab, interval 1, probability 0, space 0, times 0 [ 259.471281][T20298] CPU: 0 UID: 0 PID: 20298 Comm: syz.2.6171 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 259.482080][T20298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 259.492177][T20298] Call Trace: [ 259.495458][T20298] [ 259.498387][T20298] dump_stack_lvl+0xf2/0x150 [ 259.503001][T20298] dump_stack+0x15/0x20 [ 259.507211][T20298] should_fail_ex+0x223/0x230 [ 259.511950][T20298] ? __alloc_skb+0x10b/0x310 [ 259.516545][T20298] should_failslab+0x8f/0xb0 [ 259.521135][T20298] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 259.527018][T20298] __alloc_skb+0x10b/0x310 [ 259.531478][T20298] audit_log_start+0x368/0x6b0 [ 259.536246][T20298] audit_seccomp+0x4b/0x130 [ 259.540747][T20298] __seccomp_filter+0x6fa/0x1180 [ 259.545728][T20298] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 259.551510][T20298] ? vfs_write+0x596/0x920 [ 259.555961][T20298] ? __rcu_read_unlock+0x4e/0x70 [ 259.561063][T20298] __secure_computing+0x9f/0x1c0 [ 259.566033][T20298] syscall_trace_enter+0xd1/0x1f0 [ 259.571114][T20298] do_syscall_64+0xaa/0x1c0 [ 259.575689][T20298] ? clear_bhb_loop+0x55/0xb0 [ 259.580359][T20298] ? clear_bhb_loop+0x55/0xb0 [ 259.585030][T20298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 259.590952][T20298] RIP: 0033:0x7f57a65ae719 [ 259.595422][T20298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.615028][T20298] RSP: 002b:00007f57a5227038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 259.623578][T20298] RAX: ffffffffffffffda RBX: 00007f57a6765f80 RCX: 00007f57a65ae719 [ 259.631546][T20298] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 259.639514][T20298] RBP: 00007f57a5227090 R08: 0000000000000000 R09: 0000000000000000 [ 259.647480][T20298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.655512][T20298] R13: 0000000000000000 R14: 00007f57a6765f80 R15: 00007ffc2a7bc2e8 [ 259.663526][T20298] [ 259.712232][T20307] syz.2.6175[20307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.712294][T20307] syz.2.6175[20307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.723950][T20307] syz.2.6175[20307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.739231][T20307] tipc: Started in network mode [ 259.755650][T20307] tipc: Node identity b22284c2878a, cluster identity 4711 [ 259.762842][T20307] tipc: Enabled bearer , priority 0 [ 259.769738][T20307] ªªªªªª: renamed from syzkaller0 [ 259.776495][T20307] tipc: Disabling bearer [ 260.070997][T20331] bridge0: port 1(vlan2) entered blocking state [ 260.077410][T20331] bridge0: port 1(vlan2) entered disabled state [ 260.084267][T20331] vlan2: entered allmulticast mode [ 260.089863][T20331] vlan2: left allmulticast mode [ 260.125993][T20334] FAULT_INJECTION: forcing a failure. [ 260.125993][T20334] name failslab, interval 1, probability 0, space 0, times 0 [ 260.138716][T20334] CPU: 0 UID: 0 PID: 20334 Comm: syz.3.6184 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 260.149556][T20334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 260.159637][T20334] Call Trace: [ 260.162913][T20334] [ 260.165858][T20334] dump_stack_lvl+0xf2/0x150 [ 260.170554][T20334] dump_stack+0x15/0x20 [ 260.174799][T20334] should_fail_ex+0x223/0x230 [ 260.179631][T20334] ? __d_alloc+0x3d/0x340 [ 260.183973][T20334] should_failslab+0x8f/0xb0 [ 260.188570][T20334] kmem_cache_alloc_lru_noprof+0x51/0x2a0 [ 260.194299][T20334] __d_alloc+0x3d/0x340 [ 260.198476][T20334] d_alloc_pseudo+0x1e/0x80 [ 260.203037][T20334] alloc_file_pseudo+0x70/0x140 [ 260.208041][T20334] __shmem_file_setup+0x1bb/0x1f0 [ 260.213073][T20334] shmem_file_setup+0x3b/0x50 [ 260.217763][T20334] __se_sys_memfd_create+0x31d/0x5c0 [ 260.223122][T20334] __x64_sys_memfd_create+0x31/0x40 [ 260.228436][T20334] x64_sys_call+0x2891/0x2d60 [ 260.233181][T20334] do_syscall_64+0xc9/0x1c0 [ 260.237678][T20334] ? clear_bhb_loop+0x55/0xb0 [ 260.242359][T20334] ? clear_bhb_loop+0x55/0xb0 [ 260.247097][T20334] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 260.253019][T20334] RIP: 0033:0x7f2284f2e719 [ 260.257569][T20334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 260.277263][T20334] RSP: 002b:00007f2283ba6d68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 260.285674][T20334] RAX: ffffffffffffffda RBX: 0000000000000593 RCX: 00007f2284f2e719 [ 260.293662][T20334] RDX: 00007f2283ba6dec RSI: 0000000000000000 RDI: 00007f2284fa1b9a [ 260.301625][T20334] RBP: 00000000200005c0 R08: 00007f2283ba6b07 R09: 0000000000000000 [ 260.309591][T20334] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 260.317555][T20334] R13: 00007f2283ba6dec R14: 00007f2283ba6df0 R15: 00007ffe6156d5a8 [ 260.325671][T20334] [ 260.329182][ T29] kauditd_printk_skb: 315 callbacks suppressed [ 260.329195][ T29] audit: type=1326 audit(1730253802.536:30673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20326 comm="syz.6.6183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f717bede719 code=0x7ffc0000 [ 260.381474][T20338] loop6: detected capacity change from 0 to 512 [ 260.392333][ T29] audit: type=1400 audit(1730253802.756:30674): avc: denied { setopt } for pid=20337 comm="syz.6.6186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 260.431710][T20344] loop6: detected capacity change from 0 to 128 [ 260.442815][T20344] syz.6.6189: attempt to access beyond end of device [ 260.442815][T20344] loop6: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 260.457016][T20344] syz.6.6189: attempt to access beyond end of device [ 260.457016][T20344] loop6: rw=2049, sector=153, nr_sectors = 24 limit=128 [ 260.486312][T20348] Invalid ELF header magic: != ELF [ 260.750733][T20354] loop5: detected capacity change from 0 to 8192 [ 260.800770][T20356] Invalid ELF header magic: != ELF [ 261.031912][T20361] bridge0: port 1(vlan2) entered blocking state [ 261.038240][T20361] bridge0: port 1(vlan2) entered disabled state [ 261.044625][T20361] vlan2: entered allmulticast mode [ 261.050297][T20361] vlan2: left allmulticast mode [ 261.224602][T20364] loop3: detected capacity change from 0 to 512 [ 261.233976][T20364] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 261.247103][T20364] ext4 filesystem being mounted at /7/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 261.247452][ T29] audit: type=1400 audit(1730253803.616:30675): avc: denied { mount } for pid=20363 comm="syz.3.6197" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 261.281957][ T29] audit: type=1400 audit(1730253803.646:30676): avc: denied { getopt } for pid=20363 comm="syz.3.6197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 261.300996][T20364] 9pnet_fd: Insufficient options for proto=fd [ 261.302104][ T29] audit: type=1400 audit(1730253803.646:30677): avc: denied { write } for pid=20363 comm="syz.3.6197" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 261.329639][ T29] audit: type=1400 audit(1730253803.646:30678): avc: denied { add_name } for pid=20363 comm="syz.3.6197" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 261.332114][T20068] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 261.350758][ T29] audit: type=1400 audit(1730253803.656:30679): avc: denied { create } for pid=20363 comm="syz.3.6197" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 261.379815][ T29] audit: type=1400 audit(1730253803.656:30680): avc: denied { write open } for pid=20363 comm="syz.3.6197" path="/7/file1/bus" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 261.402946][ T29] audit: type=1400 audit(1730253803.666:30681): avc: denied { mounton } for pid=20363 comm="syz.3.6197" path="/7/file1/file0" dev="loop3" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 