last executing test programs: 1.143294178s ago: executing program 4 (id=6025): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0xb, &(0x7f0000005300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$F2FS_IOC_GET_COMPRESS_OPTION(r0, 0x8002f515, &(0x7f0000000000)) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="300000001114410029bd70000000000008004a0000000000080001000000000008004b002800000008"], 0x30}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f00000007c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100030010651fbe347b2c2b00000c00018008000100", @ANYRES16=r1], 0x20}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0xb, &(0x7f0000005300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) socket$nl_rdma(0x10, 0x3, 0x14) (async) ioctl$F2FS_IOC_GET_COMPRESS_OPTION(r0, 0x8002f515, &(0x7f0000000000)) (async) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="300000001114410029bd70000000000008004a0000000000080001000000000008004b002800000008"], 0x30}}, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f00000007c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100030010651fbe347b2c2b00000c00018008000100", @ANYRES16=r1], 0x20}}, 0x0) (async) 1.070451935s ago: executing program 4 (id=6028): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x30, r2, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@GTPA_TID={0xc}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x4004800) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3000010, &(0x7f0000000100)={[{@resuid}, {@nobh}]}, 0x1, 0x519, &(0x7f00000009c0)="$eJzs3cFvI1cZAPBvJvE2u5tiFxAqlSgVLcpWsHbS0DZCCMoFTpWA5b6ExImi2HEUO2UTVZCK/wAhgcSJExck/gCkqgfEGVWqBBfEAQECIdjCAQnoII/HJevYSaBJnI1/P+mt35sZz/e9ifw8M56dCWBiPRURL0XEVEQ8GxHlYnpalDjole5yb99/daVbksiyO39JIimm9dfVbU9HxM3ibTMR8ZUvRnw9ORq3vbe/udxo1HeKdq3T3K619/ZvbzSX1+vr9a3FxYUXll5cen5pPiu8p35W+pUffeGzr3/yG7+9+6db3+ym9ZkPRSkG+nGWel0v5duir7uNds4j2BhMFf0pjTsRAABOpbuP//6I+Fi+/1+OqXxvbsDUODIDAAAAzkr2udn4VxKRAQAAAFdWGhGzkaTV4lqA2UjTa8W5gQ/GjbTRanc+sdba3VrtzouoRCld22jU54trhStRSrrtheIa2377uYH2YkQ8FhHfLV/P29WVVmN1zOc+AAAAYFLcHDj+/3s5zesnG/L/BAAAAIDLqzKyAQAAAFwVDvkBAADg6hs8/n99THkAAAAA5+JLL7/cLVn/+derr+ztbrZeub1ab29Wm7sr1ZXWznZ1vdVaz+/Z1zxpfY1Wa/tTsbV7r9aptzu19t7+3WZrd6tzd+OBR2ADAAAAF+ixj77xqyQiDj59PS9R3AcQ4AG/H3cCwFmaGncCwNi4izdMrlK/cm28eQDjk5ww38U7AADw8Jv78NHf//unAkpjzQw4b671AYDJ4/d/mFwlVwDCREsj4n296iOjlhn5+/8vThslyyLeLB+e4vwiAABcrNm8JGm1OA6YjTStViMejUgrUUrWNhr1+eL44Jfl0iPd9kL+zuTEa4YBAAAAAAAAAAAAAAAAAAAAAAAAgJ4sSyIDAAAArrSI9I9Jfjf/iLnyM7OD5weuJf8oxx+Kxg/ufO/ecqezs9Cd/tf8WV7XIqLz/TulfPpzIx8fBgAAAJy15GDkrN5xevG6cKFZAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAB3r7/6kq/XGTcP38+IirD4k/HTP46E6WIuPG3JKYPvS+JiKkziH/wWkQ8Pix+Eu9kWVYpshgW//o5x6/km2Z4/DQibp5BfJhkb3THn5eGff7SeCp/Hf75my7KezV6/EuLyI/n49yw8efRI2trDo3xxFs/qY2M/1rEE9PDx5/++JuMiP/0kbX9M8uyozG+9tX9/VHxsx9GzA39/kkeiFXrNLdr7b392xvN5fX6en1rcXHhhaUXl55fmq+tbTTqxb9DY3znIz9957j+3xgS/ze/7o2/x/X/mVErHfDvt+7d/0CvWhoW/9bTQ79/Z2JE/LT47vt4Ue/On+vXD3r1w5788ZtPHtf/1RHb/6S//61T9v/ZL3/7d6dcFAC4AO29/c3lRqO+c0xl5hTLPIyVn81cijT+x0r2rd5f7rLk8/9Wunur/53S79UlSOxQJbuwWFNxSbr8bmWswxIAAHAOfv7uTv+4MwEAAAAAAAAAAAAAAAAAAIDJdRG3ExuMeTCergIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHOs/AQAA//9GB9/T") r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000fc0)=@raw={'raw\x00', 0x8, 0x3, 0x4e8, 0x0, 0x11, 0x148, 0x340, 0x0, 0x450, 0x2a8, 0x2a8, 0x450, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x81}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x4f, 0x7, "72f6daeff0a9c6294e211d2d88fe6dcff5d0e552201da3b7a1fdb30dcb59"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x548) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000600)={&(0x7f0000000640)={0x2c, r2, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_I_TEI={0x8}, @GTPA_NET_NS_FD={0x8}, @GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa000}, 0x8010) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) r6 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001100a7cc4a372eaf541d002007000000", @ANYRES32=r5, @ANYBLOB="00000000100000001c001a80080002802d00ff0008000200", @ANYRES16=r6, @ANYRES32=r6], 0x44}}, 0x2000800) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0x7, 0xb3, 0xc4, 0x20, 0x0, 0x2, 0x10220, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffa, 0x2, @perf_config_ext={0x8}, 0x64, 0x4, 0xfffff000, 0x2, 0x7, 0x4, 0x8, 0x0, 0x7ff, 0x0, 0x8}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = socket(0x2, 0x805, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f00000003c0)={r10, @in6={{0xa, 0x4e20, 0x8, @empty, 0x7}}, 0x0, 0xcb}, 0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={r10, 0x309a5ec4}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) syz_genetlink_get_family_id$tipc(&(0x7f0000000240), r0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002abd7000ffdbdf25010000000000000009410900004c0018000000087564700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000da0000"], 0x68}, 0x1, 0x0, 0x0, 0x20040000}, 0x14) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r11}, 0x18) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r12}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 929.577399ms ago: executing program 4 (id=6032): bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ff"], 0x48) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0xffffd000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000000)='syzkaller\x00', 0x800008, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYRES32=r2, @ANYRES16=r2, @ANYBLOB="43208a4c9ebf08a303d607"], 0x58}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)={0x6c, 0x12, 0x905, 0x70bd2d, 0x25dfdbfb, {0xa, 0x9, 0x4, 0x0, {0x4e22, 0x4e66, [0xfffffffb, 0x7, 0x1, 0x6], [0x1, 0x5, 0x21, 0x2], 0x0, [0xa, 0x1000]}, 0x6, 0xa}, [@INET_DIAG_REQ_BYTECODE={0x20, 0x1, "0891320c0ac9e7a4c6922f2e1f6c071d4914abfaafc08e7a4f000000"}]}, 0x6c}, 0x1, 0x0, 0x0, 0x26000001}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3000010, &(0x7f0000000340)={[{@errors_remount}, {@nodioread_nolock}]}, 0x1, 0x512, &(0x7f0000000380)="$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") r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r4, 0x0, 0x40014) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x48) unshare(0x2040400) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r7, 0x78, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r6}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8f7ffffb702000008000000b703000000000000a5000000eeffffff95"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_enter\x00', r8}, 0x10) arch_prctl$ARCH_GET_XCOMP_GUEST_PERM(0x1024, &(0x7f0000000d00)) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEAUTHENTICATE(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x20, r5, 0xfc5, 0x70bd29, 0x4000, {{0x11}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x4}]}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) 841.633478ms ago: executing program 4 (id=6040): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x2c, 0x2, 0x9, 0x5, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x14}, @NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000014}, 0x2000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r2 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000240)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) 796.241702ms ago: executing program 4 (id=6043): r0 = socket$netlink(0x10, 0x3, 0x8000000004) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a0000000400"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r1, &(0x7f0000000480)=""/110, 0x168f6f3d, 0x734, 0x0, 0xfffffffffffffecb) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000080)) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6075ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001500192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000200040010000800014004000000", 0x58}], 0x1) 763.908435ms ago: executing program 2 (id=6046): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000440)='kfree\x00', r1, 0x0, 0x5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)="a6", 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000140)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r3, 0xffffffffffffffff, r2, 0x0) 745.729537ms ago: executing program 1 (id=6047): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000a00), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r2}, 0x10) flock(0xffffffffffffffff, 0x2) 744.186637ms ago: executing program 0 (id=6048): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0xa5) r1 = syz_io_uring_setup(0x73d3, &(0x7f0000000680)={0x0, 0x7d89, 0x10100, 0x3, 0x289}, &(0x7f0000000300)=0x0, &(0x7f0000000700)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x4007, @fd_index=0x3, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1}) io_uring_enter(r1, 0x12a8, 0x24bb, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x7}, 0x18) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='gadgetfs\x00', 0x221000, &(0x7f0000000180)='GPL\x00') setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000140)=[{{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{}, {0x0, 0x0, 0x1, 0x1}}], 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000080000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) 692.025162ms ago: executing program 1 (id=6049): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000440)='kfree\x00', r1, 0x0, 0x5}, 0x18) r2 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)="a6", 0x1, r2) keyctl$KEYCTL_MOVE(0x1e, r3, 0xffffffffffffffff, r2, 0x0) 681.789153ms ago: executing program 1 (id=6050): bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ff"], 0x48) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0xffffd000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000000)='syzkaller\x00', 0x800008, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYRES32=r2, @ANYRES16=r2, @ANYBLOB="43208a4c9ebf08a303d607"], 0x58}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)={0x6c, 0x12, 0x905, 0x70bd2d, 0x25dfdbfb, {0xa, 0x9, 0x4, 0x0, {0x4e22, 0x4e66, [0xfffffffb, 0x7, 0x1, 0x6], [0x1, 0x5, 0x21, 0x2], 0x0, [0xa, 0x1000]}, 0x6, 0xa}, [@INET_DIAG_REQ_BYTECODE={0x20, 0x1, "0891320c0ac9e7a4c6922f2e1f6c071d4914abfaafc08e7a4f000000"}]}, 0x6c}, 0x1, 0x0, 0x0, 0x26000001}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3000010, &(0x7f0000000340)={[{@errors_remount}, {@nodioread_nolock}]}, 0x1, 