last executing test programs: 12m29.841228942s ago: executing program 32 (id=988): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x4, 0x9, 0x0, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000040)='sys_exit\x00', r1, 0x0, 0x4000000000000004}, 0x18) 12m22.267273247s ago: executing program 33 (id=1127): r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="120002"]) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendto$packet(r0, &(0x7f00000006c0), 0x0, 0x40080, &(0x7f0000000240)={0x11, 0x18, r4, 0x1, 0xb, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}, 0x14) 12m19.706872314s ago: executing program 34 (id=1154): syz_emit_ethernet(0x4a, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaa"], 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000200)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r0 = syz_open_dev$loop(&(0x7f0000000100), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1801000021000000000000000000000085"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000040), 0xe09) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r1, 0x0, {0x2a00, 0x80010000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xb, 0x1c, "fee8a2ab78fc979fd1e00d96072000001ea89de2b7fb0000e60080b8785d96000100", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "f4bd000000801900", [0x0, 0x2000000000001]}}) 12m18.335216948s ago: executing program 35 (id=1172): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc4e48aa31086b8703410000004000000000000000040014000d000a00100000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) 12m9.425845758s ago: executing program 36 (id=1309): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11m4.976761604s ago: executing program 8 (id=2471): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r2, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x0, 0x0}, 0x10) 11m4.868480616s ago: executing program 8 (id=2472): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x56d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='contention_end\x00', r1}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600), &(0x7f0000001f80), 0xfffffffb, r0}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200), 0x0, 0x1000, r0}, 0x38) 11m4.575284111s ago: executing program 8 (id=2473): sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000400)={[{@sysvgroups}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4000}}]}, 0xff, 0x23f, &(0x7f0000000540)="$eJzs3T1oLFUYBuB3Zne95t5FrtoI4g+IiAbCtRNsYqMQkBBEBBUiIjZKIsQEu8TKxkJrlVQ2QeyMlpIm2CiCVdQUsRE0WBgstFiZnURisuLPxh1xngdmZ2b3nPnOMPOe3WbYAK11Nclskk6S6SS9JMXpBnfWy9Xj3c2p3cVkMHjsh2LYrt6vnfS7kmQjyQNJdsoiL3STte2nDn7ae+Se11d7d7+7/eTURE/y2OHB/qNH78y/9sHc/WufffHdfJHZ9H93XhevGPFet0hu+jeK/UcU3aZHwF+x8Mr7X1a5vznJXcP891KmvnhvrFy308t9b/9R3ze///zWSY4VuHiDQa/6DtwYAK1TJumnKGeS1NtlOTNT/4b/qnO5fHF55eXp55dXl55reqYCLko/2X/4o0sfXjmT/287df6B/68q/48vbH1dbR91mh4NMBG31asq/9PPrN8b+YfWkX9oL/mH9pJ/aC/5h/aSf2gv+Yf2kn9oL/mH9pJ/aK/T+QcA2mVwqeknkIGmND3/AAAAAAAAAAAAAAAAAAAA521O7S6eLJOq+clbyeFDSbqj6neG/0ecXD98vfxjUTX7TVF3G8vTd4x5gDG91/DT1zd802z9T29vtv76UrLxapJr3e75+684vv/+uRv/5PPes2MW+JuKM/sPPjHZ+mf9stVs/bm95ONq/rk2av4pc8twPXr+6VfXb8z6L/085gEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACYmF8DAAD//xFQbUc=") syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001"], 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x4, 0x5, 0x2, 0x9, 0x25, @loopback, @rand_addr=' \x01\x00', 0x700, 0x700, 0x6, 0x499a}}) r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000500)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f00000002c0)={0x1, 0x4, 0x0, 0x7, @vifc_lcl_ifindex, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$MRT_FLUSH(r2, 0x0, 0xd4, &(0x7f0000000140)=0xf, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}]}, 0x40}}, 0x0) 11m4.499718213s ago: executing program 8 (id=2474): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@delnexthop={0x20, 0x69, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [{0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x2, 0x0, 0x44010}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) socket$inet6(0xa, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0xa0c406, &(0x7f0000000f80)=ANY=[@ANYBLOB="646f747300000000732c646d6173a594e5e0d4ee303030303032fd33a1ddfe6717c3d234e02f30303030302c6e6f646f74732cb7f973636172642c6e66733d6e6f73", @ANYRESDEC, @ANYRES64], 0x1, 0x2a2, &(0x7f0000001140)="$eJzs3M9r02AYwPGn6dZ0k/04CXrxQS96CbMe1UOVDcSC0q2iHoSMZVpa25EUbUUwZ0/7O4ZHb4L4D+y/8DYE2WknI22zNOu633Wt3fcDI++b5323J3nJeNKSbD1ff1ta9axVuyZGWsUQ8WVHZFaKsisRblOtdiraL/cz4sutuXfbnxdfvHyczeXm86oL2aU7GVWdvvb9/ccv13/ULj37Om2asjn7aut35ufm5c0rW3+W3hQ9LaakUq2prcvVas1eLju6UvRKlurTsmN7jhYrnuPuia+Wq2trDbUrK1OTa67jeWpXGmpIQ2tVTYdZVdSyLJ2abLbTcoGkTjyjsJHP29lOfz7Z34wwDFw3azcXdmLf1VDYGExGAABgkA6u/41ozG79b3TX/yJH1P+fwlHT33rW/56evv5PSlT/l5xW/V9zG2q/tovx+h+H6q7/j8f4N8ngLBJ+rPNgT8h1sxO9J1H/AwAAAAAAAAAAAAAAAAAAAADwP9gJgpkgCGaaW0NEgrBvikgy1u8x9UI9Wz+q4usfxH7McIEPWX+MgNiDe2mRX369UC8kWtt2fOFRbn5OW2IP/m3X64VkFL/djuve+LhMhvFMz3hKbt5ox5uxh09y8fh6vTAhK4dm7vfrFAAAAAAAMPIsjcxGO9MS3d9blprSHW/dv7dbfufzAe28GqgZH5OrY+d5JAAAAAAA4CBe40PJLpcd93wayXP8W6duiJxu+t3A7EsaSRE5Ykx+UWTwJ2pfw5ShSGOUG/f69guDhEh7z3j4z6DrKgAAAAAwWjr3Ayefy9f7AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD0x5neImYcb/CgjxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYFn8DAAD//8DvvIM=") mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100, 0x103) r5 = mq_open(&(0x7f0000000340)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!T\xeeux\x00\xbf@\xf4\x1c\xbce\xca\x97\xd5pkv\x8bL\xe8$\xef\xfeI\xdaW1\xfcg\xa1\xdb$,0\xcc\xc1\xd6Pu\x05J\x1a8\x10\xfc\ny$\xcd{zl.