261.432015][ T29] audit: type=1400 audit(1730253803.686:30682): avc: denied { unmount } for pid=20068 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 261.455621][T20371] loop6: detected capacity change from 0 to 512 [ 261.477249][T20375] Invalid ELF header magic: != ELF [ 261.485145][T20371] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 261.497900][T20371] ext4 filesystem being mounted at /471/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 261.550110][T20371] 9pnet_fd: Insufficient options for proto=fd [ 261.563495][T20381] loop5: detected capacity change from 0 to 128 [ 261.571088][T13143] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 261.574924][T20381] syz.5.6201: attempt to access beyond end of device [ 261.574924][T20381] loop5: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 261.596262][T20381] syz.5.6201: attempt to access beyond end of device [ 261.596262][T20381] loop5: rw=2049, sector=153, nr_sectors = 24 limit=128 [ 261.656730][T20393] Invalid ELF header magic: != ELF [ 261.673436][T20389] sctp: [Deprecated]: syz.7.6205 (pid 20389) Use of int in max_burst socket option. [ 261.673436][T20389] Use struct sctp_assoc_value instead [ 261.702098][T20395] loop5: detected capacity change from 0 to 512 [ 261.723980][T20395] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 261.724624][T20399] Invalid ELF header magic: != ELF [ 261.736749][T20395] ext4 filesystem being mounted at /209/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 261.785327][T20395] 9pnet_fd: Insufficient options for proto=fd [ 261.799075][T17770] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 261.819069][T20403] __nla_validate_parse: 13 callbacks suppressed [ 261.819083][T20403] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6210'. [ 262.090042][T20410] loop2: detected capacity change from 0 to 8192 [ 262.327533][T20412] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6213'. [ 262.391105][T20416] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6215'. [ 262.472486][T20419] loop3: detected capacity change from 0 to 1024 [ 262.479540][T20419] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 262.489231][T20419] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 262.499961][T20419] EXT4-fs (loop3): invalid journal inode [ 262.536222][T20423] loop6: detected capacity change from 0 to 512 [ 262.576081][T20427] loop7: detected capacity change from 0 to 512 [ 262.583503][T20427] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 262.594571][T20427] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a00ec019, mo2=0002] [ 262.603149][T20427] System zones: 1-12 [ 262.607970][T20427] EXT4-fs (loop7): 1 truncate cleaned up [ 262.614621][T20427] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 262.619216][T20430] FAULT_INJECTION: forcing a failure. [ 262.619216][T20430] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 262.629612][T20427] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6219'. [ 262.640243][T20430] CPU: 0 UID: 0 PID: 20430 Comm: syz.6.6220 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 262.640300][T20430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 262.640310][T20430] Call Trace: [ 262.640317][T20430] [ 262.640324][T20430] dump_stack_lvl+0xf2/0x150 [ 262.640349][T20430] dump_stack+0x15/0x20 [ 262.640368][T20430] should_fail_ex+0x223/0x230 [ 262.689550][T20430] should_fail+0xb/0x10 [ 262.693710][T20430] should_fail_usercopy+0x1a/0x20 [ 262.698728][T20430] _copy_to_user+0x20/0xa0 [ 262.703187][T20430] simple_read_from_buffer+0xa0/0x110 [ 262.708561][T20430] proc_fail_nth_read+0xf9/0x140 [ 262.713555][T20430] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 262.719219][T20430] vfs_read+0x1a2/0x700 [ 262.723374][T20430] ? __fget_files+0x1d4/0x210 [ 262.728055][T20430] ksys_read+0xeb/0x1b0 [ 262.732265][T20430] __x64_sys_read+0x42/0x50 [ 262.736899][T20430] x64_sys_call+0x27d3/0x2d60 [ 262.741603][T20430] do_syscall_64+0xc9/0x1c0 [ 262.746099][T20430] ? clear_bhb_loop+0x55/0xb0 [ 262.750766][T20430] ? clear_bhb_loop+0x55/0xb0 [ 262.755441][T20430] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 262.761438][T20430] RIP: 0033:0x7f717bedd15c [ 262.765845][T20430] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 262.785577][T20430] RSP: 002b:00007f717ab51030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 262.793986][T20430] RAX: ffffffffffffffda RBX: 00007f717c095f80 RCX: 00007f717bedd15c [ 262.801951][T20430] RDX: 000000000000000f RSI: 00007f717ab510a0 RDI: 0000000000000003 [ 262.809921][T20430] RBP: 00007f717ab51090 R08: 0000000000000000 R09: 0000000000000000 [ 262.817884][T20430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 262.825856][T20430] R13: 0000000000000000 R14: 00007f717c095f80 R15: 00007fffc875bf78 [ 262.833860][T20430] [ 262.859905][T20432] loop6: detected capacity change from 0 to 512 [ 262.874404][T20432] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 262.887126][T20432] ext4 filesystem being mounted at /478/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 262.891169][T20436] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6222'. [ 262.928018][T20440] Invalid ELF header magic: != ELF [ 262.935262][T18312] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 262.953644][T20432] 9pnet_fd: Insufficient options for proto=fd [ 262.954004][T20442] loop7: detected capacity change from 0 to 256 [ 262.968924][T13143] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 263.079216][T20447] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6226'. [ 263.146745][T20457] Invalid ELF header magic: != ELF [ 263.242061][T20459] loop3: detected capacity change from 0 to 512 [ 263.274954][T20461] bridge_slave_0: left allmulticast mode [ 263.280620][T20461] bridge_slave_0: left promiscuous mode [ 263.286321][T20461] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.295669][T20461] bridge_slave_1: left allmulticast mode [ 263.301330][T20461] bridge_slave_1: left promiscuous mode [ 263.307064][T20461] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.316708][T20461] bond0: (slave bond_slave_0): Releasing backup interface [ 263.327179][T20461] bond0: (slave bond_slave_1): Releasing backup interface [ 263.340647][T20461] team0: Port device team_slave_0 removed [ 263.350913][T20461] team0: Port device team_slave_1 removed [ 263.357801][T20461] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 263.365324][T20461] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 263.374209][T20461] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 263.381647][T20461] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 263.419630][T20464] FAULT_INJECTION: forcing a failure. [ 263.419630][T20464] name failslab, interval 1, probability 0, space 0, times 0 [ 263.432391][T20464] CPU: 0 UID: 0 PID: 20464 Comm: syz.3.6232 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 263.443158][T20464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 263.453209][T20464] Call Trace: [ 263.456480][T20464] [ 263.459399][T20464] dump_stack_lvl+0xf2/0x150 [ 263.463988][T20464] dump_stack+0x15/0x20 [ 263.468290][T20464] should_fail_ex+0x223/0x230 [ 263.472967][T20464] ? __alloc_skb+0x10b/0x310 [ 263.477651][T20464] should_failslab+0x8f/0xb0 [ 263.482304][T20464] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 263.488147][T20464] __alloc_skb+0x10b/0x310 [ 263.492657][T20464] netlink_alloc_large_skb+0xad/0xe0 [ 263.497968][T20464] netlink_sendmsg+0x3b4/0x6e0 [ 263.502722][T20464] ? __pfx_netlink_sendmsg+0x10/0x10 [ 263.508082][T20464] __sock_sendmsg+0x140/0x180 [ 