0x512, &(0x7f0000000380)="$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") r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r4, 0x0, 0x40014) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x48) unshare(0x2040400) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r7, 0x78, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r6}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8f7ffffb702000008000000b703000000000000a5000000eeffffff95"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_enter\x00', r8}, 0x10) arch_prctl$ARCH_GET_XCOMP_GUEST_PERM(0x1024, &(0x7f0000000d00)) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEAUTHENTICATE(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x20, r5, 0xfc5, 0x70bd29, 0x4000, {{0x11}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x4}]}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) 681.366344ms ago: executing program 2 (id=6051): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x6, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0x10a, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x42, 0x0}}, 0x10) 676.250544ms ago: executing program 3 (id=6052): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x7]}, 0x8, 0x800) 641.115188ms ago: executing program 2 (id=6053): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x34, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}]}, 0x34}}, 0x8094) 602.000091ms ago: executing program 0 (id=6054): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000008000000000018000380140003801000018004000300080001"], 0x44}}, 0x0) 601.423531ms ago: executing program 3 (id=6055): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a0000000700000003000084830300000f00000002000000080000001000000000000000030000000e0000000400000000080012861fe50000000002ffc729352a845955f72e302e6100"], &(0x7f00000003c0)=""/56, 0x5e, 0x38, 0x1, 0x8001}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f0000000440), 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0x2000000000000145, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000001000040000000000000000000300000a20000000000a05000000000000000000070000000900010073797a300000000044000000090a010400000000000000000700ffff08000a40000000030900020073797a31000000000900010073797a3000000000080005400000002105000d40930000005c0000000c0a01020000000000000000070000000900020073797a31000000000900010073797a3000000000300003802c0000800400018024000b80100001800c000100636f756e7465720010000180090001006c617374"], 0xe8}, 0x1, 0x0, 0x0, 0x10}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000580)={'macvlan0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r5, @ANYBLOB="00001700000000001c0037800b0001206970768a616e08000c0002800600010000000000050027"], 0x44}, 0x1, 0x0, 0x0, 0x50}, 0x48044) 600.783781ms ago: executing program 2 (id=6056): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000240)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) (fail_nth: 2) 544.231807ms ago: executing program 0 (id=6057): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x2a) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r2) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000010000000800010014000000080003"], 0x30}}, 0x44) 543.677157ms ago: executing program 4 (id=6058): sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000700)=ANY=[@ANYBLOB="0c0400002d0000012dbd7000fbdbdf252000738004004880040051000c001d0073797a5f74756e0008007600", @ANYRES32=0x0, @ANYBLOB="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"], 0x40c}], 0x1, 0x0, 0x0, 0x20004801}, 0x25) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) fcntl$setlease(r1, 0x400, 0x1) open(&(0x7f0000000040)='./file1\x00', 0x80, 0x24) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r3}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r2}, 0x10) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="4c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB='\b\x00?\x00'], 0x4c}, 0x1, 0xba01, 0x0, 0x4004001}, 0x20044890) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 330.532378ms ago: executing program 2 (id=6059): r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) shutdown(0xffffffffffffffff, 0x1) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0x168f6f3d, 0x734, 0x0, 0xfffffffffffffecb) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x348, 0x160, 0x1170, 0x1398, 0x0, 0x1170, 0x2a0, 0x1398, 0x1398, 0x2a0, 0x1398, 0x3, 0x0, {[{{@ipv6={@empty, @loopback, [0x0, 0xff000000], [0xffffff00], 'ip6tnl0\x00', 'veth0_to_hsr\x00', {}, {}, 0x6}, 0x0, 0xf8, 0x160, 0x0, {}, [@common=@inet=@ecn={{0x28}, {0x21}}, @common=@unspec=@addrtype1={{0x28}, {0x94, 0x804, 0x3}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz1\x00'}}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'geneve1\x00', 'veth1_vlan\x00', {}, {}, 0x0, 0x0, 0x0, 0x12}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a8) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) r3 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r4 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6075ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB], 0x0, 0x3, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) keyctl$KEYCTL_MOVE(0x4, r5, r1, r1, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001500192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000200040010000800014004000000", 0x58}], 0x1) 324.002778ms ago: executing program 3 (id=6060): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000440)='kfree\x00', r1, 0x0, 0x5}, 0x18) r2 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)="a6", 0x1, r2) keyctl$KEYCTL_MOVE(0x1e, r3, 0xffffffffffffffff, r2, 0x0) 321.228269ms ago: executing program 0 (id=6061): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x7]}, 0x8, 0x800) 300.809831ms ago: executing program 0 (id=6062): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = memfd_secret(0x80000) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRESHEX, @ANYBLOB="da89367bf3fc17880fa2f4048940c394f56ef820821361419d5f012a8349cf06793649744ccfa091ebd66da68d3ad493ce4a49d538860a1a0f9238f7fa50550ea31e1afaf088ed43ffd8961207e268404fd4108097888ca75d8e9458d374bb5904b12b9a971c46f5ac649b2dea8c9431e338c7deeacd6f20fa1cb8082c7aada3d3dc10991982ff8c2a"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3a}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000002340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000012c0)=ANY=[@ANYRESOCT=r4], &(0x7f0000000100)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000580)=ANY=[@ANYBLOB="23a430e96f11345dba976691d30cc251e304b117d881e9c884b1ba642612c44da3de78418a66759658302f305dcf584b655b9f363b9ab61998468aefd986fa365562830f70e594e009e2ee3c7ef6ffe84a9b6a7d93b77bd9093a4f8f3a9ce3da86c2c7afa2e2d732bffafd195a03794d5c69ff8a2f07af2fac84b5c9a0fde5de05ed05beb8d060f9c85be0a02f879d58f7d5d249e88cc133be98c2a874db1ac69a7609d1a2d8cb9ab643c89f87f032823ac3048f75aa39a4eb77bb338adb2c83cee8323ef308", @ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRES32=0x0, @ANYBLOB="8d9176910761d1602b2fc070847891d959f4b482def04f2ad46e511a2dadd6d8be63ed513d0837b1ed9ae8", @ANYRES64=0x0], 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x30) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000140)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB='/'], 0x20) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x13, r1, 0x0) ftruncate(r1, 0x3) creat(&(0x7f0000000140)='./file0\x00', 0x52) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000020000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000000000202009"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000181100000664f76718214200166e9f90a60ab7f6ad8582c7965b8076bd7c845378e063fcd46a5cf7972f4e586d74a969", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7020000140000e5"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r9}, 0x10) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) ioctl$FICLONERANGE(r9, 0x4020940d, &(0x7f00000001c0)={{r10}, 0x8, 0xffffffffffffffff, 0x100000000}) 300.389521ms ago: executing program 1 (id=6063): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14008}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0xfffffffffffffffe}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=@deltfilter={0x24, 0x2d, 0x200, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x0, 0x10}, {0x4, 0xe}, {0x4, 0xf}}}, 0x24}}, 0x14000000) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'dummy0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c000100", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0xb4}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) 262.132375ms ago: executing program 2 (id=6064): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x24, &(0x7f0000000740)=ANY=[], 0x0) ioctl$EVIOCRMFF(r0, 0x5501, &(0x7f0000000000)=0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) write$vga_arbiter(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='target '], 0x15) syz_emit_ethernet(0x5e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaade9ea3f675c186dd60083ff200280600fe8000000000000000000000000000bbff02000000000000000000000000000100004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="a0000000907800001d12cb3ffa01"], 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0xffffffffffffff54}, 0x18) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r3, 0xfffffffffffffffe, r3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() sendmsg$unix(r4, 0x0, 0x4004881) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdcf, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@block_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@norecovery}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") setxattr$security_ima(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000200), &(0x7f0000000240)=ANY=[], 0x700, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000001d80)=@broute={'broute\x00', 0x20, 0x11, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000c0], 0x11, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000b00000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff8f4221063125"]}, 0x108) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) rename(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='./file1\x00') 260.559605ms ago: executing program 3 (id=6065): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x851) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x401, 0xfffffffe, 0x0, 0xffffffff}, 