\xae\x805\xa8\xd6\x85\x15\xd2\x0e~\xcc\x90\x97\xe8h\v\x1a9X\a\xca{\x11#\x95m{U\xe5-\xabRw\xcafy\xe6\aNhX4Ll[\x14\x150x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x33, &(0x7f0000000580)={&(0x7f0000000a00)=ANY=[@ANYBLOB="44000000100003040400"/20, @ANYRES32=0x0, @ANYBLOB="4101030000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r7, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7, @ANYBLOB], 0x44}, 0x1, 0xba01}, 0x810) sendmmsg$inet(r6, &(0x7f00000005c0)=[{{&(0x7f00000007c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000480)="96e1697cdb25f5dbe1b5d6be5c9d13401513d140dc1086f51295f00fa3d2d4226206aea3088332e93c4b711ebd0543c50e3e43bda1edb516b9f41ccf5890e1feb18f05cd643899ccf93ea688cb7b6f2665931297574e3af0cddc64a1415d468505bf0998a70db7f36b4d5c50b2f9b851f3e9cb0eb912b48aa2164816704da8534e55be0ff4e86e75ca735f7e", 0x8c}], 0x1, &(0x7f00000006c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xd}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @broadcast, @broadcast}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0xd9, 0x0, 0x8, [0x33d, 0x29]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x4c, 0x7c, 0x3, 0x4, [{@empty, 0xa8}, {@multicast2, 0xfff}, {@multicast2, 0xffffffff}, {@multicast2, 0x6}, {@broadcast, 0x5}, {@multicast2, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x694e}, {@rand_addr=0x64010100, 0x7}, {@broadcast, 0x81}]}, @rr={0x7, 0xf, 0xe5, [@empty, @multicast1, @dev={0xac, 0x14, 0x14, 0x29}]}]}}}], 0x100}}], 0x1, 0x2000c010) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r8 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000001}, 0x1100, 0x5dd8, 0x0, 0x8, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffbf, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012000000000000"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) writev(0xffffffffffffffff, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) 11m4.399339834s ago: executing program 8 (id=2475): socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)={0x58, r1, 0x103, 0xffffffff, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x19}, @NL80211_ATTR_REG_RULES={0x3c, 0x22, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7fffffff}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x80}]}, {0x4}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x48011}, 0x8000) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, 0x0, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) 11m4.187982848s ago: executing program 8 (id=2482): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r2, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x0, 0x0}, 0x10) 11m4.176006108s ago: executing program 37 (id=2482): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r2, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x0, 0x0}, 0x10) 11m0.16586931s ago: executing program 4 (id=2524): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8003}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0xa4, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x7c, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x22}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}]}}}, {0x44, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_BITWISE_XOR={0xc, 0x5, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "8f"}]}, @NFTA_BITWISE_MASK={0xc, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "8a95"}]}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0xec}}, 0x0) 11m0.132360361s ago: executing program 4 (id=2525): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_DISCONNECT_CLAIM(r3, 0x8108551b, &(0x7f0000000000)={0x0, 0x0, "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"}) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, &(0x7f0000000380)={0x1, 0x1}) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)=0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x3, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2e}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="c274386d178550cb864bd57221bc", 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket(0x0, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x1001}], 0x2, 0x0, 0x0, 0x0) 10m58.754197715s ago: executing program 4 (id=2534): ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 10m58.733369166s ago: executing program 4 (id=2536): socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@delnexthop={0x20, 0x69, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [{0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x2, 0x0, 0x44010}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) socket$inet6(0xa, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0xa0c406, &(0x7f0000000f80)=ANY=[@ANYBLOB="646f747300000000732c646d6173a594e5e0d4ee303030303032fd33a1ddfe6717c3d234e02f30303030302c6e6f646f74732cb7f973636172642c6e66733d6e6f73", @ANYRESDEC, @ANYRES64], 0x1, 0x2a2, &(0x7f0000001140)="$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") mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100, 0x103) mq_open(&(0x7f0000000340)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!T\xeeux\x00\xbf@\xf4\x1c\xbce\xca\x97\xd5pkv\x8bL\xe8$\xef\xfeI\xdaW1\xfcg\xa1\xdb$,0\xcc\xc1\xd6Pu\x05J\x1a8\x10\xfc\ny$\xcd{zl.