263.512856][T20464] ____sys_sendmsg+0x312/0x410 [ 263.517649][T20464] __sys_sendmsg+0x1d9/0x270 [ 263.522255][T20464] __x64_sys_sendmsg+0x46/0x50 [ 263.527088][T20464] x64_sys_call+0x2689/0x2d60 [ 263.531816][T20464] do_syscall_64+0xc9/0x1c0 [ 263.536329][T20464] ? clear_bhb_loop+0x55/0xb0 [ 263.541048][T20464] ? clear_bhb_loop+0x55/0xb0 [ 263.545714][T20464] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 263.551631][T20464] RIP: 0033:0x7f2284f2e719 [ 263.556054][T20464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 263.575652][T20464] RSP: 002b:00007f2283ba7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 263.584077][T20464] RAX: ffffffffffffffda RBX: 00007f22850e5f80 RCX: 00007f2284f2e719 [ 263.592061][T20464] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 263.600052][T20464] RBP: 00007f2283ba7090 R08: 0000000000000000 R09: 0000000000000000 [ 263.608039][T20464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.615996][T20464] R13: 0000000000000000 R14: 00007f22850e5f80 R15: 00007ffe6156d5a8 [ 263.624037][T20464] [ 263.922227][T20468] loop3: detected capacity change from 0 to 8192 [ 263.951668][T20470] netlink: 8 bytes leftover after parsing attributes in process `syz.7.6234'. [ 264.075366][T20474] loop6: detected capacity change from 0 to 512 [ 264.106670][T20474] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 264.125458][T20474] ext4 filesystem being mounted at /485/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 264.155186][T20481] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6239'. [ 264.164151][T20486] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6240'. [ 264.186809][T20474] 9pnet_fd: Insufficient options for proto=fd [ 264.202298][T13143] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 264.227656][T20490] loop2: detected capacity change from 0 to 512 [ 264.273415][T20499] Invalid ELF header magic: != ELF [ 264.289201][T20494] 9pnet: p9_errstr2errno: server reported unknown error œæçæÎsÅ‚Ün02ÖÌüä§‘Ì [ 264.311708][T20504] loop7: detected capacity change from 0 to 256 [ 264.348856][T20506] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6248'. [ 264.376566][T20508] Invalid ELF header magic: != ELF [ 264.550054][T20515] loop3: detected capacity change from 0 to 512 [ 264.574115][T20515] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 264.587351][T20515] ext4 filesystem being mounted at /18/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 264.630040][T20515] 9pnet_fd: Insufficient options for proto=fd [ 264.643716][T20068] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 264.745481][T20524] loop3: detected capacity change from 0 to 512 [ 264.776344][T20526] hsr_slave_1 (unregistering): left promiscuous mode [ 265.172839][T20539] loop3: detected capacity change from 0 to 8192 [ 265.367312][T20547] tmpfs: Bad value for 'mpol' [ 265.372670][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 265.372692][ T29] audit: type=1400 audit(1730253807.736:30760): avc: denied { mounton } for pid=20545 comm="syz.2.6263" path="/syzcgroup/unified/syz2" dev="cgroup2" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 265.403031][ T29] audit: type=1400 audit(1730253807.746:30761): avc: denied { ioctl } for pid=20545 comm="syz.2.6263" path="socket:[65233]" dev="sockfs" ino=65233 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 265.428078][ T29] audit: type=1400 audit(1730253807.746:30762): avc: denied { bind } for pid=20545 comm="syz.2.6263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 265.479689][T20546] loop7: detected capacity change from 0 to 1024 [ 265.486807][T20546] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 265.488786][T20555] loop6: detected capacity change from 0 to 512 [ 265.496486][T20546] EXT4-fs (loop7): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 265.513680][T20546] EXT4-fs (loop7): invalid journal inode [ 265.623538][T20565] FAULT_INJECTION: forcing a failure. [ 265.623538][T20565] name failslab, interval 1, probability 0, space 0, times 0 [ 265.636425][T20565] CPU: 1 UID: 0 PID: 20565 Comm: syz.6.6270 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 265.647197][T20565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 265.657338][T20565] Call Trace: [ 265.660636][T20565] [ 265.663603][T20565] dump_stack_lvl+0xf2/0x150 [ 265.668206][T20565] dump_stack+0x15/0x20 [ 265.672359][T20565] should_fail_ex+0x223/0x230 [ 265.677086][T20565] ? __alloc_skb+0x10b/0x310 [ 265.681677][T20565] should_failslab+0x8f/0xb0 [ 265.686266][T20565] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 265.692097][T20565] __alloc_skb+0x10b/0x310 [ 265.696574][T20565] netlink_alloc_large_skb+0xad/0xe0 [ 265.701872][T20565] netlink_sendmsg+0x3b4/0x6e0 [ 265.706744][T20565] ? __pfx_netlink_sendmsg+0x10/0x10 [ 265.712025][T20565] __sock_sendmsg+0x140/0x180 [ 265.716717][T20565] ____sys_sendmsg+0x312/0x410 [ 265.721563][T20565] __sys_sendmsg+0x1d9/0x270 [ 265.726168][T20565] __x64_sys_sendmsg+0x46/0x50 [ 265.731071][T20565] x64_sys_call+0x2689/0x2d60 [ 265.735745][T20565] do_syscall_64+0xc9/0x1c0 [ 265.740293][T20565] ? clear_bhb_loop+0x55/0xb0 [ 265.745065][T20565] ? clear_bhb_loop+0x55/0xb0 [ 265.749808][T20565] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 265.755702][T20565] RIP: 0033:0x7f717bede719 [ 265.760120][T20565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 265.779766][T20565] RSP: 002b:00007f717ab51038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 265.788199][T20565] RAX: ffffffffffffffda RBX: 00007f717c095f80 RCX: 00007f717bede719 [ 265.796251][T20565] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 265.804218][T20565] RBP: 00007f717ab51090 R08: 0000000000000000 R09: 0000000000000000 [ 265.812182][T20565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.820225][T20565] R13: 0000000000000000 R14: 00007f717c095f80 R15: 00007fffc875bf78 [ 265.828256][T20565] [ 265.864081][T20569] Invalid ELF header magic: != ELF [ 265.913094][T20575] Invalid ELF header magic: != ELF [ 266.090306][T20579] loop2: detected capacity change from 0 to 256 [ 266.208309][T20582] loop7: detected capacity change from 0 to 512 [ 266.708403][T20592] Invalid ELF header magic: != ELF [ 267.063343][T20598] loop3: detected capacity change from 0 to 8192 [ 267.244896][T20610] __nla_validate_parse: 8 callbacks suppressed [ 267.244911][T20610] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6289'. [ 267.255672][T20612] loop7: detected capacity change from 0 to 512 [ 267.284333][T20610] loop2: detected capacity change from 0 to 1024 [ 267.291860][T20610] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 267.301545][T20610] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 267.312199][T20610] EXT4-fs (loop2): invalid journal inode [ 267.320403][T20618] bridge0: port 1(vlan2) entered blocking state [ 267.326794][T20618] bridge0: port 1(vlan2) entered disabled state [ 267.333573][T20618] vlan2: entered allmulticast mode [ 267.339625][T20618] vlan2: left allmulticast mode [ 267.341824][T20620] Invalid ELF header magic: != ELF [ 267.395827][T20623] Invalid ELF header magic: != ELF [ 267.552627][T20625] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6295'. [ 267.668417][T20635] loop3: detected capacity change from 0 to 256 [ 268.209890][ T29] audit: type=1326 audit(1730253810.576:30763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.2.6301" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 268.240321][ T29] audit: type=1326 audit(1730253810.576:30764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.2.6301" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 268.251385][T20641] netlink: 