last executing test programs: 2m12.738523896s ago: executing program 32 (id=67): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='mm_page_free\x00'}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x50032, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) r1 = socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="020000000400000008000000"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x2f}]}, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000038b15196000600000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x66) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r2}, 0x38) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f00000003c0)=ANY=[@ANYBLOB="80000000", @ANYRES16=r3, @ANYBLOB="010028bd7000fedbe3250c00000054000380080002000002000044000400d700981b00eb2e2466b3b726c12bfffe5f916f1716088a9129f9d2da6226169a994f49a227f189a859257dea5b53a46afb0f8effa4689efe631ffa5f5e03709c04000100180001801400020076657468305f746f5f626174616476"], 0x80}, 0x1, 0x0, 0x0, 0x881}, 0x8000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x18) io_setup(0x2007, &(0x7f0000000980)=0x0) io_destroy(r5) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x42073, 0xffffffffffffffff, 0x0) 2m12.310111184s ago: executing program 33 (id=78): syz_usb_connect$cdc_ncm(0x2, 0x76, &(0x7f00000004c0)=ANY=[@ANYBLOB="b206da34480f206bb69cca4788e3b5a8693100c41404d40145ed5f4a4cd10031dee180337b04a553afa21ed7df5cdad13026f2cb80481321bf35ffc217cabfb7a43c62fe9afcdd4f9b4bc8985aace60a2c6f1817f8cff3c5b0c12b57f27b68a88a9192da7d9380b7b83def952f33", @ANYBLOB="c7e41608ced5f879b7661d2facbbc4abf819ea759581d5d4ec6ec286f15a77ab1dbc9d6bea7a9b880f252d8689d041f35a74c2464e4f95bad30574cdad258cab6248a8d37cd541004d6f584852ec95d9"], 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x40001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'hsr0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x2000000, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {}, {}, {0xfff3}}}, 0x24}}, 0x800) 2m0.52993107s ago: executing program 34 (id=212): syz_usb_connect$cdc_ncm(0x2, 0x76, &(0x7f00000004c0)=ANY=[@ANYBLOB="b206da34480f206bb69cca4788e3b5a8693100c41404d40145ed5f4a4cd10031dee180337b04a553afa2", @ANYBLOB="c7e41608ced5f879b7661d2facbbc4abf819ea759581d5d4ec6ec286f15a77ab1dbc9d6bea7a9b880f252d8689d041f35a74c2464e4f95bad30574cdad258cab6248a8d37cd541004d6f584852ec95d9"], 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x40001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'hsr0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x2000000, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {}, {}, {0xfff3}}}, 0x24}}, 0x800) 1m58.823851263s ago: executing program 35 (id=227): r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000400000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) statx(0xffffffffffffffff, 0x0, 0x2000, 0x400, 0x0) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, 0x0) 1m56.315135771s ago: executing program 36 (id=238): connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="0107000000000000000020000000040003"], 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r6, 0x0, 0x6}, 0x18) recvfrom(0xffffffffffffffff, &(0x7f0000000280)=""/62, 0x3e, 0x40000160, 0x0, 0x0) r7 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0), 0x1, 0x507, &(0x7f0000001500)="$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") r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYRES32=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='cachefiles_vfs_error\x00', r8}, 0x18) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x8747, 0x1, 0x9, 0x8, {{0xe, 0x4, 0x0, 0x7, 0x38, 0x66, 0x0, 0xa, 0x4, 0x0, @multicast1, @multicast2, {[@lsrr={0x83, 0xb, 0x4c, [@remote, @rand_addr=0x64010102]}, @timestamp={0x44, 0x8, 0xe7, 0x0, 0x1, [0x9]}, @timestamp_addr={0x44, 0xc, 0x61, 0x1, 0x6, [{@local, 0x10001}]}, @ra={0x94, 0x4, 0x2001}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000580)={'gre0\x00', r10, 0x1, 0x8, 0x100, 0x8, {{0xb, 0x4, 0x0, 0x2e, 0x2c, 0x67, 0x0, 0xb, 0x2f, 0x0, @private=0xa010100, @broadcast, {[@timestamp_prespec={0x44, 0xc, 0x6d, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x35}, 0x800}]}, @lsrr={0x83, 0xb, 0xe6, [@multicast1, @remote]}]}}}}}) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x200000a, 0x8010, r7, 0xcdd09000) openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x1e8) 1m38.028205501s ago: executing program 37 (id=345): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r1}, 0x20) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1d1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000005000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18, 0x48000}}], 0x1, 0x4) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x14, 0x15, 0x1, 0x0, 0x25dfdbfb, {0xa}}, 0x14}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64=r2, @ANYRES16=0x0, @ANYRES32=r2, @ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESDEC=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000080)='9p_client_res\x00', r5}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = socket(0x400000000010, 0x3, 0x0) write(r8, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030004000500e1000c1e0309000800a000", 0x33a) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r9, &(0x7f0000000340)={0xa, 0x3, 0x7, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r11}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r9, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r9, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "0500"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r9, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "3b444c4a45b2809e", "4db9f6c4a51139c579f71eb12c5d8c9e", "d597a076", "a9f99e0b9f466c49"}, 0x28) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r12, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r13, &(0x7f0000000300)=ANY=[@ANYBLOB="51f0ec9a"], 0x7) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x2004000, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7]) 1m37.03810955s ago: executing program 38 (id=352): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0xa, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20048880, 0x0, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000400)={0x0, 0x900, &(0x7f0000000040)={&(0x7f0000000180)={0x28, r2, 0x1, 0xff1f, 0x9000000, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xaa34a4cfdf933201}, 0x26004808) 1m36.041177879s ago: executing program 39 (id=360): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffff9}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) socket$inet6(0xa, 0x3, 0x7) socket$key(0xf, 0x3, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x40900, 0x0) r2 = syz_io_uring_setup(0x54c5, &(0x7f0000000180)={0x0, 0x5eab, 0x8, 0x2, 0x400250}, &(0x7f0000000300)=0x0, &(0x7f0000000400)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x2007, @fd=r1, 0x6, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_READ=@pass_buffer={0x16, 0x41, 0x4004, @fd=r2, 0x0, &(0x7f0000000680)=""/4096, 0x1000, 0x12, 0x1, {0x0, r5}}) io_uring_enter(r2, 0x74d1, 0x4c3, 0x43, 0x0, 0xfffffffffffffd1d) 1m33.044113687s ago: executing program 40 (id=372): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105142, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x20, 0xc, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x11, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000b7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000064bf0000f0ffffffb70200000800000018230000", @ANYRESHEX=r0, @ANYRES8], &(0x7f00000000c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x32, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r3}, 0xc) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x7, 0x8, '9P2000.u'}, 0x15) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0x18ff2}], 0x1, 0x8, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r4, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESOCT=r2], 0x0, 0x0, 0xfffffffffffffc6f}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = socket(0x2b, 0x1, 0x1) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000080)=0x5) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000002180)=0xff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='scsi_eh_wakeup\x00', r7}, 0x18) r9 = socket$rds(0x15, 0x5, 0x0) bind$rds(r9, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r9, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@mask_fadd={0x58, 0x114, 0x8, {{0x800, 0x6}, &(0x7f0000000300)=0xfffffffffffffff8, &(0x7f0000000440)=0x7, 0x100, 0xaf, 0xf985, 0xfffffffffffffffa, 0x47, 0x4}}], 0x58}, 0x0) ioctl$sock_inet_udp_SIOCINQ(r6, 0x8905, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) r10 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r10, &(0x7f0000000200)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, r10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) getpid() 1m30.528099605s ago: executing program 41 (id=383): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_LLC_SDREQ(r4, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)={0x16c, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {}, [@NFC_ATTR_LLC_SDP={0x100, 0x13, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [{0x5, 0x1, '&'}, {0x9, 0x1, '$%@\x99!'}, {0x8, 0x1, 'GPL\x00'}, {0x4}, {0x5, 0x1, '\x00'}]}, {0x50, 0x0, 0x0, 0x1, [{0x5, 0x1, '\x00'}, {0x5, 0x1, '\x00'}, {0x8, 0x1, 'GPL\x00'}, {0xc, 0x1, '.-[))]:+'}, {0x9, 0x1, '}\xb3{^.'}, {0x5, 0x1, '\x00'}, {0x11, 0x1, 'sched_switch\x00'}]}, {0x50, 0x0, 0x0, 0x1, [{0x11, 0x1, 'sched_switch\x00'}, {0x4}, {0x5, 0x1, '\x00'}, {0x5, 0x1, '\x00'}, {0x4}, {0x11, 0x1, 'sched_switch\x00'}, {0x5, 0x1, '('}, {0x4}]}, {0x30, 0x0, 0x0, 0x1, [{0xd, 0x1, '{])^)#\x02($'}, {0x5, 0x1, '\x00'}, {0x11, 0x1, 'sched_switch\x00'}]}]}, @NFC_ATTR_LLC_SDP={0x58, 0x13, 0x0, 0x1, [{0x54, 0x0, 0x0, 0x1, [{0x4}, {0x6, 0x1, '\xdc]'}, {0x5, 0x1, '\x00'}, {0x5, 0x1, '\x00'}, {0xa, 0x1, '[\\-[-}'}, {0x7, 0x1, '-\','}, {0x11, 0x1, 'sched_switch\x00'}, {0x5, 0x1, '.'}, {0x4}]}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040040) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x10, &(0x7f0000000000)=ANY=[@ANYRESDEC=r1, @ANYRES32=r3, @ANYRESDEC=r2], &(0x7f0000000300)='GPL\x00', 0x8, 0x1002, &(0x7f00000014c0)=""/4098, 0x41000}, 0x94) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) unshare(0x62040200) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) (async) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) (async) getpid() (async) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_LLC_SDREQ(r4, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)={0x16c, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {}, [@NFC_ATTR_LLC_SDP={0x100, 0x13, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [{0x5, 0x1, '&'}, {0x9, 0x1, '$%@\x99!'}, {0x8, 0x1, 'GPL\x00'}, {0x4}, {0x5, 0x1, '\x00'}]}, {0x50, 0x0, 0x0, 0x1, [{0x5, 0x1, '\x00'}, {0x5, 0x1, '\x00'}, {0x8, 0x1, 'GPL\x00'}, {0xc, 0x1, '.-[))]:+'}, {0x9, 0x1, '}\xb3{^.'}, {0x5, 0x1, '\x00'}, {0x11, 0x1, 'sched_switch\x00'}]}, {0x50, 0x0, 0x0, 0x1, [{0x11, 0x1, 'sched_switch\x00'}, {0x4}, {0x5, 0x1, '\x00'}, {0x5, 0x1, '\x00'}, {0x4}, {0x11, 0x1, 'sched_switch\x00'}, {0x5, 0x1, '('}, {0x4}]}, {0x30, 0x0, 0x0, 0x1, [{0xd, 0x1, '{])^)#\x02($'}, {0x5, 0x1, '\x00'}, {0x11, 0x1, 'sched_switch\x00'}]}]}, @NFC_ATTR_LLC_SDP={0x58, 0x13, 0x0, 0x1, [{0x54, 0x0, 0x0, 0x1, [{0x4}, {0x6, 0x1, '\xdc]'}, {0x5, 0x1, '\x00'}, {0x5, 0x1, '\x00'}, {0xa, 0x1, '[\\-[-}'}, {0x7, 0x1, '-\','}, {0x11, 0x1, 'sched_switch\x00'}, {0x5, 0x1, '.'}, {0x4}]}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040040) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x10, &(0x7f0000000000)=ANY=[@ANYRESDEC=r1, @ANYRES32=r3, @ANYRESDEC=r2], &(0x7f0000000300)='GPL\x00', 0x8, 0x1002, &(0x7f00000014c0)=""/4098, 0x41000}, 0x94) (async) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) (async) unshare(0x62040200) (async) 1m28.070922302s ago: executing program 1 (id=396): bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, 0x0, 0x0}, 0x94) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) syz_emit_ethernet(0x86, &(0x7f00000010c0)={@local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x4, 0x2, 0x0, @broadcast=0x1000000, {0x17, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x11, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x15}, {[@timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x5, [{@private=0xa010102, 0x4e20fffc}]}, @timestamp_addr={0x44, 0x3c, 0x0, 0x1, 0x0, [{@multicast1}, {}, {@loopback}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@local, 0x800}, {@multicast2}, {@dev, 0x4}]}]}}}}}}}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000780)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000007c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0x60, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) close(r7) socket$inet6(0xa, 0x2, 0x3a) recvmmsg(r7, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x10043, 0x0) sendmsg$unix(r7, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000440)="ea", 0x1}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="14ba3b2f9236440000000000000000000000000010"], 0x18, 0x40004001}, 0xc800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(r1, &(0x7f00000000c0)="3f03fe7f0302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c153cfdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) 1m12.991652381s ago: executing program 42 (id=396): bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, 0x0, 0x0}, 0x94) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) syz_emit_ethernet(0x86, &(0x7f00000010c0)={@local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x4, 0x2, 0x0, @broadcast=0x1000000, {0x17, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x11, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x15}, {[@timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x5, [{@private=0xa010102, 0x4e20fffc}]}, @timestamp_addr={0x44, 0x3c, 0x0, 0x1, 0x0, [{@multicast1}, {}, {@loopback}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@local, 0x800}, {@multicast2}, {@dev, 0x4}]}]}}}}}}}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000780)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000007c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0x60, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) close(r7) socket$inet6(0xa, 0x2, 0x3a) recvmmsg(r7, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x10043, 0x0) sendmsg$unix(r7, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000440)="ea", 0x1}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="14ba3b2f9236440000000000000000000000000010"], 0x18, 0x40004001}, 0xc800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(r1, &(0x7f00000000c0)="3f03fe7f0302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c153cfdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) 1m8.478236008s ago: executing program 43 (id=420): r0 = syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4002, &(0x7f0000000080)={[{@noquota}, {@errors_remount}]}, 0x3, 0xbc9, &(0x7f0000002380)="$eJzs3M1rG2caAPBnxrLiJN6VsyzLZi/rZVkSWFaxszhswsImS5a99FBor4UYRw7Gyge2S2rHB7n9B0rbc6GXQtvQ0kNzzqWlvfbSJteWHgqhuHELpbQuow/biSXbqaWMcX4/eDXvO6+k53k0SDMvSArgiTWc3aQRRyPiQhJRau5PI6JY7w1E1Br3W1lenPh+eXEiidXVZ75JIomI+8uLE63nSprbw83BQER8+t8kfvfS5riz8wvT49VqZaY5PjF3+dqJ2fmFf0xdHr9UuVS5MnrqX2Mnx06NnB7rWq0/fHH21nd/+f9XtR/f/unmt6++mcTZGGzObayjW4ZjeO012agQEePdDpaTvmY9G+tMCts8KO1xUgAAdJRuuIb7Q5SiL9Yv3krx4We5JgcAAAB0xWpfxCoAAACwzyXW/wAAALDPtb4HcH95caLV8v1GwuN171xEDDXqX2m2xkwhavXtQPRHxKH7SWz8WWvSeNiuDUfEl3dPv5e16NHvkLdSW4qIP7Y7/km9/qH6r7g3159GxEgX4g8/NN6m/r4uhHzAbuo/24X4j1g/AHTF7XONE9nm81+6dv0Tbc5/hTbnrl+jzfmv6+f4rbSu/1Y2Xf+t19/X4frv6R3GuPHW69c7zWX1//vW/95ttSx+tt1VUY/g3lLEnwrt6k/W6k861H9hhzFKP1+vdJrLu/7VNyKORfv6W5Kt/5/oxORUtTLSuG0bY+mTsXc6xc+7/uz4H+pQf+v/nzod/2s7jPHc+fPvb9p5d727df3p18Xk2Xqv2Nzzwvjc3MxoRDF5avP+k1vn0rpP6zmy+o//dev3f7v6s8+EWvN1yNYCS81tNn7xoZj/uXnjg075tNZ/eR7/ix2O/8b6Py5sPv4v7zDG3z565XinuY3r36xl8VtrYQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoSSNiMJK0vNZP03I54nBE/D4OpdWrs3N/n7z6/JWL2VzEUPSnk1PVykhElBrjJBuP1vvr45MPjf8ZEUci4rXSwfq4PHG1ejHv4gEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFhzOCIGI0nLEZFGxEopTcvlvLMCAAAAum4o7wQAAACAnrP+BwAAgP3P+h8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAeO/Ln23eSiKidOVhvmWJzrj/XzIBeS/NOAMhNX94JALkp5J0AkJtHXOO7XIB9KNlmfqDjzIGu5wIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA3nXs6O07SUTUzhyst0yxOdefa2ZAr6V5JwDkpm+rycLjywN4/LzF4clljQ8k28wPrN+n9uDMgZ7lBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDeM1hvSVqOiGJzX7kc8ZuIGIr+ZHKqWhmJiN9GxOel/gPZeDTnnAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOi+2fmF6fFqtTKTddJodtb26Kx3ksYrVtsr+ejsslOMPZHGHu3k/ckEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAeZucXpser1crMbN6ZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHmbnV+YHq9WKzM97ORdIwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+fklAAD//+K3Chc=") syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000100)='./bus\x00', 0x1a404ac, &(0x7f0000000d80)=ANY=[@ANYBLOB="ba618c14e6c7e698de3fb8b765b993fa49575985fb77bf8cbe11f3e10fe145c3161212e5b9a65501d007df1337c25665e8404c1dc11c53041207bea7fd891761869c2d7d6a7a06c71bfcfe33d41cab42b82ecd0a1fd7f713b1fc70fee63b712bbefbb0a96138503f0163651b0512fa7aa1c1df2df969aa400e0f1901ad03d5cb2eaa2e2fd9500641a214a4ff49e005d1eeb61c2893e933bb23f2568bb02382c787f0c6642de45d21683e0bcf71115878d6e9a489bf815b4133e3d156bdd935a75e", @ANYBLOB="5e0584d98ab9a07cae177cb398fee2c48255da63f1ae64afe765132ed12cbc9bfb022226e28fb35070dc87ba1b2a3a6c20825430fcacee5452969171f4cdf23c85b7bffa4df736ccac00310973de025b31f0382cd0add86117309479fb585673aceae9ba360bada48478ccccfe4a6f24eef38a77e18f1527fe8efaaf56820321cc1f0c607438ef99fde6fc57ec4c27b82affbb7bfd4dd5e00136eecafa7e90973740aa78aa201350d4a0460c40bf274cfc068799c6d7f82a5cc82652ea98ea29f7b1538a78f7a47390d04591b868c9d40b515a43a90b87ee8d0ca9a5eefbfb6f79ea17a81fc573", @ANYRESOCT, @ANYRESHEX, @ANYRESDEC=0x0, @ANYRES16, @ANYRESDEC, @ANYRESHEX], 0xfe, 0x0, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f00000004c0)='./bus/file0\x00', 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r5, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x5, 0x8b}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) request_key(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f0000000080)='\xe3', 0xffffffffffffffff) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000240)='kfree\x00', r7}, 0x18) r8 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r8, &(0x7f0000000780)=[{{&(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000200000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4008804) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) renameat2(r1, &(0x7f0000000240)='./bus/file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x2) 1m6.929056428s ago: executing program 44 (id=430): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) write$selinux_load(0xffffffffffffffff, 0x0, 0x44f0) syz_emit_ethernet(0x6e, &(0x7f0000000340)=ANY=[@ANYBLOB="bbbbbbbbbbbbfd137b07daa786dd6002adf700383a1700000000000000000000ffff00000000ff0200000000000000000000000000010300906e0000000060fd906300002f00ff01000000000000000000000000000100000000000000000000ffffac1414aa8d0022eb00000000b7eae900c3ac479815e4cb7ae39e0f9a23f2dc11"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000066000000004b64ffec850000006d000000c50000000500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000480)='sched_switch\x00', r1}, 0x18) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x1a9041, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[], 0xff2e) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="11a32ed688eb47", 0x7}, 0x1, 0x0, 0x0, 0x24008011}, 0x80) 1m3.398883605s ago: executing program 45 (id=440): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvtap0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x2000, {0x0, 0x0, 0x74, r1, {0xfffd, 0x10}, {0x1, 0xfff1}, {0xfff2, 0x3}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x14004804}, 0x840) 55.995993017s ago: executing program 7 (id=530): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000"], 0x50) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffff7f}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0xfffffffffffffffe}, 0x18) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007"], 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20000010) 55.625390504s ago: executing program 7 (id=532): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0xfffffff9, 0x7fff, 0x16, "0062ba7d82000000000000000000f7ffffff00"}) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000400)={0x0, 0x2, 0x40f, 0xc, 0x7704, 0x6, 0x10, 0xfc, {0x0, @in6={{0xa, 0x4e20, 0x40, @empty, 0x9}}, 0x100, 0x389, 0xe559, 0x7ff, 0x1}}, &(0x7f0000000580)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000340)={r2, 0x3}, 0x8) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1818e58, &(0x7f00000003c0), 0x22, 0x63f, &(0x7f0000000d80)="$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") r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000096d132478102268d00", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB="fdffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000ffff000000000000f0605bec3cdeffeebf0400a20000000000000000100000000000"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000013c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x160, 0x2a8, 0x0, 0x0, 0x378, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, &(0x7f0000000640), {[{{@ipv6={@private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, [0xffffff00, 0xff, 0xff, 0x9b1cfddd92d9d95f], [0xff000000, 0xff, 0xffffff00], '\x00', 'veth0_to_batadv\x00', {0xff}, {0xff}, 0x32, 0x1, 0x2, 0x2}, 0x0, 0x120, 0x160, 0x0, {}, [@common=@frag={{0x30}, {[0x2, 0x2], 0x9, 0x1f, 0x3}}, @common=@hbh={{0x48}, {0x400, 0x1, 0x1, [0x4, 0xf, 0xfffe, 0xfd, 0x0, 0x18, 0xb95a, 0x4, 0x5, 0x5, 0x7, 0x0, 0x9, 0x2, 0x7, 0xc29], 0x9}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x8, 0x14, "0ab62e0e444cbab0cfde8b33b203c99f57859693940e739dce8a4bad3242"}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@inet=@ipcomp={{0x30}, {[0x4d6, 0x4d5], 0x1}}, @inet=@rpfilter={{0x28}, {0xa}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@local, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x32, 0x3a, 0x800}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback, 0x1c, 0x2c, 0x100}}}, {{@ipv6={@empty, @private0={0xfc, 0x0, '\x00', 0x1}, [0xff, 0x0, 0xff, 0xff000000], [0x0, 0xffffffff], 'ip6_vti0\x00', 'pim6reg1\x00', {0xff}, {0xff}, 0x2c, 0x10, 0x2}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x90c, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r5, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="df12c9f7b9a60000000000000000", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r8 = socket$inet6(0x10, 0x80002, 0x6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41101, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000008000000f57875d4c8001fd60c6a5cc7862f1cf43db8d55a01d9e851"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000840), 0x81, r9}, 0x38) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x13, 0xd, &(0x7f0000000c40)=ANY=[@ANYBLOB="180004000000175cb6e8ac000000000000000000000000850000006d00000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095", @ANYBLOB="6f0e86aa93bf70d1ce83d5bc154dabca812d333825c5fe2fdc9d0c6979552d42f282b0e49309954fc27016c2bd93ae8c65937054389dcd96cca131a2e7ebe21db691454c0fbfd197585500c08e4ef27112460e3f1294d35f453ca83458e9eec423a89dc5ba826756349f0fb92931a2e91c4177c9b33b83df4207ec51a4c1a69dd7a4e0b96daf193f17ac193f524b095a353cd501212da7b39f27865774b76554538675c3f4"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r10}, 0x10) sendto$inet6(r8, &(0x7f00000002c0)="100000001200050f0c1000000049b23e", 0x10, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, 0x0, 0x0}, 0x20) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000000)=ANY=[], 0x8840) sendto$inet6(r1, &(0x7f00000005c0)="f5", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffc, @rand_addr=' \x01\x00'}, 0x1c) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r11}, 0x10) 55.056492475s ago: executing program 7 (id=539): gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @thr={&(0x7f0000000800)="9578fa99aed23a55719bc52b5958c1a5f5d4f96434420c66d8d065ad87eb132dca2d69cad4a1a17ac5fc61e06790588c135261911150afb00ca0f580132071af456a99f34aa867529870633f07ac446d700eb6fffa9f64ba1563954c3948b9954adfdbfcddb8c922602d03a6582334ac19fa3439377fec0d2242b7219ade64c5a5b0143c76993eedb2a602594edccbf1091112ee8a17881a0b4c2d59d663dec12fe4152a1f3a950031e53d59991b6f675c38cdefcbbf7906be00b72a0d1045f513b671dabf2eb8e86091a80c12710ddf51a4482271f87a2c130d08a10d01f9641db9", &(0x7f0000000a00)="18a51e2bbc2c98e58cb5390a0681d24b0a3cb139297f00cfd427cae0af662d1ca2f3c3dbb806d8131a6c08c4451e36becaa7f78b97cbf2968d8541abb911e63f0b0857ecfa46e40b3286c2f4b4"}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5f}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f00000020c0), r3) sendmsg$NL802154_CMD_GET_WPAN_PHY(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="6d932bbd700000000000010000000800030003"], 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x20000894) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") splice(r0, 0x0, r1, 0x0, 0x7, 0x9) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb}, 0x11000) 51.923380645s ago: executing program 4 (id=559): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000200)='kmem_cache_free\x00', r1}, 0x18) shmat(0x0, &(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x4000, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000540)={'syztnl0\x00', &(0x7f00000004c0)={'syztnl2\x00', 0x0, 0x8, 0xf, 0x5c, 0x2154, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, 0x10, 0x8, 0xfffffffe, 0x3ff}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0x19, &(0x7f0000000b00)=ANY=[@ANYBLOB="18650000010000000000000001000000184a000002000000000000000000000018410000000000000000000000000000852000000100000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000001832000001000000000000000000000005870000fcffffff18110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200000000000085000000860000001038f0ff01000000af280000fcffffff795dd4"], &(0x7f0000000200)='syzkaller\x00', 0x1, 0xd0, &(0x7f0000000600)=""/208, 0x41100, 0x14, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x21f36, r4, 