\xae\x805\xa8\xd6\x85\x15\xd2\x0e~\xcc\x90\x97\xe8h\v\x1a9X\a\xca{\x11#\x95m{U\xe5-\xabRw\xcafy\xe6\aNhX4Ll[\x14\x150xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_DISCONNECT_CLAIM(r3, 0x8108551b, &(0x7f0000000000)={0x0, 0x0, "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"}) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, &(0x7f0000000380)={0x1, 0x1}) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)=0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x3, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2e}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="c274386d178550cb864bd57221bc", 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket(0x0, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x1001}], 0x2, 0x0, 0x0, 0x0) 10m58.234676315s ago: executing program 38 (id=2545): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_DISCONNECT_CLAIM(r3, 0x8108551b, &(0x7f0000000000)={0x0, 0x0, "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"}) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, &(0x7f0000000380)={0x1, 0x1}) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)=0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x3, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2e}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="c274386d178550cb864bd57221bc", 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket(0x0, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x1001}], 0x2, 0x0, 0x0, 0x0) 10m57.122994415s ago: executing program 2 (id=2561): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write$cgroup_pressure(r2, &(0x7f0000000140)={'full'}, 0xfffffdef) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x5452, &(0x7f0000000000)) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x6) setsockopt$inet_tcp_int(r1, 0x6, 0x5, &(0x7f0000000280)=0x1, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x11, &(0x7f0000000100)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xfffd}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}]}, @NFT_MSG_NEWSETELEM={0x2c, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}}, 0xb8}}, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r4, &(0x7f0000000180)={0x1a, 0x30c, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) socket$nl_route(0x10, 0x3, 0x0) close(0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x22052, r5, 0x0) mmap(&(0x7f00007a6000/0x3000)=nil, 0x3000, 0x100000c, 0x22051, r5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x3c8, 0x0, 0x18c, 0x203, 0x1e0, 0x19030000, 0x2f8, 0x2e0, 0x2e0, 0x2f8, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x198, 0x1e0, 0x0, {}, [@common=@unspec=@conntrack3={{0xc8}, {{@ipv4=@broadcast, [0xff, 0xffffff00, 0xff, 0xffffff00], @ipv4=@dev={0xac, 0x14, 0x14, 0x15}, [0xff, 0xff, 0xffffff00], @ipv6=@private0={0xfc, 0x0, '\x00', 0x8}, [0xff000000, 0x0, 0xff000000, 0xff], @ipv4=@loopback, [0x0, 0xffffffff, 0x0, 0xff], 0x80, 0x0, 0x0, 0x4e24, 0x4e21, 0x4e21, 0x4e20, 0x0, 0x844}, 0x180, 0xa10, 0x4e23, 0x4e24, 0x4e20, 0x4e21}}, @common=@hl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'veth1_macvtap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 10m56.956441028s ago: executing program 2 (id=2563): ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x40, 0x10, 0x7fff, 0x9, {{0xc, 0x4, 0x3, 0x3c, 0x30, 0x66, 0x0, 0x6b, 0x29, 0x0, @broadcast, @remote, {[@lsrr={0x83, 0x13, 0x23, [@local, @multicast2, @multicast2, @empty]}, @timestamp={0x44, 0x8, 0x48, 0x0, 0x5, [0x8]}]}}}}}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000280)={r0, 0x1, 0x6, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='afs_file_error\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r5}, 0xc) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) 10m56.83272469s ago: executing program 2 (id=2564): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) 10m56.616738584s ago: executing program 2 (id=2567): socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@delnexthop={0x20, 0x69, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [{0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x2, 0x0, 0x44010}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) socket$inet6(0xa, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0xa0c406, &(0x7f0000000f80)=ANY=[@ANYBLOB="646f747300000000732c646d6173a594e5e0d4ee303030303032fd33a1ddfe6717c3d234e02f30303030302c6e6f646f74732cb7f973636172642c6e66733d6e6f73", @ANYRESDEC, @ANYRES64], 0x1, 0x2a2, &(0x7f0000001140)="$eJzs3M9r02AYwPGn6dZ0k/04CXrxQS96CbMe1UOVDcSC0q2iHoSMZVpa25EUbUUwZ0/7O4ZHb4L4D+y/8DYE2WknI22zNOu633Wt3fcDI++b5323J3nJeNKSbD1ff1ta9axVuyZGWsUQ8WVHZFaKsisRblOtdiraL/cz4sutuXfbnxdfvHyczeXm86oL2aU7GVWdvvb9/ccv13/ULj37Om2asjn7aut35ufm5c0rW3+W3hQ9LaakUq2prcvVas1eLju6UvRKlurTsmN7jhYrnuPuia+Wq2trDbUrK1OTa67jeWpXGmpIQ2tVTYdZVdSyLJ2abLbTcoGkTjyjsJHP29lOfz7Z34wwDFw3azcXdmLf1VDYGExGAABgkA6u/41ozG79b3TX/yJH1P+fwlHT33rW/56evv5PSlT/l5xW/V9zG2q/tovx+h+H6q7/j8f4N8ngLBJ+rPNgT8h1sxO9J1H/AwAAAAAAAAAAAAAAAAAAAADwP9gJgpkgCGaaW0NEgrBvikgy1u8x9UI9Wz+q4usfxH7McIEPWX+MgNiDe2mRX369UC8kWtt2fOFRbn5OW2IP/m3X64VkFL/djuve+LhMhvFMz3hKbt5ox5uxh09y8fh6vTAhK4dm7vfrFAAAAAAAMPIsjcxGO9MS3d9blprSHW/dv7dbfufzAe28GqgZH5OrY+d5JAAAAAAA4CBe40PJLpcd93wayXP8W6duiJxu+t3A7EsaSRE5Ykx+UWTwJ2pfw5ShSGOUG/f69guDhEh7z3j4z6DrKgAAAAAwWjr3Ayefy9f7AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD0x5neImYcb/CgjxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYFn8DAAD//8DvvIM=") mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100, 0x103) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) writev(r3, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) 10m56.415334257s ago: executing program 2 (id=2571): r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e0000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x20000009, 0x0, &(0x7f0000000240)={0x0, 0x0, 0xfffc, 0x360}, 0x8, 0x7, 0x80, 0x0, 0x1, 0x101, 