40 bytes leftover after parsing attributes in process `syz.7.6303'. [ 268.264013][ T29] audit: type=1326 audit(1730253810.576:30765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.2.6301" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 268.296620][ T29] audit: type=1326 audit(1730253810.586:30766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.2.6301" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 268.296643][ T29] audit: type=1326 audit(1730253810.586:30767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.2.6301" exe="/root/syz-executor" sig=0 arch=c000003e syscall=237 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 268.326207][T20641] loop7: detected capacity change from 0 to 1024 [ 268.344025][ T29] audit: type=1326 audit(1730253810.586:30768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.2.6301" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 268.353334][T20641] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 268.373851][ T29] audit: type=1326 audit(1730253810.586:30769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.2.6301" exe="/root/syz-executor" sig=0 arch=c000003e syscall=450 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 268.383600][T20641] EXT4-fs (loop7): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 268.418377][T20641] EXT4-fs (loop7): invalid journal inode [ 268.435268][T20644] loop2: detected capacity change from 0 to 512 [ 268.456551][T20648] bridge0: port 1(vlan2) entered blocking state [ 268.462863][T20648] bridge0: port 1(vlan2) entered disabled state [ 268.470478][T20648] vlan2: entered allmulticast mode [ 268.471972][T20650] Invalid ELF header magic: != ELF [ 268.481241][T20648] vlan2: left allmulticast mode [ 268.499635][T20654] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6308'. [ 268.606738][T20659] Invalid ELF header magic: != ELF [ 268.620000][T20668] Invalid ELF header magic: != ELF [ 268.785512][T20669] loop2: detected capacity change from 0 to 8192 [ 269.405242][T20673] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6316'. [ 269.437455][T20673] loop2: detected capacity change from 0 to 1024 [ 269.438083][T20679] loop7: detected capacity change from 0 to 512 [ 269.444428][T20673] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 269.459736][T20673] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 269.471248][T20673] EXT4-fs (loop2): invalid journal inode [ 269.501949][T20685] loop3: detected capacity change from 0 to 256 [ 269.502208][T20683] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6320'. [ 269.526989][T20687] bridge0: port 1(vlan2) entered blocking state [ 269.533395][T20687] bridge0: port 1(vlan2) entered disabled state [ 269.540111][T20687] vlan2: entered allmulticast mode [ 269.556238][T20687] vlan2: left allmulticast mode [ 269.612530][T20696] loop2: detected capacity change from 0 to 128 [ 269.656672][T20700] Invalid ELF header magic: != ELF [ 269.894221][T20702] loop7: detected capacity change from 0 to 8192 [ 270.143933][T20704] Invalid ELF header magic: != ELF [ 270.373080][T20706] Invalid ELF header magic: != ELF [ 270.487949][T20708] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6330'. [ 270.537206][T20714] loop7: detected capacity change from 0 to 512 [ 270.578925][T20719] loop2: detected capacity change from 0 to 1024 [ 270.579111][T20721] netlink: 8 bytes leftover after parsing attributes in process `syz.7.6335'. [ 270.587430][T20719] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 270.604482][T20719] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 270.609100][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 270.609114][ T29] audit: type=1326 audit(1730253812.976:30787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20722 comm="syz.7.6336" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6996c0e719 code=0x0 [ 270.616020][T20719] EXT4-fs (loop2): invalid journal inode [ 271.008256][T20725] bridge0: port 1(vlan2) entered blocking state [ 271.014645][T20725] bridge0: port 1(vlan2) entered disabled state [ 271.021080][T20725] vlan2: entered allmulticast mode [ 271.026633][T20725] vlan2: left allmulticast mode [ 271.084714][T20728] loop6: detected capacity change from 0 to 128 [ 271.095864][T20728] syz.6.6338: attempt to access beyond end of device [ 271.095864][T20728] loop6: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 271.109847][T20728] syz.6.6338: attempt to access beyond end of device [ 271.109847][T20728] loop6: rw=2049, sector=153, nr_sectors = 24 limit=128 [ 271.123488][T20728] syz.6.6338: attempt to access beyond end of device [ 271.123488][T20728] loop6: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 271.136952][T20728] Buffer I/O error on dev loop6, logical block 177, lost async page write [ 271.159854][ T29] audit: type=1326 audit(1730253813.526:30788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20729 comm="syz.6.6339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f717bede719 code=0x7ffc0000 [ 271.185047][ T29] audit: type=1326 audit(1730253813.526:30789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20729 comm="syz.6.6339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f717bede719 code=0x7ffc0000 [ 271.208698][ T29] audit: type=1326 audit(1730253813.526:30790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20729 comm="syz.6.6339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7f717bede719 code=0x7ffc0000 [ 271.232344][ T29] audit: type=1326 audit(1730253813.526:30791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20729 comm="syz.6.6339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f717bede719 code=0x7ffc0000 [ 271.256191][ T29] audit: type=1326 audit(1730253813.526:30792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20729 comm="syz.6.6339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f717bede719 code=0x7ffc0000 [ 271.279788][ T29] audit: type=1326 audit(1730253813.556:30793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20729 comm="syz.6.6339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f717bede719 code=0x7ffc0000 [ 271.303565][ T29] audit: type=1326 audit(1730253813.556:30794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20729 comm="syz.6.6339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f717bede719 code=0x7ffc0000 [ 271.329801][ T29] audit: type=1326 audit(1730253813.556:30795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20729 comm="syz.6.6339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f717bede719 code=0x7ffc0000 [ 271.338450][T20734] Invalid ELF header magic: != ELF [ 271.353355][ T29] audit: type=1326 audit(1730253813.556:30796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20729 comm="syz.6.6339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f717bede719 code=0x7ffc0000 [ 271.391946][T20737] loop2: detected capacity change from 0 to 256 [ 271.504927][T20742] loop7: detected capacity change from 0 to 512 [ 271.920634][T20745] loop6: detected capacity change from 0 to 8192 [ 271.958678][T20752] netlink: 8 bytes leftover after parsing attributes in process `syz.7.6347'. [ 271.979862][T20754] Invalid ELF header magic: != ELF [ 272.189239][T20756] bridge0: port 1(vlan2) entered blocking state [ 272.195586][T20756] bridge0: port 1(vlan2) entered disabled state [ 272.202018][T20756] vlan2: entered allmulticast mode [ 272.208310][T20756] vlan2: left allmulticast mode [ 272.272686][T20758] loop2: detected capacity change from 0 to 128 [ 272.286125][T20760] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6352'. [ 272.290066][T20758] syz.2.6350: attempt to access beyond end