0xa, &(0x7f0000000800)=[r3, r3], &(0x7f0000000840)=[{0x1, 0x5, 0xa, 0x5}, {0x4, 0x1, 0x4, 0xb}, {0x2, 0x3, 0x2, 0x4}, {0x1, 0x4, 0x4, 0x3}, {0x1, 0x4, 0xa, 0x5}, {0x1, 0x5, 0x2}, {0x3, 0x2, 0xf, 0x7}, {0x5, 0x4, 0x3}, {0x0, 0x2, 0x5, 0x4}, {0x0, 0x2, 0x6, 0xc}], 0x10, 0x2}, 0x94) socket$can_bcm(0x1d, 0x2, 0x2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) time(0x0) 51.876037276s ago: executing program 7 (id=560): r0 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r0, &(0x7f0000000340)={0x2a, 0xffffffff00000002, 0x7fff}, 0xc) bind$qrtr(r0, &(0x7f0000000500)={0x2a, 0x1, 0x1}, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$AUDIT_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3e8, 0x200, 0x70bd28, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x4040) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000480)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x2, 0x1, 0x0, 0x1}], &(0x7f0000000400)='GPL\x00', 0xc, 0x85, &(0x7f0000000680)=""/133, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0x2, 0x31cf, 0x7c7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000740)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, r0, 0x1, 0xffffffffffffffff], &(0x7f0000000780)=[{0x1, 0x2, 0x7, 0xc}, {0x0, 0x1, 0x6, 0x1}], 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f00000003c0)='kmem_cache_free\x00', r2, 0x0, 0x1034}, 0x18) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x64, 0x0, 0x4, 0x2, 0x0, @empty, @multicast2}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x10001}}}}}, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x401, 0xfffffffe, 0x0, 0xffffffff}, 0x10) close(r3) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWRULE={0x40, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2, 0x0, 0xfffe}, [@NFTA_RULE_EXPRESSIONS={0x14, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @xfrm={{0x9}, @void}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}]}], {0x14}}, 0x68}, 0x1, 0x0, 0x0, 0xc010}, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1, 0x176, &(0x7f0000000240)="$eJzs3TFKK1EUBuCTl7z3glVqsRiwsQrqCiISQRwQlBRaKUSbRATTjFbZhTtwK25HUqWL6EiiIZbJoPN9TX74CdzbzKnmzMXGTa97O7h+en6Mer0StVa0YlyJRvyJauSGAQD8JuPJJF4muaLPAgCshvkPAOVj/gNA+Zj/AFA+p2fnR3tp2j5JknrEaJh1sk7+m/cHh2l7O3nXmP1rlGWd6rTfyfvka/831j763YX9v9jazPu3bv84nev/R3f51wcAAAAAAAAAAAAAAAAAAAAAgEI0k6mF+32aze/6PH3aDzS3v6cW67WVXQMAAAAAAAAAAAAAAAAAAAB+tMH9Q++y37+6EwRBmIain0wAAAAAAAAAAAAAAAAAAFA+s5d+iz4JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABRn9v3/5YWi7wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK8BAAD//9OzTek=") truncate(&(0x7f0000000040)='./file1\x00', 0x1000) set_mempolicy_home_node(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x0) 51.816580617s ago: executing program 7 (id=562): r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001cb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x3e) syz_emit_ethernet(0x32, &(0x7f0000000840)=ANY=[], 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) execve(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00'}, 0x18) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000100), 0x10) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92F\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, 0x0) r5 = dup2(r3, r4) pipe2$9p(&(0x7f0000000180), 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="090000000400000004000000501f360c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="000000000014841a60b42c2db6b7b5304dbff300040000000000001d"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000011c0)={{}, &(0x7f0000000000), &(0x7f00000010c0)=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) 50.917763124s ago: executing program 7 (id=566): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x100) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000000)='./file2\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='nodots,dmask=00000000000000000000003,usefree,nodots,flush,dots,dots,gid=', @ANYRESHEX=0x0, @ANYBLOB], 0x1, 0x214, &(0x7f0000000840)="$eJzs3D1rW1cYB/AjWa6tlhZPhXbpoV3a5bb10qVDS3GhVNCSRCEv0zWWEyFFAl8NksmgOVM+RwhkCWQL+QL+DFmymYDx5Ck3OJKs2NixE0dy4vx+ix6e/z1X5+jARVy9bP5+91ZjNUtW004ozRdC8Y/QDzuFsBCKYaQffnpwZfvOxavX/v2zUlm6MDvsx/jVd4+v377//ZPOF5cf7nYKIYStxWcbX298s/ni0s16FutZbLU7MY3L7XYnXW7W4ko9ayQx/t+spVkt1ltZbW1fvtpsj5861LIspq1ebNR6sdOOnbVeTG+k9VZMkiTOB06lem8nz8NWnuf5XD/kef62JyhMZl5Myyn3n4/c3kU97l5Nn/e71W518DjI//6nsvRLfGVhPGq7263O7OW/DvK4P58Nnw/zxUPzz8KPPwzy3eyv/yoH8nJYmfzyAQAAAADgXErinkPv7yfJUfmgeu3zgQP370vh29K4MzP5pQAAAABHyHrrjbS5Mrs2KJq1Myvmwv7Ob4+GUzxu+M9Pjz9mQsWXwyK843nKIYSjjymGM9+U6RSj75EPO6PfF5xseOl9TaP8gbwao2I+HBaVw3pjbjqbAgAAnC/jN/0nHlKc6IQAAAAAAAAAAAAAAAAAAADgEzSNPzM76zUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALzJywAAAP//ixdW4w==") (fail_nth: 12) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0), 0x208e24b) 50.534108712s ago: executing program 4 (id=568): r0 = socket(0x10, 0x3, 0x0) r1 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) pwritev2(r1, &(0x7f0000000000)=[{&(0x7f0000000500)="002e2e0000000000d8c1a2", 0xb}], 0x1, 0x9, 0x8000400, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000020000000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xe, 0x0, &(0x7f0000000000)="259a53f271a76d2608064c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x300, 0x8}, 0x50) 50.497330162s ago: executing program 4 (id=569): setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x200000000}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="04000000f1000086b6824ff796090000000000000005d76762ae44613eb3e91300df5b8fea2d8086cb68a2de7e2eb02b3bdecf1aad3904a1783f495c396a7ce0fbf30741a112e3e451cade6546cc9314d5192207fbcb33a81bcec608690eed183fcc6db72ea20de01501219ae9246865b49d89e57c582a1be49df1dacf11047808356bf0edf2ca6ea8a6feca50156b72c70000ef2caf28eaa19e"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x38, 0x1403, 0x1, 0x70bd2c, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x44, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x4000041) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) 50.424452984s ago: executing program 4 (id=570): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000010100000000000000000000000000000000000004f6df4272f2b6e7ca6aed1d805700"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000d000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) shmdt(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x80, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000500)={0x1, &(0x7f00000004c0)=[{0x8, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00'}, 0x10) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000480)='./file0\x00', 0x18000, &(0x7f0000003f80)=ANY=[], 0x1, 0x2f4, &(0x7f0000000900)="$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") r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af87f00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x109942, 0x0) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f0000000580)) ioctl$PPPIOCSACTIVE(r6, 0x40107446, &(0x7f0000000000)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000040), 0x208e24b) getsockopt$bt_sco_SCO_OPTIONS(r7, 0x11, 0x1, &(0x7f0000001000)=""/157, &(0x7f0000000100)=0x9d) fdatasync(r7) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYRESDEC=r3], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYRES16=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r8}, &(0x7f0000000540), &(0x7f0000000580)='%pS \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r10) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000640)={@broadcast, @multicast1}, 0xc) sendmsg$ETHTOOL_MSG_TSINFO_GET(r10, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES64=r5, @ANYBLOB="01002dbd7000fedbdf2531000000180001801400020064756d6d7930"], 0x2c}, 0x1, 0x0, 0x0, 0x2004c890}, 0x2000c800) lseek(0xffffffffffffffff, 0x0, 0x1) 49.486104122s ago: executing program 4 (id=576): r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001cb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x3e) syz_emit_ethernet(0x32, &(0x7f0000000840)=ANY=[], 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) execve(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00'}, 0x18) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000100), 0x10) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92F\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, 0x0) r5 = dup2(r3, r4) pipe2$9p(&(0x7f0000000180), 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="090000000400000004000000501f360c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="000000000014841a60b42c2db6b7b5304dbff300040000000000001d"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000011c0)={{}, &(0x7f0000000000), &(0x7f00000010c0)=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) 48.567842899s ago: executing program 4 (id=582): r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20000001) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @restrict={0x0, 0x0, 0x0, 0xb, 0x2}]}}, &(0x7f0000000000)=""/247, 0x32, 0xf7, 0x1}, 0x28) getsockname$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB='<\x00'/20, @ANYRES16=r2, @ANYBLOB="f54cf5ff0f00252155b21c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c00000010bf6072bae9fa7d7de0ed4a57d90003052dbd70000020000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000100000140012800800010067726500080002800400120008000a00", @ANYRES32=r3, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x2000000) 40.047873422s ago: executing program 46 (id=535): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000007c577e1700000000da", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x5) fchdir(r3) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x2) close_range(r4, 0xffffffffffffffff, 0x0) 37.55456054s ago: executing program 47 (id=552): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000038c0)={0x0, 0x0, &(0x7f0000003880)={&(0x7f0000003800)={0x30, 0x0, 0xb, 0x201, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_NAME={0x9, 0x1, 'MARK\x00'}, @NFTA_COMPAT_TYPE={0xfffffffffffffe4e, 0x3, 0x1, 0x0, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x8080}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = memfd_create(0x0, 0x5) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000ddff00850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x8, 0x0, r4, 0x1ff, '\x00', 0x0, r2, 0x1, 0x0, 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r5}, 0x10) setuid(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000800)='kfree\x00', r3}, 0x18) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="8b33000000510000000005000000080003"], 0x28}}, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x40010, r2, 0xed82e000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0xa, 0x0, 0x0, 0x7ffc0002}]}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000302000000000000"], &(0x7f0000001f80)=""/226, 0x26, 0x81, 0x2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x10) r9 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00', 0x3}) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070084000000060004404e220000060005"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) 35.885399532s ago: executing program 48 (id=566): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x100) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000000)='./file2\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='nodots,dmask=00000000000000000000003,usefree,nodots,flush,dots,dots,gid=', @ANYRESHEX=0x0, @ANYBLOB], 0x1, 0x214, &(0x7f0000000840)="$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") (fail_nth: 12) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0), 0x208e24b) 33.419790329s ago: executing program 49 (id=582): r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20000001) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @restrict={0x0, 0x0, 0x0, 0xb, 0x2}]}}, &(0x7f0000000000)=""/247, 0x32, 0xf7, 0x1}, 0x28) getsockname$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB='<\x00'/20, @ANYRES16=r2, @ANYBLOB="f54cf5ff0f00252155b21c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c00000010bf6072bae9fa7d7de0ed4a57d90003052dbd70000020000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000100000140012800800010067726500080002800400120008000a00", @ANYRES32=r3, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x2000000) 31.734264602s ago: executing program 5 (id=640): r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(r0, 0x8916, 0x0) 31.719393962s ago: executing program 5 (id=641): setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="04000000f1000086b6824ff796090000000000000005d76762ae44613eb3e91300df5b8fea2d8086cb68a2de7e2eb02b3bdecf1aad3904a1783f495c396a7ce0fbf30741a112e3e451cade6546cc9314d5192207fbcb33a81bcec608690eed183fcc6db72ea20de01501219ae9246865b49d89e57c582a1be49df1dacf11047808356bf0edf2ca6ea8a6feca50156b72c70000ef2caf28eaa19e"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x38, 0x1403, 0x1, 0x70bd2c, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x44, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x4000041) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) 31.700352883s ago: executing program 5 (id=642): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = socket(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001a80)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe50a10a000600014002020c600e41b0000900ac000a0501000000160012000a00ff120048035c3b61c1d67f6f94007134cf6efb8007a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667daffffffffff1f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5b7276505de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000001008af26c8b7b55f4d2a6823a45", 0xd8}], 0x1}, 0x894) 31.538770126s ago: executing program 5 (id=643): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r1, 0x4734}}, 0x10) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) 31.517609966s ago: executing program 5 (id=644): r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001cb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x3e) syz_emit_ethernet(0x32, &(0x7f0000000840)=ANY=[], 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) execve(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x0) pipe2(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000100), 0x10) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92F\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, 0x0) r5 = dup2(r3, r4) pipe2$9p(&(0x7f0000000180), 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="090000000400000004000000501f360c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="000000000014841a60b42c2db6b7b5304dbff300040000000000001d"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000011c0)={{}, &(0x7f0000000000), &(0x7f00000010c0)=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) 30.678350952s ago: executing program 1 (id=615): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) write$selinux_load(0xffffffffffffffff, 0x0, 0x44f0) syz_emit_ethernet(0x6e, &(0x7f0000000340)=ANY=[@ANYBLOB="bbbbbbbbbbbbfd137b07daa786dd6002adf700383a1700000000000000000000ffff00000000ff0200000000000000000000000000010300906e0000000060fd906300002f00ff01000000000000000000000000000100000000000000000000ffffac1414aa8d0022eb00000000b7eae900c3ac479815e4cb7ae39e0f9a23f2dc11"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000066000000004b64ffec850000006d000000c50000000500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000480)='sched_switch\x00', r1}, 0x18) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x1a9041, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[], 0xff2e) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000f"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000740)='kfree\x00', r4}, 0x18) io_uring_register$IORING_REGISTER_SYNC_CANCEL(0xffffffffffffffff, 0x18, &(0x7f0000000000)={0xfe, 0xffffffffffffffff, 0x11, {0x27fffffffffffff, 0x8}, 0x54}, 0x1) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000dc0)={0x0, 0xfffffffc, 0x0, 0x4, 0x1a, "0062ba098200ff00"}) r5 = syz_open_pts(r2, 0x121881) r6 = dup3(r5, r2, 0x0) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000000)=0x12) 30.640060623s ago: executing program 5 (id=649): setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, r0, 0x0, 0x200000000}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="04000000f1000086b6824ff796090000000000000005d76762ae44613eb3e91300df5b8fea2d8086cb68a2de7e2eb02b3bdecf1aad3904a1783f495c396a7ce0fbf30741a112e3e451cade6546cc9314d5192207fbcb33a81bcec608690eed183fcc6db72ea20de01501219ae9246865b49d89e57c582a1be49df1dacf11047808356bf0edf2ca6ea8a6feca50156b72c70000ef2caf28eaa19e"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x38, 0x1403, 0x1, 0x70bd2c, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x44, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x4000041) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) 29.541405924s ago: executing program 1 (id=654): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r0, 0x0, 0x4}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x3, &(0x7f0000007000/0x1000)=nil) r1 = open(0x0, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x1000) sendmsg$NFT_BATCH(r2, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = socket(0x10, 0x803, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x5}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0xccd4ddef28b9e90e}, 0x40094) 29.489447365s ago: executing program 1 (id=655): r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) flock(r0, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) dup3(r1, r0, 0x0) 29.390358047s ago: executing program 1 (id=658): r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001cb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x3e) syz_emit_ethernet(0x32, &(0x7f0000000840)=ANY=[], 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) execve(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x0) pipe2(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, 0x0, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92F\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, 0x0) r5 = dup2(r3, r4) pipe2$9p(&(0x7f0000000180), 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="090000000400000004000000501f360c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="000000000014841a60b42c2db6b7b5304dbff300040000000000001d"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000011c0)={{}, &(0x7f0000000000), &(0x7f00000010c0)=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) 28.529690844s ago: executing program 1 (id=665): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000800000085000000b000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)=r2}, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vlan0\x00', 0x0}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r7, 0x20, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="18027a0000000000000000003b00000095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000001c80)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r8, r6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x14, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xf}, [@call={0x85, 0x0, 0x0, 0xc9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x7, 0x0, 0x3, 0x7, 0x4, 0x50, 0xfffffffffffffff0}, @exit, @ringbuf_query, @jmp={0x5, 0x1, 0x7, 0x5, 0x1, 0x20, 0x10}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4ccb}, @ldst={0x0, 0x3, 0x3, 0x2, 0x3, 0x10, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x45, &(0x7f0000000100)=""/69, 0x40f00, 0x20, '\x00', r4, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x5, 0x6, 0x8, 0x7}, 0x10, r8, r2, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r0, &(0x7f0000000780)}, 0x20) r9 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r9, 0x8917, 0x0) 28.526387044s ago: executing program 8 (id=666): unshare(0x6a040000) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1b4b216f651801b5b24af3f9b61e6c0ace78b940b2cce19b771cbb71d07d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) r2 = syz_clone(0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r2, 0x0, 0x40000000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @remote}, {0x2, 0x0, @local}, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffd, 0x200}) 27.740166128s ago: executing program 8 (id=671): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) sendmsg$nl_route_sched(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f00000029c0)=@newtaction={0x488, 0x30, 0x12f, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x6, 0xffffffff, 0x7f, 0x401, 0x2, 0x0, 0x2, 0x80000000, 0x4, 0x5, 0x8, 0x0, 0x7fff, 0x75ba, 0x7fffffff, 0x5, 0xffffffff, 0x7ff, 0x2, 0x9, 0x2, 0x0, 0x1001, 0x1, 0x3, 0x6, 0x0, 0xfa, 0x4, 0x0, 0xf, 0x80000001, 0x7, 0xfffffffb, 0x1, 0x20, 0x5, 0x8, 0x1, 0x2f2, 0x7fff, 0x0, 0x81, 0x206, 0x1ff, 0x7, 0x3, 0x5, 0x3, 0x9, 0x1000, 0x401, 0x1, 0x6, 0x7, 0x2, 0x4, 0x7f, 0x5, 0xfffffffb, 0x1, 0x4, 0x5, 0x8, 0x2000009, 0x9, 0x10, 0x9, 0x7, 0xffffff00, 0x97, 0x0, 0x4, 0x8, 0x8, 0x1, 0x958, 0x1fe, 0x4, 0x6, 0x7, 0x80, 0x5, 0xe53, 0x0, 0xfffffffe, 0x4, 0x8, 0x9, 0x7fff, 0x30, 0x8, 0xfffffff7, 0x4, 0x9, 0x1, 0x4, 0x7, 0x9, 0x5, 0x7, 0x6, 0x0, 0x7, 0x2, 0x7, 0x3, 0xcdd, 0x2, 0xd67, 0x7, 0x4, 0x25, 0x9dc5, 0x7, 0xfffffff7, 0x2, 0x400, 0x8, 0x0, 0x7, 0x5, 0x9, 0xa, 0x100, 0x9, 0x5, 0xdb5, 0x101, 0x4, 0x74e4, 0x7fff, 0x7, 0x7ff, 0x1, 0xd70, 0x1, 0x8, 0xa, 0x800007, 0x1, 0x82, 0x52e, 0x7, 0x1, 0x5, 0x26, 0x1, 0x1b2a, 0x81, 0x9, 0x1c, 0x767, 0x7, 0x9, 0x10, 0xc2a, 0xff, 0x7, 0x6, 0x7, 0x3, 0xfffffff4, 0x8, 0x3, 0xfff, 0x8, 0x2, 0x5, 0x6, 0x3, 0xd7c3, 0x2, 0x10000, 0x7fff, 0x5, 0x5, 0x0, 0xfffffff7, 0x4, 0x2, 0x0, 0x6ee1847d, 0x10001, 0x7ff, 0x1, 0xf0, 0x7, 0x2, 0x7, 0x4, 0x6, 0x4, 0x7, 0x2, 0x0, 0x1, 0x4, 0x3, 0xfff, 0x80000001, 0x7, 0x676, 0x3, 0x9, 0x2, 0x4, 0x7fff, 0x4a5, 0x80023, 0x4, 0x9, 0x8, 0x4000000, 0x8000, 0xa, 0x9, 0xca000000, 0x2, 0xfffffffa, 0x3, 0x7, 0x9, 0x7, 0x65fe, 0x9, 0x6, 0x4, 0x80000000, 0x5, 0x801, 0xb848, 0x6, 0x6, 0x800, 0x7, 0x1, 0xb, 0x80, 0x2, 0x3, 0x6, 0x9, 0x4, 0x4, 0xc, 0x80000001, 0x1, 0x5, 0x10000002, 0xb, 0x7, 0x5, 0x2, 0x4]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x1f6, 0x4, 0x5, 0x9, 0x9, {0x4, 0x0, 0x6, 0x7fff, 0x4, 0x3}, {0x5, 0x1, 0x5, 0x40, 0x6, 0x3}, 0x2, 0xfffffff7, 0x3}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x488}}, 0x0) (fail_nth: 6) 27.393364235s ago: executing program 8 (id=672): bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) dup2(r1, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x8200, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r2, 0xa, 0x13) fcntl$setlease(r2, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x2000000) fcntl$setlease(r2, 0x400, 0x2) 27.280156108s ago: executing program 8 (id=674): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r0, 0x0, 0x4}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x3, &(0x7f0000007000/0x1000)=nil) r1 = open(0x0, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x1000) sendmsg$NFT_BATCH(r2, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = socket(0x10, 0x803, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x5}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=@newtfilter={0x24, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r5, {0xf}, {}, {0xa, 0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0xccd4ddef28b9e90e}, 0x40094) 27.252550178s ago: executing program 8 (id=675): r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001cb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x3e) syz_emit_ethernet(0x32, &(0x7f0000000840)=ANY=[], 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) execve(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x0) pipe2(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, 0x0, 0x0) connect$vsock_stream(r2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92F\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, 0x0) r5 = dup2(r3, r4) pipe2$9p(&(0x7f0000000180), 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="090000000400000004000000501f360c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="000000000014841a60b42c2db6b7b5304dbff300040000000000001d"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000011c0)={{}, &(0x7f0000000000), &(0x7f00000010c0)=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) 26.385433635s ago: executing program 8 (id=678): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_usb_connect(0x6, 0x24, &(0x7f0000001000)=ANY=[], 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 16.551157813s ago: executing program 2 (id=733): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r3, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000300)='./control\x00', 0x1000000, &(0x7f00000005c0)=ANY=[], 0x1, 0x126f, &(0x7f0000002880)="$eJzs3U1rY1UcB+B/2vQtY5uq4+gMiAfdKEKcduHKTZEZEAtKtQMqCHdsqqFpU5pQiIhTV64EP4aoS3eC+AW6ceNaEES6cTkL8UqbjDNp0o522lSG59ncwznnd8+5veXCDedw9175cn1ttVlZzVoxUihEcXMsirdTpBiJ0ejYiRdu/PzL02+98+7rC4uL15ZSur7w9tzLKaWZZ35475Nvn/2xdeHGdzPfT8Tu7Pt7f8z/untp9/LeX99ErZlqzbTRaKUs3Ww0WtnNejWt1JprlZTerFezZjVNdse4275ab2xutlO2sTJd2tyqNpsp22intWo7tQqptdVO2YdZbSNVKpU0XQoexPLXt/M8j8jzsRiPPM/zqSjFhXgkpmMmyjEbj8Zj8XhcjCfiUjwZT8Xlg17nPW8AAAAAAAAAAAAAAAAAAAB4uNxn/3+hf///xHlPGQAAAAAAAAAAAAAAAAAAAB46h/f/FyN8/x8AAAAAAAAAAAAAAAAAAACG7D7f/z+0//9F+/8BAAAAAAAAAAAAAAAAAADgLEx2DkspTUasf769vL3cOXbqF1ajFvWoxtUox59xsPu/o1O+/tritavpwGy8tH6rm7+1vTzam58bK8dsYWB+rpNPvfmJKN2bn49yXBw8/vzA/GQ8/9x+/rNOvhLl+OmDaEQ9ViIK3as/yH86l9KrbyxO9eav7Pc70ugZ3xYAAAA4TZX0j/73951up4Htnabu+3nq9iwc8/vAoffzYlwpntdVc0ez/fFaVq9Xt05YGD/6POO9NVPdniceqxARWU98pvTb0v4pTzr5UyuMDnXQseP7PMA9jeL/4I95CoXfv7qnZjKGO/pI9x89q+8/P/9dKnby/EwnNj6oaeK41NHPjMIZP5MYnrs3/bxnAgAAAAAAAAAAwH8xcPXfVET0rQf8qK/mzvLw3nj/mY8e/YshXCEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPA3O3AsAAAAACDM3zqNjg0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4KgAA//+E38bU") chown(0x0, 0x0, 0xee01) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./control\x00', 