0x0}) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, 0x0) 10m56.019392394s ago: executing program 2 (id=2573): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) close(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x4, &(0x7f0000000a80)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 10m55.996799325s ago: executing program 39 (id=2573): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) close(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x4, &(0x7f0000000a80)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 10m55.588086502s ago: executing program 0 (id=2578): pipe(&(0x7f00000001c0)={0xffffffffffffffff}) read(r0, &(0x7f0000032440)=""/102364, 0x18fdc) 10m54.667632808s ago: executing program 0 (id=2583): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x2, 0xc, &(0x7f0000000580)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="c749ae2cc6aebcfae157555110a51ffc79a003d1ee4fd8bf3a48843b51cb9d4c519d5e507b35ca55feedbf9dbca87615c61b875ca7297e5b6dcff4f1799653d9b45e84f9979ecfe8c7b241afc5087364972dcfddaf03982cccff3c9a28301a000000007bb31f1aa5c74db1caccce634204bdbeade31fb21acd4ce6762b9badd5e7fd4db8db0566cdc027d054bf1f54bd1ed7864e0b936430b35e7ce98ebed9cc48fb95c0692323ab7fa0c46baff7e35d3c83e0664751f7808ed98ba741a2706d8661fc0d3596354f4987b15018fb259c80f8dc765939e3", @ANYRESHEX=0x0], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_dccp(0x2, 0x6, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340), 0x9, 0x0, 0x39}, 0x64024051) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x14a) fallocate(r4, 0x20, 0x0, 0x8000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000240)={0x40, 0x1, 0x0, 'queue0\x00', 0x5}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r2, @ANYRES32=r0, @ANYRESDEC=r0], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) openat$cgroup_ro(r5, &(0x7f0000000380)='memory.stat\x00', 0x0, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r6, 0xc0185879, &(0x7f00000004c0)={0x1, 0x6, 0x0, 0x0, 0x0, 0x6, 0x2401}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 10m54.189381147s ago: executing program 0 (id=2586): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x75f, 0xa382) r2 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc90\xb9voI\xa5/\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\x81\x00V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93\x9c5\xcf\t\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\x94\x13^\x13\xaf\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0x0, 0x40, 0x10, 0x7fff, 0x9, {{0xc, 0x4, 0x3, 0x3c, 0x30, 0x66, 0x0, 0x6b, 0x29, 0x0, @broadcast, @remote, {[@lsrr={0x83, 0x13, 0x23, [@local, @multicast2, @multicast2, @empty]}, @timestamp={0x44, 0x8, 0x48, 0x0, 0x5, [0x8]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000280)={r0, 0x1, 0x6, @broadcast}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='afs_file_error\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r5}, 0xc) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) 10m53.571302969s ago: executing program 0 (id=2590): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x2, 0xc, &(0x7f0000000580)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="c749ae2cc6aebcfae157555110a51ffc79a003d1ee4fd8bf3a48843b51cb9d4c519d5e507b35ca55feedbf9dbca87615c61b875ca7297e5b6dcff4f1799653d9b45e84f9979ecfe8c7b241afc5087364972dcfddaf03982cccff3c9a28301a000000007bb31f1aa5c74db1caccce634204bdbeade31fb21acd4ce6762b9badd5e7fd4db8db0566cdc027d054bf1f54bd1ed7864e0b936430b35e7ce98ebed9cc48fb95c0692323ab7fa0c46baff7e35d3c83e0664751f7808ed98ba741a2706d8661fc0d3596354f4987b15018fb259c80f8dc765939e3", @ANYRESHEX=0x0], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_dccp(0x2, 0x6, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340), 0x9, 0x0, 0x39}, 0x64024051) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x14a) fallocate(r4, 0x20, 0x0, 0x8000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000240)={0x40, 0x1, 0x0, 'queue0\x00', 0x5}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r2, @ANYRES32=r0, @ANYRESDEC=r0], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) openat$cgroup_ro(r5, &(0x7f0000000380)='memory.stat\x00', 0x0, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r6, 0xc0185879, &(0x7f00000004c0)={0x1, 0x6, 0x0, 0x0, 0x0, 0x6, 0x2401}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 10m53.541108449s ago: executing program 40 (id=2590): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x2, 0xc, &(0x7f0000000580)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="c749ae2cc6aebcfae157555110a51ffc79a003d1ee4fd8bf3a48843b51cb9d4c519d5e507b35ca55feedbf9dbca87615c61b875ca7297e5b6dcff4f1799653d9b45e84f9979ecfe8c7b241afc5087364972dcfddaf03982cccff3c9a28301a000000007bb31f1aa5c74db1caccce634204bdbeade31fb21acd4ce6762b9badd5e7fd4db8db0566cdc027d054bf1f54bd1ed7864e0b936430b35e7ce98ebed9cc48fb95c0692323ab7fa0c46baff7e35d3c83e0664751f7808ed98ba741a2706d8661fc0d3596354f4987b15018fb259c80f8dc765939e3", @ANYRESHEX=0x0], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_dccp(0x2, 0x6, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340), 0x9, 0x0, 0x39}, 0x64024051) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x14a) fallocate(r4, 0x20, 0x0, 0x8000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000240)={0x40, 0x1, 0x0, 'queue0\x00', 0x5}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r2, @ANYRES32=r0, @ANYRESDEC=r0], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) openat$cgroup_ro(r5, &(0x7f0000000380)='memory.stat\x00', 0x0, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r6, 