of device [ 272.290066][T20758] loop2: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 272.300378][T20762] Invalid ELF header magic: != ELF [ 272.319961][T20758] syz.2.6350: attempt to access beyond end of device [ 272.319961][T20758] loop2: rw=2049, sector=153, nr_sectors = 24 limit=128 [ 272.333656][T20758] syz.2.6350: attempt to access beyond end of device [ 272.333656][T20758] loop2: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 272.347086][T20758] Buffer I/O error on dev loop2, logical block 177, lost async page write [ 272.384715][T20768] loop3: detected capacity change from 0 to 1024 [ 272.391753][T20768] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 272.401522][T20768] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 272.412261][T20768] EXT4-fs (loop3): invalid journal inode [ 272.422992][T20771] loop2: detected capacity change from 0 to 256 [ 272.432492][T20771] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=20771 comm=syz.2.6354 [ 272.856085][T20776] loop7: detected capacity change from 0 to 512 [ 272.875479][T20778] Invalid ELF header magic: != ELF [ 273.147463][T20783] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6360'. [ 273.152809][T20784] Invalid ELF header magic: != ELF [ 273.170922][T20786] loop6: detected capacity change from 0 to 256 [ 273.585268][T20792] loop2: detected capacity change from 0 to 8192 [ 273.756823][T20794] bridge0: port 1(vlan2) entered blocking state [ 273.763273][T20794] bridge0: port 1(vlan2) entered disabled state [ 273.770375][T20794] vlan2: entered allmulticast mode [ 273.777975][T20794] vlan2: left allmulticast mode [ 273.857953][T20797] loop7: detected capacity change from 0 to 128 [ 273.869512][T20797] syz.7.6364: attempt to access beyond end of device [ 273.869512][T20797] loop7: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 273.883556][T20797] syz.7.6364: attempt to access beyond end of device [ 273.883556][T20797] loop7: rw=2049, sector=153, nr_sectors = 24 limit=128 [ 273.897098][T20797] syz.7.6364: attempt to access beyond end of device [ 273.897098][T20797] loop7: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 273.910659][T20797] Buffer I/O error on dev loop7, logical block 177, lost async page write [ 273.970190][T20803] Invalid ELF header magic: != ELF [ 273.997957][T20805] loop3: detected capacity change from 0 to 512 [ 274.029618][T20807] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6368'. [ 274.079478][T20815] Invalid ELF header magic: != ELF [ 274.115349][T20816] loop3: detected capacity change from 0 to 1024 [ 274.122933][T20816] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 274.132999][T20816] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 274.144623][T20816] EXT4-fs (loop3): invalid journal inode [ 274.159018][T20818] FAULT_INJECTION: forcing a failure. [ 274.159018][T20818] name failslab, interval 1, probability 0, space 0, times 0 [ 274.171718][T20818] CPU: 0 UID: 0 PID: 20818 Comm: syz.2.6372 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 274.182616][T20818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 274.192684][T20818] Call Trace: [ 274.196081][T20818] [ 274.198998][T20818] dump_stack_lvl+0xf2/0x150 [ 274.203580][T20818] dump_stack+0x15/0x20 [ 274.207725][T20818] should_fail_ex+0x223/0x230 [ 274.212397][T20818] ? getname_kernel+0x3d/0x1e0 [ 274.217157][T20818] should_failslab+0x8f/0xb0 [ 274.221765][T20818] kmem_cache_alloc_noprof+0x4c/0x290 [ 274.227210][T20818] ? avc_has_perm_noaudit+0x1cc/0x210 [ 274.232596][T20818] getname_kernel+0x3d/0x1e0 [ 274.237256][T20818] kern_path+0x21/0x110 [ 274.241437][T20818] create_local_trace_uprobe+0x55/0x2d0 [ 274.246983][T20818] perf_uprobe_init+0xc2/0x140 [ 274.251747][T20818] perf_uprobe_event_init+0xe2/0x140 [ 274.257023][T20818] perf_try_init_event+0xcb/0x4f0 [ 274.262037][T20818] ? perf_event_alloc+0xabf/0x1750 [ 274.267139][T20818] perf_event_alloc+0xaca/0x1750 [ 274.272063][T20818] __se_sys_perf_event_open+0x5e8/0x21f0 [ 274.277820][T20818] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 274.283466][T20818] ? vfs_write+0x596/0x920 [ 274.287896][T20818] ? __rcu_read_unlock+0x4e/0x70 [ 274.292891][T20818] ? __fget_files+0x1d4/0x210 [ 274.297681][T20818] __x64_sys_perf_event_open+0x67/0x80 [ 274.303212][T20818] x64_sys_call+0x18d7/0x2d60 [ 274.307907][T20818] do_syscall_64+0xc9/0x1c0 [ 274.312400][T20818] ? clear_bhb_loop+0x55/0xb0 [ 274.317132][T20818] ? clear_bhb_loop+0x55/0xb0 [ 274.321836][T20818] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 274.327780][T20818] RIP: 0033:0x7f57a65ae719 [ 274.332198][T20818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.351975][T20818] RSP: 002b:00007f57a5227038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 274.360375][T20818] RAX: ffffffffffffffda RBX: 00007f57a6765f80 RCX: 00007f57a65ae719 [ 274.368412][T20818] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 274.376429][T20818] RBP: 00007f57a5227090 R08: 000000000000000d R09: 0000000000000000 [ 274.384399][T20818] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 274.392414][T20818] R13: 0000000000000000 R14: 00007f57a6765f80 R15: 00007ffc2a7bc2e8 [ 274.400376][T20818] [ 274.416817][T20820] Invalid ELF header magic: != ELF [ 274.818380][T20822] loop7: detected capacity change from 0 to 1024 [ 274.833594][T20822] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 274.870387][T18312] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 274.887536][T20829] loop7: detected capacity change from 0 to 128 [ 274.898316][T20829] syz.7.6376: attempt to access beyond end of device [ 274.898316][T20829] loop7: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 274.912454][T20829] Buffer I/O error on dev loop7, logical block 177, lost async page write [ 274.930054][T20831] Invalid ELF header magic: != ELF [ 274.939447][T20832] bridge0: port 1(vlan2) entered blocking state [ 274.945840][T20832] bridge0: port 1(vlan2) entered disabled state [ 274.953485][T20832] vlan2: entered allmulticast mode [ 274.959215][T20832] vlan2: left allmulticast mode [ 274.986163][T20838] loop7: detected capacity change from 0 to 512 [ 275.006384][T20841] loop7: detected capacity change from 0 to 256 [ 275.551344][T20849] loop2: detected capacity change from 0 to 8192 [ 275.760188][T20853] Invalid ELF header magic: != ELF [ 275.776043][T20855] loop6: detected capacity change from 0 to 512 [ 275.794176][T20855] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 275.806882][T20855] ext4 filesystem being mounted at /516/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 275.851719][T20855] 9pnet_fd: Insufficient options for proto=fd [ 275.866987][T13143] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 275.886359][T20863] netlink: 40 bytes leftover after parsing attributes in process `syz.6.6386'. [ 275.887151][T20864] Invalid ELF header magic: != ELF [ 275.968079][T20867] loop6: detected capacity change from 0 to 1024 [ 275.974938][T20867] EXT4-fs (loop6): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 275.984669][T20867] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 275.995454][T20867] EXT4-fs (loop6): invalid journal inode [ 276.195928][T20871] loop2: detected capacity change from 0 to 128 [ 276.207516][T20871] bio_check_eod: 2 callbacks suppressed [ 276.207526][T20871] syz.2.6389: attempt to access beyond end of device [ 276.207526][T20871] loop2: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 276.227644][T20871] syz.2.6389: attempt to access beyond end of device [ 276.227644][T20871] loop2: rw=2049, sector=153, nr_sectors = 24 limit=128 [ 276.241247][T20871] syz.2.6389: attempt to access beyond end of device [ 276.241247][T20871] loop2: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 276.254693][T20871] Buffer I/O error on dev loop2, logical block 177, lost async page write [ 276.278193][ T29] kauditd_printk_skb: 131 callbacks suppressed [ 276.278208][ T29] audit: type=1326 audit(1730253818.646:30928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20872 comm="syz.2.6390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 276.308077][ T29] audit: type=1326 audit(1730253818.646:30929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20872 comm="syz.2.6390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 276.331707][ T29] audit: type=1326 audit(1730253818.646:30930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20872 comm="syz.2.6390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 276.355260][ T29] audit: type=1326 audit(1730253818.646:30931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20872 comm="syz.2.6390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 276.368749][T20877] loop2: detected capacity change from 0 to 512 [ 276.378856][ T29] audit: type=1326 audit(1730253818.646:30932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20872 comm="syz.2.6390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 276.408830][ T29] audit: type=1326 audit(1730253818.646:30933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20872 comm="syz.2.6390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 276.432479][ T29] audit: type=1326 audit(1730253818.646:30934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20872 comm="syz.2.6390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 276.456023][ T29] audit: type=1326 audit(1730253818.646:30935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20872 comm="syz.2.6390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 276.479701][ T29] audit: type=1326 audit(1730253818.646:30936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20872 comm="syz.2.6390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 276.503361][ T29] audit: type=1326 audit(1730253818.646:30937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20872 comm="syz.2.6390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57a65ae719 code=0x7ffc0000 [ 276.538971][T20879] Invalid ELF header magic: != ELF [ 276.708305][T20884] bridge0: port 1(vlan2) entered blocking state [ 276.714654][T20884] bridge0: port 1(vlan2) entered disabled state [ 276.727167][T20884] vlan2: entered allmulticast mode [ 276.733179][T20884] vlan2: left allmulticast mode [ 276.743855][T20888] Invalid ELF header magic: != ELF [ 276.761998][T20891] loop6: detected capacity change from 0 to 512 [ 276.773792][T20891] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 276.786537][T20891] ext4 filesystem being mounted at /519/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 276.830112][T20891] 9pnet_fd: Insufficient options for proto=fd [ 276.843260][T13143] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 277.111304][T20899] loop6: detected capacity change from 0 to 8192 [ 277.420742][T20905] loop2: detected capacity change from 0 to 128 [ 277.431894][T20905] syz.2.6401: attempt to access beyond end of device [ 277.431894][T20905] loop2: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 277.446880][T20905] syz.2.6401: attempt to access beyond end of device [ 277.446880][T20905] loop2: rw=2049, sector=153, nr_sectors = 24 limit=128 [ 277.460489][T20905] syz.2.6401: attempt to access beyond end of device [ 277.460489][T20905] loop2: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 277.473939][T20905] Buffer I/O error on dev loop2, logical block 177, lost async page write [ 277.506684][T20915] loop3: detected capacity change from 0 to 512 [ 277.541041][T20920] FAULT_INJECTION: forcing a failure. [ 277.541041][T20920] name failslab, interval 1, probability 0, space 0, times 0 [ 277.554015][T20920] CPU: 0 UID: 0 PID: 20920 Comm: syz.2.6404 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 277.559159][T20922] loop3: detected capacity change from 0 to 1764 [ 277.564774][T20920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 277.564789][T20920] Call Trace: [ 277.564795][T20920] [ 277.564803][T20920] dump_stack_lvl+0xf2/0x150 [ 277.564828][T20920] dump_stack+0x15/0x20 [ 277.564845][T20920] should_fail_ex+0x223/0x230 [ 277.581285][T20920] ? audit_log_d_path+0x96/0x250 [ 277.606230][T20920] should_failslab+0x8f/0xb0 [ 277.610866][T20920] __kmalloc_cache_noprof+0x4b/0x2a0 [ 277.616152][T20920] audit_log_d_path+0x96/0x250 [ 277.620921][T20920] ? get_file_rcu+0xeb/0x100 [ 277.625534][T20920] ? __rcu_read_unlock+0x4e/0x70 [ 277.630470][T20920] audit_log_d_path_exe+0x42/0x70 [ 277.635487][T20920] audit_log_task+0x155/0x180 [ 277.640161][T20920] audit_seccomp+0x68/0x130 [ 277.644660][T20920] __seccomp_filter+0x6fa/0x1180 [ 277.649641][T20920] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 277.655276][T20920] ? vfs_write+0x596/0x920 [ 277.659708][T20920] ? __rcu_read_unlock+0x4e/0x70 [ 277.664768][T20920] __secure_computing+0x9f/0x1c0 [ 277.669804][T20920] syscall_trace_enter+0xd1/0x1f0 [ 277.674939][T20920] do_syscall_64+0xaa/0x1c0 [ 277.679438][T20920] ? clear_bhb_loop+0x55/0xb0 [ 277.684166][T20920] ? clear_bhb_loop+0x55/0xb0 [ 277.688835][T20920] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 277.694747][T20920] RIP: 0033:0x7f57a65ae719 [ 277.699210][T20920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.718843][T20920] RSP: 002b:00007f57a5227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 277.727250][T20920] RAX: ffffffffffffffda RBX: 00007f57a6765f80 RCX: 00007f57a65ae719 [ 277.735304][T20920] RDX: 0000000000000001 RSI: 0000000020000240 RDI: 0000000000000003 [ 277.743352][T20920] RBP: 00007f57a5227090 R08: 0000000000000000 R09: 0000000000000003 [ 277.751318][T20920] R10: 0000000000033000 R11: 0000000000000246 R12: 0000000000000001 [ 277.759287][T20920] R13: 0000000000000000 R14: 00007f57a6765f80 R15: 00007ffc2a7bc2e8 [ 277.767322][T20920] [ 277.812722][T20903] chnl_net:caif_netlink_parms(): no params data found [ 277.833120][T20926] Invalid ELF header magic: != ELF [ 277.852829][T20932] loop2: detected capacity change from 0 to 512 [ 277.862025][T20936] loop6: detected capacity change from 0 to 512 [ 277.863237][T20934] Invalid ELF header magic: != ELF [ 277.891563][T20903] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.898854][T20903] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.906093][T20903] bridge_slave_0: entered allmulticast mode [ 277.912469][T20903] bridge_slave_0: entered promiscuous mode [ 277.913087][T20932] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c11c, mo2=0002] [ 277.919440][T20903] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.927435][T20932] System zones: [ 277.933397][T20903] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.933402][T20932] 0-2 [ 277.934047][T20903] bridge_slave_1: entered allmulticast mode [ 277.936979][T20932] , 18-18 [ 277.945441][T20903] bridge_slave_1: entered promiscuous mode [ 277.946598][T20932] , 34-34 [ 277.948198][T20936] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 277.958195][T20932] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz.2.6406: bg 0: block 248: padding at end of block bitmap is not set [ 277.961521][T20936] ext4 filesystem being mounted at /521/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 277.965426][T20932] EXT4-fs error (device loop2): ext4_acquire_dquot:6879: comm syz.2.6406: Failed to acquire dquot type 1 [ 278.015758][T20932] EXT4-fs (loop2): 1 truncate cleaned up [ 278.021829][T20932] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 278.023838][T20903] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 278.036091][T20932] ext4 filesystem being mounted at /97/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 278.045356][T20903] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 278.057960][T20932] EXT4-fs error (device loop2): ext4_readdir:261: inode #2: block 3: comm syz.2.6406: path /97/file0: bad entry in directory: rec_len % 4 != 0 - offset=92, inode=2164260880, rec_len=231, size=4096 fake=0 [ 278.070438][T20936] 9pnet_fd: Insufficient options for proto=fd [ 278.099548][T19510] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 278.102594][T20903] team0: Port device team_slave_0 added [ 278.115240][T20903] team0: Port device team_slave_1 added [ 278.115311][T13143] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 278.138301][T20903] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 278.145339][T20903] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.171415][T20903] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 278.183138][T20903] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 278.190089][T20903] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.216169][T20903] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 278.245208][T20903] hsr_slave_0: entered promiscuous mode [ 278.245538][T20956] Invalid ELF header magic: != ELF [ 278.256352][T20903] hsr_slave_1: entered promiscuous mode [ 278.262512][T20903] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 278.270136][T20903] Cannot create hsr debugfs directory [ 278.283786][T20958] bridge0: port 1(vlan2) entered blocking state [ 278.290130][T20958] bridge0: port 1(vlan2) entered disabled state [ 278.296564][T20958] vlan2: entered allmulticast mode [ 278.302037][T20958] vlan2: left allmulticast mode [ 278.349882][T20903] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 278.358839][T20903] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 278.367627][T20903] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 278.375907][T20903] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 278.389285][T20903] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.396343][T20903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.403670][T20903] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.410803][T20903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.439959][T20903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.451723][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.460058][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.472813][T20903] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.482880][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.489930][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.500037][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.507080][ T380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.569278][T20903] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 278.666363][T20903] veth0_vlan: entered promiscuous mode [ 278.676191][T20903] veth1_vlan: entered promiscuous mode [ 278.694080][T20903] veth0_macvtap: entered promiscuous mode [ 278.702069][T20903] veth1_macvtap: entered promiscuous mode [ 278.705447][T20979] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6417'. [ 278.716675][T20903] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 278.721388][T20977] loop7: detected capacity change from 0 to 128 [ 278.734603][T20903] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 278.740008][T20977] syz.7.6416: attempt to access beyond end of device [ 278.740008][T20977] loop7: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 278.743626][T20903] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.764081][T20903] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.772833][T20903] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.781588][T20903] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.783590][T20977] syz.7.6416: attempt to access beyond end of device [ 278.783590][T20977] loop7: rw=2049, sector=153, nr_sectors = 24 limit=128 [ 278.804231][T20977] syz.7.6416: attempt to access beyond end of device [ 278.804231][T20977] loop7: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 278.817705][T20977] Buffer I/O error on dev loop7, logical block 177, lost async page write [ 278.851019][T20985] Invalid ELF header magic: != ELF [ 278.851204][T20979] loop3: detected capacity change from 0 to 1024 [ 278.863320][T20979] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 278.873047][T20979] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 278.876335][T20987] loop8: detected capacity change from 0 to 256 [ 278.884645][T20979] EXT4-fs (loop3): invalid journal inode [ 279.074839][T20992] loop6: detected capacity change from 0 to 512 [ 279.100407][T20997] loop6: detected capacity change from 0 to 512 [ 279.125177][T20997] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 279.139038][T20997] ext4 filesystem being mounted at /524/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 279.267779][T21006] loop8: detected capacity change from 0 to 8192 [ 279.353092][T21005] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6425'. [ 279.379240][T20997] 9pnet_fd: Insufficient options for proto=fd [ 279.410283][T13143] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 279.573255][T21010] Invalid ELF header magic: != ELF [ 279.716243][T21012] loop7: detected capacity change from 0 to 128 [ 279.726268][T21014] Invalid ELF header magic: != ELF [ 279.736773][T21012] syz.7.6428: attempt to access beyond end of device [ 279.736773][T21012] loop7: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 279.751744][T21012] Buffer I/O error on dev loop7, logical block 177, lost async page write [ 279.774854][T21016] loop7: detected capacity change from 0 to 256 [ 279.883979][T21022] bridge0: port 1(vlan2) entered blocking state [ 279.890290][T21022] bridge0: port 1(vlan2) entered disabled state [ 279.898237][T21022] vlan2: entered allmulticast mode [ 279.904900][T21022] vlan2: left allmulticast mode [ 279.917981][T21024] Invalid ELF header magic: != ELF [ 279.926448][T21026] loop8: detected capacity change from 0 to 512 [ 279.975986][T21033] loop8: detected capacity change from 0 to 512 [ 280.004264][T21033] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 280.016976][T21033] ext4 filesystem being mounted at /5/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 280.060872][T21033] 9pnet_fd: Insufficient options for proto=fd [ 280.073499][T20903] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 280.105554][T21041] Invalid ELF header magic: != ELF [ 280.414790][T21043] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6439'. [ 280.495298][T21046] loop3: detected capacity change from 0 to 1024 [ 280.502644][T21046] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (24866!