0x18000, &(0x7f0000003b40)=ANY=[@ANYRES32=0x0, @ANYRESDEC, @ANYRES16=0x0, @ANYBLOB="b022fd84099290ab8ebe39cfc17f80bc2926131e9437a1dea9ca1756900531c14b67f7a9edd0d80c7c73649053153a8d8db6d3c0d3b3fa951f57d14071b61a27d968a0ae7bd580d2d9fd9034451c3ecffae80b234e72fb11e3a60c1208bd5262c5009e3e45582ed4203850292ed682fc5e26f5c2af47718ee5b4f2ed68f0b21b813ec22c4c61d3f22f5a01ebea6c484d8ef4ca90180b4587e0bee2f782fef574aa1e0ebc5d9e42452910d03c12feff7848f72ac5430476b9dc2457a09efdc6f181c408abe7b30cccd2c8fb85389e1cacd4f4b29a3d4a55941bf1bb416203732d6712d5a89470876ae6daec66f3fe1b39982c2781b115e20af7ce0a0c7c77db1073adc6e11597bd9f540f90f60b92dc84a5c764379c0b9426ff4f547182502633aa754dcfc63e46c7cef8e3a0c29bf5184ac150e90d884c59cba3dae7c531fb114534292629d8532c0f67ee37f2c349ea8f28199aff2aa335df5db411287a73adfbfff212cf7b6d277a361c55af160d98b5c3db84da37d80e07269c33f60f111ec3c09d8843e1f5499e71de9b48882b9415d45b20393888ec49f307d535580947b5a5b40b465382aa4a579f317d91792f8ed70e9401863bc0a21d7e15f828ae8f13c673a30cba6f10f89c8a018cc8bbe7072ffe1c5d4ef11f0f82cf967faef8608f8b289245f87607917b0c2578dbbe5186ac78b8cd9a5aff567aebe8a73dd547fdc503885a2df4953f3497688b7b1ede6a2e529b25ecc246a7bcb00077059d7e0100aa20cb4d1dbac6eec0a9f803601c799eddb9b271f0530842291167abffb982fe47a496e884ee3c17850f970cb3ac3342b832b8b984e2eb4836afb7727f7310a347add2a1094cfff7b44516593bbf15f3a9e0e2a788e99bdec6706ae9a39b4f8983ae38d4cdf866d9670de91036ea86646f195ec4b4ce462ea624b8875825262a301f9235496b935506109287bbcf4754e3fa637428a2e39a80cd07ffafd756839abddc721421754fcae705ab432fcdd6f3c004dfad9e6bfa87746dd41649dcd2bf1728a3d6d2ddf27a52957422a27f9e478530873d9f1861b71f2378540648b171bcbd44533723ae1a89e56e2f570c0571eb3c66fac65e3abad003a828f2d21cc990e57b80dd3762fe1204eb320591d6a93f9052b80494b2f52ad89d6374cf33040e2484c3384946450bb65835d65bebb4a91c0f82e598e5aa7ff9ba79f27bbd46240287721d2759fa24cec97658d8f17b3f424293f7253b74dae4b966c8089c546936953d8ce63463c26f1e296f56e17e7f890b6001ed5d9f739036842e989b40c02d3fe5227b1fb08a98f1b1f0c336346698e70171e74e40c5304a356b29c947672f8a0535b7ce3a66b276d09ca3d9fff030e41598649a310875f5b5801c471182c1f617c907f06b5f36a1f9294b0f4a95d0fc98682b1e38f2f94fb08f20c5e5c7afaa9fbbd84734a98dd9b33188f6b79334b09ca8e2de56457242f904b114a2c313b193fe421d7fa97da5ab77f363e83b4698bf903022d13826ded79a905f07f97dc0fc4cc290b969ee37075a4a80a0d86d0696eeea2048ebd1a97f8319b3342e515ae5c9e25ee933d926ae0f31af55aeb07da6508756ac9549ba8bbc0095a17cb647df12f926e595a531d7208ef75cfd6239f65a0584121c75e00f7c77990b90e6350b1a84eba4430979bb726ab02050573af29156bed8e243527593dc0c6de41d0b6775818a96ee97d153826a217e8d7e88c6c44baa781a495afeba3882a06f5b1a87b1e8ee1edf404ac3ade6f5af1f6cd22c01506b5f84befb55c86f79b56e4d5754be8f564f57852f991c2275cbf55937666e022c2b2f0d020156152377859b345f74fe66791421e5571a7900df89c9bef5c3cb19113fae5d524ae2edea5ca91baf096c02e1e860c9b5a97882da598ef1e39fcb61d83f997675a772ac37c0fbe65a9d379b9204a915fdb6a7c7cdbd14c0893cd5e8cfd56f4021756d6c6a25b258a69922a41f3c7bc43b69f46293b381a27ae5a3cfcf2526f8eadcb540ec87d6009d6a2939882140f9a447c5be4328a0681aa3002f6a9dfd836b362fb1d423d7c9571aeb50e2a6acb9ab4e85574baf27b1028db0f6647aa7fe995c1fbf8ab422bb15acf9ae6de73972c9549cb601297bbb1c740e8761af16c4785c4827b5dc5e52f4a82000f6f87670ec19fea4e04e564fc83c0ccf1b7fa2bb9ac3e56addfa7f5f6d1d3d3c92dea5de9fa42f1414a769b0cdc40e306fee0ad66573628b83a07fe087fcb3377848e1a7869e592c83bb594284da28a4f5db381059d56e5d4989042dadbbe6000b66184ca8fe9d293f6c70988f3d7b8ee00546a21aaeca498ae06fa7becc5a55914c7a1ab714d955a8b0bd72e8d6bbf4dd451b525fcbc9fb5c10747dee3c755d39be5c2d52345c56185a8d6cee878b72255acabf7dbefafaed94838532fd01ea6244c4ac929de6846084a07d19de7098e62b613775abe326d402f707c4fbb3968b0aac7f1f27537cbdecee19151b310bcbe2c848ef41eea747e85f87d5a160b2cb6b28d137e30c69770c1651e44a66f8e3394bec03c8256b89fd59bec449c6a2bdb351f53d05e463f75b834624b8c7b557dc38a398d726d0846fc2f062b5b32d10af38ce844c6811aaef73ace1d86813bc37433670f6180f9bd112ae00133077fc7a0bd12d7b4b3a53a3c16a9cb0e8112f18691aa3bd2215afdaa1d00c8ea4f4a302ea9ebc94afaad2549f646a8ae66b953fa9cd649a02c4b152cc6c7b55d99ddc3d0fd1fcd84da355eb02581dba9e4d9dd235d2d4c4e094161440e70926221d76ce70c8762485c8b801550cc208e5d1bfd184e622ff0950a912dd47163c838fd562f09ca1690e76da55a471ec67cb83bbb103975bd4683f0393ec8b843f55ba2c0bdc6c90b50031cfe751792bd5d0cb50c8ee93086794e18c4ed66d6bd09b499f8ff2f63a8920701ab0af5b4b75402b1d65b1eb515dc46e181a1699f21e67349c904f02f8358e28faff2ade65703d14dc2774b02acc731eee0941675502d95e0c32a7304f6e9af85ef220daea0de24cf79e35a59412e62835d3032f88d9ed7befd4f708bfd2d236bd188b6f951bbe13e3add84f111e20324a523426611ec15fb376e7306cbec6867f0b945047a4facf78154e68a66a36972d5a18af1403baa9b4b51fddd072ee1f0087add02485b40323bd708b76406e10a927a913d91c5d771d3aeb3cfafb54b1016785c61ed13060d5f1b550676a656b874fd392ae61c5044218df55cbb72b819990ffdb130fb17a14f7cb5a2a8aafedc6526d83762dbf320f15758030eeecf5652dccf04cdc68827400c768a21daff47212b87357ff0bcb36cae4d113a5d9815b07332cb42329321664d93e43e6dcd6115987007fc623088004f8ac943736eb2a045a25b1bbfbbc97571eabf875d924f6b7b0e524b1afa0ff499473aa7976de83b91928e84f8e445728778fe0e5a356a57f09ed254848cec31b7c5c9c7a2fca21befe15ffc9317e96f7ad582684ce625791b99563781bf64983e77be4f1a5893beec4b560fc15e9c21dd0c29bf2879dfaa257ba5ec97957050d5b2c1f25eb4064488c139dbf88f3b7c70850d6fdbf0603cdd4011bf76e0d9ee5c2b128b50dba5689a8f04d4caf62d777eab31aab4b4195da780901352d284885bf417eb05367ee1b5f2f8c5cfe7f0394fb977f3a3f96084375e22ccf6c3ee4659d68d2b1948a4a1783a4db2282c67d39613fa67be4dd144793b76c09dd563ef3d169f34318acbd62d3b2d64f9173d16e9801132918c3390172c6f64d049b4c894d593419e5f4d5a513fc5a64ddcd05b034e6d16fe88ff89a520c464f842ad5a62a6fc46f0e9d56d05d6f5e625d25f537cca62910981dd463255318d8273db13d27fdc6c17c2c54776ba3a246c413957f297b8ecb1adb5c3f1d4d8e4d7705bdb9268f956d2845b68511edd51cdc5d05de5d6d4b3f573592986fed325f1f3c6a9ef7740f9d843e11981d1ca515c7e722ec4d691c5e4d3a146e39bcf407f66418f754bb2508cb4cc843aa9d8eb63850e5b9103682ecc1fc8f972f394be9d31cb9efd0f693d4ec41fe8d0993b45d2f422f9ab604d3371c1bda1daa3206a027c4de5c8f2cf6d1fc7e6d1423a6c71e84f24e0a4dfbf4a331deff2ae649df9681a08846efc9f0001e7ef106f1bfa25ee2799b13f1f076e30e58078d186afb65301497e982478babf143972cc7072f70829b8faee46e56a1451ff7ddd0dd35816bfa29eee361de60fbc3222e89d70f1495be94d0e82072a0e572e3055c905552e6c45d2af3d4f505a99d947667059c1c92ce2d3549077539c4cec4c07337361eeb9f78813bf9e77b0a79f391ae6eb663deb53317f61ef8ddffdbd0ca2d8095c10c106b0968325bc1e88829d92399b809f1b881e9b9f0aeada5c5ee20fd0866070e3d5d41e62f5b6d2d25441babcdf9d3dc8ae3c140a6f352daf00ed38e248b236acd27f24bdebae0f272a5820ef77fb603fe3cc910a9d842129259e61d25dcf546cd770e4cccab470b20fa5f5972a6dd15853483de6e032f9726c166e81e8e0f9db4df397cc4a10b6e58708a31f48d7d2bae4ef92828c37088068b2ae433110dc7c08e6017d8b26e4e0382ca8fa62dc6f53c4cc2f0f78af72335c494f57f2414afe247e2291c395895bb18f701b6f4331feb759110c543dd94a238e782ad552047677558a50e7683d71a9e222fd19a9343e1d64528640a8099dedd19e4c747dda18ff25b15bddf750a54533b6ecfc75ad4a2909485f7fd759d45c74727b2e7300eae71a8784f5dd7f25b4b000ed3254264131cbbae316fb3a3bfbeb309dd2d18104629db354f447791eb882bf0333a520b8dba745b673d071b07e1de3e02fe751a1cf5908435b1a38edbd60483abdb15452c868844ceb96c449ab72999a55c79f9ce7405797142ef7095b4caf99d7bbe51cd4e963e4ffbbd2648761abd3894b5420a0add261ff9c0eff61aafd1ac5195ff15cadb5b0c7ce34d4d2d68146f3dae677e833b8be0f8a876153bb65398def38e4bf539d3a00047b19c483062fc1c2547b7d4f7d99b7035212ccfffeeb21ed7bbd6165ac7fbafbca3cef86fff655305706dd0baa607c50543bb0d66f0f4dbdd9c365fdb7b875dc5e7ee59afccc321ad1e31cc84687afda71231bb2e4dc3ce79ff3ce4bbafed8821a5b71bbf3844f110e2dd9557b596ac792d97506d22c0410bce435e20fa2e2d435361b5b6ac85f44763769723a7b629258f45e10578f70bef2e9c05af8032e357697dfcd30de9b3e953a36d6cb7a03ce69288b663f692793904dd8fb4ab6dc31ddf7f6942ef84c1e68c78bf9974f830ee2fccca84113cee98b47ed41a87fe610c5348dc38d4ada19862772317a70754870347ad87dbbb4c52349b0261aa8e108fcf387b24d4e2a77ba76e8472fd74ab6fa021277a24ef7a48d395b0fd1f9c0cf83bac56b433ffbfe5984a362e337969febf259988162c2b4842bd2fc0b230fee93a085003e615088abfe41889f7b5e0f380ffe55b66c1f7419993c3dd4aac5891494a183ddca2e415e1749489c925715f3c44d94b90d2d735f2b923bdbbbf1646580ab135356a9ee29bc19e73ded9a33798a69d248574e0c9e9f40a1c1ba52bc66a578d08b75f271a9e9f447efede09d6b3b57e0aa6322c18fd6f5e1c9d2753e0a6513cc04124ab89802eb9c504f0e5550868ab597629d7cc7447ed1b01b2ff4cf511aa098710b208b5aa0f595039a2f0e7294c5fe3b0c3e6c40000000000000000000000000000000002588beb10115f4b22f4ac997c86c49201ee9dceb2142ae61555bbbc4ef8cdd468a8ffbe6cbfc8877dd87292c70e10669bc99d8d5710f7719cc2cffc86cd529b6da2511d07aef4a1d9533ab58a76f80ad7fe91a17397d3c83481", @ANYBLOB="fe2ecf20a9a17bd2ed7e803f830375c150a1f848f604c2c1f932d2b7163be4b2b9a5bd521d185cfbee555b27608594beba6325923aaf5db74cff01000053db92c6c5fcbba0abd975fc76bea49b00513afc856ed89d3fadeda307ca587354322803b0983cc65725ae7f45fb95e7cdb28c6b886959b7dde2c87c73f6008cf6eed7861f24b7423704b95f3d05b92d3d7ff9d392833ecd02443320b60131a350360fcc1d659e2a03cb469caf0498bacae0735a161345b3d71a55f14ef636b6f832c7a6071fce83904dfd871b6d8e03648dbaa3a039eb5673792cae80335732030f9aeabaf3bb3cc4ca5fe75271d69b2e78beb2b81fc3cf3a18a7ae93a3cdbe6599b99408275e2b4b4477c6fcf4806134e839e13533ec000000000000006a1c000000000000000000000000000000000000000000000000000069c3288311b7414705e975eb3f1b77a120", @ANYRES64], 0x8, 0x2eb, &(0x7f00000004c0)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc0a85320, &(0x7f0000000180)={{0x80, 0x80}, 'port1\x00', 0xa9, 0x1e0041, 0x8000, 0x0, 0x3, 0x0, 0x5, 0x0, 0xd, 0x9}) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000200)={{0x80, 0x4}, 'port1\x00', 0x89, 0x40800, 0x0, 0xfffffeff, 0x0, 0x0, 0x200000, 0x0, 0x4875c99660ff2b28}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) fdatasync(r5) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r8 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)="b8", 0x1ff48}], 0x2}, 0x0) r9 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r10, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r10, {0x0, 0x4}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0xfffffffd, 0x400, 0xffffffffffffffff, 0x6, 0x7}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000140)='ext4_mballoc_alloc\x00', r0, 0x0, 0x80}, 0x18) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000000380)={[{@errors_remount}, {@discard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5e}}, {@noauto_da_alloc}, {@bsdgroups}, {@jqfmt_vfsv1}, {@abort}, {@data_err_ignore}]}, 0x1, 0x476, &(0x7f0000000540)="$eJzs3M1vFOUfAPDvzLblx2v7Q3wBUavE2PjS0oLKwYtGEw8YTfSAN2tbCKFQQ2sihEg1Bi8mhkTP6tHEv8CbF6OeTLzq3ZAQ5QJ6qpnZmbK7dLctLLuF/XySZZ9n5pl9nm9nnp1n5pklgJ41nP2TRGyLiN8jYrCarS8wXH27duXc1D9Xzk0lsbT05l9JXu7qlXNTZdFyu61FZiSNSD9JikrqzZ85e2JydnbmdJEfWzj53tj8mbPPHD85eWzm2MypiUOHDh4Yf/65iWfbEmcW19U9H87t3f3q2xdfmzpy8d2fv8vau61YXxtHg00N72s2nAX+91JueWFafXt83RFsbNtr0klfFxvCulQiIttd/Xn/H4xKXN95g/HKx11tHHBbZeemFie2xSXgLpZEt1sAdEd5os+uf8tXh4YeG8LlF6sXQFnc14pXdU1feameXxttv031D0fEkcV/v8pe0fo+BABAW3w29eXheHql8V8a99WU21HMoQxFxP8jYmdE3BMRuyLi3oi87P0R8cDqVaa1mcapoRvHP+mlmw5uDbLx3wvF3Fb9+G+5mUOVIrc9j78/OXp8dmZ/8TcZif5NWX68RR0/vPzb583W1Y7/sldWfzkWLNpxqa/hBt305MJkPihtg8sfRezpWyn+ZHkmIImI3RGxZ30fvaNMHH/y273NCq0efwttmGda+ibiier+X4yG+EtJ6/nJsf/F7Mz+sfKouNEvv154o1n9txR/G2T7f0v98d9YZCipna+dX38dF/74tOk1zc0e/wPJW/m2A8WyDyYXFk6PRwwkh/N83fKJ69uW+bJ8Fv/IvpX7/85imyz+ByMiO4gfioiHI+KRou2PRsRjEbGvRfw/vdR8XX38m7d1Y/9PN3z/bc7XLB//Dft//YnKiR+/X7n2r99Z2/4/mKdGiiX5998q1trAW/zzAQAAwB0hzZ+BT9LR5XSajo5Wn+HfFVvS2bn5haeOzr1/arr6rPxQ9Kflna7Bmvuh48li8YnV/ERxr7hcf6C4b/xFZXOeH52am53ucuzQ67Y26f+ZPyvdbh1w2600jzYx0IWGAB3X2P/T+uz51zvZGKCjmj5Hs6Wz7QA6b5Xn6NJOtQPoPP9fC/Sulfr/+Ya8uQC4Ozn/Q+/S/6F36f/Qu/R/6Emr/Ui+cou//Ze44xLJ2gpH2v2mboxEf0S05QMHNkQ4RaLb30wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADt8V8AAAD//5qI6jE=") syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') 15.558016362s ago: executing program 50 (id=649): setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, r0, 0x0, 0x200000000}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="04000000f1000086b6824ff796090000000000000005d76762ae44613eb3e91300df5b8fea2d8086cb68a2de7e2eb02b3bdecf1aad3904a1783f495c396a7ce0fbf30741a112e3e451cade6546cc9314d5192207fbcb33a81bcec608690eed183fcc6db72ea20de01501219ae9246865b49d89e57c582a1be49df1dacf11047808356bf0edf2ca6ea8a6feca50156b72c70000ef2caf28eaa19e"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x38, 0x1403, 0x1, 0x70bd2c, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x44, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x4000041) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) 15.552155022s ago: executing program 2 (id=740): socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb8000) r0 = open(&(0x7f0000000980)='./bus\x00', 0x64842, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000840)=@newqdisc={0x80, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}, {0x0, 0xd}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x50, 0x2, {{}, [@TCA_NETEM_LOSS={0x34, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0x18}, @NETEM_LOSS_GI={0x18}]}]}}}]}, 0x80}}, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xfffffdd6}], 0x1, 0x9c00, 0x0, 0x3) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r6 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$NS_GET_PARENT(r6, 0xb702, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r7, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r8 = accept4$unix(r7, &(0x7f0000000180)=@abs, &(0x7f0000000240)=0x6e, 0x81000) sendmmsg$unix(r8, &(0x7f0000000000), 0x0, 0x24000011) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=r4], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) setsockopt$inet_buf(r5, 0x0, 0x10, &(0x7f0000000000)="17000000020001000003be8c5e687a8a12003300020100ecff3f0000000300000a0001000098fc5a53d3f5b7e4a96c6b06169da9c0f8d9485bbb6a880a00243c5197b29f9368bdd6c8db0000dba67e06000000e289c46f8ab8b4028a7a63c900000200df0180000000000100000000000080c457681f009cee4a5acb3dac00001fb7315033bf79ac2df5bc080236e2b68c8eec25a02aff06011500000000010000000affff02dfccebf6ba00085d024f0298e9e90554062a", 0xb8) r10 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x0) setreuid(0x0, 0xee00) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, &(0x7f0000001600)={0xffffffffffffffff, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000300)=""/134, 0x86}, {&(0x7f0000000480)=""/143, 0x8f}, {&(0x7f0000000600)=""/201, 0xc9}, {&(0x7f0000000280)=""/26, 0x1a}, {&(0x7f0000000540)=""/63, 0x3f}, {&(0x7f0000000700)=""/12, 0xc}, {&(0x7f0000000740)=""/30, 0x1e}], 0x7, &(0x7f0000000800)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r10, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000400000019"]) 14.172140029s ago: executing program 2 (id=745): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) ioperm(0x3c, 0x1, 0x8) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x503, 0x0, 0xfffffffc, {0x0, 0x0, 0x0, 0x0, 0x115}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x2}]}}}]}, 0x3c}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000004000000000009496e9c0f5c37cea09588291", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) dup3(r6, r3, 0x0) 14.034864251s ago: executing program 2 (id=746): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x2008042, &(0x7f00000000c0), 0x1, 0x571, &(0x7f0000000780)="$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") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000800)={0x9, 0x108, 0xfa00, {r2, 0x4, '\x00', "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"}}, 0x110) creat(&(0x7f0000000000)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x147842, 0x49) llistxattr(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)=""/37, 0x25) 13.707973768s ago: executing program 2 (id=747): r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001cb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x3e) syz_emit_ethernet(0x32, &(0x7f0000000840)=ANY=[], 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) execve(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x0) pipe2(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, 0x0, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92F\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000180), 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="090000000400000004000000501f360c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="000000000014841a60b42c2db6b7b5304dbff300040000000000001d"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000011c0)={{}, &(0x7f0000000000), &(0x7f00000010c0)=r3}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) 13.437099153s ago: executing program 51 (id=665): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000800000085000000b000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)=r2}, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vlan0\x00', 0x0}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r7, 0x20, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="18027a0000000000000000003b00000095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000001c80)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r8, r6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x14, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xf}, [@call={0x85, 0x0, 0x0, 0xc9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x7, 0x0, 0x3, 0x7, 0x4, 0x50, 0xfffffffffffffff0}, @exit, @ringbuf_query, @jmp={0x5, 0x1, 0x7, 0x5, 0x1, 0x20, 0x10}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4ccb}, @ldst={0x0, 0x3, 0x3, 0x2, 0x3, 0x10, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x45, &(0x7f0000000100)=""/69, 0x40f00, 0x20, '\x00', r4, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x5, 0x6, 0x8, 0x7}, 0x10, r8, r2, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r0, &(0x7f0000000780)}, 0x20) r9 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r9, 0x8917, 0x0) 12.829993334s ago: executing program 2 (id=749): prctl$PR_SET_SECUREBITS(0x1c, 0x15) setuid(0xee00) r0 = socket$unix(0x1, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000003c0), 0x1, 0x609, &(0x7f0000000f80)="$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") bind$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 10.581707347s ago: executing program 52 (id=678): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_usb_connect(0x6, 0x24, &(0x7f0000001000)=ANY=[], 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 4.524536263s ago: executing program 6 (id=775): socket(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @rand_addr, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000040)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x4008840, &(0x7f0000000180)={0xa, 0x4e23, 0xcc08, @empty}, 0x1c) sendto$inet6(r1, &(0x7f00000001c0)='~', 0x1, 0x40804, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000002300)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x40, 0x0) 4.300240367s ago: executing program 6 (id=777): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xe, &(0x7f00000001c0)={[{@noblock_validity}, {@jqfmt_vfsv0}]}, 0x1, 0x445, &(0x7f0000000b00)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000100)=ANY=[@ANYBLOB="180200000000000000000000000000008510000001000000950000000000000018010000202073250000000000e4d020731af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000002885000000c700000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x98, &(0x7f00000001c0)=""/152, 0x40f00, 0x9}, 0x94) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb8000) r0 = socket(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001f2, 0xfff0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x5c, r1, 0x800, 0x70bd25, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}]}, 0x5c}}, 0x20000845) r2 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r2, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xfffffdd6}], 0x1, 0x9c00, 0x0, 0x3) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r3}, 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r4}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x201, 0x1000}, 0x28) 3.951927324s ago: executing program 6 (id=780): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x4, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20048020}, 0xd0) read(r0, &(0x7f0000000140)=""/167, 0xa7) prctl$PR_GET_TSC(0x19, &(0x7f0000000200)) io_setup(0x96, &(0x7f0000000240)=0x0) r2 = socket$rxrpc(0x21, 0x2, 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/tty/drivers\x00', 0x0, 0x0) io_cancel(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0xf4ac, r2, &(0x7f0000000280)="d2adf578bc105d936f0bf9b98da8ecbae911e1cb9de1cbe6254a7db0ccc4af6422c081fa02ebe5865e089d5fb99eb5863e2eafa9f5af716f2b27e8292468f0bb63264693284b6a1ebcc0d55d0594e958b3ece9", 0x53, 0x0, 0x0, 0x2, r3}, &(0x7f0000000380)) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f00000003c0)={0x0, 0x5, 0x4, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000400)={'gretap0\x00', {0x2, 0x4e23, @private=0xa010101}}) gettid() ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000940)={0x0, @empty, @broadcast}, &(0x7f0000000980)=0xc) getpeername$packet(r3, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{&(0x7f0000000440)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000480)="6d79ece41dd00f111d7c98a5ce0997754ac8f472dfa9d8fc4d35e138d4fe288b215e32e7fa8ebdd9cded56a3c11b0b06b4dd90ace883349e046558fefcd5a5ff494051dd361eef3b054af3ff592e87b0adcc1d827e43729c0617185c63be29231fe0fc74ca845a", 0x67}], 0x1, &(0x7f0000000580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @empty}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x2c, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x1b, 0x14, [@initdev={0xac, 0x1e, 0x1, 0x0}, @local, @private=0xa010102, @loopback, @rand_addr=0x64010102, @local]}, @timestamp_prespec={0x44, 0x34, 0xa4, 0x3, 0x7, [{@broadcast}, {@remote, 0x3}, {@broadcast, 0x1}, {@multicast1, 0x7fff}, {@local, 0x5}, {@rand_addr=0x64010100, 0x9}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0xc0}}, {{&(0x7f0000000640)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000680)="f6a2368743f3d098b36e6e427ba0184264717fa3ea9b301247e8721f58487d396a53dc6e3a9a631aeee0eaca1c0e6dc61a73d7030b83f5e1c3c5c98871e337e53b01e5faf70d86c847675acc174eb1a8762f49056571ea0c03713202889ddeda2de75b24c74e927212ec5a88ebf20a024ab7a6e68097142d78ff44c2c752705ee1a119028e56be468f873f8ae5e13d", 0x8f}, {&(0x7f0000000740)="093448c7ae2bd297c09acc855f207e8301b4748890adb92db321ab45a6a2689d0f3b66a1f0e7b39413370498e19118be6978555fd78599581f6df0f2f0281dd4544fddda3fd33ff96227342d3c0e68f91a6f367f4903d67fd1d4d45db74095723c6a637d95b1777397d43e34afb13a8ac19a984e4995f297091a18a7fdf33bda5e65f254653830e18cc21174bb493116f5bf0b733e1264caa35f98da11b10d2795c9bef46db1a083c60925032f9443", 0xaf}, {&(0x7f0000000800)='rDE', 0x3}, {&(0x7f0000000840)="f392c51bd6241ed35754558a74f442334c789c265fce240fd4180efce634d5f8e311ac60992b0f0f203022efdab4d045d35517a9ccd7efa05b67018b9dc80b09ab2c46fbf075c43a9f15d833560887e06476a9d51c430e27af6362d0775cf7f0193edd3e22653797e065729dabaf8db5a27da606071d3710b532f43e28b5c647025b597fdff8f40a5ae48737b0caf6592414cc13d37899ae6ec92590ef1091d75939", 0xa2}], 0x4, &(0x7f0000000a40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @broadcast, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xc}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0xce, 0x0, 0x1, [0xffffffff]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @broadcast, @empty}}}], 0x88}}], 0x2, 0x8000) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@bloom_filter={0x1e, 0xf1c5, 0x2, 0x4, 0x20, r3, 0x9644354, '\x00', r5, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0x4}, 0x50) socket$inet_sctp(0x2, 0x1, 0x84) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c40)={&(0x7f0000000c00)='neigh_create\x00', r3, 0x0, 0x3ff}, 0x18) r8 = eventfd2(0x1, 0x800) io_cancel(r1, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x1, 0xf, r2, &(0x7f0000000c80)="c1990d0ce83b467e3f5236e40af50ad60828a3e2b691d4bcc2a8527225bf9b2159961c58251a32ff8198715f49b4355f44e17e41a29e7f4cbe745b35af04e8fd426c03313295651c22f0376ebd4f44e2a477ec31a0647229a7321355257f4b72e288387c5ca8e6f5637de0ae6ec9e4c1520b4196bb6ac97fd7a90dac92721bd272314b85139570fd1d17b4e43aee50c9e6a725ba4defad5d5309ef74873cd4fe9ada3663be32f15273f8c1a6b0176bdba82b14b43c4f3837a94c5bc435f39318b33f55ca16ab31b3fb0382685738e6a2ff00cdfe892197533fd1bb5a49a2", 0xde, 0x1, 0x0, 0x1, r8}, &(0x7f0000000dc0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e80)={r3, 0x58, &(0x7f0000000e00)}, 0x10) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x10, 0x3f2, 0x8, 0x70bd2c, 0x25dfdbfb, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x200008c0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001280)={r3, 0xe0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000fc0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000001000)=[0x0, 0x0, 0x0], &(0x7f0000001040)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x7c, &(0x7f0000001080)=[{}, {}], 0x10, 0x10, &(0x7f00000010c0), &(0x7f0000001100), 0x8, 0xec, 0x8, 0x8, &(0x7f0000001140)}}, 0x10) r9 = openat$cgroup_ro(r8, &(0x7f00000012c0)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) accept(r2, &(0x7f0000001300)=@caif=@rfm, &(0x7f0000001380)=0x80) r10 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000013c0)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r10, 0x5000943a, &(0x7f0000001480)={{r7}, r11, 0x0, @inherit={0x50, &(0x7f0000001400)={0x0, 0x1, 0x6, 0xe14, {0x24, 0x10000, 0x4, 0x7, 0x9613}, [0x8]}}, @name="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"}) bpf$ITER_CREATE(0x21, &(0x7f0000002480)={r9}, 0x8) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f00000024c0)={'wlan0\x00'}) 3.788016888s ago: executing program 6 (id=783): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) ioperm(0x3c, 0x1, 0x8) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x503, 0x0, 0xfffffffc, {0x0, 0x0, 0x0, 0x0, 0x115}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x2}]}}}]}, 0x3c}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) flock(r3, 0x5) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) dup3(r4, r3, 0x0) 3.547514102s ago: executing program 6 (id=786): r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001cb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x3e) syz_emit_ethernet(0x32, &(0x7f0000000840)=ANY=[], 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) execve(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x0) pipe2(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, 0x0, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92F\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000180), 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="090000000400000004000000501f360c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="000000000014841a60b42c2db6b7b5304dbff300040000000000001d"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000011c0)={{}, &(0x7f0000000000), &(0x7f00000010c0)=r3}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) 3.291191427s ago: executing program 3 (id=793): r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c10000000000000000000", 0x58}], 0x1) 3.184424179s ago: executing program 3 (id=794): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800700, &(0x7f0000000680)={[{@nombcache}, {@journal_dev={'journal_dev', 0x3d, 0xff}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4c}}, {@nouid32}, {@resgid}, {@acl}, {@init_itable_val={'init_itable', 0x3d, 0x8d55}}]}, 0x0, 0x493, &(0x7f0000000740)="$eJzs3M1vFOUfAPDvzLaF/nhpf4gvIGqVmDS+tLSgcPCi0cQDRhM94LG2C2lYqKHVCCFSjMGLiSHRs/Fo4l9g4sGYGPVk4lUvnowJUS6gp5qZnYHusgtUlu7Kfj7Jdp9n5pk+z3efeXlmnm0D6Ftj2Y8kYnNE/BwRI/VsY4Gx+tvli6dn/7p4ejaJlZVX/0jycpcunp4ti5bbbSoy42lE+n5SVNJo8eSpozO1WvVEkZ9cOvbm5OLJU0++fWzmSPVI9fj0gQP79k7tf3r6qY7EmcV1aee7C7t2vPj6+ZdmD51/4/svsvZuLtavjqNTxrLA/1zJNa97tNOVddmWVelkoIsNYU0qEZF112B+/I9EJa523ki88F5XGwfcVtm1aUP71csrwB0siW63AOiO8kKf3f+Wr3UaevSEC8/Wb4CyuC8Xr/qagUiLMoNN97edNBYRh5b//jR7RdEPZ5r6BgCgkz6c/eRgPNFq/JfGPfn7r/nPrcUcymhE/D8itkXEXRGxPSLujsjL3hsR962x/uapoWvHn2nlXwd3E7Lx3zPF3Fbj+K8c/cVopchtyeMfTA7P16p7is9kPAY3ZPmp69Tx9fM/fdRu3erxX/bK6i/HgkU7fh9oekA3N7M0kw9KO+DC2YidA63iT67MBCQRsSMidq7tV28tE/OPfb6rXaEbx38dHZhnWvksC285i385muIvJavnJ+evmZ+c3Bi16p7Jcq+41g8/nnulXf23FH8HXKjW31f1f3OR0WT1fO3i2us498sHbe8pr8Y/3H7/Txq3mZtZSoeS1/J55qFi2TszS0snpiKGkoN5vmH59NVty3xZPtv/x3e3Pv63Fdtk1d8fEdlO/EBEPBgRDxVtfzgiHomI3deJ/7vn2q8r44+0S/1/NmIu7//haD7+C039v/ZE5ei3X7ar/+bOf/vy1HixJD//3UCr5mSni+YG3spnBwAAAP8Vaf4d+CSduJJO04mJ+nf4t8f/0trC4tLjhxfeOj5X/678aAym5ZOukeJ5aG2+Vp1KlovfWH8+Ol08Ky6fl+4tnht/XBnO8xOzC7W5LscO/W5Tm+M/89ttnXkBesBwy6XTQ+veEKALmufR08bsmZfDyQDuVP5eG/rXDY7/dL3aAaw/13/oX62O/zNNeXMBcGdy/Yf+5fiHPpV+0+0WAF3k+g996Vb+rv82Jjb2RjMa/lPA8np9Yr3aKXkiokykPdGeNSYqvbTPf7W/J5rROtHtMxMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEBn/BMAAP//sE3sYw==") 2.722425858s ago: executing program 3 (id=799): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ff8}]}) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000001c0)='./file0\x00', 0x800000, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x373, &(0x7f00000006c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) 2.718063478s ago: executing program 6 (id=800): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00'}, 0x18) setrlimit(0x40000000000008, &(0x7f0000000080)={0x0, 0x6}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 5) 2.319582896s ago: executing program 3 (id=803): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000540), 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8001}, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYRES16], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\a\x00\x00B\x00'], 0xfe33) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000fc0)=""/4124, 0x101c}, {&(0x7f00000006c0)=""/166, 0xa6}], 0x2}, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x2) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000b27c588bd47ae6e5df85c4331b223c000000b36acd3fc70b79515f176a0f53f91f819de7b42f670684a774853aa214366651807103fca607b84d9e4ada241218867a66f5e22665d350679548ba082ac66df92eefa01c5aa2a10d297b112bf7596fd23b4566410837cd9fa4329700b132b6516607799f9d59f2cdc5ae6a06156da2b03bd7a7598080a317b09e39a82ef14c8b325852a9f5bfd5eed57a2bbeb4", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7c8fe030000000000008500000083000000bf09000000000000550901007af6982c950000009bd60000bf91000000000000b7020000010000008500000084000000b700000000000000950000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000200)='kmem_cache_free\x00', r6}, 0x18) sendmsg$802154_dgram(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x24, @long={0x3, 0xffff, {0xaaaaaaaaaaaa0302}}}, 0x14, 0x0, 0x1, 0x0, 0x0, 0x20044005}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000740)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb"], 0x0) syz_emit_ethernet(0x2e, &(0x7f00000004c0)={@empty, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0xe000, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x1, 0x1, 0x4, 0x0, @void}}}}}}}, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000002b0ffcbe1bba8d1c2206e8f17906bd96a24f505d9bfcb9b7f39d3e59d3d5879d6b6e0d52a1020607d063a63b656f273ccd49d71bf6ba9402cf842535a19aaebd19745052752d81d49d2fa72ab80c85955060aab2f09f07ac20ec4b67b0e55422625826b7f831a0e7fc64feb5bb039905194caa8fe8a850515d09bcf7fbe34b93e993a670fa855e63d4bab1ba6245bdc7e63d0043ddaa2577dd8bc3a8e9b4cf5d6c9d1bcc195a0a8eb6cebf4a69787f"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x10, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r7, @ANYBLOB="0000000002000000b705000008000000850000005d00000095"], &(0x7f0000000300)='GPL\x00', 0x5, 0x51, &(0x7f0000001e00)=""/4086, 0x41000}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') preadv(r9, &(0x7f00000000c0)=[{&(0x7f0000000740)=""/4100, 0x1004}], 0x1, 0x145, 0x80000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r8}, 0x18) r10 = open(&(0x7f0000000140)='./bus\x00', 0x143bc2, 0x1c0) fcntl$setlease(r10, 0x400, 0x1) close(r10) open(&(0x7f0000000080)='./bus\x00', 0x147842, 0x49) lsetxattr$security_selinux(&(0x7f0000000280)='./bus\x00', &(0x7f0000000240), &(0x7f0000000100)='system_u:object_r:usr_t:s0\x00', 0x1b, 0x2) mount$cgroup(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0xa00005, &(0x7f00000004c0)={[{@clone_children}]}) 1.451008222s ago: executing program 3 (id=811): r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001cb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x3e) syz_emit_ethernet(0x32, &(0x7f0000000840)=ANY=[], 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) execve(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x0) pipe2(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00'}, 0x18) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000100), 0x10) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92F\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, 0x0) r5 = dup2(r3, r4) pipe2$9p(&(0x7f0000000180), 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="090000000400000004000000501f360c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="000000000014841a60b42c2db6b7b5304dbff300040000000000001d"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000011c0)={{}, &(0x7f0000000000), &(0x7f00000010c0)=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) 1.372685584s ago: executing program 9 (id=812): socket(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @rand_addr, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000040)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x4008840, &(0x7f0000000180)={0xa, 0x4e23, 0xcc08, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000002300)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x40, 0x0) 1.324838375s ago: executing program 9 (id=813): syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000001c0)='./file0\x00', 0x800000, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x373, &(0x7f00000006c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) 1.221881757s ago: executing program 9 (id=814): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004180)=ANY=[@ANYBLOB="02000000040000000700000002"], 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1900000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000000000000000000000000059f5c18e74b777345ec3ade9372c0336249203f0fcd331c5c091480cfd936b375c9d4e1a9af725d155b03b5fa067ca56557b03060b9f6a9f86632a8f3965a667792617aac84e4b77d7b2a913a47f0e781cca7056e0c5f1edb54fbb1ad4e9fb65d5075984e96b93d7590c5fdfffc8c8efb9717a266c194a4ab4ce22f31a27b4575997336d8473e596a9ea8ed9174d46e65881af319678d887322c59f9db21943ac8f2d4240022b82265de03c008aa103b56f6c6803db2070531406bb28c5c650da282ac", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYRES32=0x0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) syz_emit_ethernet(0x4e, &(0x7f0000000580)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0xb, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010101, @local, {[@timestamp_addr={0x44, 0x14, 0xa, 0x1, 0x0, [{@multicast1}, {@remote}]}, @generic={0x7, 0x2}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x80}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000680), 0x3, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) timer_create(0x7, &(0x7f0000000440)={0x0, 0x23, 0x1, @thr={&(0x7f0000000340)="b617f5b75a6fe9686f1bf7fc357ea4a6929ca072a4f8f45dafa1c1604c4fb59feb5f708081bdb745c03bb6a32f41bae56f86d271fb2584198f784daafa88e2f5be37b8c3c7705590542c101d000653d7f9cf9891006c5fffc7a45391671861828039f7dc2cef07b69c1014fdd97ba6e94fa40ed9307f37ac0922a2b6f4474448ab7207333443c31833c3c40b72967c", &(0x7f0000000400)="ccf74f389ce9d2c9ce86704dc7143aa5814fae0a0ec90094dc228b50ce455b63cbff7faf7545a140f3ddd801073e84ef933491a83965eb558efdf35cc634a27d"}}, &(0x7f00000004c0)=0x0) timer_delete(r2) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f0000000e40)='./file2\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$eJzs3c9rXNUeAPDvnSRNm/a95MGD9+oqIGigdGJqbBVcVFyIYKGga9thMg01k0zJTEoTAlpEcCOouBB007U/6s6tP7b6X7gQS9W0WHEhkTu5t502M2mSJpnqfD5wM+fceyfnfOf+OGfmHu4NoGeNpn8KEYcj4t0kYjibn0TEQDPVH3Fybb1bK8vldEpidfXlX5LmOjdXlsvR8p7UwSzz/4j45q2II4X15dYXl2ZK1WplPsuPN2YvjNcXl46eny1NV6Yrc8cnJiePnXjqxPGdi/W375cOXXvvhcc/P/nHm/+7+s63SZyMQ9my1jh2ymiMZp/JQPoR3uX5nS6sy5JuV4BtSQ/NvrWjPA7HcPQ1UwDAP9nrEbEKAPSYRPsPAD0m/x3g5spyOZ+6+4vE3rr+XETsX4s/v765tqQ/u2a3v3kddOhmcteVkSQiRnag/NGI+PjLVz9Np9il65AA7bxxOSLOjoyuP/8n68YsbNUTGyzbl72O3jPf+Q/2zldp/+fpdv2/wu3+T7Tp/wy2OXa3477H/4EdKGQDaf/v2Zaxbbda4s+M9GW5fzX7fAPJufPVSnpu+3dEjMXAYJqf2KCMsRt/3ui0rLX/9+v7r32Slp++3lmj8FP/4N3vmSo1Sg8Sc6vrlyMe6W8Xf3J7+ycd+r+nN1nGi8+8/VGnZWn8abz5tD7+yEYn7Y7VKxGPtd3+d0a0JRuOTxxv7g7j+U7Rxhc/fDjUqfzW7Z9Oafn5d4G9kG7/oY3jH0lax2vWt17Gd1eGv+607P7xt9//9yWvNNN5P+JSqdGYn4jYl7y0fv6xO+/N8/n6afxjj7Y//jfa/9PvhGc3GX//tZ8/2378uyuNf2pL23/riau3Zvo6lb+57T/ZTI1lczZz/ttsBR/kswMAAAAAAAAAAAAAAAAAAAAAAACAzSpExKFICsXb6UKhWFx7hvd/Y6hQrdUbR87VFuamovms7JEYKOS3uhxuuR/qRHY//Dx/7J78kxHxn4j4YPBAkt9HcarLsQMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABA7mCH5/+nfhzsdu0AgF2zv9sVAAD2nPYfAHqP9h8Aeo/2HwB6j/YfAHqP9h8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBddvrUqXRa/X1luZzmpy4uLszULh6dqtRnirML5WK5Nn+hOF2rTVcrxXJt9n7/r1qrXZiMuYVL441KvTFeX1w6M1tbmGucOT9bmq6cqQzsSVQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAsDX1xaWZUrVamZfYRmL14ahG9xN92e70sNRnTxPJw1GNHU50+cQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8DfxVwAAAP//02Ii/w==") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sched_switch\x00', r4}, 0x18) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r5, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r5, 0x5, 0x4) r6 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r6, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) setsockopt$inet6_opts(r6, 0x29, 0x36, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x8) connect$inet6(r6, &(0x7f0000000240)={0xa, 0xffff, 0xffffffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000001840), 0x3b, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r7, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000005480), r8, r7}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x6}, 0x18) r9 = socket$unix(0x1, 0x2, 0x0) ppoll(&(0x7f0000000000)=[{r9, 0x4690}], 0x1, 0x0, 0x0, 0x0) (fail_nth: 2) 603.422538ms ago: executing program 0 (id=816): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) 590.694079ms ago: executing program 9 (id=817): openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) (fail_nth: 6) 574.205609ms ago: executing program 3 (id=818): ioctl$EXT4_IOC_SETFSUUID(0xffffffffffffffff, 0x4008662c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@mpls_delroute={0x30, 0x18, 0x9, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_VIA={0x14, 0x5, {0x0, "f1b9a81697008d68a0328c49d2ee"}}]}, 0x30}}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x26f2e217, 0x4ba}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2, 0xfffe}}}}}}, 0x0) 545.24995ms ago: executing program 0 (id=819): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r0, 0x0, 0x4}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x3, &(0x7f0000007000/0x1000)=nil) r1 = open(0x0, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x1000) sendmsg$NFT_BATCH(r2, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = socket(0x10, 0x803, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x5}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=@newtfilter={0x94, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r5, {0xf}, {}, {0xa, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x68, 0x2, [@TCA_U32_SEL={0x64, 0x5, {0x10, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1000, 0xe, 0xfffff000, 0x9f6}, {0xdeb2, 0x3, 0x6, 0x3}, {0x1, 0xfffffffb, 0x100, 0x3ff}, {0x200, 0x3ff, 0x3, 0x4}, {0x3ff, 0xb, 0x3, 0xa6d}]}}]}}]}, 0x94}, 0x1, 0x0, 0x0, 0xccd4ddef28b9e90e}, 0x40094) 274.443875ms ago: executing program 0 (id=820): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) r1 = syz_io_uring_setup(0x593, &(0x7f0000000400)={0x0, 0xc459, 0x8, 0x0, 0x398}, &(0x7f0000000300)=0x0, &(0x7f0000000a40)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xff8, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000b00)=@IORING_OP_UNLINKAT={0x24, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x200, 0x1}) io_uring_enter(r1, 0x627, 0x4c1, 0x43, 0x0, 0x0) 274.154175ms ago: executing program 9 (id=822): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000640)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) rt_sigpending(0x0, 0x0) (fail_nth: 3) 156.143407ms ago: executing program 9 (id=823): pipe(&(0x7f0000000040)={0xffffffffffffffff}) io_setup(0x7f, &(0x7f0000000940)=0x0) io_submit(r1, 0xfdef, &(0x7f00000002c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080)="c3", 0x1}]) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000640)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x20132, 0xffffffffffffffff, 0x391e1000) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000080)=0x7, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000140)=@ethtool_cmd={0x5, 0x0, 0x9, 0xfffc, 0x0, 0xfc, 0x1, 0x8, 0x0, 0x0, 0x1000, 0x0, 0x6, 0x0, 0x0, 0x45, [0x8000000]}}) syz_emit_ethernet(0x46, &(0x7f0000000280)=ANY=[@ANYRESDEC=r2], 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={0x800000, 0xb7, 0x2}, 0x18) recvmmsg(r3, &(0x7f0000001980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003680)=""/27, 0x1b}}], 0x39, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigpending(0x0, 0x0) 108.078598ms ago: executing program 0 (id=824): socket(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @rand_addr, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000040)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x4008840, &(0x7f0000000180)={0xa, 0x4e23, 0xcc08, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000002300)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x40, 0x0) 73.773769ms ago: executing program 0 (id=825): syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000001c0)='./file0\x00', 0x800000, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x373, &(0x7f00000006c0)="$eJzs3U9rXFUUAPDTsfmr6WQhgop4qRvdDEn8Ag3SghhQYkeqC+HVTHTINBPmDZEpot259XMUl+4E8QtkoXt37rJx2UXpk8yfJpOOKSVOHtXfD8I9yT0nc+883uNuHufw1g93drbz2nbWjcq1FJWIqDyIWO5HA5eGY6Ufz8ZJ9+Kd6q0/3vj4088+WN/YuL6Z0o31m++upZSuvPnL19/8ePXX7ouf/HTl57k4WP788K+1Pw9eOXj18NHNr5p5auZpt91NWbrdbnez261G2mrmO7WUPmo1sryRmrt5ozM2v91q7+31Ura7tbS412nkecp2e2mn0Uvddup2ein7MmvuplqtlpYWg6ep39/czNYH8fwZedcuakFMQaeznh3dw3NPzNTvl7IgAKBU5z3/z/6r5/+ZcP6/SCfP//xXHZ3/Z4f37zjnfwAAAAAAAAAAAAAAeB48KIpqURTV0ViMXhIe/l7y8piyJ67/qZ+y18d0nXhxbz6i9f1+fb8+GAfz69vRjFY0YiWq8fDosTAyiG+8v3F9JfUtx9Kd7/r1V3+LqL8wXr8a1VieXL86qE+P6+NonInFk/VrUY2XJ9evTayfjbffOlFfi2r8/kW0oxVb/cfbcf23qym99+HGqfq5fh4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/w+1NPJ6DPre79cjFmJ/2L+/dpywPN4ff1D/uL/+SlTj4eT+/CsT+/Nfjtcul7t3AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABjJe3d3slar0bmoYNTzv/+X2VHwz1WXBun3Tk0txHjy3NP+zzmDyjNVLQw3OWHqUVEU01rq/MVeyvMEMxFxRk4x/ALP/1kvRcQZOXMRMf0tV8r/wp85KONpBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOU6bvpd9koAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoU967u5O1Wo3OFIOy9wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPA8+TsAAP//S+oM3w==") openat(0xffffffffffffff9c, 0x0, 0x181242, 0x148) 0s ago: executing program 0 (id=826): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x148, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffe, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0x16}}, [@qdisc_kind_options=@q_red={{0x8}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "09000000000000008f29d158039b90627d7b60f0d5ca47f33eed46409b7c8722ce020df6b24c2e6ac7b97dc04d01be2092874115214b1ebb764511f69cd1e9f6263346363d2c639c76000067af25166c2f0f85f36aa8867406119c010400002e31dea98204000000d560eae59ea49ef95d73202a6e3b5e1eb38244e694e7410d33bc92794ad27031f2a19698b5142ddf36e2a876a4fc871207bf12a84f1d4d132f5bb7edcf2d08d677e6a7268e106b6ced3c7f53df24092ddb9e0fac6a1153c3fc88bfd1404fef22cf3e825a6e19c6a48a5444eabb459ac3ec9a278df4011773d2f2e6529ed0ad424b47ec67522477f979360b76d1008000"}, @TCA_RED_PARMS={0x14, 0x1, {0x3f26, 0x7, 0x81, 0xc, 0xb, 0x14, 0x5}}]}}]}, 0x148}}, 0x0) r4 = socket(0x10, 0x3, 0x6) r5 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x0, 0x800, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) r7 = socket(0x400000000010, 0x3, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) syslog(0x4, &(0x7f0000001940)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r9, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=@newtfilter={0x6c, 0x2c, 0xd27, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, r9, {0xfff3, 0x7}, {}, {0x8, 0x1}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x3c, 0x2, [@TCA_CGROUP_EMATCHES={0x38, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x2c, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x28, 0x1, 0x0, 0x0, {{0xe38, 0x9, 0x4}, [@TCA_EM_IPT_HOOK={0x8, 0x1, 0x1f}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}]}}]}]}]}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x40010) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0500a700", @ANYRES16=0x0, @ANYBLOB="000328bd7000fbdbdf25020000003b000180140002006970766c616e3100000000000000000008000100", @ANYRES32=r3, @ANYBLOB="0c000180080003000300000028000180080003000300000014000200626f6e6430000000000000000000000008000100", @ANYRES32=r6, @ANYBLOB="0c00018008000100", @ANYRES32=r9, @ANYBLOB], 0x74}, 0x1, 0x0, 0x0, 0x20002080}, 0x20008040) r10 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r10, 0x402, 0x5) r11 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r12 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x5) writev(r12, &(0x7f0000000400)=[{&(0x7f0000000040)="aa1d484ea0000000f7fc08fcd111fbdf23ea32db0e8f21d5bc27bd49eb067a0689fff2a41cfbf0e9d85e44", 0x2b}], 0x1) fcntl$notify(r11, 0x402, 0x8000001f) r13 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) unshare(0x2040600) fcntl$notify(r13, 0x402, 0x8000003d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000026", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x29) r16 = dup(r15) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="74b3616e733d664b2c7266646f3d00", @ANYRESHEX=r14, @ANYBLOB=',wfdno=', @ANYRESHEX=r16, @ANYBLOB=',k']) kernel console output (not intermixed with test programs): l_trace_enter+0xcf/0x1e0 [ 143.288307][ T7934] do_syscall_64+0xac/0x200 [ 143.288335][ T7934] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 143.288432][ T7934] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 143.288477][ T7934] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 143.288546][ T7934] RIP: 0033:0x7fb3349eeec9 [ 143.288566][ T7934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.288590][ T7934] RSP: 002b:00007fb33344f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ee [ 143.288688][ T7934] RAX: ffffffffffffffda RBX: 00007fb334c45fa0 RCX: 00007fb3349eeec9 [ 143.288706][ T7934] RDX: 00000000000000e0 RSI: 00002000000003c0 RDI: 0000000000000006 [ 143.288745][ T7934] RBP: 00007fb33344f090 R08: 0000000000000000 R09: 0000000000000000 [ 143.288762][ T7934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.288783][ T7934] R13: 00007fb334c46038 R14: 00007fb334c45fa0 R15: 00007ffd08aec928 [ 143.288809][ T7934] [ 143.756895][ T7951] FAULT_INJECTION: forcing a failure. [ 143.756895][ T7951] name failslab, interval 1, probability 0, space 0, times 0 [ 143.769878][ T7951] CPU: 0 UID: 0 PID: 7951 Comm: syz.5.587 Not tainted syzkaller #0 PREEMPT(voluntary) [ 143.769916][ T7951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 143.769933][ T7951] Call Trace: [ 143.769941][ T7951] [ 143.769952][ T7951] __dump_stack+0x1d/0x30 [ 143.770014][ T7951] dump_stack_lvl+0xe8/0x140 [ 143.770054][ T7951] dump_stack+0x15/0x1b [ 143.770085][ T7951] should_fail_ex+0x265/0x280 [ 143.770186][ T7951] should_failslab+0x8c/0xb0 [ 143.770224][ T7951] kmem_cache_alloc_noprof+0x50/0x480 [ 143.770254][ T7951] ? getname_flags+0x80/0x3b0 [ 143.770294][ T7951] getname_flags+0x80/0x3b0 [ 143.770369][ T7951] user_path_at+0x28/0x130 [ 143.770398][ T7951] user_statfs+0x4d/0x110 [ 143.770481][ T7951] __x64_sys_statfs+0x65/0xf0 [ 143.770520][ T7951] ? __secure_computing+0x82/0x150 [ 143.770586][ T7951] ? syscall_trace_enter+0x102/0x1e0 [ 143.770623][ T7951] x64_sys_call+0x2a07/0x3000 [ 143.770646][ T7951] do_syscall_64+0xd2/0x200 [ 143.770671][ T7951] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 143.770801][ T7951] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 143.770869][ T7951] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 143.770899][ T7951] RIP: 0033:0x7fb3349eeec9 [ 143.770919][ T7951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.770971][ T7951] RSP: 002b:00007fb33344f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 143.770997][ T7951] RAX: ffffffffffffffda RBX: 00007fb334c45fa0 RCX: 00007fb3349eeec9 [ 143.771089][ T7951] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 143.771106][ T7951] RBP: 00007fb33344f090 R08: 0000000000000000 R09: 0000000000000000 [ 143.771122][ T7951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.771138][ T7951] R13: 00007fb334c46038 R14: 00007fb334c45fa0 R15: 00007ffd08aec928 [ 143.771163][ T7951] [ 144.740104][ T7988] loop5: detected capacity change from 0 to 512 [ 144.763556][ T7988] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 144.809644][ T7988] FAT-fs (loop5): error, invalid access to FAT (entry 0x0fffff00) [ 144.818559][ T7988] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 146.484197][ T8052] syz.5.594 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 146.498354][ T8052] CPU: 1 UID: 0 PID: 8052 Comm: syz.5.594 Not tainted syzkaller #0 PREEMPT(voluntary) [ 146.498429][ T8052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 146.498445][ T8052] Call Trace: [ 146.498452][ T8052] [ 146.498459][ T8052] __dump_stack+0x1d/0x30 [ 146.498626][ T8052] dump_stack_lvl+0xe8/0x140 [ 146.498711][ T8052] dump_stack+0x15/0x1b [ 146.498747][ T8052] dump_header+0x81/0x220 [ 146.498852][ T8052] oom_kill_process+0x342/0x400 [ 146.498894][ T8052] out_of_memory+0x979/0xb80 [ 146.498985][ T8052] try_charge_memcg+0x5e6/0x9e0 [ 146.499102][ T8052] obj_cgroup_charge_pages+0xa6/0x150 [ 146.499217][ T8052] __memcg_kmem_charge_page+0x9f/0x170 [ 146.499262][ T8052] __alloc_frozen_pages_noprof+0x188/0x360 [ 146.499359][ T8052] alloc_pages_mpol+0xb3/0x260 [ 146.499403][ T8052] ? alloc_pages_noprof+0x61/0x130 [ 146.499505][ T8052] alloc_pages_noprof+0x90/0x130 [ 146.499554][ T8052] __vmalloc_node_range_noprof+0x7a5/0xed0 [ 146.499652][ T8052] __kvmalloc_node_noprof+0x483/0x670 [ 146.499690][ T8052] ? ip_set_alloc+0x24/0x30 [ 146.499753][ T8052] ? ip_set_alloc+0x24/0x30 [ 146.499780][ T8052] ? __kmalloc_cache_noprof+0x249/0x4a0 [ 146.499809][ T8052] ip_set_alloc+0x24/0x30 [ 146.499888][ T8052] hash_netiface_create+0x282/0x740 [ 146.499963][ T8052] ? __pfx_hash_netiface_create+0x10/0x10 [ 146.500001][ T8052] ip_set_create+0x3cc/0x970 [ 146.500062][ T8052] ? __nla_parse+0x40/0x60 [ 146.500103][ T8052] nfnetlink_rcv_msg+0x4c6/0x590 [ 146.500220][ T8052] netlink_rcv_skb+0x120/0x220 [ 146.500257][ T8052] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 146.500346][ T8052] nfnetlink_rcv+0x167/0x16c0 [ 146.500369][ T8052] ? kmem_cache_free+0xe4/0x3d0 [ 146.500399][ T8052] ? __kfree_skb+0x109/0x150 [ 146.500426][ T8052] ? nlmon_xmit+0x4f/0x60 [ 146.500490][ T8052] ? consume_skb+0x49/0x150 [ 146.500524][ T8052] ? nlmon_xmit+0x4f/0x60 [ 146.500554][ T8052] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 146.500592][ T8052] ? __dev_queue_xmit+0x1200/0x2000 [ 146.500619][ T8052] ? __dev_queue_xmit+0x182/0x2000 [ 146.500740][ T8052] ? __pte_offset_map_lock+0x1d4/0x230 [ 146.500784][ T8052] ? ref_tracker_free+0x37d/0x3e0 [ 146.500834][ T8052] ? __netlink_deliver_tap+0x4dc/0x500 [ 146.500940][ T8052] netlink_unicast+0x5c0/0x690 [ 146.501071][ T8052] netlink_sendmsg+0x58b/0x6b0 [ 146.501186][ T8052] ? __pfx_netlink_sendmsg+0x10/0x10 [ 146.501218][ T8052] __sock_sendmsg+0x142/0x180 [ 146.501247][ T8052] ____sys_sendmsg+0x31e/0x4e0 [ 146.501421][ T8052] ___sys_sendmsg+0x17b/0x1d0 [ 146.501481][ T8052] __x64_sys_sendmsg+0xd4/0x160 [ 146.501523][ T8052] x64_sys_call+0x191e/0x3000 [ 146.501544][ T8052] do_syscall_64+0xd2/0x200 [ 146.501572][ T8052] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 146.501609][ T8052] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 146.501680][ T8052] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.501708][ T8052] RIP: 0033:0x7fb3349eeec9 [ 146.501724][ T8052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.501743][ T8052] RSP: 002b:00007fb33344f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 146.501764][ T8052] RAX: ffffffffffffffda RBX: 00007fb334c45fa0 RCX: 00007fb3349eeec9 [ 146.501793][ T8052] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000007 [ 146.501808][ T8052] RBP: 00007fb334a71f91 R08: 0000000000000000 R09: 0000000000000000 [ 146.501877][ T8052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 146.501894][ T8052] R13: 00007fb334c46038 R14: 00007fb334c45fa0 R15: 00007ffd08aec928 [ 146.501914][ T8052] [ 146.501921][ T8052] memory: usage 307200kB, limit 307200kB, failcnt 177 [ 146.867234][ T8052] memory+swap: usage 307384kB, limit 9007199254740988kB, failcnt 0 [ 146.875289][ T8052] kmem: usage 307188kB, limit 9007199254740988kB, failcnt 0 [ 146.882658][ T8052] Memory cgroup stats for /syz5: [ 146.885735][ T8052] cache 0 [ 146.893825][ T8052] rss 4096 [ 146.896937][ T8052] shmem 0 [ 146.899902][ T8052] mapped_file 0 [ 146.903484][ T8052] dirty 0 [ 146.906583][ T8052] writeback 0 [ 146.909978][ T8052] workingset_refault_anon 6 [ 146.914610][ T8052] workingset_refault_file 0 [ 146.919165][ T8052] swap 188416 [ 146.922532][ T8052] swapcached 12288 [ 146.926531][ T8052] pgpgin 55039 [ 146.929948][ T8052] pgpgout 55036 [ 146.933434][ T8052] pgfault 28625 [ 146.937139][ T8052] pgmajfault 3 [ 146.940529][ T8052] inactive_anon 12288 [ 146.944525][ T8052] active_anon 0 [ 146.948304][ T8052] inactive_file 0 [ 146.951977][ T8052] active_file 0 [ 146.955487][ T8052] unevictable 0 [ 146.959050][ T8052] hierarchical_memory_limit 314572800 [ 146.965340][ T8052] hierarchical_memsw_limit 9223372036854771712 [ 146.971871][ T8052] total_cache 0 [ 146.975458][ T8052] total_rss 4096 [ 146.979067][ T8052] total_shmem 0 [ 146.982557][ T8052] total_mapped_file 0 [ 146.986858][ T8052] total_dirty 0 [ 146.990421][ T8052] total_writeback 0 [ 146.994441][ T8052] total_workingset_refault_anon 6 [ 147.000134][ T8052] total_workingset_refault_file 0 [ 147.005433][ T8052] total_swap 188416 [ 147.009368][ T8052] total_swapcached 12288 [ 147.013719][ T8052] total_pgpgin 55039 [ 147.017735][ T8052] total_pgpgout 55036 [ 147.021771][ T8052] total_pgfault 28625 [ 147.025824][ T8052] total_pgmajfault 3 [ 147.029856][ T8052] total_inactive_anon 12288 [ 147.034439][ T8052] total_active_anon 0 [ 147.038486][ T8052] total_inactive_file 0 [ 147.042765][ T8052] total_active_file 0 [ 147.046820][ T8052] total_unevictable 0 [ 147.051465][ T8052] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz5,task_memcg=/syz5,task=syz.5.594,pid=8051,uid=0 [ 147.066190][ T8052] Memory cgroup out of memory: Killed process 8051 (syz.5.594) total-vm:96004kB, anon-rss:1088kB, file-rss:22440kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:1000 [ 147.696063][ T8100] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 148.665183][ T8123] netlink: 'syz.5.597': attribute type 7 has an invalid length. [ 148.673657][ T8123] netlink: 8 bytes leftover after parsing attributes in process `syz.5.597'. [ 150.525244][ T8158] tipc: Started in network mode [ 150.530390][ T8158] tipc: Node identity caf80769e5b7, cluster identity 4711 [ 150.537776][ T8158] tipc: Enabled bearer , priority 0 [ 150.593855][ T30] kauditd_printk_skb: 129 callbacks suppressed [ 150.593872][ T30] audit: type=1400 audit(1759494783.809:2696): avc: denied { ioctl } for pid=8157 comm="syz.5.606" path="socket:[21068]" dev="sockfs" ino=21068 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 150.627968][ T8158] syzkaller0: entered promiscuous mode [ 150.633811][ T8158] syzkaller0: entered allmulticast mode [ 150.666166][ T8158] tipc: Resetting bearer [ 150.673062][ T8158] netlink: 32 bytes leftover after parsing attributes in process `syz.5.606'. [ 150.736472][ T8158] 9pnet: p9_errstr2errno: server reported unknown error õ1 [ 150.746786][ T12] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 150.826312][ T12] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 150.905408][ T12] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 150.972727][ T8157] tipc: Resetting bearer [ 150.985823][ T8157] tipc: Disabling bearer [ 151.096767][ T12] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 151.133863][ T30] audit: type=1400 audit(1759494784.349:2697): avc: denied { create } for pid=8199 comm="syz.5.