0x10) close(r1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$smc(&(0x7f0000000200), 0xffffffffffffffff) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) sendto$inet(r3, 0x0, 0xffe5, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xfd}, 0x0, 0x0, 0x4, 0x6, 0x2, 0x101, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x9) msgctl$IPC_RMID(0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x2, 0xf, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x300000a, 0x12, r5, 0x852ac000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') setfsgid(0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r7}, 0x0, &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1d, 0x8, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41002, 0x58, '\x00', 0x0, @fallback=0x2d, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffba) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000101a010000000000000000000500000a3c000000090a010400000000000000000a000004090e00010073797a3100000000080005400000002beb6f0dc80910020073797aa391ce6ac35a1c4b40fffffffc140000001100010000000000000000000100000a"], 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) 259.724125ms ago: executing program 0 (id=6066): syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000440)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200080, &(0x7f0000000000)={[{@errors_remount}, {@noload}, {@bsdgroups}]}, 0x4, 0x56d, &(0x7f0000000c00)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x400000000008d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000074", @ANYRES32=r2], 0x50) (fail_nth: 8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) pipe(0x0) r6 = fsmount(0xffffffffffffffff, 0x1, 0x2) sendmsg$DEVLINK_CMD_RATE_NEW(r6, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x4000) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000240), &(0x7f0000000040)='u:r:untrusted_app:s0:c512,c768\x00', 0x1f, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000280)=ANY=[@ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r7, 0x0, 0xb9}, 0x18) 236.784787ms ago: executing program 1 (id=6067): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xd7, 0x2, 0x0, 0x0, 0x0, 0x6149, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) 92.312751ms ago: executing program 3 (id=6068): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x18) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) listen(r2, 0x20) shutdown(r2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) r3 = inotify_init1(0x0) close(r3) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c000000"], 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100006cc70000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r6}, 0x10) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x178}}, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x42) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r8, 0x0, 0x200000000000006}, 0x18) futex(0x0, 0x80000000000b, 0x4, 0x0, 0x0, 0x0) 59.960944ms ago: executing program 3 (id=6069): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000440)='kfree\x00', r1, 0x0, 0x5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)="a6", 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000140)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r3, 0xffffffffffffffff, r2, 0x0) 0s ago: executing program 1 (id=6070): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0xa5) r1 = syz_io_uring_setup(0x73d3, &(0x7f0000000680)={0x0, 0x7d89, 0x10100, 0x3, 0x289}, &(0x7f0000000300)=0x0, &(0x7f0000000700)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x4007, @fd_index=0x3, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1}) io_uring_enter(r1, 0x12a8, 0x24bb, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x7}, 0x18) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='gadgetfs\x00', 0x221000, &(0x7f0000000180)='GPL\x00') setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000140)=[{{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{}, {0x0, 0x0, 0x1, 0x1}}], 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000080000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) kernel console output (not intermixed with test programs): 9.627054][T16560] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 349.759852][ T565] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.783369][T16570] validate_nla: 3 callbacks suppressed [ 349.783401][T16570] netlink: 'syz.3.4454': attribute type 21 has an invalid length. [ 349.816932][ T565] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.873391][ T565] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.884762][ T565] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.949441][T16570] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 350.112084][T16588] netlink: 'syz.1.4460': attribute type 2 has an invalid length. [ 350.119945][T16588] netlink: 'syz.1.4460': attribute type 3 has an invalid length. [ 350.380397][T16608] lo: entered allmulticast mode [ 350.386005][T16608] tunl0: entered allmulticast mode [ 350.517906][T16608] gre0: entered allmulticast mode [ 350.553392][T16608] gretap0: entered allmulticast mode [ 350.611961][T16608] erspan0: entered allmulticast mode [ 350.639303][T16608] ip_vti0: entered allmulticast mode [ 350.667881][T16608] ip6_vti0: entered allmulticast mode [ 350.696735][T16608] sit0: entered allmulticast mode [ 350.725776][T16608] ip6tnl0: entered allmulticast mode [ 350.758837][T16608] ip6gre0: entered allmulticast mode [ 350.781782][T16608] syz_tun: entered allmulticast mode [ 350.829574][T16608] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.836920][T16608] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.857896][T16608] bridge0: entered allmulticast mode [ 350.873460][T16608] team0: entered allmulticast mode [ 350.878789][T16608] team_slave_0: entered allmulticast mode [ 350.908060][T16608] nlmon0: entered allmulticast mode [ 350.916561][T16608] caif0: entered allmulticast mode [ 350.922285][T16608] batadv0: entered allmulticast mode [ 350.930838][T16608] vxcan0: entered allmulticast mode [ 350.941055][T16608] vxcan1: entered allmulticast mode [ 350.948282][T16608] veth0: entered allmulticast mode [ 350.956163][T16608] veth1: entered allmulticast mode [ 350.966961][T16608] wg0: entered allmulticast mode [ 350.977507][T16608] wg1: entered allmulticast mode [ 350.992942][T16608] wg2: entered allmulticast mode [ 351.002917][T16608] veth0_to_bridge: entered allmulticast mode [ 351.016679][T16608] veth1_to_bridge: entered allmulticast mode [ 351.027103][T16608] veth0_to_bond: entered allmulticast mode [ 351.037257][T16608] bond_slave_0: entered allmulticast mode [ 351.043737][T16608] veth1_to_bond: entered allmulticast mode [ 351.053586][T16608] bond_slave_1: entered allmulticast mode [ 351.060445][T16608] veth0_to_team: entered allmulticast mode [ 351.077759][T16608] veth0_to_batadv: entered allmulticast mode [ 351.087571][T16608] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 351.095991][T16608] batadv_slave_0: entered allmulticast mode [ 351.105759][T16608] veth1_to_batadv: entered allmulticast mode [ 351.114631][T16608] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 351.122825][T16608] batadv_slave_1: entered allmulticast mode [ 351.134828][T16608] xfrm0: entered allmulticast mode [ 351.140721][T16608] veth0_to_hsr: entered allmulticast mode [ 351.148740][T16608] hsr_slave_0: entered allmulticast mode [ 351.160207][T16608] veth1_to_hsr: entered allmulticast mode [ 351.167510][T16608] hsr_slave_1: entered allmulticast mode [ 351.174600][T16608] hsr0: entered allmulticast mode [ 351.181125][T16608] veth1_virt_wifi: entered allmulticast mode [ 351.189149][T16608] veth0_virt_wifi: entered allmulticast mode [ 351.197537][T16608] veth1_vlan: entered allmulticast mode [ 351.250715][T16608] veth0_vlan: entered allmulticast mode [ 351.268843][T16608] vlan0: entered allmulticast mode [ 351.274278][T16608] vlan1: entered allmulticast mode [ 351.279972][T16608] macvlan0: entered allmulticast mode [ 351.288241][T16608] macvlan1: entered allmulticast mode [ 351.304956][T16608] ipvlan0: entered allmulticast mode [ 351.310509][T16608] ipvlan1: entered allmulticast mode [ 351.318718][T16608] veth1_macvtap: entered allmulticast mode [ 351.325824][T16608] veth0_macvtap: entered allmulticast mode [ 351.351281][T16608] macvtap0: entered allmulticast mode [ 351.358673][T16608] macsec0: entered allmulticast mode [ 351.365940][T16608] geneve0: entered allmulticast mode [ 351.382065][T16608] geneve1: entered allmulticast mode [ 351.395312][T16608] bridge1: entered allmulticast mode [ 351.470151][T16608] veth2: entered allmulticast mode [ 351.475525][T16608] veth3: entered allmulticast mode [ 351.480813][T16608] veth4: entered allmulticast mode [ 351.486121][T16608] veth5: entered allmulticast mode [ 351.491351][T16608] veth6: entered allmulticast mode [ 351.496736][T16608] veth7: entered allmulticast mode [ 351.502106][T16608] veth8: entered allmulticast mode [ 351.507484][T16608] veth9: entered allmulticast mode [ 351.512783][T16608] veth10: entered allmulticast mode [ 351.518161][T16608] veth11: entered allmulticast mode [ 351.523467][T16608] veth12: entered allmulticast mode [ 351.528920][T16608] veth13: entered allmulticast mode [ 351.534311][T16608] veth14: entered allmulticast mode [ 351.539639][T16608] veth15: entered allmulticast mode [ 351.545191][T16608] veth16: entered allmulticast mode [ 351.550719][T16608] veth17: entered allmulticast mode [ 351.604651][T16608] bridge2: entered allmulticast mode [ 351.624158][T16608] veth18: entered allmulticast mode [ 351.629692][T16608] veth19: entered allmulticast mode [ 351.635062][T16608] veth20: entered allmulticast mode [ 351.640369][T16608] veth21: entered allmulticast mode [ 351.645900][T16608] veth22: entered allmulticast mode [ 351.651322][T16608] veth23: entered allmulticast mode [ 351.656629][T16608] veth24: entered allmulticast mode [ 351.662085][T16608] veth25: entered allmulticast mode [ 351.676308][T16608] netdevsim netdevsim4 eth0: entered allmulticast mode [ 351.683422][T16608] netdevsim netdevsim4 eth1: entered allmulticast mode [ 351.690759][T16608] netdevsim netdevsim4 eth2: entered allmulticast mode [ 351.697870][T16608] netdevsim netdevsim4 eth3: entered allmulticast mode [ 351.718071][ T12] netdevsim netdevsim4 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.733397][T16644] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.758683][ T12] netdevsim netdevsim4 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.768684][T16651] xt_TPROXY: Can be used only with -p tcp or -p udp [ 351.775842][ T12] netdevsim netdevsim4 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.785726][ T12] netdevsim netdevsim4 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.817249][T16644] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.876802][T16644] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.968663][T16644] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 352.095634][T16682] vlan0: entered allmulticast mode [ 352.237576][T16686] netlink: 'syz.3.4483': attribute type 21 has an invalid length. [ 352.265660][T16688] vlan0: entered allmulticast mode [ 352.310815][T16686] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 352.360476][T16693] __nla_validate_parse: 38 callbacks suppressed [ 352.360498][T16693] netlink: 52 bytes leftover after parsing attributes in process `syz.0.4487'. [ 352.376150][T16693] netlink: 7 bytes leftover after parsing attributes in process `syz.0.4487'. [ 352.385138][T16693] netlink: 52 bytes leftover after parsing attributes in process `syz.0.4487'. [ 352.394195][T16693] netlink: 7 bytes leftover after parsing attributes in process `syz.0.4487'. [ 352.403085][T16693] netlink: 52 bytes leftover after parsing attributes in process `syz.0.4487'. [ 352.480644][T16704] netlink: 'syz.3.4492': attribute type 21 has an invalid length. [ 352.488965][T16704] netlink: 156 bytes leftover after parsing attributes in process `syz.3.4492'. [ 352.498181][T16704] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4492'. [ 352.579248][T16704] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 352.642096][T16712] vlan2: entered allmulticast mode [ 352.654610][ T29] kauditd_printk_skb: 1383 callbacks suppressed [ 352.654629][ T29] audit: type=1326 audit(1760188446.598:42324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16706 comm="syz.0.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 352.684720][ T29] audit: type=1326 audit(1760188446.598:42325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16706 comm="syz.0.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 352.708540][ T29] audit: type=1326 audit(1760188446.598:42326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16706 comm="syz.0.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 352.732410][ T29] audit: type=1326 audit(1760188446.598:42327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16706 comm="syz.0.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 352.757510][ T29] audit: type=1326 audit(1760188446.598:42328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16706 comm="syz.0.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 352.781330][ T29] audit: type=1326 audit(1760188446.598:42329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16706 comm="syz.0.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 352.805194][ T29] audit: type=1326 audit(1760188446.598:42330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16706 comm="syz.0.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 352.828893][ T29] audit: type=1326 audit(1760188446.598:42331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16706 comm="syz.0.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 352.852667][ T29] audit: type=1326 audit(1760188446.598:42332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16706 comm="syz.0.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 352.876372][ T29] audit: type=1326 audit(1760188446.598:42333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16706 comm="syz.0.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 352.976076][T16716] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4496'. [ 353.005518][T16718] netlink: 24 bytes leftover after parsing attributes in process `syz.3.4497'. [ 353.014770][T16718] IPVS: Error connecting to the multicast addr [ 353.042894][T16722] vlan0: entered allmulticast mode [ 353.138988][T16728] 9pnet: Could not find request transport: fd rejected, already enabled [ 356.811308][T16901] netlink: 'syz.0.4560': attribute type 21 has an invalid length. [ 356.824621][T16901] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 356.840842][T16898] siw: device registration error -23 [ 357.090989][T16913] vlan0: entered allmulticast mode [ 357.232746][T16915] tipc: Started in network mode [ 357.237791][T16915] tipc: Node identity ac14140f, cluster identity 4711 [ 357.272129][T16915] tipc: New replicast peer: 255.255.255.255 [ 357.278466][T16915] tipc: Enabled bearer , priority 10 [ 357.476542][T16921] __nla_validate_parse: 25 callbacks suppressed [ 357.476558][T16921] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4567'. [ 357.492644][T16921] IPVS: Unknown mcast interface: ipvlan1 [ 357.566602][T16926] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 357.617538][T16926] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 357.664486][ T29] kauditd_printk_skb: 1387 callbacks suppressed [ 357.664506][ T29] audit: type=1326 audit(1760188451.608:43721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16904 comm="syz.1.4561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe1d6edaf79 code=0x7ffc0000 [ 357.698858][T16931] netlink: 'syz.3.4569': attribute type 2 has an invalid length. [ 357.706871][T16931] netlink: 'syz.3.4569': attribute type 3 has an invalid length. [ 357.714660][T16931] netlink: 132 bytes leftover after parsing attributes in process `syz.3.4569'. [ 357.729606][T16926] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 357.796592][T16926] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 357.817164][T16933] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4570'. [ 357.826401][T16933] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4570'. [ 357.961335][ T52] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 357.982599][ T29] audit: type=1326 audit(1760188451.678:43722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16904 comm="syz.1.4561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe1d6f35d67 code=0x7ffc0000 [ 358.006226][ T29] audit: type=1326 audit(1760188451.678:43723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16904 comm="syz.1.4561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe1d6edaf79 code=0x7ffc0000 [ 358.029836][ T29] audit: type=1326 audit(1760188451.678:43724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16904 comm="syz.1.4561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 358.044553][ T52] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.053524][ T29] audit: type=1326 audit(1760188451.688:43725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16904 comm="syz.1.4561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe1d6f35d67 code=0x7ffc0000 [ 358.061908][ T52] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.085813][ T29] audit: type=1326 audit(1760188451.688:43726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16904 comm="syz.1.4561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe1d6edaf79 code=0x7ffc0000 [ 358.085888][ T29] audit: type=1326 audit(1760188451.688:43727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16904 comm="syz.1.4561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 358.085916][ T29] audit: type=1326 audit(1760188451.688:43728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16904 comm="syz.1.4561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe1d6f35d67 code=0x7ffc0000 [ 358.094552][ T52] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.117687][ T29] audit: type=1326 audit(1760188451.688:43729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16904 comm="syz.1.4561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe1d6edaf79 code=0x7ffc0000 [ 358.117774][ T29] audit: type=1326 audit(1760188451.688:43730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16904 comm="syz.1.4561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 358.314493][T16950] vlan2: entered allmulticast mode [ 358.322726][T16942] 9pnet: Could not find request transport: fd rejected, already enabled [ 360.275682][T17137] sctp: [Deprecated]: syz.1.4651 (pid 17137) Use of int in max_burst socket option. [ 360.275682][T17137] Use struct sctp_assoc_value instead [ 360.334341][T17153] netlink: 'syz.4.4657': attribute type 21 has an invalid length. [ 360.343341][T17153] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 360.593699][T17176] tipc: Started in network mode [ 360.598817][T17176] tipc: Node identity ac14140f, cluster identity 4711 [ 360.606631][T17176] tipc: New replicast peer: 255.255.255.255 [ 360.612714][T17176] tipc: Enabled bearer , priority 10 [ 360.869348][T17196] sctp: [Deprecated]: syz.2.4674 (pid 17196) Use of int in max_burst socket option. [ 360.869348][T17196] Use struct sctp_assoc_value instead [ 361.506748][T17236] 9pnet: Could not find request transport: fd rejected, already enabled [ 365.485826][T17555] 9pnet: Could not find request transport: fd rejected, already enabled [ 371.841969][T17802] xt_TPROXY: Can be used only with -p tcp or -p udp [ 372.955805][T17835] 9pnet: Could not find request transport: fd rejected, already enabled [ 373.256000][T17855] vlan2: entered allmulticast mode [ 373.339444][T17861] IPVS: Unknown mcast interface: ipvlan1 [ 373.699465][T17882] IPVS: Error connecting to the multicast addr [ 373.834920][T17896] batadv0: entered promiscuous mode [ 373.895394][T17896] __nla_validate_parse: 12 callbacks suppressed [ 373.895415][T17896] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4935'. [ 374.031450][T17909] vlan2: entered allmulticast mode [ 374.239877][T17918] 9pnet: Could not find request transport: fd rejected, already enabled [ 375.209971][T17948] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4954'. [ 375.292520][T17958] lo speed is unknown, defaulting to 1000 [ 375.479248][T17954] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 375.491322][T17954] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 376.054845][T17984] netlink: 24 bytes leftover after parsing attributes in process `syz.3.4966'. [ 376.064017][T17984] IPVS: Error connecting to the multicast addr [ 376.145222][T17989] netlink: 24 bytes leftover after parsing attributes in process `syz.1.4967'. [ 376.183351][T17994] netlink: 'syz.3.4970': attribute type 2 has an invalid length. [ 