0xc0185879, &(0x7f00000004c0)={0x1, 0x6, 0x0, 0x0, 0x0, 0x6, 0x2401}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m57.472274126s ago: executing program 7 (id=9927): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000100000000000000040000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x5e, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r2, 0x0, 0x10000}, 0x18) accept(0xffffffffffffffff, &(0x7f0000000440)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000380)=0x80) setrlimit(0x4, &(0x7f00000003c0)={0x0, 0x100203}) socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$inet(r4, 0x0, 0x0, 0x0) close(r4) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x0, &(0x7f0000000080), 0xc1, 0x7b7, &(0x7f00000007c0)="$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") prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) ioperm(0x0, 0x82, 0x1e) lsm_get_self_attr(0x66, 0x0, 0xfffffffffffffffe, 0x0) ioprio_get$uid(0x3, 0x0) syz_open_dev$usbmon(&(0x7f00000004c0), 0x16a3, 0x10000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7a680000) 2m57.13433909s ago: executing program 7 (id=9932): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f00000001c0)='./file1\x00', 0x3014850, &(0x7f0000000040), 0x3, 0x4e4, &(0x7f0000002d40)="$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") r0 = shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) shmat(r0, &(0x7f0000ff1000/0x3000)=nil, 0x400c) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/228) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x10, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x2, 0x4, 0x0, 0x1, 0x22}, @jmp={0x5, 0x0, 0x9, 0x0, 0x6, 0x40, 0xfffffffffffffff0}], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_clone(0x80000, &(0x7f0000000080)="c38e3fda62a2b6ac08591d19921f0a6fd956bd6ef04f41a1e3648fd6b3eed8d6f1dad2c42d311d96fdce9cfa810192e31b4bcf274f7d3241b6069879e63fd7757b986fd3c70fb066", 0x48, &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="e99cccb4ca9d86ca9a6d16d634799def72de5f6232626a98e2aa") r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) fcntl$dupfd(r1, 0x0, r1) r2 = getpid() r3 = eventfd2(0x7, 0x80801) write(r3, &(0x7f0000000380)="171d887147ce469228581e21a8e0d26252f05c5ca6ed5080793138433ae22f375cd00980ec70c6d338", 0x29) sched_setscheduler(r2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x18) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = dup(r4) fsetxattr$security_selinux(r5, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x20, 0x0) 2m56.903321553s ago: executing program 7 (id=9935): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c3942, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m54.357486434s ago: executing program 7 (id=9973): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000c40)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2901090, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) mount(0x0, &(0x7f0000000d40)='./file0/../file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000300)={0x0, 0xffffffffffffff20, &(0x7f00000002c0)={&(0x7f0000001740)={0x2c, r1, 0x701, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 2m54.228388096s ago: executing program 7 (id=9974): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'macvlan1\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000001c0)='kfree\x00', r3, 0x0, 0x4}, 0x18) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000030500000000fddbdf0000000000", @ANYRES32=0x0, @ANYBLOB="02880100373004002000128008000100687372001400028008000100", @ANYRES32=r1, @ANYBLOB="08000200", @ANYRES32=r4], 0x40}}, 0x4) 2m53.94726162s ago: executing program 7 (id=9978): perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x6}, 0x0, 0xc8, 0xfffffffe, 0x0, 0x80, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) 2m53.89610869s ago: executing program 41 (id=9978): perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x6}, 0x0, 0xc8, 0xfffffffe, 0x0, 0x80, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) 2.138103844s ago: executing program 5 (id=13990): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x18) getuid() 2.043272255s ago: executing program 5 (id=13992): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x8, 0x0, 0x0, 0x40000000000005, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x1}, 0x1100, 0x5dd8, 0x80000001, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg(r1, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x1}, @enum={0x3, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1, 0x100}]}]}, {0x0, [0x30, 0x2e, 0x5f]}}, &(0x7f0000000640)=""/170, 0x45, 0xaa, 0x1, 0x0, 0x0, @void, @value}, 0x28) socket$nl_route(0x10, 0x3, 0x0) preadv(r1, &(0x7f0000000900)=[{&(0x7f00000004c0)=""/233, 0xe9}, {&(0x7f0000003100)=""/4096, 0x1000}, {&(0x7f0000004440)=""/4096, 0x1000}, {&(0x7f0000005440)=""/4096, 0x1000}, {&(0x7f0000000000)=""/40, 0x28}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f00000001c0)=""/44, 0x2c}, {&(0x7f00000005c0)=""/244, 0xf4}, {&(0x7f0000000780)=""/89, 0x59}], 0x9, 0x10001, 0x1f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close_range(r0, 0xffffffffffffffff, 0x0) 1.68002754s ago: executing program 3 (id=13997): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) read$msr(0xffffffffffffffff, 0x0, 0x0) ustat(0x0, 0x0) timer_create(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000840)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x70, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x200000001300, 0x200000001330], 0x0, 