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 151.184849][ T30] audit: type=1400 audit(1759494784.379:2698): avc: denied { ioctl } for pid=8199 comm="syz.5.608" path="socket:[21102]" dev="sockfs" ino=21102 ioctlcmd=0x891c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 151.309712][ T8208] netlink: 'syz.5.609': attribute type 7 has an invalid length. [ 151.317601][ T8208] netlink: 8 bytes leftover after parsing attributes in process `syz.5.609'. [ 151.414531][ T12] bridge_slave_1: left allmulticast mode [ 151.420469][ T12] bridge_slave_1: left promiscuous mode [ 151.426315][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.474865][ T12] bridge_slave_0: left allmulticast mode [ 151.480715][ T12] bridge_slave_0: left promiscuous mode [ 151.486463][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.771845][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 151.782852][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 151.793119][ T12] bond0 (unregistering): Released all slaves [ 151.817747][ T8160] chnl_net:caif_netlink_parms(): no params data found [ 151.878793][ T12] hsr_slave_0: left promiscuous mode [ 151.888733][ T12] hsr_slave_1: left promiscuous mode [ 151.904952][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 151.912533][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 151.936719][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 151.944271][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 152.016982][ T12] veth1_macvtap: left promiscuous mode [ 152.031874][ T12] veth0_macvtap: left promiscuous mode [ 152.044541][ T12] veth1_vlan: left promiscuous mode [ 152.075355][ T30] audit: type=1326 audit(1759494785.299:2699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8240 comm="syz.5.613" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb3349eeec9 code=0x7ffc0000 [ 152.078936][ T12] veth0_vlan: left promiscuous mode [ 152.099376][ T30] audit: type=1326 audit(1759494785.299:2700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8240 comm="syz.5.613" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb3349eeec9 code=0x7ffc0000 [ 152.156136][ T8241] loop5: detected capacity change from 0 to 1024 [ 152.235287][ T8241] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 152.250571][ T30] audit: type=1326 audit(1759494785.359:2701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8240 comm="syz.5.613" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb3349eeec9 code=0x7ffc0000 [ 152.273891][ T30] audit: type=1326 audit(1759494785.359:2702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8240 comm="syz.5.613" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb3349eeec9 code=0x7ffc0000 [ 152.297996][ T30] audit: type=1326 audit(1759494785.359:2703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8240 comm="syz.5.613" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb3349eeec9 code=0x7ffc0000 [ 152.321504][ T30] audit: type=1326 audit(1759494785.359:2704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8240 comm="syz.5.613" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb3349eeec9 code=0x7ffc0000 [ 152.345286][ T30] audit: type=1326 audit(1759494785.359:2705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8240 comm="syz.5.613" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb3349eeec9 code=0x7ffc0000 [ 152.355411][ T8241] ext4 filesystem being mounted at /64/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 152.569694][ T12] team0 (unregistering): Port device team_slave_1 removed [ 152.602413][ T12] team0 (unregistering): Port device team_slave_0 removed [ 152.976483][ T6812] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 153.035510][ T8160] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.042895][ T8160] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.086188][ T8160] bridge_slave_0: entered allmulticast mode [ 153.107063][ T8160] bridge_slave_0: entered promiscuous mode [ 153.117717][ T8269] netlink: 4 bytes leftover after parsing attributes in process `syz.5.616'. [ 153.132190][ T8160] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.139363][ T8160] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.147045][ T8160] bridge_slave_1: entered allmulticast mode [ 153.161527][ T8160] bridge_slave_1: entered promiscuous mode [ 153.218364][ T8160] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 153.253405][ T8160] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 153.359010][ T12] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 153.380805][ T8289] loop5: detected capacity change from 0 to 1024 [ 153.389192][ T8289] EXT4-fs: Ignoring removed mblk_io_submit option [ 153.413755][ T8289] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 153.413774][ T8160] team0: Port device team_slave_0 added [ 153.446088][ T8160] team0: Port device team_slave_1 added [ 153.466735][ T8289] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 153.512031][ T12] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 153.555317][ T8160] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 153.562868][ T8160] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 153.589809][ T8160] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 153.694362][ T12] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 153.719343][ T8160] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 153.726927][ T8160] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 153.754359][ T8160] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 153.778257][ T8306] FAULT_INJECTION: forcing a failure. [ 153.778257][ T8306] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.792035][ T8306] CPU: 1 UID: 0 PID: 8306 Comm: syz.5.619 Not tainted syzkaller #0 PREEMPT(voluntary) [ 153.792138][ T8306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 153.792151][ T8306] Call Trace: [ 153.792156][ T8306] [ 153.792164][ T8306] __dump_stack+0x1d/0x30 [ 153.792210][ T8306] dump_stack_lvl+0xe8/0x140 [ 153.792290][ T8306] dump_stack+0x15/0x1b [ 153.792321][ T8306] should_fail_ex+0x265/0x280 [ 153.792354][ T8306] should_fail+0xb/0x20 [ 153.792426][ T8306] should_fail_usercopy+0x1a/0x20 [ 153.792472][ T8306] _copy_from_user+0x1c/0xb0 [ 153.792493][ T8306] load_msg+0x173/0x2f0 [ 153.792567][ T8306] do_msgsnd+0xdc/0xb00 [ 153.792589][ T8306] ? __rcu_read_unlock+0x4f/0x70 [ 153.792619][ T8306] __x64_sys_msgsnd+0xa8/0xc0 [ 153.792651][ T8306] x64_sys_call+0x17c1/0x3000 [ 153.792721][ T8306] do_syscall_64+0xd2/0x200 [ 153.792747][ T8306] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 153.792774][ T8306] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 153.792813][ T8306] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 153.792956][ T8306] RIP: 0033:0x7fb3349eeec9 [ 153.792978][ T8306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.793003][ T8306] RSP: 002b:00007fb33344f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000045 [ 153.793027][ T8306] RAX: ffffffffffffffda RBX: 00007fb334c45fa0 RCX: 00007fb3349eeec9 [ 153.793039][ T8306] RDX: 0000000000000000 RSI: 0000200000000380 RDI: 0000000000000000 [ 153.793052][ T8306] RBP: 00007fb33344f090 R08: 0000000000000000 R09: 0000000000000000 [ 153.793064][ T8306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.793087][ T8306] R13: 00007fb334c46038 R14: 00007fb334c45fa0 R15: 00007ffd08aec928 [ 153.793111][ T8306] [ 154.005620][ T12] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 154.059334][ T8160] hsr_slave_0: entered promiscuous mode [ 154.080043][ T8160] hsr_slave_1: entered promiscuous mode [ 154.096862][ T8160] debugfs: 'hsr0' already exists in 'hsr' [ 154.102657][ T8160] Cannot create hsr debugfs directory [ 154.279684][ T12] bridge_slave_1: left allmulticast mode [ 154.285440][ T12] bridge_slave_1: left promiscuous mode [ 154.291276][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.325568][ T12] bridge_slave_0: left allmulticast mode [ 154.331357][ T12] bridge_slave_0: left promiscuous mode [ 154.337296][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.520819][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 154.543287][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 154.565906][ T12] bond0 (unregistering): Released all slaves [ 154.586990][ T8260] chnl_net:caif_netlink_parms(): no params data found [ 154.760261][ T12] hsr_slave_0: left promiscuous mode [ 154.774791][ T12] hsr_slave_1: left promiscuous mode [ 154.780657][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 154.788545][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 154.815321][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 154.822843][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 154.827259][ T8349] FAULT_INJECTION: forcing a failure. [ 154.827259][ T8349] name failslab, interval 1, probability 0, space 0, times 0 [ 154.844216][ T8349] CPU: 0 UID: 0 PID: 8349 Comm: syz.5.624 Not tainted syzkaller #0 PREEMPT(voluntary) [ 154.844245][ T8349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 154.844262][ T8349] Call Trace: [ 154.844270][ T8349] [ 154.844278][ T8349] __dump_stack+0x1d/0x30 [ 154.844327][ T8349] dump_stack_lvl+0xe8/0x140 [ 154.844428][ T8349] dump_stack+0x15/0x1b [ 154.844469][ T8349] should_fail_ex+0x265/0x280 [ 154.844508][ T8349] should_failslab+0x8c/0xb0 [ 154.844608][ T8349] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 154.844641][ T8349] ? v9fs_session_init+0x4b/0xde0 [ 154.844681][ T8349] kstrdup+0x3e/0xd0 [ 154.844710][ T8349] v9fs_session_init+0x4b/0xde0 [ 154.844788][ T8349] ? __rcu_read_unlock+0x4f/0x70 [ 154.844819][ T8349] ? avc_has_perm_noaudit+0x1b1/0x200 [ 154.844854][ T8349] ? should_fail_ex+0xdb/0x280 [ 154.844889][ T8349] ? v9fs_mount+0x51/0x5c0 [ 154.844983][ T8349] ? should_failslab+0x8c/0xb0 [ 154.845009][ T8349] ? __kmalloc_cache_noprof+0x249/0x4a0 [ 154.845072][ T8349] v9fs_mount+0x67/0x5c0 [ 154.845236][ T8349] ? selinux_capable+0x31/0x40 [ 154.845268][ T8349] ? __pfx_v9fs_mount+0x10/0x10 [ 154.845349][ T8349] legacy_get_tree+0x78/0xd0 [ 154.845376][ T8349] vfs_get_tree+0x57/0x1d0 [ 154.845410][ T8349] do_new_mount+0x207/0x600 [ 154.845432][ T8349] ? security_capable+0x83/0x90 [ 154.845525][ T8349] path_mount+0x4a4/0xb30 [ 154.845550][ T8349] ? user_path_at+0x109/0x130 [ 154.845568][ T8349] __se_sys_mount+0x28f/0x2e0 [ 154.845670][ T8349] ? fput+0x8f/0xc0 [ 154.845760][ T8349] __x64_sys_mount+0x67/0x80 [ 154.845830][ T8349] x64_sys_call+0x2b51/0x3000 [ 154.845877][ T8349] do_syscall_64+0xd2/0x200 [ 154.845903][ T8349] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 154.845936][ T8349] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 154.846010][ T8349] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.846037][ T8349] RIP: 0033:0x7fb3349eeec9 [ 154.846057][ T8349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.846077][ T8349] RSP: 002b:00007fb33344f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 154.846096][ T8349] RAX: ffffffffffffffda RBX: 00007fb334c45fa0 RCX: 00007fb3349eeec9 [ 154.846114][ T8349] RDX: 0000200000000040 RSI: 0000200000000000 RDI: 0000000000000000 [ 154.846130][ T8349] RBP: 00007fb33344f090 R08: 0000200000000300 R09: 0000000000000000 [ 154.846196][ T8349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.846213][ T8349] R13: 00007fb334c46038 R14: 00007fb334c45fa0 R15: 00007ffd08aec928 [ 154.846239][ T8349] [ 155.124838][ T12] veth1_macvtap: left promiscuous mode [ 155.130475][ T12] veth0_macvtap: left promiscuous mode [ 155.136966][ T12] veth1_vlan: left promiscuous mode [ 155.142264][ T12] veth0_vlan: left promiscuous mode [ 155.429317][ T8260] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.436728][ T8260] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.456530][ T8260] bridge_slave_0: entered allmulticast mode [ 155.463301][ T8260] bridge_slave_0: entered promiscuous mode [ 155.471342][ T8260] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.478540][ T8260] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.486544][ T8260] bridge_slave_1: entered allmulticast mode [ 155.494540][ T8260] bridge_slave_1: entered promiscuous mode [ 155.547218][ T8260] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 155.603666][ T8260] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 155.667676][ T8260] team0: Port device team_slave_0 added [ 155.692237][ T8260] team0: Port device team_slave_1 added [ 155.747387][ T8260] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 155.755381][ T8260] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 155.783280][ T8260] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 155.811752][ T8260] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 155.818978][ T8260] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 155.845154][ T8260] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 155.899566][ T12] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 155.912947][ T8345] chnl_net:caif_netlink_parms(): no params data found [ 155.980014][ T12] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 155.997489][ T8260] hsr_slave_0: entered promiscuous mode [ 156.003896][ T8260] hsr_slave_1: entered promiscuous mode [ 156.010949][ T8260] debugfs: 'hsr0' already exists in 'hsr' [ 156.016869][ T8260] Cannot create hsr debugfs directory [ 156.045728][ T12] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 156.063446][ T8345] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.070931][ T8345] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.078932][ T8345] bridge_slave_0: entered allmulticast mode [ 156.094427][ T8345] bridge_slave_0: entered promiscuous mode [ 156.102096][ T8345] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.109426][ T8345] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.140221][ T8345] bridge_slave_1: entered allmulticast mode [ 156.147677][ T30] kauditd_printk_skb: 220 callbacks suppressed [ 156.147768][ T30] audit: type=1400 audit(1759494789.369:2926): avc: denied { create } for pid=8394 comm="syz.5.630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 156.175381][ T30] audit: type=1400 audit(1759494789.379:2927): avc: denied { ioctl } for pid=8394 comm="syz.5.630" path="socket:[22664]" dev="sockfs" ino=22664 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 156.193893][ T8345] bridge_slave_1: entered promiscuous mode [ 156.210775][ T8397] netlink: 'syz.5.631': attribute type 1 has an invalid length. [ 156.243046][ T12] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 156.263461][ T8397] 8021q: adding VLAN 0 to HW filter on device bond1 [ 156.270555][ T8399] netlink: 4 bytes leftover after parsing attributes in process `syz.5.631'. [ 156.272233][ T8160] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 156.310583][ T8399] bond1 (unregistering): Released all slaves [ 156.336990][ T8160] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 156.356946][ T8160] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 156.371518][ T8345] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.395237][ T8160] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 156.417465][ T8345] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.473527][ T8345] team0: Port device team_slave_0 added [ 156.519006][ T8345] team0: Port device team_slave_1 added [ 156.555455][ T8345] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 156.562619][ T8345] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 156.589175][ T8345] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 156.604583][ T8345] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 156.611677][ T8345] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 156.637991][ T8345] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 156.665580][ T12] bridge_slave_1: left allmulticast mode [ 156.671520][ T12] bridge_slave_1: left promiscuous mode [ 156.677516][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.685825][ T12] bridge_slave_0: left allmulticast mode [ 156.691500][ T12] bridge_slave_0: left promiscuous mode [ 156.697319][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.788402][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 156.798904][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 156.809273][ T12] bond0 (unregistering): Released all slaves [ 156.858199][ T12] hsr_slave_0: left promiscuous mode [ 156.864211][ T12] hsr_slave_1: left promiscuous mode [ 156.870830][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 156.878517][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 156.886371][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 156.893894][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 156.906567][ T12] veth1_macvtap: left promiscuous mode [ 156.913162][ T12] veth0_macvtap: left promiscuous mode [ 156.919145][ T12] veth1_vlan: left promiscuous mode [ 156.924916][ T12] veth0_vlan: left promiscuous mode [ 157.015934][ T12] team0 (unregistering): Port device team_slave_1 removed [ 157.029271][ T12] team0 (unregistering): Port device team_slave_0 removed [ 157.072547][ T8421] FAULT_INJECTION: forcing a failure. [ 157.072547][ T8421] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 157.086551][ T8421] CPU: 1 UID: 0 PID: 8421 Comm: syz.5.632 Not tainted syzkaller #0 PREEMPT(voluntary) [ 157.086583][ T8421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 157.086711][ T8421] Call Trace: [ 157.086720][ T8421] [ 157.086730][ T8421] __dump_stack+0x1d/0x30 [ 157.086777][ T8421] dump_stack_lvl+0xe8/0x140 [ 157.086864][ T8421] dump_stack+0x15/0x1b [ 157.086933][ T8421] should_fail_ex+0x265/0x280 [ 157.086964][ T8421] should_fail+0xb/0x20 [ 157.087038][ T8421] should_fail_usercopy+0x1a/0x20 [ 157.087116][ T8421] _copy_to_user+0x20/0xa0 [ 157.087145][ T8421] simple_read_from_buffer+0xb5/0x130 [ 157.087178][ T8421] proc_fail_nth_read+0x10e/0x150 [ 157.087251][ T8421] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 157.087310][ T8421] vfs_read+0x1a5/0x770 [ 157.087419][ T8421] ? __set_next_task_fair+0x5b/0x150 [ 157.087527][ T8421] ? __rcu_read_unlock+0x4f/0x70 [ 157.087559][ T8421] ? __fget_files+0x184/0x1c0 [ 157.087590][ T8421] ? finish_task_switch+0xad/0x2b0 [ 157.087695][ T8421] ksys_read+0xda/0x1a0 [ 157.087720][ T8421] __x64_sys_read+0x40/0x50 [ 157.087806][ T8421] x64_sys_call+0x27c0/0x3000 [ 157.087828][ T8421] do_syscall_64+0xd2/0x200 [ 157.087877][ T8421] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 157.087913][ T8421] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 157.087958][ T8421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 157.088002][ T8421] RIP: 0033:0x7fb3349ed8dc [ 157.088018][ T8421] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 157.088038][ T8421] RSP: 002b:00007fb33344f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 157.088057][ T8421] RAX: ffffffffffffffda RBX: 00007fb334c45fa0 RCX: 00007fb3349ed8dc [ 157.088070][ T8421] RDX: 000000000000000f RSI: 00007fb33344f0a0 RDI: 0000000000000003 [ 157.088082][ T8421] RBP: 00007fb33344f090 R08: 0000000000000000 R09: 0000000000000000 [ 157.088118][ T8421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 157.088135][ T8421] R13: 00007fb334c46038 R14: 00007fb334c45fa0 R15: 00007ffd08aec928 [ 157.088162][ T8421] [ 157.375576][ T30] audit: type=1400 audit(1759494790.599:2928): avc: denied { name_connect } for pid=8428 comm="syz.5.635" dest=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 157.416973][ T8345] hsr_slave_0: entered promiscuous mode [ 157.423313][ T8345] hsr_slave_1: entered promiscuous mode [ 157.429791][ T8345] debugfs: 'hsr0' already exists in 'hsr' [ 157.435704][ T8345] Cannot create hsr debugfs directory [ 157.506386][ T8438] loop5: detected capacity change from 0 to 512 [ 157.518612][ T8438] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 157.537617][ T8438] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 157.558928][ T8438] EXT4-fs (loop5): warning: checktime reached, running e2fsck is recommended [ 157.569079][ T8438] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 157.578450][ T8438] System zones: 0-2, 18-18, 34-34 [ 157.584293][ T8438] EXT4-fs error (device loop5): ext4_orphan_get:1392: inode #15: comm syz.5.636: iget: bad i_size value: 360287970189639680 [ 157.611441][ T8160] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.619278][ T8438] EXT4-fs error (device loop5): ext4_orphan_get:1397: comm syz.5.636: couldn't read orphan inode 15 (err -117) [ 157.649725][ T8438] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 157.664598][ T8438] EXT4-fs error (device loop5): ext4_readdir:264: inode #2: block 3: comm syz.5.636: path /84/file2: bad entry in directory: inode out of bounds - offset=0, inode=63, rec_len=12, size=4096 fake=1 [ 157.688721][ T8160] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.705833][ T2851] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.713116][ T2851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.724669][ T2851] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.732666][ T2851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.813957][ T8438] hub 8-0:1.0: USB hub found [ 157.819576][ T8438] hub 8-0:1.0: 8 ports detected [ 157.835158][ T12] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 157.884176][ T8260] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 157.907744][ T8260] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 157.926520][ T12] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 157.937768][ T6812] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 157.965465][ T8260] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 157.978393][ T8260] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 157.990492][ T8425] chnl_net:caif_netlink_parms(): no params data found [ 158.004157][ T12] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 158.048437][ T8160] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.084964][ T12] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 158.098971][ T8425] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.106379][ T8425] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.115112][ T8425] bridge_slave_0: entered allmulticast mode [ 158.121978][ T8425] bridge_slave_0: entered promiscuous mode [ 158.139760][ T8425] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.147067][ T8425] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.155926][ T8425] bridge_slave_1: entered allmulticast mode [ 158.162992][ T8425] bridge_slave_1: entered promiscuous mode [ 158.230115][ T8260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.251525][ T8425] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 158.271123][ T8425] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 158.290700][ T12] bridge_slave_1: left allmulticast mode [ 158.297080][ T12] bridge_slave_1: left promiscuous mode [ 158.302853][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.310647][ T12] bridge_slave_0: left allmulticast mode [ 158.316519][ T12] bridge_slave_0: left promiscuous mode [ 158.322266][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.417319][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 158.427408][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 158.436927][ T12] bond0 (unregistering): Released all slaves [ 158.446407][ T8260] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.469049][ T8425] team0: Port device team_slave_0 added [ 158.479976][ T2851] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.487114][ T2851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.502478][ T8425] team0: Port device team_slave_1 added [ 158.515458][ T12] tipc: Left network mode [ 158.522440][ T8345] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 158.536706][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.543904][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.612404][ T8425] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 158.619751][ T8425] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 158.646065][ T8425] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 158.657275][ T8345] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 158.670282][ T8160] veth0_vlan: entered promiscuous mode [ 158.681719][ T8506] bond1: entered promiscuous mode [ 158.687580][ T8506] 8021q: adding VLAN 0 to HW filter on device bond1 [ 158.697434][ T12] hsr_slave_0: left promiscuous mode [ 158.703390][ T12] hsr_slave_1: left promiscuous mode [ 158.709452][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 158.717430][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 158.725162][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 158.735976][ T12] veth1_macvtap: left promiscuous mode [ 158.741502][ T30] audit: type=1400 audit(1759494791.959:2929): avc: denied { create } for pid=8505 comm="syz.5.