376.191301][T17994] netlink: 'syz.3.4970': attribute type 3 has an invalid length. [ 376.199177][T17994] netlink: 132 bytes leftover after parsing attributes in process `syz.3.4970'. [ 376.316159][T18008] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4977'. [ 376.384871][T18012] vlan2: entered allmulticast mode [ 376.445261][T18023] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4984'. [ 376.456771][T18000] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 376.471039][T18000] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 376.545646][T18031] netlink: 16 bytes leftover after parsing attributes in process `syz.2.4989'. [ 376.554883][T18031] netlink: 24 bytes leftover after parsing attributes in process `syz.2.4989'. [ 376.976499][T18058] siw: device registration error -23 [ 377.292789][T18076] netlink: 'syz.2.5003': attribute type 21 has an invalid length. [ 377.301111][T18076] netlink: 156 bytes leftover after parsing attributes in process `syz.2.5003'. [ 377.417948][T18080] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 377.595164][T18086] xt_TPROXY: Can be used only with -p tcp or -p udp [ 377.826052][T18095] netlink: 'syz.4.5012': attribute type 2 has an invalid length. [ 377.833896][T18095] netlink: 'syz.4.5012': attribute type 3 has an invalid length. [ 377.876566][T18100] tipc: Enabling of bearer rejected, already enabled [ 377.936748][T18108] xt_TPROXY: Can be used only with -p tcp or -p udp [ 378.006525][T18110] netlink: 'syz.4.5019': attribute type 21 has an invalid length. [ 378.014455][T18110] netlink: 'syz.4.5019': attribute type 5 has an invalid length. [ 378.035627][T18117] 9pnet: Could not find request transport: fd rejected, already enabled [ 378.272875][T18151] 9pnet: Could not find request transport: fd rejected, already enabled [ 380.751081][ T29] audit: type=1326 audit(1760188474.698:49756): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18293 comm="syz.4.5087" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f442c28eec9 code=0x0 [ 380.829405][ T29] audit: type=1326 audit(1760188474.768:49757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18301 comm="syz.1.5093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 380.853305][ T29] audit: type=1326 audit(1760188474.778:49758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18301 comm="syz.1.5093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 380.877622][ T29] audit: type=1326 audit(1760188474.778:49759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18301 comm="syz.1.5093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 380.901362][ T29] audit: type=1326 audit(1760188474.778:49760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18301 comm="syz.1.5093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 380.925253][ T29] audit: type=1326 audit(1760188474.778:49761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18301 comm="syz.1.5093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 380.949220][ T29] audit: type=1326 audit(1760188474.778:49762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18301 comm="syz.1.5093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=447 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 380.973043][ T29] audit: type=1326 audit(1760188474.778:49763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18301 comm="syz.1.5093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 380.996673][ T29] audit: type=1326 audit(1760188474.778:49764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18301 comm="syz.1.5093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe1d6f3eec9 code=0x7ffc0000 [ 381.196789][T18329] validate_nla: 6 callbacks suppressed [ 381.196806][T18329] netlink: 'syz.3.5102': attribute type 21 has an invalid length. [ 381.246929][T18331] 9pnet: Could not find request transport: fd rejected, already enabled [ 381.547130][T18367] vlan2: entered allmulticast mode [ 381.599307][T18377] netlink: 'syz.4.5119': attribute type 21 has an invalid length. [ 381.608194][T18377] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 381.776361][T18403] xt_TPROXY: Can be used only with -p tcp or -p udp [ 381.838389][T18417] vlan2: entered allmulticast mode [ 381.931192][T18419] netlink: 'syz.3.5132': attribute type 21 has an invalid length. [ 381.939431][T18419] netlink: 'syz.3.5132': attribute type 5 has an invalid length. [ 382.194601][T18446] 9pnet: Could not find request transport: fd rejected, already enabled [ 383.323189][T18520] netlink: 'syz.2.5171': attribute type 2 has an invalid length. [ 383.331203][T18520] netlink: 'syz.2.5171': attribute type 3 has an invalid length. [ 383.484345][T18529] netlink: 'syz.4.5176': attribute type 21 has an invalid length. [ 383.588357][T18539] IPVS: set_ctl: invalid protocol: 60 224.0.0.2:20000 [ 383.597830][T18539] 0ªX¹¦À: renamed from caif0 [ 383.605212][T18543] xt_TPROXY: Can be used only with -p tcp or -p udp [ 383.614758][T18539] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 383.644872][T18539] 9pnet: Could not find request transport: rdmaø³q¥J [ 383.674111][T18554] vlan2: entered allmulticast mode [ 384.034923][T18593] xt_TPROXY: Can be used only with -p tcp or -p udp [ 384.150362][T18601] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 384.432077][T18608] vlan2: entered allmulticast mode [ 384.734791][T18616] __nla_validate_parse: 115 callbacks suppressed [ 384.734809][T18616] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5207'. [ 384.766278][T18618] netlink: 156 bytes leftover after parsing attributes in process `syz.1.5211'. [ 384.775731][T18618] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5211'. [ 384.891256][T18623] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5213'. [ 384.925732][T18626] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5214'. [ 384.935140][T18626] netlink: 7 bytes leftover after parsing attributes in process `syz.1.5214'. [ 384.944092][T18626] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5214'. [ 384.953574][T18626] netlink: 7 bytes leftover after parsing attributes in process `syz.1.5214'. [ 384.962466][T18626] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5214'. [ 385.097340][T18630] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5216'. [ 385.342973][T18645] FAULT_INJECTION: forcing a failure. [ 385.342973][T18645] name failslab, interval 1, probability 0, space 0, times 0 [ 385.355782][T18645] CPU: 0 UID: 0 PID: 18645 Comm: syz.1.5221 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 385.355830][T18645] Tainted: [W]=WARN [ 385.355837][T18645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 385.355850][T18645] Call Trace: [ 385.355901][T18645] [ 385.355911][T18645] __dump_stack+0x1d/0x30 [ 385.355937][T18645] dump_stack_lvl+0xe8/0x140 [ 385.355995][T18645] dump_stack+0x15/0x1b [ 385.356018][T18645] should_fail_ex+0x265/0x280 [ 385.356128][T18645] should_failslab+0x8c/0xb0 [ 385.356166][T18645] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 385.356204][T18645] ? __alloc_skb+0x101/0x320 [ 385.356239][T18645] __alloc_skb+0x101/0x320 [ 385.356296][T18645] rtmsg_ifinfo_build_skb+0x5f/0x1b0 [ 385.356369][T18645] ? __pfx_team_close+0x10/0x10 [ 385.356409][T18645] rtmsg_ifinfo+0x6d/0x110 [ 385.356451][T18645] netif_close_many+0x14d/0x240 [ 385.356485][T18645] ? __pfx_unregister_netdevice_queue+0x10/0x10 [ 385.356517][T18645] unregister_netdevice_many_notify+0x437/0x15d0 [ 385.356554][T18645] ? __kernel_text_address+0xd/0x40 [ 385.356671][T18645] ? cmp_ex_search+0x25/0x40 [ 385.356711][T18645] ? __pfx_unregister_netdevice_queue+0x10/0x10 [ 385.356821][T18645] rtnl_dellink+0x3cb/0x550 [ 385.356860][T18645] ? fixup_exception+0x741/0xd50 [ 385.356946][T18645] ? selinux_capable+0x31/0x40 [ 385.356974][T18645] ? security_capable+0x83/0x90 [ 385.357022][T18645] ? ns_capable+0x7d/0xb0 [ 385.357112][T18645] ? __pfx_rtnl_dellink+0x10/0x10 [ 385.357206][T18645] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 385.357263][T18645] netlink_rcv_skb+0x120/0x220 [ 385.357291][T18645] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 385.357338][T18645] rtnetlink_rcv+0x1c/0x30 [ 385.357493][T18645] netlink_unicast+0x5bd/0x690 [ 385.357532][T18645] netlink_sendmsg+0x58b/0x6b0 [ 385.357635][T18645] ? __pfx_netlink_sendmsg+0x10/0x10 [ 385.357675][T18645] __sock_sendmsg+0x145/0x180 [ 385.357696][T18645] ____sys_sendmsg+0x31e/0x4e0 [ 385.357729][T18645] ___sys_sendmsg+0x17b/0x1d0 [ 385.357838][T18645] __x64_sys_sendmsg+0xd4/0x160 [ 385.357882][T18645] x64_sys_call+0x191e/0x3000 [ 385.357905][T18645] do_syscall_64+0xd2/0x200 [ 385.357930][T18645] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 385.357991][T18645] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 385.358035][T18645] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 385.358115][T18645] RIP: 0033:0x7fe1d6f3eec9 [ 385.358141][T18645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 385.358196][T18645] RSP: 002b:00007fe1d599f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 385.358222][T18645] RAX: ffffffffffffffda RBX: 00007fe1d7195fa0 RCX: 00007fe1d6f3eec9 [ 385.358240][T18645] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000008 [ 385.358263][T18645] RBP: 00007fe1d599f090 R08: 0000000000000000 R09: 0000000000000000 [ 385.358284][T18645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 385.358300][T18645] R13: 00007fe1d7196038 R14: 00007fe1d7195fa0 R15: 00007fff9af726a8 [ 385.358326][T18645] [ 385.697262][T18645] team0 (unregistering): Port device team_slave_0 removed [ 385.734967][ T29] kauditd_printk_skb: 1637 callbacks suppressed [ 385.734985][ T29] audit: type=1326 audit(1760188479.668:51402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18619 comm="syz.4.5212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f442c285d67 code=0x7ffc0000 [ 385.764796][ T29] audit: type=1326 audit(1760188479.668:51403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18619 comm="syz.4.5212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f442c22af79 code=0x7ffc0000 [ 385.788901][ T29] audit: type=1326 audit(1760188479.668:51404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18619 comm="syz.4.5212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f442c28eec9 code=0x7ffc0000 [ 385.812909][ T29] audit: type=1326 audit(1760188479.668:51405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18619 comm="syz.4.5212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f442c285d67 