0x0, &(0x7f0000001300)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}]}, 0x108) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x110b, 0x8000000000002}) socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="5c00000013006bcd9e3fe3dc4e48aa31086b8703140000001f03000000330000040014000d000a000d0000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f698", 0x5b}], 0x1, 0x0, 0x0, 0x1f000801}, 0x840) 1.567731441s ago: executing program 3 (id=14001): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mkdir(&(0x7f0000000540)='./file0\x00', 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x81e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x3}) setrlimit(0x40000000000008, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$inet(r1, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4008804) 1.542023132s ago: executing program 9 (id=14002): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x18) getuid() 1.519032572s ago: executing program 3 (id=14003): syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, 0x0, 0x1, 0x40, 0x1}) io_uring_enter(0xffffffffffffffff, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161142, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)=0x7ffd) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x40, 0x0, 0x1, 0xffffffff}]}) 1.507268702s ago: executing program 9 (id=14004): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x81e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4008804) 1.506900352s ago: executing program 6 (id=14005): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000140)=0x7, 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00f7ffffffffffff130012800b00010062617461647600000400028008000a00", @ANYRES32], 0x3c}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[], 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='kfree\x00', r4, 0x0, 0x7fffffffffffffff}, 0x18) 1.479073022s ago: executing program 9 (id=14006): r0 = gettid() prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) read$msr(0xffffffffffffffff, 0x0, 0x0) ustat(0x0, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001800", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000840)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848140000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x8, &(0x7f0000000000)=[{&(0x7f0000000340)="5c00000013006bcd9e3fe3dc4e48aa31086b8703140000001f03000000330000040014000d000a000d0000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x840) 1.375266063s ago: executing program 3 (id=14007): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) prctl$PR_SET_NAME(0xf, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000010008108040f80ecdb4cb92e0a480e000000e8bd6efb250314000e0003fcffffffffffffff001200", 0x2c}], 0x1}, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x4, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") prctl$PR_GET_FPEXC(0x45, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001680)=ANY=[@ANYBLOB="1c0000000203010400000000000000000000000800010e22000100001c5d566ceebb570f5facef82802c88b56ee14e2461e33adc6421cc52ac50d62b8c2fb788194d0774899b191fd3e206c26c2a8e00d929da267c2b3246eaab195efda45a6078366619a24a7d04f8e6c082ad629c40912d4c66250141a95023db006d07034f6b581d89543225d2889593f1876fe2d4d5ef0ae514db6d1c7cee54846af41e90993271b0b5bbe3ed4ee2c0e5916f4fa7ac4f43c92cd1b92563269d7cf191edd9efdeb1"], 0x1c}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001600)=ANY=[@ANYBLOB="2c0000000203245e0101000004400000002e0800081d316b003fe57c054000000007051e82fe0860b6206ff3f2337a02390c9647ea8bd62f58b2760f58c439756bdeb784262b1943c71c3a1dbdba58ca72d872aeb4b8e2e77422f9bf881b4745f559c65d222e9c2a921c04"], 0x2c}}, 0x814) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="580000000008010200000000000000000200ffff0600024022eb000005000300ffff00000900010073797a3000000000260004"], 0x58}, 0x1, 0x0, 0x0, 0x20000015}, 0x20008000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000001500)='hwmon_attr_show_string\x00', r0, 0x0, 0x400000000}, 0x31) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r6) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00\x00~'], 0x1c}}, 0x4000054) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) getpid() r8 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000009c0)="010000", 0x3, r8) request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f00000004c0)='-L\x80&\x00', 0xfffffffffffffffb) 1.310341914s ago: executing program 6 (id=14008): openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001200)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10, 0x0}}], 0x1, 0x2000c054) bind$inet(r0, &(0x7f0000000980)={0x2, 0x4e22, @broadcast}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0x7}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001c80)=@newtfilter={0x118c, 0x2c, 0xd27, 0x470bd28, 0x2, {0x0, 0x0, 0x0, r4, {0x0, 0x17}, {}, {0x7, 0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x115c, 0x2, [@TCA_BASIC_POLICE={0x818, 0x4, [@TCA_POLICE_RATE64={0xc, 0x8, 0x3}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x612, 0x7, 0x5, 0x2, 0x9, 0x9, 0x4, 0x7, 0xb7, 0x2, 0x5, 0x0, 0x7, 0x7, 0x1, 0x4, 0xc000000, 0x9, 0x0, 0x0, 0x100, 0x6, 0x4, 0x7, 0x0, 0xffffffff, 0x10001, 0x8, 0x8, 0x3, 0x2, 0xc3, 0x0, 0x2, 0x4, 0x7, 0x7fff, 0x7, 0x1000, 0x4431, 0xc, 0x9d69, 0xb, 0x4, 0x1, 0x9, 0x3, 0x8, 0xfba6, 0x5, 0x0, 0xffffff3a, 0x0, 0x9, 0x1, 0x5, 0x6, 0x9, 0xad, 0x72, 0x3, 0x6b880000, 0x101, 0x0, 0xd, 0x5, 0x0, 0x9, 0x3, 0x7, 0xfffffffc, 0x2, 0x8878, 0x1, 0x9, 0x23ae4e85, 0x5, 0xfffffbff, 0x9, 0x0, 0x8000, 0x1, 0x10000, 0x7ff, 0xc769, 0x1, 0x4, 0x9, 0x6, 0xb930000, 