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 158.744873][ T12] veth1_vlan: left promiscuous mode [ 158.767372][ T12] @ÿ: left promiscuous mode [ 158.834300][ T8515] netlink: 'syz.5.642': attribute type 6 has an invalid length. [ 158.860459][ T12] team0 (unregistering): Port device team_slave_1 removed [ 158.870380][ T12] team0 (unregistering): Port device team_slave_0 removed [ 158.903955][ T8425] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 158.911064][ T8425] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 158.937520][ T8425] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 158.948895][ T8345] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 158.957964][ T8345] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 158.997904][ T8160] veth1_vlan: entered promiscuous mode [ 159.030477][ T8425] hsr_slave_0: entered promiscuous mode [ 159.037488][ T8425] hsr_slave_1: entered promiscuous mode [ 159.043429][ T8425] debugfs: 'hsr0' already exists in 'hsr' [ 159.049439][ T8425] Cannot create hsr debugfs directory [ 159.108130][ T8160] veth0_macvtap: entered promiscuous mode [ 159.120810][ T8160] veth1_macvtap: entered promiscuous mode [ 159.150509][ T8160] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 159.178820][ T8260] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.196799][ T8160] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 159.226396][ T41] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.237551][ T41] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.256056][ T41] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.265365][ T41] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.289546][ T8345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.325750][ T8345] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.350531][ T8260] veth0_vlan: entered promiscuous mode [ 159.365027][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.368662][ T8540] netlink: 332 bytes leftover after parsing attributes in process `syz.8.607'. [ 159.372237][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.400110][ T8260] veth1_vlan: entered promiscuous mode [ 159.411212][ T56] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.418410][ T56] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.443293][ T8345] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 159.454062][ T8345] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 159.505700][ T8260] veth0_macvtap: entered promiscuous mode [ 159.525480][ T8548] bond1: entered promiscuous mode [ 159.530788][ T8548] 8021q: adding VLAN 0 to HW filter on device bond1 [ 159.540147][ T8260] veth1_macvtap: entered promiscuous mode [ 159.547983][ T8425] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 159.561933][ T8425] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 159.581125][ T8425] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 159.590531][ T8425] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 159.615471][ T8260] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 159.640866][ T8345] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.648890][ T8260] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 159.672451][ T41] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.687176][ T41] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.701259][ T30] audit: type=1400 audit(1759494792.919:2930): avc: denied { connect } for pid=8560 comm="syz.8.648" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 159.750269][ T41] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.772672][ T41] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.787370][ T8425] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.833875][ T8425] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.865568][ T56] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.872799][ T56] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.921812][ T56] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.929005][ T56] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.976256][ T8584] bridge: RTM_NEWNEIGH with invalid ether address [ 160.087612][ T8345] veth0_vlan: entered promiscuous mode [ 160.109843][ T8345] veth1_vlan: entered promiscuous mode [ 160.166314][ T8345] veth0_macvtap: entered promiscuous mode [ 160.192519][ T8345] veth1_macvtap: entered promiscuous mode [ 160.200896][ T8604] loop8: detected capacity change from 0 to 2048 [ 160.226399][ T8345] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 160.266627][ T8425] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.297427][ T8345] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 160.316317][ T8610] FAULT_INJECTION: forcing a failure. [ 160.316317][ T8610] name failslab, interval 1, probability 0, space 0, times 0 [ 160.329388][ T8610] CPU: 1 UID: 0 PID: 8610 Comm: syz.8.652 Not tainted syzkaller #0 PREEMPT(voluntary) [ 160.329493][ T8610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 160.329514][ T8610] Call Trace: [ 160.329522][ T8610] [ 160.329531][ T8610] __dump_stack+0x1d/0x30 [ 160.329674][ T8610] dump_stack_lvl+0xe8/0x140 [ 160.329721][ T8610] dump_stack+0x15/0x1b [ 160.329763][ T8610] should_fail_ex+0x265/0x280 [ 160.329812][ T8610] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 160.329917][ T8610] should_failslab+0x8c/0xb0 [ 160.329966][ T8610] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 160.330058][ T8610] ? shmem_alloc_inode+0x34/0x50 [ 160.330079][ T8610] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 160.330180][ T8610] shmem_alloc_inode+0x34/0x50 [ 160.330206][ T8610] alloc_inode+0x3d/0x170 [ 160.330233][ T8610] new_inode+0x1d/0xe0 [ 160.330264][ T8610] shmem_get_inode+0x244/0x750 [ 160.330337][ T8610] shmem_mknod+0x46/0x180 [ 160.330368][ T8610] shmem_rename2+0x159/0x290 [ 160.330397][ T8610] ? __pfx_shmem_rename2+0x10/0x10 [ 160.330421][ T8610] vfs_rename+0x7e8/0xa30 [ 160.330501][ T8610] do_renameat2+0x52a/0x9e0 [ 160.330552][ T8610] __x64_sys_renameat2+0x7e/0x90 [ 160.330606][ T8610] x64_sys_call+0x3f9/0x3000 [ 160.330628][ T8610] do_syscall_64+0xd2/0x200 [ 160.330656][ T8610] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 160.330692][ T8610] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 160.330819][ T8610] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 160.330864][ T8610] RIP: 0033:0x7f947e2eeec9 [ 160.330881][ T8610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.330930][ T8610] RSP: 002b:00007f947cd4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 160.330956][ T8610] RAX: ffffffffffffffda RBX: 00007f947e545fa0 RCX: 00007f947e2eeec9 [ 160.330974][ T8610] RDX: ffffffffffffff9c RSI: 0000200000000440 RDI: ffffffffffffff9c [ 160.331065][ T8610] RBP: 00007f947cd4f090 R08: 0000000000000004 R09: 0000000000000000 [ 160.331078][ T8610] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.331090][ T8610] R13: 00007f947e546038 R14: 00007f947e545fa0 R15: 00007ffe06321668 [ 160.331114][ T8610] [ 160.573255][ T41] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.582531][ T41] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.597385][ T2851] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.647189][ T2851] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.714911][ T8621] FAULT_INJECTION: forcing a failure. [ 160.714911][ T8621] name failslab, interval 1, probability 0, space 0, times 0 [ 160.727775][ T8621] CPU: 0 UID: 0 PID: 8621 Comm: syz.8.653 Not tainted syzkaller #0 PREEMPT(voluntary) [ 160.727805][ T8621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 160.727817][ T8621] Call Trace: [ 160.727824][ T8621] [ 160.727833][ T8621] __dump_stack+0x1d/0x30 [ 160.727906][ T8621] dump_stack_lvl+0xe8/0x140 [ 160.727952][ T8621] dump_stack+0x15/0x1b [ 160.728072][ T8621] should_fail_ex+0x265/0x280 [ 160.728113][ T8621] should_failslab+0x8c/0xb0 [ 160.728200][ T8621] kmem_cache_alloc_noprof+0x50/0x480 [ 160.728236][ T8621] ? skb_clone+0x151/0x1f0 [ 160.728276][ T8621] skb_clone+0x151/0x1f0 [ 160.728373][ T8621] dev_queue_xmit_nit+0x146/0x680 [ 160.728405][ T8621] ? obj_cgroup_charge_account+0x122/0x1a0 [ 160.728491][ T8621] dev_hard_start_xmit+0xd3/0x3e0 [ 160.728518][ T8621] ? validate_xmit_skb+0x7c1/0x980 [ 160.728551][ T8621] __dev_queue_xmit+0x10f9/0x2000 [ 160.728594][ T8621] ? __dev_queue_xmit+0x182/0x2000 [ 160.728640][ T8621] ? __skb_clone+0x2a6/0x2d0 [ 160.728673][ T8621] __netlink_deliver_tap+0x3c3/0x500 [ 160.728709][ T8621] netlink_unicast+0x66b/0x690 [ 160.728759][ T8621] netlink_sendmsg+0x58b/0x6b0 [ 160.728796][ T8621] ? __pfx_netlink_sendmsg+0x10/0x10 [ 160.728827][ T8621] __sock_sendmsg+0x142/0x180 [ 160.728854][ T8621] ____sys_sendmsg+0x31e/0x4e0 [ 160.728905][ T8621] ___sys_sendmsg+0x17b/0x1d0 [ 160.728953][ T8621] __x64_sys_sendmsg+0xd4/0x160 [ 160.728999][ T8621] x64_sys_call+0x191e/0x3000 [ 160.729089][ T8621] do_syscall_64+0xd2/0x200 [ 160.729118][ T8621] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 160.729166][ T8621] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 160.729204][ T8621] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 160.729228][ T8621] RIP: 0033:0x7f947e2eeec9 [ 160.729296][ T8621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.729315][ T8621] RSP: 002b:00007f947cd4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 160.729335][ T8621] RAX: ffffffffffffffda RBX: 00007f947e545fa0 RCX: 00007f947e2eeec9 [ 160.729403][ T8621] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 0000000000000013 [ 160.729420][ T8621] RBP: 00007f947cd4f090 R08: 0000000000000000 R09: 0000000000000000 [ 160.729437][ T8621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.729454][ T8621] R13: 00007f947e546038 R14: 00007f947e545fa0 R15: 00007ffe06321668 [ 160.729481][ T8621] [ 161.113270][ T8425] veth0_vlan: entered promiscuous mode [ 161.140256][ T8425] veth1_vlan: entered promiscuous mode [ 161.175285][ T8639] netlink: 12 bytes leftover after parsing attributes in process `syz.3.657'. [ 161.192139][ T8425] veth0_macvtap: entered promiscuous mode [ 161.212859][ T30] audit: type=1400 audit(1759494794.429:2931): avc: denied { read append } for pid=8638 comm="syz.3.657" name="event1" dev="devtmpfs" ino=243 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 161.219606][ T8425] veth1_macvtap: entered promiscuous mode [ 161.237305][ T30] audit: type=1400 audit(1759494794.429:2932): avc: denied { open } for pid=8638 comm="syz.3.657" path="/dev/input/event1" dev="devtmpfs" ino=243 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 161.269016][ T30] audit: type=1400 audit(1759494794.489:2933): avc: denied { ioctl } for pid=8638 comm="syz.3.657" path="/dev/input/event1" dev="devtmpfs" ino=243 ioctlcmd=0x450a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 161.298248][ T8639] netlink: 24 bytes leftover after parsing attributes in process `syz.3.657'. [ 161.447728][ T8425] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 161.460066][ T8425] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 161.489709][ T8656] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 161.503484][ T2851] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.519050][ T2851] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.558587][ T2851] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.586548][ T30] audit: type=1326 audit(1759494794.809:2934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8663 comm="syz.3.660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ffa69eec9 code=0x7ffc0000 [ 161.586622][ T30] audit: type=1326 audit(1759494794.809:2935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8663 comm="syz.3.660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ffa69eec9 code=0x7ffc0000 [ 161.586884][ T30] audit: type=1326 audit(1759494794.809:2936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8663 comm="syz.3.660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f7ffa6a0e1a code=0x7ffc0000 [ 161.588382][ T30] audit: type=1326 audit(1759494794.809:2937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8663 comm="syz.3.660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7ffa69d710 code=0x7ffc0000 [ 161.588420][ T30] audit: type=1326 audit(1759494794.809:2938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8663 comm="syz.3.660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f7ffa69d97f code=0x7ffc0000 [ 161.589220][ T2851] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.643438][ T30] audit: type=1400 audit(1759494794.859:2939): avc: denied { create } for pid=8673 comm="syz.2.661" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 161.766716][ T30] audit: type=1400 audit(1759494794.939:2940): avc: denied { write } for pid=8673 comm="syz.2.661" name="file0" dev="tmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 162.102050][ T8708] sctp: [Deprecated]: syz.2.664 (pid 8708) Use of struct sctp_assoc_value in delayed_ack socket option. [ 162.102050][ T8708] Use struct sctp_sack_info instead [ 162.359333][ T8719] FAULT_INJECTION: forcing a failure. [ 162.359333][ T8719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 162.373007][ T8719] CPU: 0 UID: 0 PID: 8719 Comm: syz.3.668 Not tainted syzkaller #0 PREEMPT(voluntary) [ 162.373109][ T8719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 162.373125][ T8719] Call Trace: [ 162.373134][ T8719] [ 162.373143][ T8719] __dump_stack+0x1d/0x30 [ 162.373190][ T8719] dump_stack_lvl+0xe8/0x140 [ 162.373264][ T8719] dump_stack+0x15/0x1b [ 162.373366][ T8719] should_fail_ex+0x265/0x280 [ 162.373462][ T8719] should_fail+0xb/0x20 [ 162.373498][ T8719] should_fail_usercopy+0x1a/0x20 [ 162.373597][ T8719] strncpy_from_user+0x25/0x230 [ 162.373697][ T8719] ? kmem_cache_alloc_noprof+0x242/0x480 [ 162.373763][ T8719] ? getname_flags+0x80/0x3b0 [ 162.373847][ T8719] getname_flags+0xae/0x3b0 [ 162.373895][ T8719] do_sys_openat2+0x60/0x110 [ 162.373922][ T8719] __x64_sys_creat+0x65/0x90 [ 162.374029][ T8719] x64_sys_call+0x2da3/0x3000 [ 162.374135][ T8719] do_syscall_64+0xd2/0x200 [ 162.374158][ T8719] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 162.374216][ T8719] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 162.374262][ T8719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 162.374292][ T8719] RIP: 0033:0x7f7ffa69eec9 [ 162.374312][ T8719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.374339][ T8719] RSP: 002b:00007f7ff90ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 162.374362][ T8719] RAX: ffffffffffffffda RBX: 00007f7ffa8f5fa0 RCX: 00007f7ffa69eec9 [ 162.374379][ T8719] RDX: 0000000000000000 RSI: 0000000000000028 RDI: 0000200000000300 [ 162.374448][ T8719] RBP: 00007f7ff90ff090 R08: 0000000000000000 R09: 0000000000000000 [ 162.374461][ T8719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 162.374473][ T8719] R13: 00007f7ffa8f6038 R14: 00007f7ffa8f5fa0 R15: 00007ffd7f9424d8 [ 162.374494][ T8719] [ 162.750287][ T8742] netlink: 256 bytes leftover after parsing attributes in process `syz.3.670'. [ 162.798159][ T8746] FAULT_INJECTION: forcing a failure. [ 162.798159][ T8746] name failslab, interval 1, probability 0, space 0, times 0 [ 162.811082][ T8746] CPU: 1 UID: 0 PID: 8746 Comm: syz.8.671 Not tainted syzkaller #0 PREEMPT(voluntary) [ 162.811172][ T8746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 162.811190][ T8746] Call Trace: [ 162.811198][ T8746] [ 162.811207][ T8746] __dump_stack+0x1d/0x30 [ 162.811255][ T8746] dump_stack_lvl+0xe8/0x140 [ 162.811330][ T8746] dump_stack+0x15/0x1b [ 162.811371][ T8746] should_fail_ex+0x265/0x280 [ 162.811401][ T8746] ? tcf_action_init_1+0x11e/0x4a0 [ 162.811420][ T8746] should_failslab+0x8c/0xb0 [ 162.811467][ T8746] __kmalloc_cache_noprof+0x4c/0x4a0 [ 162.811508][ T8746] tcf_action_init_1+0x11e/0x4a0 [ 162.811568][ T8746] tcf_action_init+0x267/0x6d0 [ 162.811602][ T8746] ? __rcu_read_unlock+0x34/0x70 [ 162.811693][ T8746] tc_ctl_action+0x291/0x830 [ 162.811748][ T8746] ? __pfx_tc_ctl_action+0x10/0x10 [ 162.811774][ T8746] rtnetlink_rcv_msg+0x65a/0x6d0 [ 162.811822][ T8746] netlink_rcv_skb+0x120/0x220 [ 162.811901][ T8746] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 162.811956][ T8746] rtnetlink_rcv+0x1c/0x30 [ 162.811998][ T8746] netlink_unicast+0x5c0/0x690 [ 162.812139][ T8746] netlink_sendmsg+0x58b/0x6b0 [ 162.812181][ T8746] ? __pfx_netlink_sendmsg+0x10/0x10 [ 162.812220][ T8746] __sock_sendmsg+0x142/0x180 [ 162.812257][ T8746] ____sys_sendmsg+0x31e/0x4e0 [ 162.812290][ T8746] ___sys_sendmsg+0x17b/0x1d0 [ 162.812374][ T8746] __x64_sys_sendmsg+0xd4/0x160 [ 162.812420][ T8746] x64_sys_call+0x191e/0x3000 [ 162.812445][ T8746] do_syscall_64+0xd2/0x200 [ 162.812466][ T8746] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 162.812541][ T8746] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 162.812645][ T8746] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 162.812668][ T8746] RIP: 0033:0x7f947e2eeec9 [ 162.812744][ T8746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.812816][ T8746] RSP: 002b:00007f947cd4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 162.812843][ T8746] RAX: ffffffffffffffda RBX: 00007f947e545fa0 RCX: 00007f947e2eeec9 [ 162.812859][ T8746] RDX: 0000000000000000 RSI: 00002000000037c0 RDI: 0000000000000003 [ 162.812876][ T8746] RBP: 00007f947cd4f090 R08: 0000000000000000 R09: 0000000000000000 [ 162.812926][ T8746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 162.812943][ T8746] R13: 00007f947e546038 R14: 00007f947e545fa0 R15: 00007ffe06321668 [ 162.812970][ T8746] [ 163.320472][ T8770] loop3: detected capacity change from 0 to 128 [ 163.358256][ T8770] FAT-fs (loop3): Directory bread(block 32) failed [ 163.366778][ T8770] FAT-fs (loop3): Directory bread(block 33) failed [ 163.376699][ T8770] FAT-fs (loop3): Directory bread(block 34) failed [ 163.390109][ T8770] FAT-fs (loop3): Directory bread(block 35) failed [ 163.410066][ T8770] FAT-fs (loop3): Directory bread(block 36) failed [ 163.426957][ T8770] FAT-fs (loop3): Directory bread(block 37) failed [ 163.442308][ T8770] FAT-fs (loop3): Directory bread(block 38) failed [ 163.458896][ T8770] FAT-fs (loop3): Directory bread(block 39) failed [ 163.474432][ T8770] FAT-fs (loop3): Directory bread(block 40) failed [ 163.492094][ T8770] FAT-fs (loop3): Directory bread(block 41) failed [ 163.570166][ T8770] bio_check_eod: 102 callbacks suppressed [ 163.570257][ T8770] syz.3.676: attempt to access beyond end of device [ 163.570257][ T8770] loop3: rw=0, sector=4112, nr_sectors = 4 limit=128 [ 163.589896][ T8770] Buffer I/O error on dev loop3, logical block 1028, async page read [ 163.616972][ T8770] syz.3.676: attempt to access beyond end of device [ 163.616972][ T8770] loop3: rw=0, sector=167964, nr_sectors = 4 limit=128 [ 163.631075][ T8770] Buffer I/O error on dev loop3, logical block 41991, async page read [ 163.664787][ T8770] FAT-fs (loop3): Filesystem has been set read-only [ 163.681515][ T8770] syz.3.676: attempt to access beyond end of device [ 163.681515][ T8770] loop3: rw=0, sector=4112, nr_sectors = 4 limit=128 [ 163.694902][ T8770] Buffer I/O error on dev loop3, logical block 1028, async page read [ 163.720266][ T8770] syz.3.676: attempt to access beyond end of device [ 163.720266][ T8770] loop3: rw=0, sector=167964, nr_sectors = 4 limit=128 [ 163.734091][ T8770] Buffer I/O error on dev loop3, logical block 41991, async page read [ 164.385889][ T8850] loop3: detected capacity change from 0 to 128 [ 164.400020][ T8850] FAT-fs (loop3): Directory bread(block 32) failed [ 164.434753][ T8850] FAT-fs (loop3): Directory bread(block 33) failed [ 164.441416][ T8850] FAT-fs (loop3): Directory bread(block 34) failed [ 164.454879][ T8850] FAT-fs (loop3): Directory bread(block 35) failed [ 164.464984][ T8850] FAT-fs (loop3): Directory bread(block 36) failed [ 164.471686][ T8850] FAT-fs (loop3): Directory bread(block 37) failed [ 164.514633][ T8850] FAT-fs (loop3): Directory bread(block 38) failed [ 164.543741][ T8850] FAT-fs (loop3): Directory bread(block 39) failed [ 164.573169][ T8850] FAT-fs (loop3): Directory bread(block 40) failed [ 164.596688][ T8850] FAT-fs (loop3): Directory bread(block 41) failed [ 164.654420][ T8850] FAULT_INJECTION: forcing a failure. [ 164.654420][ T8850] name failslab, interval 1, probability 0, space 0, times 0 [ 164.667967][ T8850] CPU: 1 UID: 0 PID: 8850 Comm: syz.3.679 Not tainted syzkaller #0 PREEMPT(voluntary) [ 164.667994][ T8850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 164.668011][ T8850] Call Trace: [ 164.668018][ T8850] [ 164.668027][ T8850] __dump_stack+0x1d/0x30 [ 164.668073][ T8850] dump_stack_lvl+0xe8/0x140 [ 164.668119][ T8850] dump_stack+0x15/0x1b [ 164.668227][ T8850] should_fail_ex+0x265/0x280 [ 164.668268][ T8850] should_failslab+0x8c/0xb0 [ 164.668380][ T8850] kmem_cache_alloc_noprof+0x50/0x480 [ 164.668492][ T8850] ? getname_flags+0x80/0x3b0 [ 164.668522][ T8850] getname_flags+0x80/0x3b0 [ 164.668560][ T8850] getname_uflags+0x21/0x30 [ 164.668609][ T8850] __x64_sys_execveat+0x5d/0x90 [ 164.668642][ T8850] x64_sys_call+0x1fec/0x3000 [ 164.668666][ T8850] do_syscall_64+0xd2/0x200 [ 164.668711][ T8850] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 164.668741][ T8850] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 164.668782][ T8850] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 164.668826][ T8850] RIP: 0033:0x7f7ffa69eec9 [ 164.668842][ T8850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 164.668861][ T8850] RSP: 002b:00007f7ff90ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 164.668880][ T8850] RAX: ffffffffffffffda RBX: 00007f7ffa8f5fa0 RCX: 00007f7ffa69eec9 [ 164.668893][ T8850] RDX: 0000000000000000 RSI: 0000200000000280 RDI: ffffffffffffff9c [ 164.668910][ T8850] RBP: 00007f7ff90ff090 R08: 0000000000000000 R09: 0000000000000000 [ 164.668931][ T8850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 164.668947][ T8850] R13: 00007f7ffa8f6038 R14: 00007f7ffa8f5fa0 R15: 00007ffd7f9424d8 [ 164.668973][ T8850] [ 165.160703][ T8883] FAULT_INJECTION: forcing a failure. [ 165.160703][ T8883] name failslab, interval 1, probability 0, space 0, times 0 [ 165.173636][ T8883] CPU: 0 UID: 0 PID: 8883 Comm: syz.2.682 Not tainted syzkaller #0 PREEMPT(voluntary) [ 165.173671][ T8883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 165.173782][ T8883] Call Trace: [ 165.173790][ T8883] [ 165.173801][ T8883] __dump_stack+0x1d/0x30 [ 165.173850][ T8883] dump_stack_lvl+0xe8/0x140 [ 165.173893][ T8883] dump_stack+0x15/0x1b [ 165.173925][ T8883] should_fail_ex+0x265/0x280 [ 165.173974][ T8883] should_failslab+0x8c/0xb0 [ 165.174011][ T8883] kmem_cache_alloc_noprof+0x50/0x480 [ 165.174117][ T8883] ? audit_log_start+0x342/0x720 [ 165.174160][ T8883] audit_log_start+0x342/0x720 [ 165.174265][ T8883] ? kstrtouint+0x76/0xc0 [ 165.174301][ T8883] audit_seccomp+0x48/0x100 [ 165.174330][ T8883] ? __seccomp_filter+0x82d/0x1250 [ 165.174391][ T8883] __seccomp_filter+0x83e/0x1250 [ 165.174461][ T8883] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 165.174500][ T8883] ? vfs_write+0x7e8/0x960 [ 165.174531][ T8883] ? __rcu_read_unlock+0x4f/0x70 [ 165.174591][ T8883] ? __fget_files+0x184/0x1c0 [ 165.174624][ T8883] __secure_computing+0x82/0x150 [ 165.174659][ T8883] syscall_trace_enter+0xcf/0x1e0 [ 165.174701][ T8883] do_syscall_64+0xac/0x200 [ 165.174734][ T8883] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 165.174764][ T8883] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 165.174884][ T8883] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 165.174913][ T8883] RIP: 0033:0x7f59f567eec9 [ 165.174933][ T8883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.174964][ T8883] RSP: 002b:00007f59f40e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000000c [ 165.174989][ T8883] RAX: ffffffffffffffda RBX: 00007f59f58d5fa0 RCX: 00007f59f567eec9 [ 165.175006][ T8883] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055555ede5ffe [ 165.175057][ T8883] RBP: 00007f59f40e7090 R08: 0000000000000000 R09: 0000000000000000 [ 165.175074][ T8883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.175224][ T8883] R13: 00007f59f58d6038 R14: 00007f59f58d5fa0 R15: 00007ffdb7bd6f68 [ 165.175248][ T8883] [ 165.896941][ T8929] bond1: entered promiscuous mode [ 165.902294][ T8929] 8021q: adding VLAN 0 to HW filter on device bond1 [ 166.325029][ T30] kauditd_printk_skb: 84 callbacks suppressed [ 166.325048][ T30] audit: type=1400 audit(1759494799.549:3023): avc: denied { bind } for pid=8972 comm="syz.3.