code=0x7ffc0000 [ 385.836862][ T29] audit: type=1326 audit(1760188479.668:51406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18619 comm="syz.4.5212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f442c22af79 code=0x7ffc0000 [ 385.861113][ T29] audit: type=1326 audit(1760188479.668:51407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18619 comm="syz.4.5212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f442c28eec9 code=0x7ffc0000 [ 385.885119][ T29] audit: type=1326 audit(1760188479.678:51408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18619 comm="syz.4.5212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f442c285d67 code=0x7ffc0000 [ 385.908818][ T29] audit: type=1326 audit(1760188479.678:51409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18619 comm="syz.4.5212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f442c22af79 code=0x7ffc0000 [ 385.932564][ T29] audit: type=1326 audit(1760188479.678:51410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18619 comm="syz.4.5212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f442c28eec9 code=0x7ffc0000 [ 385.957844][ T29] audit: type=1326 audit(1760188479.688:51411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18619 comm="syz.4.5212" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f442c285d67 code=0x7ffc0000 [ 386.016999][T18658] 9pnet: Could not find request transport: fd rejected, already enabled [ 390.508444][T18985] siw: device registration error -23 [ 390.599022][T18989] netlink: 24 bytes leftover after parsing attributes in process `syz.0.5357'. [ 390.698578][T19000] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 390.753908][T18998] vlan2: entered allmulticast mode [ 390.930655][ T29] kauditd_printk_skb: 960 callbacks suppressed [ 390.930675][ T29] audit: type=1326 audit(1760188484.878:52372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19007 comm="syz.0.5366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 390.960782][ T29] audit: type=1326 audit(1760188484.878:52373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19007 comm="syz.0.5366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=8 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 390.984456][ T29] audit: type=1326 audit(1760188484.878:52374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19007 comm="syz.0.5366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 391.008250][ T29] audit: type=1326 audit(1760188484.878:52375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19007 comm="syz.0.5366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 391.046718][ T29] audit: type=1326 audit(1760188484.958:52376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19007 comm="syz.0.5366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 391.070782][ T29] audit: type=1326 audit(1760188484.958:52377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19007 comm="syz.0.5366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 391.094616][ T29] audit: type=1326 audit(1760188484.958:52378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19012 comm="syz.0.5366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7feab3551785 code=0x7ffc0000 [ 391.133463][ T29] audit: type=1326 audit(1760188484.998:52379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19007 comm="syz.0.5366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 391.157248][ T29] audit: type=1326 audit(1760188484.998:52380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19007 comm="syz.0.5366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 391.180956][ T29] audit: type=1326 audit(1760188484.998:52381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19007 comm="syz.0.5366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 391.239820][T19018] netlink: 'syz.1.5370': attribute type 21 has an invalid length. [ 391.249438][T19018] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 391.302220][T19020] vlan2: entered allmulticast mode [ 391.505926][T19046] netlink: 'syz.1.5383': attribute type 21 has an invalid length. [ 391.515122][T19046] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 391.661936][T19058] vlan2: entered allmulticast mode [ 391.830490][T19062] netlink: 'syz.0.5390': attribute type 21 has an invalid length. [ 391.844617][T19062] netlink: 'syz.0.5390': attribute type 5 has an invalid length. [ 391.890878][T19072] xt_TPROXY: Can be used only with -p tcp or -p udp [ 391.948863][T19074] netlink: 'syz.0.5395': attribute type 21 has an invalid length. [ 391.977402][T19074] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 392.057020][T19076] 9pnet: Could not find request transport: fd rejected, already enabled [ 392.487886][T19099] sctp: [Deprecated]: syz.0.5404 (pid 19099) Use of int in max_burst socket option. [ 392.487886][T19099] Use struct sctp_assoc_value instead [ 392.962066][T19126] netlink: 'syz.2.5414': attribute type 21 has an invalid length. [ 392.970329][T19126] netlink: 'syz.2.5414': attribute type 5 has an invalid length. [ 393.355865][T19152] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 393.513608][T19158] netlink: 'syz.0.5426': attribute type 21 has an invalid length. [ 393.535765][T19169] vlan2: entered allmulticast mode [ 393.548251][T19158] netlink: 'syz.0.5426': attribute type 5 has an invalid length. [ 393.770759][T19184] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 394.654875][T19236] xt_TPROXY: Can be used only with -p tcp or -p udp [ 395.179006][T19253] __nla_validate_parse: 48 callbacks suppressed [ 395.179028][T19253] netlink: 148 bytes leftover after parsing attributes in process `syz.2.5463'. [ 395.246685][T19259] xt_TPROXY: Can be used only with -p tcp or -p udp [ 395.350258][T19272] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5470'. [ 395.375474][T19272] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5470'. [ 395.437440][T19279] xt_TPROXY: Can be used only with -p tcp or -p udp [ 395.468284][T19282] vlan2: entered allmulticast mode [ 395.572879][T19291] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5477'. [ 395.649503][T19299] netlink: 'syz.0.5480': attribute type 13 has an invalid length. [ 395.657973][T19299] netlink: 'syz.0.5480': attribute type 17 has an invalid length. [ 395.723816][T19299] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 395.740010][T16629] lo speed is unknown, defaulting to 1000 [ 395.746054][T16629] syz0: Port: 1 Link ACTIVE [ 395.770643][T19303] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5482'. [ 395.806936][T19307] tipc: Enabling of bearer rejected, already enabled [ 395.849771][T19314] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 395.856011][T19311] 9pnet: Could not find request transport: fd rejected, already enabled [ 399.510643][T19461] xt_TPROXY: Can be used only with -p tcp or -p udp [ 399.623211][T19466] netlink: 'syz.2.5536': attribute type 21 has an invalid length. [ 399.732704][T19470] vlan2: entered allmulticast mode [ 399.741687][T19471] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 400.096643][T19498] vlan2: entered allmulticast mode [ 400.167757][T19499] siw: device registration error -23 [ 400.263767][T19505] __nla_validate_parse: 61 callbacks suppressed [ 400.263787][T19505] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5551'. [ 400.279301][T19505] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5551'. [ 400.288398][T19505] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5551'. [ 400.309073][T19505] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5551'. [ 400.318201][T19505] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5551'. [ 400.327395][T19505] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5551'. [ 400.357499][T19505] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5551'. [ 400.366630][T19505] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5551'. [ 400.375730][T19505] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5551'. [ 400.463428][T19511] netlink: 'syz.3.5552': attribute type 21 has an invalid length. [ 400.471507][T19511] netlink: 128 bytes leftover after parsing attributes in process `syz.3.5552'. [ 400.481393][T19511] netlink: 'syz.3.5552': attribute type 5 has an invalid length. [ 400.611030][T19521] tipc: Enabling of bearer rejected, already enabled [ 400.651936][T19515] netlink: 'syz.2.5554': attribute type 21 has an invalid length. [ 400.669631][T19515] netlink: 'syz.2.5554': attribute type 5 has an invalid length. [ 401.059157][T19557] vlan2: entered allmulticast mode [ 401.066514][ T29] kauditd_printk_skb: 1689 callbacks suppressed [ 401.066530][ T29] audit: type=1326 audit(1760188495.008:55473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19551 comm="syz.2.5571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f834b4beec9 code=0x7ffc0000 [ 401.096909][ T29] audit: type=1326 audit(1760188495.008:55474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19551 comm="syz.2.5571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f834b4beec9 code=0x7ffc0000 [ 401.120859][ T29] audit: type=1326 audit(1760188495.008:55475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19551 comm="syz.2.5571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f834b4beec9 code=0x7ffc0000 [ 401.144743][ T29] audit: type=1326 audit(1760188495.008:55476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19551 comm="syz.2.5571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f834b4beec9 code=0x7ffc0000 [ 401.168589][ T29] audit: type=1326 audit(1760188495.008:55477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19551 comm="syz.2.5571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f834b4beec9 code=0x7ffc0000 [ 401.192386][ T29] audit: type=1326 audit(1760188495.008:55478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19551 comm="syz.2.5571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f834b4beec9 code=0x7ffc0000 [ 401.216122][ T29] audit: type=1326 audit(1760188495.008:55479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19551 comm="syz.2.5571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f834b4beec9 code=0x7ffc0000 [ 401.240227][ T29] audit: type=1326 audit(1760188495.008:55480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19551 comm="syz.2.5571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7f834b4beec9 code=0x7ffc0000 [ 401.264204][ T29] audit: type=1326 