0xc, 0xb, 0x0, 0x1, 0x0, 0xf, 0x9e, 0x2, 0x0, 0x0, 0xfffffff8, 0x7, 0x3, 0x2d7, 0x1, 0x8, 0xb, 0x1, 0x0, 0xfffffff7, 0x1, 0x3, 0x0, 0xaa, 0xda0, 0x1, 0x78, 0xac, 0x10000, 0xfe, 0x0, 0x9, 0x1, 0x2, 0x1000, 0x4, 0x2, 0x3, 0x4, 0x5, 0x400, 0x2, 0x7f, 0xd, 0x7, 0x0, 0x1, 0x61, 0x4, 0x3, 0x5, 0x2, 0x2, 0x8, 0xfffffffa, 0xd845, 0xfff, 0x8, 0x3, 0x6d, 0x1, 0x5, 0x8, 0x6, 0x40, 0xd, 0x3, 0x2, 0x1, 0xfffffffa, 0x0, 0xca, 0x2, 0x1000, 0x57, 0x6, 0x49ff, 0x9, 0xffff, 0x6, 0x5, 0x2, 0xfffffffd, 0x1, 0x0, 0xc, 0x1ff, 0x3, 0x1, 0x3, 0x6748, 0xfffffff8, 0x81, 0x6, 0x8, 0x1, 0xfff, 0x4, 0x9, 0xff, 0x3a9, 0x4, 0x7, 0x9, 0x9, 0x9, 0x3, 0x0, 0x2bccdac2, 0xec3, 0xc1e7, 0x1ff, 0xf96, 0x7fffffff, 0x0, 0x4, 0x4, 0x6, 0x81, 0x0, 0x4, 0xa, 0x1000, 0x5, 0x48, 0x80000000, 0x2, 0x4, 0x3, 0x9d8, 0x9, 0x7, 0x0, 0x7, 0x2, 0x1, 0x6, 0x388f, 0x7f, 0xbeb1, 0x635, 0x1, 0x5, 0x7, 0x2, 0x5, 0x200, 0xf, 0x5, 0x38000, 0xe4, 0x9, 0x5, 0x9, 0x10, 0x2, 0x4, 0x7fff, 0x0, 0x81, 0x3, 0x2, 0x7fffffff, 0x2, 0x7]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x200, 0x9, 0xe, 0x4, 0x9, 0xc1, 0x0, 0x80000000, 0x0, 0x1, 0x8, 0x9, 0xfc49, 0x4, 0x20000000, 0x10000, 0xffffff1c, 0x7, 0x69, 0x3, 0x5a, 0x1, 0x3, 0x8, 0x401, 0x80000000, 0x8, 0xfff, 0x40, 0x5, 0xfffffffb, 0x8000, 0xdf, 0x9000000, 0x3, 0xfff, 0x1, 0x7fff, 0x7, 0x1, 0x8, 0x2, 0x6, 0x3ba6, 0x5, 0x6a2, 0x5, 0x7, 0x8000, 0x2, 0x0, 0x5, 0x1c0000, 0x2, 0x7, 0x7f, 0x8001, 0x73fe, 0x0, 0x2, 0x4, 0x8, 0x8, 0xc5c0, 0xffffffff, 0x4, 0xcf, 0xb3, 0x3, 0x8000, 0x3, 0x3, 0x1, 0x6, 0x0, 0xf3f, 0x1000, 0x9, 0x42bd, 0x6, 0x7, 0x4b8, 0x2, 0x890, 0x6, 0x0, 0xfffffffc, 0xce, 0x2, 0x9, 0x2, 0xfffff27a, 0x9, 0x2, 0x9, 0x6, 0x7402, 0x0, 0x5, 0xff, 0x62c, 0x38, 0x8001, 0x84a, 0x5, 0xfffffffc, 0x0, 0x40, 0xf7c, 0x7fffffff, 0xbf4, 0xe, 0x8, 0x3ff, 0x3, 0x80, 0x4, 0x3ff, 0x1, 0x1, 0x5, 0x40, 0x0, 0x3, 0x1000, 0x7, 0xfffffffe, 0xf3, 0x489, 0x5, 0x1, 0xdcc2, 0x7, 0x4, 0x0, 0xac7, 0x7, 0x6, 0xf, 0x10, 0x1, 0x3f7a, 0x4, 0xfff, 0x4, 0x3, 0x3, 0x8, 0x10, 0x4, 0x4, 0x3, 0x1, 0x1000, 0xe0a, 0xeb4, 0x6, 0xa, 0xa000000, 0x746e948c, 0x7, 0x5, 0xfffffffb, 0x2, 0x4, 0x2, 0x9, 0x5, 0xc, 0xa5, 0x50, 0x10001, 0x8, 0x400, 0x6, 0xb2f4, 0x2, 0x1, 0xee6e, 0x3, 0xd74a000, 0x8f5, 0x6, 0x8cc, 0x5, 0x44, 0x2, 0x3, 0x8000, 0x4ae60ce, 0x200, 0xffffffae, 0x5, 0x0, 0x4, 0xc, 0x7f, 0x54, 0x27f1, 0x2, 0x8001, 0x1ad, 0x9, 0xff, 0x0, 0x7fffffff, 0xa7c, 0xfffffffe, 0x7ff, 0x78, 0x6, 0x3b2b, 0x45f0458e, 0x2, 0x3000, 0x7af, 0x7, 0x9c, 0x7, 0x9, 0x9, 0x3, 0x9, 0x5, 0x6, 0x4, 0x9, 0xffff, 0x1, 0xfffffff7, 0x8, 0xd98, 0x80000001, 0x3ff, 0x8001, 0x9, 0x174, 0x3, 0x7, 0x9, 0x3, 0xffffffff, 0x7c57, 0x3, 0x7, 0x6, 0x0, 0xe4b, 0x7fff, 0x6, 0x3, 0x2, 0x9, 0x6, 0x1, 0x4]}]}, @TCA_BASIC_POLICE={0x5c, 0x4, [@TCA_POLICE_RATE64={0xc, 0x8, 0xff}, @TCA_POLICE_RESULT={0x8, 0x5, 0x4}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x53}, @TCA_POLICE_TBF={0x3c, 0x1, {0x6, 0x7, 0x1, 0x9, 0x4, {0x4, 0x2, 0x9, 0x200, 0x1d50, 0x6}, {0xb, 0x0, 0x7, 0x4, 0x3, 0x2}, 0x6, 0xfffff800, 0x7fff}}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0xc, 0x9}}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x9, 0xfff2}}, @TCA_BASIC_POLICE={0x8a0, 0x4, [@TCA_POLICE_RESULT={0x8, 0x5, 0xfffffffb}, @TCA_POLICE_RATE={0x404, 0x2, [0x9d52, 0x3, 0x80000000, 0xe94, 0x3, 0xb, 0x2, 0x3, 0x7, 0x0, 0x5, 0x5, 0x3, 0x9, 0x1, 0x5, 0x1, 0x40, 0x5, 0x401, 0x2, 0x28000000, 0x7, 0x31, 0x80, 0x1, 0xf441, 0x9b8, 0x52, 0x0, 0x5, 0x3, 0x4, 0x860, 0xfffffd1e, 0x9, 0x1, 0x4, 0xb59, 0x2, 0x61, 0x7, 0x0, 0x10, 0x6a, 0xfffffbd4, 0x1, 0x2, 0xf2a, 0x7fff, 0x8641, 0x1, 0x7, 0xb, 0x4, 0x3, 0x1f71, 0x26, 0x5, 0x10000, 0x8001, 0x5, 0x2, 0xf8305fa, 0x3, 0x80000001, 0x6, 0x4, 0x5, 0x8, 0x1, 0x4, 0x4, 0x10001, 0x1, 0x7, 0x8, 0x8, 0x8, 0x3, 0x4, 0x100, 0x0, 0x3, 0xffffffc7, 0x6, 0x10, 0x6, 0xc0000000, 0x8, 0x1, 0x0, 0x8000, 0x8, 0x10, 0x5, 0xffffff80, 0x3, 0x7, 0x6, 0x5, 0x0, 0x4, 0x20bb, 0x9, 0x9, 0x81, 0x7, 0x5, 0x8cb, 0x5cee, 0x8, 0x5, 0x4, 0x7ce9, 0x7fffffff, 0xfff, 0x1000, 0x7, 0xfffff3bd, 0x428, 0x3, 0xa1, 0x7, 0xffffffff, 0x9, 0x5, 0x2, 0x42cb, 0x8f7, 0x7, 0x8, 0x4, 0x7, 0x6, 0x9, 0x6, 0x9, 0xe, 0x7, 0x4, 0x8, 0x80000001, 0x9ef0, 0x101, 0x5, 0x80, 0x4, 0x7, 0x0, 0x1ff, 0x8, 0x1000, 0x800, 0x17fe, 0x7, 0x95, 0x6, 0x10, 0x80, 0x7, 0x6, 0xa62e, 0x59, 0x9bbf, 0x9, 0x5, 0x7ff, 0x7fff, 0xe3f8, 0x7, 0xa9, 0x100, 0x9, 0x7ff, 0x7ff, 0x3, 0x63, 0x3, 0x1, 0x6b, 0x1000, 0x1, 0x2fdf, 0x9, 0x8f62, 0xbf4, 0x9c9e, 0x0, 0xffffff12, 0x9, 0x9, 0x10, 0xfffffffa, 0xfff, 0xdc, 0xbc3, 0x4a56, 0xee, 0x10001, 0x2, 0x8, 0x3, 0x8, 0x2, 0x7, 0xb0, 0x3, 0xc88, 0x400, 0x8000, 0xf8b5, 0x3, 0xfe48, 0x0, 0x4, 0x41cd9f42, 0x2, 0x401, 0x7, 0xc536, 0x0, 0x7, 0x7fffffff, 0xfffffff7, 0x0, 0x7fff, 0x1, 0xfff, 0x400000, 0x4, 0x9f0b, 0x1, 0xb, 0x3, 0xad61, 0x6, 0x942, 0x80, 0x9, 0x8001, 0x1a235f8a, 0x10001, 0x187, 0x9, 0x0, 0x6, 0x1, 0x9, 0x0, 0xd6, 0xa, 0x1ff, 0x7ff, 0x100]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xfffff800, 0x3, 0x0, 0xffff, 0x8, 0x7, 0x2, 0x9, 0x4, 0x80, 0x9, 0x3, 0x9, 0x401, 0xffffffff, 0x9, 0x1, 0x2, 0x2da5, 0x5, 0x5, 0x7, 0x4, 0x5, 0x3ff, 0x3, 0x5, 0x2, 0xd89, 0x7, 0x857, 0x938, 0x5, 0x0, 0xed66, 0x2, 0xfffffffb, 0xa, 0x9, 0x80, 0x2e, 0x6, 0x4, 0x451, 0x80, 0x0, 0x9, 0x2d, 0x2, 0x3, 0x9, 0xaf3, 0x7, 0x3e93, 0x6, 0x93b, 0x0, 0x800, 0x2, 0x8, 0x8, 0x4, 0x0, 0x10001, 0xc2, 0xfffffffe, 0x6, 0x1, 0x400000, 0xfff, 0x7, 0x9, 0x0, 0x304, 0xf, 0x6, 0x800, 0x4, 0x8, 0x7, 0xa, 0x5, 0x6, 0x5, 0x9, 0x10001, 0xc74, 0xffffffff, 0x2, 0x2, 0x4, 0xe3de, 0x9, 0x1, 0xffff, 0x80000000, 0x1000, 0x8, 0x9e6f, 0x3, 0x20, 0x4, 0x8, 0xcc2, 0x7, 0x9, 0x0, 0x4c, 0x902, 0x8, 0x7, 0x9, 0xb3, 