=20869) [ 280.512600][T21046] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 280.523295][T21046] EXT4-fs (loop3): invalid journal inode [ 280.568596][T21048] loop6: detected capacity change from 0 to 128 [ 280.581047][T21048] Buffer I/O error on dev loop6, logical block 177, lost async page write [ 280.619985][T21050] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6441'. [ 280.641305][T21054] loop6: detected capacity change from 0 to 256 [ 280.780985][T21060] loop6: detected capacity change from 0 to 512 [ 280.804629][T21066] loop6: detected capacity change from 0 to 512 [ 280.943354][T21073] loop2: detected capacity change from 0 to 8192 [ 280.961720][T21066] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 281.000942][T21066] ext4 filesystem being mounted at /530/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 281.033672][T21077] Invalid ELF header magic: != ELF [ 281.132703][T21066] 9pnet_fd: Insufficient options for proto=fd [ 281.151460][T13143] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 281.158104][T21081] Invalid ELF header magic: != ELF [ 281.241329][T21083] loop6: detected capacity change from 0 to 128 [ 281.253813][T21083] bio_check_eod: 5 callbacks suppressed [ 281.253826][T21083] syz.6.6452: attempt to access beyond end of device [ 281.253826][T21083] loop6: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 281.275026][T21083] syz.6.6452: attempt to access beyond end of device [ 281.275026][T21083] loop6: rw=2049, sector=153, nr_sectors = 24 limit=128 [ 281.289428][T21083] syz.6.6452: attempt to access beyond end of device [ 281.289428][T21083] loop6: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 281.302882][T21083] Buffer I/O error on dev loop6, logical block 177, lost async page write [ 281.311470][T21085] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6453'. [ 281.347741][T21093] Invalid ELF header magic: != ELF [ 281.387664][T21094] bridge0: port 1(vlan2) entered blocking state [ 281.394076][T21094] bridge0: port 1(vlan2) entered disabled state [ 281.400548][T21094] vlan2: entered allmulticast mode [ 281.406414][T21094] vlan2: left allmulticast mode [ 281.568635][T21099] loop2: detected capacity change from 0 to 256 [ 281.593782][T21101] loop2: detected capacity change from 0 to 512 [ 281.629989][T21105] Invalid ELF header magic: != ELF [ 281.875947][ T29] kauditd_printk_skb: 122 callbacks suppressed [ 281.875962][ T29] audit: type=1400 audit(1730253824.246:31058): avc: denied { create } for pid=21106 comm="syz.7.6462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 281.876342][T21107] syz.7.6462: attempt to access beyond end of device [ 281.876342][T21107] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 281.917336][ T29] audit: type=1400 audit(1730253824.286:31059): avc: denied { write } for pid=21106 comm="syz.7.6462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 281.938352][ T29] audit: type=1400 audit(1730253824.286:31060): avc: denied { nlmsg_write } for pid=21106 comm="syz.7.6462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 281.961214][T21111] Invalid ELF header magic: != ELF [ 282.003612][T21113] loop8: detected capacity change from 0 to 512 [ 282.014045][T21113] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 282.026981][T21113] ext4 filesystem being mounted at /9/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 282.068283][ T29] audit: type=1400 audit(1730253824.436:31061): avc: denied { mount } for pid=21112 comm="syz.8.6465" name="/" dev="ramfs" ino=67928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 282.094610][ T29] audit: type=1400 audit(1730253824.466:31062): avc: denied { create } for pid=21112 comm="syz.8.6465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 282.114460][ T29] ================================================================== [ 282.122558][ T29] BUG: KCSAN: data-race in console_flush_all / console_flush_all [ 282.130312][ T29] [ 282.132633][ T29] write to 0xffffffff86816a28 of 8 bytes by task 21112 on cpu 1: [ 282.140353][ T29] console_flush_all+0x395/0x770 [ 282.145307][ T29] console_unlock+0xab/0x330 [ 282.149902][ T29] vprintk_emit+0x3f4/0x680 [ 282.154407][ T29] vprintk_default+0x26/0x30 [ 282.159085][ T29] vprintk+0x75/0x80 [ 282.162972][ T29] _printk+0x7a/0xa0 [ 282.166865][ T29] base_sock_release+0x38/0x200 [ 282.171715][ T29] sock_close+0x68/0x150 [ 282.175959][ T29] __fput+0x17a/0x6d0 [ 282.179938][ T29] ____fput+0x1c/0x30 [ 282.183914][ T29] task_work_run+0x13a/0x1a0 [ 282.188501][ T29] syscall_exit_to_user_mode+0xbe/0x130 [ 282.194050][ T29] do_syscall_64+0xd6/0x1c0 [ 282.198542][ T29] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.204526][ T29] [ 282.206837][ T29] read to 0xffffffff86816a28 of 8 bytes by task 29 on cpu 0: [ 282.214195][ T29] console_flush_all+0x57e/0x770 [ 282.219150][ T29] console_unlock+0xab/0x330 [ 282.223745][ T29] vprintk_emit+0x3f4/0x680 [ 282.228243][ T29] vprintk_default+0x26/0x30 [ 282.232831][ T29] vprintk+0x75/0x80 [ 282.236715][ T29] _printk+0x7a/0xa0 [ 282.240610][ T29] kauditd_hold_skb+0x1a3/0x1b0 [ 282.245453][ T29] kauditd_send_queue+0x288/0x2e0 [ 282.250472][ T29] kauditd_thread+0x42a/0x650 [ 282.255143][ T29] kthread+0x1d1/0x210 [ 282.259205][ T29] ret_from_fork+0x4b/0x60 [ 282.263623][ T29] ret_from_fork_asm+0x1a/0x30 [ 282.268382][ T29] [ 282.270692][ T29] value changed: 0x0000000000002fb3 -> 0x0000000000002fb4 [ 282.277786][ T29] [ 282.280105][ T29] Reported by Kernel Concurrency Sanitizer on: [ 282.286241][ T29] CPU: 0 UID: 0 PID: 29 Comm: kauditd Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 282.296469][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 282.306517][ T29] ================================================================== [ 282.315250][ T29] audit: type=1400 audit(1730253824.496:31063): avc: denied { remove_name } for pid=20903 comm="syz-executor" name="lost+found" dev="loop8" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 282.338791][ T29] audit: type=1400 audit(1730253824.496:31064): avc: denied { rmdir } for pid=20903 comm="syz-executor" name="lost+found" dev="loop8" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 282.361843][ T29] audit: type=1400 audit(1730253824.496:31065): avc: denied { unlink } for pid=20903 comm="syz-executor" name="file0" dev="loop8" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 282.384717][ T29] audit: type=1400 audit(1730253824.496:31066): avc: denied { unlink } for pid=20903 comm="syz-executor" name="file1" dev="loop8" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=lnk_file permissive=1 [ 284.113426][T21116] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 284.125733][ T1765] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.176962][ T1765] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.237537][ T1765] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.295676][ T1765] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.367174][ T1765] bridge_slave_1: left allmulticast mode [ 284.372900][ T1765] bridge_slave_1: left promiscuous mode [ 284.378567][ T1765] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.387477][ T1765] bridge_slave_0: left allmulticast mode [ 284.393147][ T1765] bridge_slave_0: left promiscuous mode [ 284.398748][ T1765] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.515019][ T1765] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 284.525561][ T1765] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 284.536504][ T1765] bond0 (unregistering): Released all slaves [ 284.606433][ T1765] hsr_slave_0: left promiscuous mode [ 284.612153][ T1765] hsr_slave_1: left promiscuous mode [ 284.617926][ T1765] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 284.625475][ T1765] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 284.634246][ T1765] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 284.641711][ T1765] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 284.651140][ T1765] veth1_macvtap: left promiscuous mode [ 284.656648][ T1765] veth0_macvtap: left promiscuous mode [ 284.662198][ T1765] veth1_vlan: left promiscuous mode [ 284.667455][ T1765] veth0_vlan: left promiscuous mode [ 284.767527][ T1765] team0 (unregistering): Port device team_slave_1 removed [ 284.777795][ T1765] team0 (unregistering): Port device team_slave_0 removed