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 166.397655][ T41] tipc: Subscription rejected, illegal request [ 166.416235][ T8975] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.509347][ T8975] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.581112][ T8975] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.719384][ T8975] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.830128][ T2248] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.856652][ T2248] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.882236][ T2248] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.906249][ T2851] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.318507][ T30] audit: type=1400 audit(1759494800.539:3024): avc: denied { write } for pid=9012 comm="syz.3.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 167.403273][ T9020] loop3: detected capacity change from 0 to 1024 [ 167.458558][ T9020] EXT4-fs (loop3): stripe (507) is not aligned with cluster size (16), stripe is disabled [ 167.468707][ T9020] EXT4-fs warning (device loop3): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 167.702934][ T9037] netlink: 'syz.3.697': attribute type 39 has an invalid length. [ 167.800188][ T9046] bond2: entered promiscuous mode [ 167.835143][ T9046] 8021q: adding VLAN 0 to HW filter on device bond2 [ 167.933963][ T9067] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 168.656432][ T4830] kernel write not supported for file /register (pid: 4830 comm: kworker/1:9) [ 168.759708][ T9118] loop2: detected capacity change from 0 to 512 [ 168.852657][ T9118] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 168.904821][ T9118] ext4 filesystem being mounted at /23/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 168.920605][ T30] audit: type=1400 audit(1759494802.139:3025): avc: denied { remount } for pid=9116 comm="syz.2.705" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 168.925545][ T9118] EXT4-fs (loop2): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 169.052732][ T8425] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 169.125886][ T9147] vhci_hcd: invalid port number 236 [ 169.135812][ T9147] netlink: 4 bytes leftover after parsing attributes in process `syz.2.707'. [ 169.222110][ T30] audit: type=1326 audit(1759494802.419:3026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9146 comm="syz.2.707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 169.246245][ T30] audit: type=1326 audit(1759494802.419:3027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9146 comm="syz.2.707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 169.269619][ T30] audit: type=1326 audit(1759494802.419:3028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9146 comm="syz.2.707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 169.293192][ T30] audit: type=1326 audit(1759494802.419:3029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9146 comm="syz.2.707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 169.316999][ T30] audit: type=1326 audit(1759494802.419:3030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9146 comm="syz.2.707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 169.341209][ T30] audit: type=1326 audit(1759494802.419:3031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9146 comm="syz.2.707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 169.364719][ T30] audit: type=1326 audit(1759494802.419:3032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9146 comm="syz.2.707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 169.682228][ T9173] bond4: entered promiscuous mode [ 169.694858][ T9173] 8021q: adding VLAN 0 to HW filter on device bond4 [ 169.741711][ T9181] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 170.401318][ T9218] usb usb8: usbfs: interface 0 claimed by hub while 'syz.2.715' resets device [ 170.638293][ T9235] netlink: 44 bytes leftover after parsing attributes in process `syz.2.716'. [ 171.127890][ T9264] lo speed is unknown, defaulting to 1000 [ 171.155016][ T9264] lo speed is unknown, defaulting to 1000 [ 171.161190][ T9264] lo speed is unknown, defaulting to 1000 [ 171.501665][ T9273] FAULT_INJECTION: forcing a failure. [ 171.501665][ T9273] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 171.514797][ T9273] CPU: 1 UID: 0 PID: 9273 Comm: syz.3.718 Not tainted syzkaller #0 PREEMPT(voluntary) [ 171.514827][ T9273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 171.514841][ T9273] Call Trace: [ 171.514847][ T9273] [ 171.514855][ T9273] __dump_stack+0x1d/0x30 [ 171.514898][ T9273] dump_stack_lvl+0xe8/0x140 [ 171.515033][ T9273] dump_stack+0x15/0x1b [ 171.515066][ T9273] should_fail_ex+0x265/0x280 [ 171.515103][ T9273] should_fail+0xb/0x20 [ 171.515171][ T9273] should_fail_usercopy+0x1a/0x20 [ 171.515207][ T9273] _copy_to_user+0x20/0xa0 [ 171.515230][ T9273] simple_read_from_buffer+0xb5/0x130 [ 171.515265][ T9273] proc_fail_nth_read+0x10e/0x150 [ 171.515333][ T9273] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 171.515362][ T9273] vfs_read+0x1a5/0x770 [ 171.515459][ T9273] ? __rcu_read_unlock+0x4f/0x70 [ 171.515526][ T9273] ? __fget_files+0x184/0x1c0 [ 171.515556][ T9273] ksys_read+0xda/0x1a0 [ 171.515590][ T9273] __x64_sys_read+0x40/0x50 [ 171.515636][ T9273] x64_sys_call+0x27c0/0x3000 [ 171.515730][ T9273] do_syscall_64+0xd2/0x200 [ 171.515757][ T9273] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 171.515800][ T9273] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 171.515839][ T9273] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 171.515868][ T9273] RIP: 0033:0x7f7ffa69d8dc [ 171.515926][ T9273] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 171.515946][ T9273] RSP: 002b:00007f7ff90ff030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 171.515971][ T9273] RAX: ffffffffffffffda RBX: 00007f7ffa8f5fa0 RCX: 00007f7ffa69d8dc [ 171.515988][ T9273] RDX: 000000000000000f RSI: 00007f7ff90ff0a0 RDI: 0000000000000006 [ 171.516083][ T9273] RBP: 00007f7ff90ff090 R08: 0000000000000000 R09: 0000000000000000 [ 171.516099][ T9273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.516115][ T9273] R13: 00007f7ffa8f6038 R14: 00007f7ffa8f5fa0 R15: 00007ffd7f9424d8 [ 171.516139][ T9273] [ 171.532357][ T9264] infiniband sz1: set active [ 171.733228][ T9264] infiniband sz1: added lo [ 171.738105][ T3389] lo speed is unknown, defaulting to 1000 [ 171.825822][ T9264] RDS/IB: sz1: added [ 171.874858][ T9264] lo speed is unknown, defaulting to 1000 [ 171.890430][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 171.890449][ T30] audit: type=1400 audit(1759494805.109:3056): avc: denied { bind } for pid=9285 comm="syz.3.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 171.916102][ T30] audit: type=1400 audit(1759494805.109:3057): avc: denied { listen } for pid=9285 comm="syz.3.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 172.005656][ T9300] netlink: 4 bytes leftover after parsing attributes in process `syz.3.719'. [ 172.060783][ T9264] lo speed is unknown, defaulting to 1000 [ 172.234917][ T9264] lo speed is unknown, defaulting to 1000 [ 172.401343][ T9264] lo speed is unknown, defaulting to 1000 [ 172.530676][ T9264] lo speed is unknown, defaulting to 1000 [ 172.936827][ T9383] bond1: entered promiscuous mode [ 172.942248][ T9383] 8021q: adding VLAN 0 to HW filter on device bond1 [ 173.114860][ T30] audit: type=1400 audit(1759494806.329:3058): avc: denied { read write } for pid=9400 comm="syz.3.724" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 173.150173][ T9408] FAULT_INJECTION: forcing a failure. [ 173.150173][ T9408] name failslab, interval 1, probability 0, space 0, times 0 [ 173.163432][ T9408] CPU: 1 UID: 0 PID: 9408 Comm: syz.2.726 Not tainted syzkaller #0 PREEMPT(voluntary) [ 173.163462][ T9408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 173.163486][ T9408] Call Trace: [ 173.163494][ T9408] [ 173.163503][ T9408] __dump_stack+0x1d/0x30 [ 173.163551][ T9408] dump_stack_lvl+0xe8/0x140 [ 173.163597][ T9408] dump_stack+0x15/0x1b [ 173.163638][ T9408] should_fail_ex+0x265/0x280 [ 173.163675][ T9408] should_failslab+0x8c/0xb0 [ 173.163701][ T9408] kmem_cache_alloc_noprof+0x50/0x480 [ 173.163745][ T9408] ? getname_flags+0x80/0x3b0 [ 173.163801][ T9408] ? fput+0x8f/0xc0 [ 173.163919][ T9408] getname_flags+0x80/0x3b0 [ 173.163949][ T9408] __x64_sys_symlinkat+0x40/0x70 [ 173.163980][ T9408] x64_sys_call+0x2941/0x3000 [ 173.164085][ T9408] do_syscall_64+0xd2/0x200 [ 173.164109][ T9408] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 173.164147][ T9408] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 173.164193][ T9408] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 173.164226][ T9408] RIP: 0033:0x7f59f567eec9 [ 173.164318][ T9408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.164342][ T9408] RSP: 002b:00007f59f40e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000010a [ 173.164371][ T9408] RAX: ffffffffffffffda RBX: 00007f59f58d5fa0 RCX: 00007f59f567eec9 [ 173.164384][ T9408] RDX: 0000200000000140 RSI: 0000000000000007 RDI: 0000200000000000 [ 173.164397][ T9408] RBP: 00007f59f40e7090 R08: 0000000000000000 R09: 0000000000000000 [ 173.164412][ T9408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.164429][ T9408] R13: 00007f59f58d6038 R14: 00007f59f58d5fa0 R15: 00007ffdb7bd6f68 [ 173.164510][ T9408] [ 173.376601][ T30] audit: type=1400 audit(1759494806.599:3059): avc: denied { read } for pid=9413 comm="syz.3.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 173.472805][ T9422] loop3: detected capacity change from 0 to 512 [ 173.546674][ T9422] EXT4-fs warning (device loop3): dx_probe:861: inode #2: comm syz.3.727: dx entry: limit 0 != root limit 125 [ 173.558867][ T9422] EXT4-fs warning (device loop3): dx_probe:934: inode #2: comm syz.3.727: Corrupt directory, running e2fsck is recommended [ 173.577946][ T9422] EXT4-fs (loop3): Cannot turn on journaled quota: type 1: error -117 [ 173.586563][ T9422] EXT4-fs error (device loop3): ext4_iget_extra_inode:5104: inode #15: comm syz.3.727: corrupted in-inode xattr: invalid ea_ino [ 173.600358][ T9422] EXT4-fs (loop3): Remounting filesystem read-only [ 173.660661][ T9422] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 173.741681][ T9435] loop2: detected capacity change from 0 to 512 [ 173.783018][ T9414] netlink: 'syz.3.727': attribute type 21 has an invalid length. [ 173.790886][ T9414] netlink: 132 bytes leftover after parsing attributes in process `syz.3.727'. [ 173.800012][ T9414] netlink: 'syz.3.727': attribute type 1 has an invalid length. [ 173.845799][ T8345] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 173.898505][ T9435] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 173.970026][ T8425] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 174.024890][ T9448] FAULT_INJECTION: forcing a failure. [ 174.024890][ T9448] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.038162][ T9448] CPU: 1 UID: 0 PID: 9448 Comm: syz.3.732 Not tainted syzkaller #0 PREEMPT(voluntary) [ 174.038198][ T9448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 174.038283][ T9448] Call Trace: [ 174.038292][ T9448] [ 174.038303][ T9448] __dump_stack+0x1d/0x30 [ 174.038351][ T9448] dump_stack_lvl+0xe8/0x140 [ 174.038398][ T9448] dump_stack+0x15/0x1b [ 174.038437][ T9448] should_fail_ex+0x265/0x280 [ 174.038520][ T9448] should_fail+0xb/0x20 [ 174.038555][ T9448] should_fail_usercopy+0x1a/0x20 [ 174.038651][ T9448] _copy_from_user+0x1c/0xb0 [ 174.038672][ T9448] __ia32_sys_rt_sigreturn+0x128/0x350 [ 174.038722][ T9448] x64_sys_call+0x2d4b/0x3000 [ 174.038781][ T9448] do_syscall_64+0xd2/0x200 [ 174.038802][ T9448] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 174.038838][ T9448] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 174.038935][ T9448] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 174.039002][ T9448] RIP: 0033:0x7f7ffa63af79 [ 174.039022][ T9448] Code: 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 c7 c0 0f 00 00 00 0f 05 <0f> 1f 80 00 00 00 00 48 81 ec 48 01 00 00 49 89 d0 64 48 8b 04 25 [ 174.039091][ T9448] RSP: 002b:00007f7ff90fe5c0 EFLAGS: 00000202 ORIG_RAX: 000000000000000f [ 174.039110][ T9448] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7ffa63af79 [ 174.039123][ T9448] RDX: 00007f7ff90fe5c0 RSI: 00007f7ff90fe6f0 RDI: 0000000000000021 [ 174.039135][ T9448] RBP: 00007f7ff90fec10 R08: 0000000000000000 R09: 0000000000000000 [ 174.039149][ T9448] R10: 0000000000000000 R11: 0000000000000202 R12: cccccccccccccccd [ 174.039245][ T9448] R13: 00007f7ffa8f6038 R14: 00007f7ffa8f5fa0 R15: 00007ffd7f9424d8 [ 174.039269][ T9448] [ 174.455151][ T30] audit: type=1326 audit(1759494807.669:3060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9457 comm="syz.2.733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 174.479063][ T30] audit: type=1326 audit(1759494807.669:3061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9457 comm="syz.2.733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 174.503065][ T30] audit: type=1326 audit(1759494807.669:3062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9457 comm="syz.2.733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 174.526817][ T30] audit: type=1326 audit(1759494807.669:3063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9457 comm="syz.2.733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 174.527201][ T9460] loop2: detected capacity change from 0 to 8192 [ 174.551042][ T30] audit: type=1326 audit(1759494807.669:3064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9457 comm="syz.2.733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 174.581811][ T30] audit: type=1326 audit(1759494807.669:3065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9457 comm="syz.2.733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f59f567eec9 code=0x7ffc0000 [ 174.658745][ T9462] bond2: entered promiscuous mode [ 174.664020][ T9462] 8021q: adding VLAN 0 to HW filter on device bond2 [ 175.000400][ T9493] FAULT_INJECTION: forcing a failure. [ 175.000400][ T9493] name failslab, interval 1, probability 0, space 0, times 0 [ 175.013180][ T9493] CPU: 0 UID: 0 PID: 9493 Comm: syz.3.739 Not tainted syzkaller #0 PREEMPT(voluntary) [ 175.013235][ T9493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 175.013252][ T9493] Call Trace: [ 175.013260][ T9493] [ 175.013270][ T9493] __dump_stack+0x1d/0x30 [ 175.013312][ T9493] dump_stack_lvl+0xe8/0x140 [ 175.013374][ T9493] dump_stack+0x15/0x1b [ 175.013446][ T9493] should_fail_ex+0x265/0x280 [ 175.013485][ T9493] should_failslab+0x8c/0xb0 [ 175.013516][ T9493] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 175.013553][ T9493] ? sidtab_sid2str_get+0xa0/0x130 [ 175.013675][ T9493] ? skb_put+0xa9/0xf0 [ 175.013707][ T9493] kmemdup_noprof+0x2b/0x70 [ 175.013801][ T9493] sidtab_sid2str_get+0xa0/0x130 [ 175.013825][ T9493] security_sid_to_context_core+0x1eb/0x2e0 [ 175.013960][ T9493] security_sid_to_context+0x27/0x40 [ 175.013985][ T9493] avc_audit_post_callback+0x9d/0x520 [ 175.014039][ T9493] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 175.014115][ T9493] common_lsm_audit+0x1bb/0x230 [ 175.014135][ T9493] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 175.014167][ T9493] slow_avc_audit+0x104/0x140 [ 175.014221][ T9493] avc_has_perm+0x13a/0x180 [ 175.014260][ T9493] selinux_socket_recvmsg+0x175/0x1b0 [ 175.014309][ T9493] security_socket_recvmsg+0x50/0x90 [ 175.014457][ T9493] sock_recvmsg+0x38/0x170 [ 175.014489][ T9493] __sys_recvfrom+0x122/0x1f0 [ 175.014538][ T9493] __x64_sys_recvfrom+0x76/0x90 [ 175.014573][ T9493] x64_sys_call+0x2f2f/0x3000 [ 175.014677][ T9493] do_syscall_64+0xd2/0x200 [ 175.014705][ T9493] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 175.014743][ T9493] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 175.014821][ T9493] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 175.014846][ T9493] RIP: 0033:0x7f7ffa69eec9 [ 175.014862][ T9493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.014940][ T9493] RSP: 002b:00007f7ff90ff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 175.014961][ T9493] RAX: ffffffffffffffda RBX: 00007f7ffa8f5fa0 RCX: 00007f7ffa69eec9 [ 175.014975][ T9493] RDX: 000000000000003e RSI: 0000200000000280 RDI: 0000000000000004 [ 175.015049][ T9493] RBP: 00007f7ff90ff090 R08: 0000000000000000 R09: 0000000000000000 [ 175.015068][ T9493] R10: 0000000040000160 R11: 0000000000000246 R12: 0000000000000001 [ 175.015086][ T9493] R13: 00007f7ffa8f6038 R14: 00007f7ffa8f5fa0 R15: 00007ffd7f9424d8 [ 175.015189][ T9493] [ 175.352123][ T9502] loop2: detected capacity change from 0 to 1024 [ 175.421548][ T9502] EXT4-fs: Ignoring removed orlov option [ 175.438125][ T9507] FAULT_INJECTION: forcing a failure. [ 175.438125][ T9507] name failslab, interval 1, probability 0, space 0, times 0 [ 175.446073][ T9502] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 175.451023][ T9507] CPU: 1 UID: 0 PID: 9507 Comm: syz.3.741 Not tainted syzkaller #0 PREEMPT(voluntary) [ 175.451064][ T9507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 175.451083][ T9507] Call Trace: [ 175.451093][ T9507] [ 175.451104][ T9507] __dump_stack+0x1d/0x30 [ 175.451236][ T9507] dump_stack_lvl+0xe8/0x140 [ 175.451284][ T9507] dump_stack+0x15/0x1b [ 175.451389][ T9507] should_fail_ex+0x265/0x280 [ 175.451432][ T9507] ? audit_log_d_path+0x8d/0x150 [ 175.451460][ T9507] should_failslab+0x8c/0xb0 [ 175.451555][ T9507] __kmalloc_cache_noprof+0x4c/0x4a0 [ 175.451600][ T9507] audit_log_d_path+0x8d/0x150 [ 175.451629][ T9507] audit_log_d_path_exe+0x42/0x70 [ 175.451712][ T9507] audit_log_task+0x1e9/0x250 [ 175.451756][ T9507] ? kstrtouint+0x76/0xc0 [ 175.451797][ T9507] audit_seccomp+0x61/0x100 [ 175.451838][ T9507] ? __seccomp_filter+0x82d/0x1250 [ 175.451897][ T9507] __seccomp_filter+0x83e/0x1250 [ 175.451935][ T9507] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 175.451978][ T9507] ? vfs_write+0x7e8/0x960 [ 175.452010][ T9507] ? __rcu_read_unlock+0x4f/0x70 [ 175.452049][ T9507] ? __fget_files+0x184/0x1c0 [ 175.452108][ T9507] __secure_computing+0x82/0x150 [ 175.452176][ T9507] syscall_trace_enter+0xcf/0x1e0 [ 175.452222][ T9507] do_syscall_64+0xac/0x200 [ 175.452265][ T9507] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 175.452303][ T9507] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 175.452428][ T9507] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 175.452460][ T9507] RIP: 0033:0x7f7ffa69eec9 [ 175.452484][ T9507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.452510][ T9507] RSP: 002b:00007f7ff90ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 175.452540][ T9507] RAX: ffffffffffffffda RBX: 00007f7ffa8f5fa0 RCX: 00007f7ffa69eec9 [ 175.452558][ T9507] RDX: 0000000000000001 RSI: 00002000000032c0 RDI: 0000000000000006 [ 175.452576][ T9507] RBP: 00007f7ff90ff090 R08: 0000000000000000 R09: 0000000000000000 [ 175.452724][ T9507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.452742][ T9507] R13: 00007f7ffa8f6038 R14: 00007f7ffa8f5fa0 R15: 00007ffd7f9424d8 [ 175.452769][ T9507] [ 175.657152][ T9497] lo speed is unknown, defaulting to 1000 [ 175.759672][ T288] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 175.892283][ T288] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 175.982966][ T288] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 176.037880][ T9526] program syz.2.740 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 176.063636][ T288] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 176.106973][ T9497] chnl_net:caif_netlink_parms(): no params data found [ 176.306082][ T8425] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 176.411225][ T9571] bond5: entered promiscuous mode [ 176.430601][ T9571] 8021q: adding VLAN 0 to HW filter on device bond5 [ 176.492628][ T9497] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.499817][ T9497] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.522953][ T9588] loop2: detected capacity change from 0 to 512 [ 176.545104][ T9497] bridge_slave_0: entered allmulticast mode [ 176.575268][ T9497] bridge_slave_0: entered promiscuous mode [ 176.592734][ T9497] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.600685][ T9497] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.610204][ T9497] bridge_slave_1: entered allmulticast mode [ 176.618930][ T9497] bridge_slave_1: entered promiscuous mode [ 176.627234][ T288] bridge_slave_1: left allmulticast mode [ 176.633026][ T288] bridge_slave_1: left promiscuous mode [ 176.636277][ T9588] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 176.638940][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.684691][ T9588] ext4 filesystem being mounted at /46/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 176.698233][ T288] bridge_slave_0: left allmulticast mode [ 176.704194][ T288] bridge_slave_0: left promiscuous mode [ 176.710460][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.716955][ T9588] EXT4-fs error (device loop2): ext4_do_update_inode:5653: inode #2: comm syz.2.746: corrupted inode contents [ 176.730725][ T9588] EXT4-fs error (device loop2): ext4_dirty_inode:6538: inode #2: comm syz.2.746: mark_inode_dirty error [ 176.744579][ T9588] EXT4-fs error (device loop2): ext4_do_update_inode:5653: inode #2: comm syz.2.746: corrupted inode contents [ 176.776909][ T9588] EXT4-fs error (device loop2): __ext4_ext_dirty:206: inode #2: comm syz.2.746: mark_inode_dirty error [ 176.815678][ T8425] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 176.995592][ T288] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 177.016993][ T288] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 177.038645][ T288] bond0 (unregistering): Released all slaves [ 177.063047][ T288] bond1 (unregistering): Released all slaves [ 177.120163][ T9497] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.147013][ T9497] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.156380][ T288] tipc: Left network mode [ 177.187198][ T9497] team0: Port device team_slave_0 added [ 177.212601][ T9497] team0: Port device team_slave_1 added [ 177.290021][ T288] hsr_slave_0: left promiscuous mode [ 177.300149][ T288] hsr_slave_1: left promiscuous mode [ 177.314322][ T288] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 177.321964][ T288] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 177.336113][ T288] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 177.343801][ T288] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 177.356351][ T288] veth1_macvtap: left promiscuous mode [ 177.362004][ T288] veth0_macvtap: left promiscuous mode [ 177.375173][ T288] veth1_vlan: left promiscuous mode [ 177.381529][ T288] veth0_vlan: left promiscuous mode [ 177.484157][ T288] team0 (unregistering): Port device team_slave_1 removed [ 177.495435][ T288] team0 (unregistering): Port device team_slave_0 removed [ 177.546782][ T9497] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 177.554315][ T9497] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 177.582307][ T9497] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 177.597718][ T9497] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 177.604915][ T9497] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 177.632623][ T9497] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 177.776633][ T9497] hsr_slave_0: entered promiscuous mode [ 177.798556][ T9497] hsr_slave_1: entered promiscuous mode [ 177.856203][ T9597] lo speed is unknown, defaulting to 1000 [ 178.240405][ T9597] chnl_net:caif_netlink_parms(): no params data found [ 178.285026][ T288] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 178.348992][ T288] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 178.445850][ T9597] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.453032][ T9597] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.464824][ T9597] bridge_slave_0: entered allmulticast mode [ 178.471301][ T9597] bridge_slave_0: entered promiscuous mode [ 178.481430][ T288] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 178.534825][ T9597] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.542235][ T9597] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.566607][ T9597] bridge_slave_1: entered allmulticast mode [ 178.573752][ T9597] bridge_slave_1: entered promiscuous mode [ 178.617516][ T288] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 178.737391][ T9597] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 178.794832][ T9497] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 178.805296][ T9497] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 178.839082][ T9597] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 178.849190][ T9497] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 178.867463][ T9497] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 178.955757][ T9597] team0: Port device team_slave_0 added [ 178.995291][ T288] bridge_slave_1: left allmulticast mode [ 179.001180][ T288] bridge_slave_1: left promiscuous mode [ 179.007238][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.035394][ T288] bridge_slave_0: left allmulticast mode [ 179.041830][ T288] bridge_slave_0: left promiscuous mode [ 179.048154][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.186549][ T288] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 179.208852][ T288] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 179.226382][ T288] bond0 (unregistering): Released all slaves [ 179.247924][ T9597] team0: Port device team_slave_1 added [ 179.315923][ T9597] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 179.322991][ T9597] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 179.349255][ T9597] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 179.405531][ T9597] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 179.412675][ T9597] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 179.439149][ T9597] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 179.577294][ T9597] hsr_slave_0: entered promiscuous mode [ 179.583531][ T9597] hsr_slave_1: entered promiscuous mode [ 179.590951][ T9597] debugfs: 'hsr0' already exists in 'hsr' [ 179.596935][ T9597] Cannot create hsr debugfs directory [ 179.606835][ T9497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.616374][ T288] hsr_slave_0: left promiscuous mode [ 179.622148][ T288] hsr_slave_1: left promiscuous mode [ 179.629062][ T288] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 179.636586][ T288] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 179.644328][ T288] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 179.651779][ T288] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 179.664007][ T288] veth1_macvtap: left promiscuous