audit(1760188495.008:55481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19551 comm="syz.2.5571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f834b4beec9 code=0x7ffc0000 [ 401.287872][ T29] audit: type=1326 audit(1760188495.008:55482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19551 comm="syz.2.5571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f834b4beec9 code=0x7ffc0000 [ 401.616352][T19584] netlink: 'syz.3.5584': attribute type 21 has an invalid length. [ 401.626991][T19584] netlink: 'syz.3.5584': attribute type 5 has an invalid length. [ 401.638128][T19590] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 401.702480][T19597] tipc: Enabling of bearer rejected, already enabled [ 401.868164][T19622] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 402.054715][T19635] tipc: Enabling of bearer rejected, already enabled [ 402.347984][T19631] lo speed is unknown, defaulting to 1000 [ 402.456275][T19660] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 402.520111][T19631] chnl_net:caif_netlink_parms(): no params data found [ 402.562295][ T31] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 402.613503][T19678] FAULT_INJECTION: forcing a failure. [ 402.613503][T19678] name failslab, interval 1, probability 0, space 0, times 0 [ 402.626497][T19678] CPU: 1 UID: 0 PID: 19678 Comm: syz.1.5617 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 402.626607][T19678] Tainted: [W]=WARN [ 402.626617][T19678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 402.626635][T19678] Call Trace: [ 402.626642][T19678] [ 402.626652][T19678] __dump_stack+0x1d/0x30 [ 402.626674][T19678] dump_stack_lvl+0xe8/0x140 [ 402.626697][T19678] dump_stack+0x15/0x1b [ 402.626713][T19678] should_fail_ex+0x265/0x280 [ 402.626837][T19678] should_failslab+0x8c/0xb0 [ 402.626866][T19678] kmem_cache_alloc_noprof+0x50/0x480 [ 402.626898][T19678] ? security_inode_alloc+0x37/0x100 [ 402.626979][T19678] security_inode_alloc+0x37/0x100 [ 402.627005][T19678] inode_init_always_gfp+0x4b7/0x500 [ 402.627100][T19678] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 402.627129][T19678] alloc_inode+0x58/0x170 [ 402.627159][T19678] new_inode+0x1d/0xe0 [ 402.627189][T19678] shmem_get_inode+0x244/0x750 [ 402.627211][T19678] __shmem_file_setup+0x113/0x210 [ 402.627315][T19678] shmem_file_setup+0x3b/0x50 [ 402.627404][T19678] __se_sys_memfd_create+0x2c3/0x590 [ 402.627431][T19678] __x64_sys_memfd_create+0x31/0x40 [ 402.627453][T19678] x64_sys_call+0x2ac2/0x3000 [ 402.627541][T19678] do_syscall_64+0xd2/0x200 [ 402.627569][T19678] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 402.627597][T19678] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 402.627626][T19678] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 402.627714][T19678] RIP: 0033:0x7fe1d6f3eec9 [ 402.627732][T19678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.627759][T19678] RSP: 002b:00007fe1d599ee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 402.627783][T19678] RAX: ffffffffffffffda RBX: 000000000000051c RCX: 00007fe1d6f3eec9 [ 402.627800][T19678] RDX: 00007fe1d599eef0 RSI: 0000000000000000 RDI: 00007fe1d6fc2960 [ 402.627818][T19678] RBP: 0000200000000200 R08: 00007fe1d599ebb7 R09: 00007fe1d599ee40 [ 402.627835][T19678] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000780 [ 402.627889][T19678] R13: 00007fe1d599eef0 R14: 00007fe1d599eeb0 R15: 0000200000000840 [ 402.627918][T19678] [ 402.873609][T19631] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.880839][T19631] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.888243][T19631] bridge_slave_0: entered allmulticast mode [ 402.896521][T19631] bridge_slave_0: entered promiscuous mode [ 402.905761][ T31] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 402.918176][T19631] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.925426][T19631] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.933320][T19631] bridge_slave_1: entered allmulticast mode [ 402.940307][T19631] bridge_slave_1: entered promiscuous mode [ 403.919386][ T31] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 404.041440][T19689] 9pnet: Could not find request transport: fd [ 405.045460][ T31] tipc: Left network mode [ 405.084264][ T31] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 405.092079][ T31] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 405.152626][ T31] veth1_macvtap: left promiscuous mode [ 405.165652][ T31] veth0_macvtap: left promiscuous mode [ 405.190305][ T31] veth1_vlan: left promiscuous mode [ 405.208286][ T31] veth0_vlan: left promiscuous mode [ 406.081268][ T29] kauditd_printk_skb: 992 callbacks suppressed [ 406.081283][ T29] audit: type=1326 audit(1760188500.028:56475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19739 comm="syz.0.5637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 406.148308][T19742] netlink: 'syz.4.5639': attribute type 21 has an invalid length. [ 406.181325][ T29] audit: type=1326 audit(1760188500.068:56476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19739 comm="syz.0.5637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 406.205530][ T29] audit: type=1326 audit(1760188500.068:56477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19739 comm="syz.0.5637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 406.229329][ T29] audit: type=1326 audit(1760188500.068:56478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19739 comm="syz.0.5637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feab351eec9 code=0x7ffc0000 [ 406.260723][T19745] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 406.286065][ T29] audit: type=1326 audit(1760188500.238:56479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19741 comm="syz.4.5639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f442c28eec9 code=0x7ffc0000 [ 406.310052][ T29] audit: type=1326 audit(1760188500.238:56480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19741 comm="syz.4.5639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f442c28eec9 code=0x7ffc0000 [ 406.334000][ T29] audit: type=1326 audit(1760188500.238:56481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19741 comm="syz.4.5639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f442c28eec9 code=0x7ffc0000 [ 406.358033][ T29] audit: type=1326 audit(1760188500.258:56482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19741 comm="syz.4.5639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f442c28eec9 code=0x7ffc0000 [ 406.358217][ T31] team0 (unregistering): Port device team_slave_0 removed [ 406.381879][ T29] audit: type=1326 audit(1760188500.258:56483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19741 comm="syz.4.5639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f442c28eec9 code=0x7ffc0000 [ 406.413085][ T29] audit: type=1326 audit(1760188500.258:56484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19741 comm="syz.4.5639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f442c28eec9 code=0x7ffc0000 [ 406.502565][T19742] __nla_validate_parse: 44 callbacks suppressed [ 406.502585][T19742] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5639'. [ 406.518222][T19742] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5639'. [ 406.527519][T19744] tipc: Enabling of bearer rejected, already enabled [ 406.600258][T19754] netlink: 'syz.1.5642': attribute type 21 has an invalid length. [ 406.608230][T19754] netlink: 128 bytes leftover after parsing attributes in process `syz.1.5642'. [ 406.626054][T19754] netlink: 'syz.1.5642': attribute type 5 has an invalid length. [ 406.633946][T19754] netlink: 3 bytes leftover after parsing attributes in process `syz.1.5642'. [ 406.858910][T19780] netlink: 'syz.1.5654': attribute type 2 has an invalid length. [ 406.867143][T19780] netlink: 'syz.1.5654': attribute type 3 has an invalid length. [ 406.875008][T19780] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5654'. [ 406.960356][T19785] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5656'. [ 406.978715][T19631] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 407.019670][T19631] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 407.050592][T19631] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 407.077508][T19631] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 407.084335][T19787] 9pnet: Could not find request transport: fd [ 412.541283][T20094] __dump_stack+0x1d/0x30 [ 412.541311][T20094] dump_stack_lvl+0xe8/0x140 [ 412.541345][T20094] dump_stack+0x15/0x1b [ 412.541404][T20094] should_fail_ex+0x265/0x280 [ 412.541581][T20094] should_fail+0xb/0x20 [ 412.541619][T20094] should_fail_usercopy+0x1a/0x20 [ 412.541661][T20094] _copy_from_user+0x1c/0xb0 [ 412.541688][T20094] __se_sys_mount+0x10d/0x2e0 [ 412.541712][T20094] ? fput+0x8f/0xc0 [ 412.541881][T20094] ? ksys_write+0x192/0x1a0 [ 412.541913][T20094] __x64_sys_mount+0x67/0x80 [ 412.541940][T20094] x64_sys_call+0x2b51/0x3000 [ 412.541964][T20094] do_syscall_64+0xd2/0x200 [ 412.542007][T20094] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 412.542040][T20094] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 412.542068][T20094] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 412.542076][ T565] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 412.542097][T20094] RIP: 0033:0x7f812b97eec9 [ 412.542153][T20094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.542188][T20094] RSP: 002b:00007f812a3e7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 412.542218][T20094] RAX: ffffffffffffffda RBX: 00007f812bbd5fa0 RCX: 00007f812b97eec9 [ 412.542239][T20094] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000000 [ 412.542258][T20094] RBP: 00007f812a3e7090 R08: 0000200000000000 R09: 0000000000000000 [ 412.542276][T20094] R10: 0000000002390024 R11: 0000000000000246 R12: 0000000000000001 [ 412.542295][T20094] R13: 00007f812bbd6038 R14: 00007f812bbd5fa0 R15: 00007ffddeabd578 [ 412.542324][T20094] [ 412.743459][ T565] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 412.784228][T20105] netlink: 24 bytes leftover after parsing attributes in process `syz.2.5777'. [ 412.785724][T20113] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5780'. [ 412.812299][T20105] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5777'. [ 412.833075][T20105] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 412.855646][T20105] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 412.888987][T20118] tipc: Enabling of bearer