mode [ 179.670009][ T288] veth0_macvtap: left promiscuous mode [ 179.676071][ T288] veth1_vlan: left promiscuous mode [ 179.681509][ T288] veth0_vlan: left promiscuous mode [ 179.797564][ T288] team0 (unregistering): Port device team_slave_1 removed [ 179.810286][ T288] team0 (unregistering): Port device team_slave_0 removed [ 179.920383][ T9497] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.964611][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.971840][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.995780][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.002929][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.015357][ T9716] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 180.100981][ T9497] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 180.111531][ T9497] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 180.163969][ T9724] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 180.219898][ T9739] loop3: detected capacity change from 0 to 1024 [ 180.255739][ T9739] EXT4-fs: Ignoring removed orlov option [ 180.291473][ T9739] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 180.322978][ T9497] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.356717][ T9714] lo speed is unknown, defaulting to 1000 [ 180.394007][ T288] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 180.454852][ T288] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 180.489434][ T30] kauditd_printk_skb: 80 callbacks suppressed [ 180.489491][ T30] audit: type=1400 audit(1759494813.709:3146): avc: denied { ioctl } for pid=9738 comm="syz.3.754" path="/39/bus/bus" dev="loop3" ino=18 ioctlcmd=0x9207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 180.534253][ T8345] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 180.561324][ T9497] veth0_vlan: entered promiscuous mode [ 180.585988][ T288] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 180.617817][ T9497] veth1_vlan: entered promiscuous mode [ 180.650964][ T9764] bond3: entered promiscuous mode [ 180.656479][ T9764] 8021q: adding VLAN 0 to HW filter on device bond3 [ 180.676097][ T288] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 180.730423][ T9497] veth0_macvtap: entered promiscuous mode [ 180.802319][ T9497] veth1_macvtap: entered promiscuous mode [ 180.862431][ T9597] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 180.897663][ T288] bridge_slave_1: left allmulticast mode [ 180.903583][ T288] bridge_slave_1: left promiscuous mode [ 180.909309][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.935041][ T30] audit: type=1326 audit(1759494814.149:3147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9784 comm="syz.3.758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ffa69eec9 code=0x7ffc0000 [ 180.959787][ T9785] FAULT_INJECTION: forcing a failure. [ 180.959787][ T9785] name failslab, interval 1, probability 0, space 0, times 0 [ 180.972608][ T9785] CPU: 0 UID: 0 PID: 9785 Comm: syz.3.758 Not tainted syzkaller #0 PREEMPT(voluntary) [ 180.972636][ T9785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 180.972649][ T9785] Call Trace: [ 180.972656][ T9785] [ 180.972668][ T9785] __dump_stack+0x1d/0x30 [ 180.972708][ T9785] dump_stack_lvl+0xe8/0x140 [ 180.972813][ T9785] dump_stack+0x15/0x1b [ 180.972921][ T9785] should_fail_ex+0x265/0x280 [ 180.972967][ T9785] ? audit_log_d_path+0x8d/0x150 [ 180.973039][ T9785] should_failslab+0x8c/0xb0 [ 180.973068][ T9785] __kmalloc_cache_noprof+0x4c/0x4a0 [ 180.973151][ T9785] audit_log_d_path+0x8d/0x150 [ 180.973179][ T9785] audit_log_d_path_exe+0x42/0x70 [ 180.973206][ T9785] audit_log_task+0x1e9/0x250 [ 180.973263][ T9785] ? kstrtouint+0x76/0xc0 [ 180.973302][ T9785] audit_seccomp+0x61/0x100 [ 180.973395][ T9785] ? __seccomp_filter+0x82d/0x1250 [ 180.973436][ T9785] __seccomp_filter+0x83e/0x1250 [ 180.973474][ T9785] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 180.973633][ T9785] ? vfs_write+0x7e8/0x960 [ 180.973661][ T9785] ? __rcu_read_unlock+0x4f/0x70 [ 180.973763][ T9785] ? __fget_files+0x184/0x1c0 [ 180.973795][ T9785] __secure_computing+0x82/0x150 [ 180.973820][ T9785] syscall_trace_enter+0xcf/0x1e0 [ 180.973928][ T9785] do_syscall_64+0xac/0x200 [ 180.974162][ T9785] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 180.974227][ T9785] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 180.974269][ T9785] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 180.974299][ T9785] RIP: 0033:0x7f7ffa69eec9 [ 180.974321][ T9785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.974388][ T9785] RSP: 002b:00007f7ff90ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 180.974412][ T9785] RAX: ffffffffffffffda RBX: 00007f7ffa8f5fa0 RCX: 00007f7ffa69eec9 [ 180.974437][ T9785] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 180.974449][ T9785] RBP: 00007f7ff90ff090 R08: 0000000000000000 R09: 0000000000000000 [ 180.974461][ T9785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.974530][ T9785] R13: 00007f7ffa8f6038 R14: 00007f7ffa8f5fa0 R15: 00007ffd7f9424d8 [ 180.974552][ T9785] [ 181.064768][ T30] audit: type=1326 audit(1759494814.149:3148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9784 comm="syz.3.758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f7ffa69eec9 code=0x7ffc0000 [ 181.221980][ T30] audit: type=1326 audit(1759494814.179:3149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9784 comm="syz.3.758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ffa69eec9 code=0x7ffc0000 [ 181.246033][ T30] audit: type=1326 audit(1759494814.179:3150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9784 comm="syz.3.758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7ffa69d710 code=0x7ffc0000 [ 181.254934][ T288] bridge_slave_0: left allmulticast mode [ 181.269841][ T30] audit: type=1326 audit(1759494814.179:3151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9784 comm="syz.3.758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f7ffa69d97f code=0x7ffc0000 [ 181.275517][ T288] bridge_slave_0: left promiscuous mode [ 181.275646][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.299125][ T30] audit: type=1326 audit(1759494814.179:3152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9784 comm="syz.3.758" exe="" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f7ffa69eec9 code=0x7ffc0000 [ 181.342861][ T30] audit: type=1326 audit(1759494814.289:3153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9784 comm="syz.3.758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f7ffa69d8dc code=0x7ffc0000 [ 181.366212][ T30] audit: type=1326 audit(1759494814.289:3154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9784 comm="syz.3.758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f7ffa69d97f code=0x7ffc0000 [ 181.389573][ T30] audit: type=1326 audit(1759494814.289:3155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9784 comm="syz.3.758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f7ffa69db2a code=0x7ffc0000 [ 181.498457][ T288] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 181.508733][ T288] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 181.518349][ T288] bond0 (unregistering): Released all slaves [ 181.529012][ T288] bond1 (unregistering): Released all slaves [ 181.540238][ T9714] chnl_net:caif_netlink_parms(): no params data found [ 181.555443][ T9497] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 181.563376][ T9597] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 181.577352][ T9597] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 181.594193][ T9597] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 181.654820][ T9497] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 181.699353][ T9796] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 181.709355][ T288] hsr_slave_0: left promiscuous mode [ 181.717398][ T288] hsr_slave_1: left promiscuous mode [ 181.734922][ T288] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 181.742560][ T288] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 181.755263][ T288] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 181.762775][ T288] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 181.773597][ T288] veth1_macvtap: left promiscuous mode [ 181.779737][ T288] veth0_macvtap: left promiscuous mode [ 181.785629][ T288] veth1_vlan: left promiscuous mode [ 181.791300][ T288] veth0_vlan: left promiscuous mode [ 181.887751][ T9804] loop3: detected capacity change from 0 to 2364 [ 181.899147][ T9804] iso9660: Bad value for 'sbsector' [ 181.935315][ T288] team0 (unregistering): Port device team_slave_1 removed [ 181.949060][ T288] team0 (unregistering): Port device team_slave_0 removed [ 182.025124][ T9804] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.051578][ T9714] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.058941][ T9714] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.066688][ T9714] bridge_slave_0: entered allmulticast mode [ 182.073544][ T9714] bridge_slave_0: entered promiscuous mode [ 182.081657][ T51] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.104286][ T9804] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.115973][ T9714] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.123352][ T9714] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.130981][ T9714] bridge_slave_1: entered allmulticast mode [ 182.137920][ T9714] bridge_slave_1: entered promiscuous mode [ 182.150760][ T51] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.161115][ T9804] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.222734][ T9597] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.247001][ T51] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.259661][ T51] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.277629][ T9804] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.297003][ T9714] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.318056][ T9597] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.332422][ T9714] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.359579][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.366728][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.377619][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.384847][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.422408][ T9815] bond1: entered promiscuous mode [ 182.433162][ T9815] 8021q: adding VLAN 0 to HW filter on device bond1 [ 182.450754][ T9714] team0: Port device team_slave_0 added [ 182.468017][ T9714] team0: Port device team_slave_1 added [ 182.501121][ T9714] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 182.508372][ T9714] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 182.534944][ T9714] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 182.549061][ T41] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.587283][ T9714] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 182.594613][ T9714] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 182.621307][ T9714] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 182.647332][ T51] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.665297][ T56] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.705227][ T9828] netlink: 'syz.0.765': attribute type 4 has an invalid length. [ 182.727987][ T9714] hsr_slave_0: entered promiscuous mode [ 182.744642][ T9714] hsr_slave_1: entered promiscuous mode [ 182.754618][ T9714] debugfs: 'hsr0' already exists in 'hsr' [ 182.760567][ T9714] Cannot create hsr debugfs directory [ 182.779867][ T9597] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.790993][ T56] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.106563][ T9597] veth0_vlan: entered promiscuous mode [ 183.127167][ T9597] veth1_vlan: entered promiscuous mode [ 183.181181][ T9597] veth0_macvtap: entered promiscuous mode [ 183.203891][ T9597] veth1_macvtap: entered promiscuous mode [ 183.260637][ T9714] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 183.280740][ T9597] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 183.291388][ T9714] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 183.311162][ T9597] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 183.323040][ T9714] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 183.344163][ T56] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.355385][ T9714] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 183.375950][ T56] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.401170][ T56] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.443469][ T56] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.511439][ T9714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.557149][ T9714] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.581734][ T2851] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.588983][ T2851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.618734][ T2851] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.626052][ T2851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.798294][ T9714] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.105800][ T9714] veth0_vlan: entered promiscuous mode [ 184.127568][ T9714] veth1_vlan: entered promiscuous mode [ 184.169836][ T9714] veth0_macvtap: entered promiscuous mode [ 184.187990][ T9714] veth1_macvtap: entered promiscuous mode [ 184.214839][ T9714] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 184.245982][ T9714] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 184.267692][ T56] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.290932][ T56] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.307101][ T56] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.327449][ T56] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.614326][T10122] netlink: 96 bytes leftover after parsing attributes in process `syz.9.767'. [ 185.784434][T10142] bond1: entered promiscuous mode [ 185.808291][T10142] 8021q: adding VLAN 0 to HW filter on device bond1 [ 185.875385][ T30] kauditd_printk_skb: 65 callbacks suppressed [ 185.875400][ T30] audit: type=1326 audit(1759494819.099:3221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10135 comm="syz.0.771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3da0c4eec9 code=0x7ffc0000 [ 185.979353][T10154] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.774' sets config #-1 [ 186.005222][ T30] audit: type=1326 audit(1759494819.129:3222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10135 comm="syz.0.771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3da0c4eec9 code=0x7ffc0000 [ 186.029337][ T30] audit: type=1326 audit(1759494819.129:3223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10135 comm="syz.0.771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3da0c4eec9 code=0x7ffc0000 [ 186.053131][ T30] audit: type=1326 audit(1759494819.129:3224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10135 comm="syz.0.771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3da0c4eec9 code=0x7ffc0000 [ 186.077018][ T30] audit: type=1326 audit(1759494819.129:3225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10135 comm="syz.0.771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f3da0c4eec9 code=0x7ffc0000 [ 186.100617][ T30] audit: type=1326 audit(1759494819.129:3226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10135 comm="syz.0.771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f3da0c4ef03 code=0x7ffc0000 [ 186.124033][ T30] audit: type=1326 audit(1759494819.129:3227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10135 comm="syz.0.771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f3da0c4d97f code=0x7ffc0000 [ 186.147889][ T30] audit: type=1326 audit(1759494819.129:3228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10135 comm="syz.0.771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f3da0c4ef57 code=0x7ffc0000 [ 186.171617][ T30] audit: type=1326 audit(1759494819.129:3229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10135 comm="syz.0.771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3da0c4d710 code=0x7ffc0000 [ 186.195269][ T30] audit: type=1326 audit(1759494819.129:3230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10135 comm="syz.0.771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f3da0c4db2a code=0x7ffc0000 [ 186.266489][T10166] loop6: detected capacity change from 0 to 512 [ 186.278566][T10166] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 186.332872][T10166] EXT4-fs (loop6): 1 truncate cleaned up [ 186.352934][T10166] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 186.529838][ T9714] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 186.794245][T10214] bond2: entered promiscuous mode [ 186.835386][T10214] 8021q: adding VLAN 0 to HW filter on device bond2 [ 186.852962][T10224] loop3: detected capacity change from 0 to 512 [ 186.880231][T10224] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 186.898674][T10231] netlink: 24 bytes leftover after parsing attributes in process `syz.0.785'. [ 186.965191][T10231] veth3: entered allmulticast mode [ 186.976423][T10224] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 187.036685][T10242] loop9: detected capacity change from 0 to 512 [ 187.071435][T10242] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 187.115379][T10242] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 187.221699][T10263] loop9: detected capacity change from 0 to 512 [ 187.386856][T10276] loop3: detected capacity change from 0 to 512 [ 187.439583][T10276] EXT4-fs error (device loop3): ext4_do_update_inode:5653: inode #15: comm syz.3.794: corrupted inode contents [ 187.496671][T10276] EXT4-fs error (device loop3): ext4_dirty_inode:6538: inode #15: comm syz.3.794: mark_inode_dirty error [ 187.515547][T10276] EXT4-fs error (device loop3): ext4_do_update_inode:5653: inode #15: comm syz.3.794: corrupted inode contents [ 187.534979][T10276] EXT4-fs error (device loop3): ext4_xattr_delete_inode:2991: inode #15: comm syz.3.794: mark_inode_dirty error [ 187.585719][T10276] EXT4-fs error (device loop3): ext4_xattr_delete_inode:2994: inode #15: comm syz.3.794: mark inode dirty (error -117) [ 187.625069][T10276] EXT4-fs warning (device loop3): ext4_evict_inode:274: xattr delete (err -117) [ 187.652443][T10296] loop9: detected capacity change from 0 to 736 [ 187.659003][T10276] EXT4-fs (loop3): 1 orphan inode deleted [ 187.702650][T10276] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 187.732062][T10299] netlink: 96 bytes leftover after parsing attributes in process `syz.0.789'. [ 187.805653][ T8345] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 188.042484][T10312] loop3: detected capacity change from 0 to 512 [ 188.068427][T10312] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 188.138455][T10312] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 188.281638][T10327] syz_tun: entered allmulticast mode [ 188.295430][T10327] syz_tun: left allmulticast mode [ 188.363583][T10334] loop9: detected capacity change from 0 to 1024 [ 188.395248][T10335] SELinux: Context system_u:object_r:usr_t:s0 is not valid (left unmapped). [ 188.417521][T10334] EXT4-fs (loop9): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 188.463640][T10334] ext4 filesystem being mounted at /15/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 188.544251][T10346] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 188.603486][ T9597] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 188.635758][T10357] netlink: 8 bytes leftover after parsing attributes in process `syz.0.809'. [ 188.698933][T10362] netlink: 68 bytes leftover after parsing attributes in process `syz.0.809'. [ 189.209037][T10421] loop9: detected capacity change from 0 to 512 [ 189.237496][T10421] FAT-fs (loop9): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 189.274493][T10421] FAT-fs (loop9): error, fat_free_clusters: deleting FAT entry beyond EOF [ 189.345708][T10427] loop9: detected capacity change from 0 to 2048 [ 189.395027][T10427] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 189.642631][T10453] FAULT_INJECTION: forcing a failure. [ 189.642631][T10453] name failslab, interval 1, probability 0, space 0, times 0 [ 189.655450][T10453] CPU: 0 UID: 0 PID: 10453 Comm: syz.9.814 Not tainted syzkaller #0 PREEMPT(voluntary) [ 189.655485][T10453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 189.655499][T10453] Call Trace: [ 189.655505][T10453] [ 189.655513][T10453] __dump_stack+0x1d/0x30 [ 189.655618][T10453] dump_stack_lvl+0xe8/0x140 [ 189.655663][T10453] dump_stack+0x15/0x1b [ 189.655719][T10453] should_fail_ex+0x265/0x280 [ 189.655759][T10453] should_failslab+0x8c/0xb0 [ 189.655853][T10453] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 189.655881][T10453] ? __alloc_skb+0x101/0x320 [ 189.655969][T10453] __alloc_skb+0x101/0x320 [ 189.655998][T10453] ? audit_log_start+0x342/0x720 [ 189.656054][T10453] audit_log_start+0x3a0/0x720 [ 189.656227][T10453] ? kstrtouint+0x76/0xc0 [ 189.656264][T10453] audit_seccomp+0x48/0x100 [ 189.656438][T10453] ? __seccomp_filter+0x82d/0x1250 [ 189.656472][T10453] __seccomp_filter+0x83e/0x1250 [ 189.656504][T10453] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 189.656613][T10453] ? vfs_write+0x7e8/0x960 [ 189.656650][T10453] __secure_computing+0x82/0x150 [ 189.656676][T10453] syscall_trace_enter+0xcf/0x1e0 [ 189.656706][T10453] do_syscall_64+0xac/0x200 [ 189.656784][T10453] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 189.656820][T10453] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 189.656857][T10453] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 189.656899][T10453] RIP: 0033:0x7f709a92eec9 [ 189.656928][T10453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 189.656987][T10453] RSP: 002b:00007f7099355038 EFLAGS: 00000246 ORIG_RAX: 000000000000010f [ 189.657014][T10453] RAX: ffffffffffffffda RBX: 00007f709ab86180 RCX: 00007f709a92eec9 [ 189.657027][T10453] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000200000000000 [ 189.657039][T10453] RBP: 00007f7099355090 R08: 0000000000000000 R09: 0000000000000000 [ 189.657060][T10453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 189.657077][T10453] R13: 00007f709ab86218 R14: 00007f709ab86180 R15: 00007ffc9c288588 [ 189.657102][T10453] [ 189.948324][ T9597] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 190.005156][T10469] FAULT_INJECTION: forcing a failure. [ 190.005156][T10469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 190.018457][T10469] CPU: 1 UID: 0 PID: 10469 Comm: syz.9.817 Not tainted syzkaller #0 PREEMPT(voluntary) [ 190.018511][T10469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 190.018528][T10469] Call Trace: [ 190.018537][T10469] [ 190.018547][T10469] __dump_stack+0x1d/0x30 [ 190.018595][T10469] dump_stack_lvl+0xe8/0x140 [ 190.018742][T10469] dump_stack+0x15/0x1b [ 190.018779][T10469] should_fail_ex+0x265/0x280 [ 190.018824][T10469] should_fail+0xb/0x20 [ 190.018928][T10469] should_fail_usercopy+0x1a/0x20 [ 190.018967][T10469] _copy_to_user+0x20/0xa0 [ 190.018994][T10469] simple_read_from_buffer+0xb5/0x130 [ 190.019025][T10469] proc_fail_nth_read+0x10e/0x150 [ 190.019115][T10469] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 190.019189][T10469] vfs_read+0x1a5/0x770 [ 190.019213][T10469] ? __rcu_read_unlock+0x4f/0x70 [ 190.019290][T10469] ? __fget_files+0x184/0x1c0 [ 190.019340][T10469] ksys_read+0xda/0x1a0 [ 190.019393][T10469] __x64_sys_read+0x40/0x50 [ 190.019424][T10469] x64_sys_call+0x27c0/0x3000 [ 190.019492][T10469] do_syscall_64+0xd2/0x200 [ 190.019521][T10469] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 190.019556][T10469] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 190.019600][T10469] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 190.019714][T10469] RIP: 0033:0x7f709a92d8dc [ 190.019734][T10469] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 190.019816][T10469] RSP: 002b:00007f7099397030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 190.019903][T10469] RAX: ffffffffffffffda RBX: 00007f709ab85fa0 RCX: 00007f709a92d8dc [ 190.019918][T10469] RDX: 000000000000000f RSI: 00007f70993970a0 RDI: 0000000000000003 [ 190.019930][T10469] RBP: 00007f7099397090 R08: 0000000000000000 R09: 0000000000000000 [ 190.019942][T10469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.020026][T10469] R13: 00007f709ab86038 R14: 00007f709ab85fa0 R15: 00007ffc9c288588 [ 190.020046][T10469] [ 190.644597][T10496] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 190.644597][T10496] program syz.0.826 not setting count and/or reply_len properly [ 190.669900][T10495] ================================================================== [ 190.678057][T10495] BUG: KCSAN: data-race in copy_mm / percpu_counter_destroy_many [ 190.685998][T10495] [ 190.688346][T10495] write to 0xffff88810ece7170 of 8 bytes by task 8425 on cpu 1: [ 190.696172][T10495] percpu_counter_destroy_many+0xc7/0x2b0 [ 190.702387][T10495] __mmdrop+0x22d/0x3c0 [ 190.706669][T10495] finish_task_switch+0x187/0x2b0 [ 190.711728][T10495] __schedule+0x6b9/0xb30 [ 190.716168][T10495] __cond_resched+0x4e/0x90 [ 190.720930][T10495] down_read+0x13/0xe0 [ 190.725025][T10495] kernfs_iop_permission+0x87/0x220 [ 190.730436][T10495] inode_permission+0x1ca/0x310 [ 190.735423][T10495] link_path_walk+0x63c/0x900 [ 190.740396][T10495] path_openat+0x1de/0x2170 [ 190.744985][T10495] do_filp_open+0x109/0x230 [ 190.749520][T10495] do_sys_openat2+0xa6/0x110 [ 190.754135][T10495] __x64_sys_openat+0xf2/0x120 [ 190.758992][T10495] x64_sys_call+0x2eab/0x3000 [ 190.763754][T10495] do_syscall_64+0xd2/0x200 [ 190.768536][T10495] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 190.774455][T10495] [ 190.776792][T10495] read to 0xffff88810ece6d40 of 1408 bytes by task 10495 on cpu 0: [ 190.784696][T10495] copy_mm+0xe2/0x370 [ 190.788742][T10495] copy_process+0xd08/0x2000 [ 190.793386][T10495] kernel_clone+0x16c/0x5c0 [ 190.797928][T10495] __x64_sys_clone+0xe6/0x120 [ 190.802823][T10495] x64_sys_call+0x119c/0x3000 [ 190.807525][T10495] do_syscall_64+0xd2/0x200 [ 190.812144][T10495] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 190.818158][T10495] [ 190.820519][T10495] Reported by Kernel Concurrency Sanitizer on: [ 190.826740][T10495] CPU: 0 UID: 0 PID: 10495 Comm: dhcpcd-run-hook Not tainted syzkaller #0 PREEMPT(voluntary) [ 190.837148][T10495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 190.847499][T10495] ==================================================================