rejected, already enabled [ 413.174626][T20131] SELinux: Context system_u:object_r:system_cron_spool_t:s0 is not valid (left unmapped). [ 413.187071][T20133] xt_TPROXY: Can be used only with -p tcp or -p udp [ 413.252108][T20141] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5791'. [ 413.347904][T20149] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5795'. [ 413.552297][T20167] 9pnet: Could not find request transport: fd [ 417.444974][ T31] tipc: Left network mode [ 417.447373][T20150] veth1_vlan: entered promiscuous mode [ 417.457884][ T31] hsr_slave_0: left promiscuous mode [ 417.463586][ T31] hsr_slave_1: left promiscuous mode [ 417.469329][ T31] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 417.476970][ T31] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 417.488173][ T31] veth1_macvtap: left promiscuous mode [ 417.493724][ T31] veth0_macvtap: left promiscuous mode [ 417.701501][ T36] lo speed is unknown, defaulting to 1000 [ 417.707423][ T36] infiniband syz0: ib_query_port failed (-19) [ 417.730402][T20150] veth0_macvtap: entered promiscuous mode [ 417.756358][T20417] __nla_validate_parse: 24 callbacks suppressed [ 417.756381][T20417] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5890'. [ 417.776657][T20150] veth1_macvtap: entered promiscuous mode [ 417.794457][T20150] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 417.817483][T20150] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 417.905376][ T29] kauditd_printk_skb: 1166 callbacks suppressed [ 417.905398][ T29] audit: type=1400 audit(1760188511.395:59004): avc: denied { create } for pid=20420 comm="syz.1.5891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 417.945488][T20423] netlink: 5452 bytes leftover after parsing attributes in process `syz.2.5892'. [ 417.968208][ T565] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.020555][ T565] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.132160][ T565] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.141528][ T29] audit: type=1400 audit(1760188511.423:59005): avc: denied { connect } for pid=20420 comm="syz.1.5891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 418.161970][ T29] audit: type=1400 audit(1760188511.607:59006): avc: denied { read } for pid=20420 comm="syz.1.5891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 418.189127][ T565] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.201985][ T29] audit: type=1326 audit(1760188511.653:59007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20430 comm="syz.3.5894" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cce64eec9 code=0x7ffc0000 [ 418.226086][ T29] audit: type=1326 audit(1760188511.653:59008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20430 comm="syz.3.5894" exe="/root/syz-executor" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7f2cce64eec9 code=0x7ffc0000 [ 418.249956][ T29] audit: type=1326 audit(1760188511.653:59009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20430 comm="syz.3.5894" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cce64eec9 code=0x7ffc0000 [ 418.274152][ T29] audit: type=1326 audit(1760188511.653:59010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20430 comm="syz.3.5894" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cce64eec9 code=0x7ffc0000 [ 418.330760][T20438] netlink: 22 bytes leftover after parsing attributes in process `syz.2.5895'. [ 418.367916][ T29] audit: type=1326 audit(1760188511.819:59011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20440 comm="syz.3.5898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cce64eec9 code=0x7ffc0000 [ 418.392099][ T29] audit: type=1326 audit(1760188511.819:59012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20440 comm="syz.3.5898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2cce64eec9 code=0x7ffc0000 [ 418.415901][ T29] audit: type=1326 audit(1760188511.819:59013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20440 comm="syz.3.5898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cce64eec9 code=0x7ffc0000 [ 418.416119][T20441] netlink: 128 bytes leftover after parsing attributes in process `syz.3.5898'. [ 418.461321][T20441] netlink: 3 bytes leftover after parsing attributes in process `syz.3.5898'. [ 418.504091][T20437] netlink: 128 bytes leftover after parsing attributes in process `syz.0.5897'. [ 418.545625][T20437] netlink: 3 bytes leftover after parsing attributes in process `syz.0.5897'. [ 418.630561][T20447] 9pnet: Could not find request transport: fd, priority 10 [ 419.835087][ T12] tipc: Disabling bearer [ 419.840284][ T12] tipc: Left network mode [ 419.863421][ T12] hsr_slave_0: left promiscuous mode [ 419.879836][ T12] hsr_slave_1: left promiscuous mode [ 419.885864][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 419.901458][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 419.983090][ T12] team0 (unregistering): Port device team_slave_0 removed [ 420.093558][T20527] vlan2: entered allmulticast mode [ 420.146506][T20536] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 420.146506][T20536] program syz.2.5930 not setting count and/or reply_len properly [ 420.666761][T20449] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 420.735057][T20449] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 420.812541][T20449] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 420.838674][T20449] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 420.850339][T20568] 9pnet: Could not find request transport: fd [ 425.305294][ T37] tipc: Left network mode [ 425.311481][T20723] lo speed is unknown, defaulting to 1000 [ 425.326802][T20723] lo speed is unknown, defaulting to 1000 [ 425.333122][T20723] lo speed is unknown, defaulting to 1000 [ 425.342228][T20723] lo speed is unknown, defaulting to 1000 [ 425.348532][T20723] lo speed is unknown, defaulting to 1000 [ 425.355023][T20723] lo speed is unknown, defaulting to 1000 [ 425.462226][ T37] hsr_slave_0: left promiscuous mode [ 425.471675][ T37] hsr_slave_1: left promiscuous mode [ 425.481698][ T37] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 425.491042][T20743] xt_TPROXY: Can be used only with -p tcp or -p udp [ 425.498559][ T37] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 425.999934][ T37] team0 (unregistering): Port device team_slave_0 removed [ 426.066887][T20754] 9pnet: Could not find request transport: fd [ 427.719478][T20911] __dump_stack+0x1d/0x30 [ 427.719530][T20911] dump_stack_lvl+0xe8/0x140 [ 427.719633][T20911] dump_stack+0x15/0x1b [ 427.719656][T20911] should_fail_ex+0x265/0x280 [ 427.719768][T20911] should_fail+0xb/0x20 [ 427.719866][T20911] should_fail_usercopy+0x1a/0x20 [ 427.719896][T20911] _copy_from_user+0x1c/0xb0 [ 427.719930][T20911] sctp_getsockopt_connectx3+0xda/0x300 [ 427.719969][T20911] sctp_getsockopt+0x910/0xaa0 [ 427.720089][T20911] sock_common_getsockopt+0x5d/0x70 [ 427.720116][T20911] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 427.720189][T20911] do_sock_getsockopt+0x1fd/0x240 [ 427.720230][T20911] __x64_sys_getsockopt+0x11e/0x1a0 [ 427.720299][T20911] x64_sys_call+0x2bca/0x3000 [ 427.720329][T20911] do_syscall_64+0xd2/0x200 [ 427.720363][T20911] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 427.720439][T20911] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 427.720463][T20911] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 427.720563][T20911] RIP: 0033:0x7f812b97eec9 [ 427.720584][T20911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 427.720609][T20911] RSP: 002b:00007f812a3e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 427.720629][T20911] RAX: ffffffffffffffda RBX: 00007f812bbd5fa0 RCX: 00007f812b97eec9 [ 427.720645][T20911] RDX: 000000000000006f RSI: 0000000000000084 RDI: 0000000000000005 [ 427.720662][T20911] RBP: 00007f812a3e7090 R08: 0000200000000140 R09: 0000000000000000 [ 427.720677][T20911] R10: 0000200000000200 R11: 0000000000000246 R12: 0000000000000001 [ 427.720745][T20911] R13: 00007f812bbd6038 R14: 00007f812bbd5fa0 R15: 00007ffddeabd578 [ 427.720772][T20911] [ 428.215803][T20939] SELinux: Context u:r:untrusted_app:s0:c512,c768 is not valid (left unmapped). [ 428.304202][T20929] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 428.329550][T20936] ================================================================== [ 428.337791][T20936] BUG: KCSAN: data-race in __bpf_get_stackid / bcmp [ 428.344443][T20936] [ 428.346792][T20936] write to 0xffff888118f0a190 of 72 bytes by task 20944 on cpu 1: [ 428.355138][T20936] __bpf_get_stackid+0x761/0x800 [ 428.360192][T20936] bpf_get_stackid+0xe9/0x120 [ 428.364881][T20936] bpf_get_stackid_raw_tp+0xf6/0x120 [ 428.370319][T20936] bpf_prog_53f0063d4d7f65ce+0x2a/0x32 [ 428.375813][T20936] bpf_trace_run2+0x104/0x1c0 [ 428.380741][T20936] kfree+0x351/0x400 [ 428.384834][T20936] __se_sys_add_key+0x2fa/0x350 [ 428.389706][T20936] __x64_sys_add_key+0x67/0x80 [ 428.394499][T20936] x64_sys_call+0x28c8/0x3000 [ 428.399195][T20936] do_syscall_64+0xd2/0x200 [ 428.403738][T20936] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 428.409751][T20936] [ 428.412124][T20936] read to 0xffff888118f0a1b8 of 8 bytes by task 20936 on cpu 0: [ 428.419935][T20936] bcmp+0x23/0x90 [ 428.423677][T20936] __bpf_get_stackid+0x371/0x800 [ 428.428816][T20936] bpf_get_stackid+0xe9/0x120 [ 428.433679][T20936] bpf_get_stackid_raw_tp+0xf6/0x120 [ 428.439098][T20936] bpf_prog_53f0063d4d7f65ce+0x2a/0x32 [ 428.444755][T20936] bpf_trace_run2+0x104/0x1c0 [ 428.449630][T20936] kfree+0x351/0x400 [ 428.453546][T20936] ___sys_recvmsg+0x135/0x370 [ 428.458253][T20936] do_recvmmsg+0x1ef/0x540 [ 428.462704][T20936] __x64_sys_recvmmsg+0xe5/0x170 [ 428.467665][T20936] x64_sys_call+0x27aa/0x3000 [ 428.472448][T20936] do_syscall_64+0xd2/0x200 [ 428.476995][T20936] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 428.483075][T20936] [ 428.485403][T20936] value changed: 0xffffffff844dd90f -> 0xffffffff81d0c237 [ 428.492711][T20936] [ 428.495216][T20936] Reported by Kernel Concurrency Sanitizer on: [ 428.501589][T20936] CPU: 0 UID: 0 PID: 20936 Comm: syz.0.6066 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 428.512973][T20936] Tainted: [W]=WARN [ 428.516791][T20936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 428.526943][T20936] ================================================================== [ 428.561072][T20929] misc raw-gadget: fail, usb_gadget_register_driver returned -16