0x9220, 0x7, 0x7ff, 0x0, 0x800, 0x4, 0x7, 0xd506, 0xe, 0x1, 0x1, 0x6, 0x5, 0xfffffffb, 0x3fe3fa2, 0x8, 0x5, 0x5, 0xf, 0x7ff, 0x1, 0x7, 0x3, 0x401, 0x6, 0xb, 0x5, 0xffffffff, 0x7, 0x2, 0x5, 0x4, 0x1, 0x646, 0x9ec, 0x6, 0x5, 0x3, 0xfffffff7, 0xa4, 0x2, 0x45ee, 0x1abe, 0x10001, 0x0, 0x4, 0xfffffffc, 0x7, 0x1, 0x80000000, 0x80000001, 0x7, 0x5, 0x800, 0x9, 0x2, 0x0, 0xb, 0x9, 0x8, 0xd08, 0xb, 0x6, 0x3, 0xd, 0x2, 0xaf18, 0xfffff95a, 0x11, 0xc, 0x0, 0x4, 0x778, 0xc, 0xffffffff, 0xce5f, 0xf40, 0x6, 0xd, 0x7, 0x6b, 0x1, 0x4, 0x400, 0x7fff, 0x8, 0xfffffffa, 0x8, 0x7, 0x8, 0x0, 0x9152, 0x4, 0x2, 0x9, 0x6, 0x8001, 0xffff, 0x100, 0x5ac3, 0xc2, 0x3, 0x800, 0xde7c, 0x80000001, 0x2, 0xa3, 0x2, 0x4, 0x9, 0x4, 0x45, 0x18, 0x2, 0x5, 0x401, 0xaaa4, 0x9, 0x0, 0x3, 0x29, 0x7, 0x6, 0x8, 0x3, 0x2, 0x0, 0x7, 0xe, 0x8, 0x5, 0x1, 0xf74, 0x5, 0x5, 0x0, 0x0, 0x4, 0x361, 0x7, 0xf4ae, 0x3, 0x7]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x6, 0x6, 0x9, 0x1, {0x8, 0x2, 0x40, 0x3, 0x9, 0x6}, {0x4, 0x1, 0xfffb, 0xfff, 0x5, 0x4}, 0x2, 0x8, 0x2}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x1}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7fffffff}, @TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x20000000, 0x6, 0x5, 0xef2b, {0x7, 0x1, 0x1, 0x1, 0x5, 0x5}, {0xff, 0x1, 0x2, 0x3, 0x9, 0x5}, 0x2, 0x3, 0xfffffe00}}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0xfff2, 0xfff3}}, @TCA_BASIC_EMATCHES={0x2c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7, 0x7, 0x522}, {{0x4, 0x1, 0x0, 0x1}, {0x4}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9}}]}]}}]}, 0x118c}}, 0x4000004) 1.302709185s ago: executing program 9 (id=14009): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000fc0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='cpu>=0||!') 1.230606535s ago: executing program 6 (id=14011): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) read$msr(0xffffffffffffffff, 0x0, 0x0) ustat(0x0, 0x0) timer_create(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000840)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x70, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x200000001300, 0x200000001330], 0x0, 0x0, &(0x7f0000001300)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}]}, 0x108) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x110b, 0x8000000000002}) socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="5c00000013006bcd9e3fe3dc4e48aa31086b8703140000001f03000000330000040014000d000a000d0000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f698", 0x5b}], 0x1, 0x0, 0x0, 0x1f000801}, 0x840) 1.170788516s ago: executing program 9 (id=14012): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4}, &(0x7f00000007c0)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) futex(0x0, 0x3, 0x0, &(0x7f0000fd7ff0)={0x77359400}, 0x0, 0xfffffffd) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x20000) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r1, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x25a5, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r5}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r5, r4}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000ff00000000000000000000181100001e86741c40fd2ebcbc6cf760c5c22c1e2288bd92b387e434fef554f3e16c69ba65ac97313246dcc2015080e026a57f1c7cd8cd20245d2d19e87c4f9568", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000f00)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161142, 0x0) ioctl$PPPIOCNEWUNIT(r7, 0xc004743e, &(0x7f0000000140)=0x7ffd) ioctl$PPPIOCSPASS(r7, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x40, 0x0, 0x1, 0xffffffff}]}) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, r6, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1, 0x14, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xc}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x5}, @generic={0x6, 0x8, 0xd, 0x3, 0x1}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffd}}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}]}, &(0x7f0000000000)='syzkaller\x00', 0x578, 0x10, &(0x7f0000000200)=""/16, 0x41000, 0x33, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x9, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000680)=[r6, r6, r8, r6, r9, r6, r6], &(0x7f00000006c0)=[{0x1, 0x3, 0x5, 0xb}], 0x10, 0x5, @void, @value}, 0x94) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 1.147073367s ago: executing program 6 (id=14013): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="05000000210000000a00000008000000000000002273b9cddcb034a39248cf4f7cda725a4854f9ff82a9838c107847762c30c6f3ca821929e146a5dea8d93571ec5ebf818281e969f5f7201ebda87c87b1abddb519f3413371de1fa35b8a60217f0d824a53aec2bb439871d2f76dee4687a0f79fec80fe", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socket$inet(0x2, 0x2, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00"/11], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x7, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r4, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) 1.135529187s ago: executing program 5 (id=14014): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mkdir(&(0x7f0000000540)='./file0\x00', 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x81e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x3}) setrlimit(0x40000000000008, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$inet(r1, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4008804) 1.077538757s ago: executing program 5 (id=14015): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x18) getuid() 1.025040458s ago: executing program 1 (id=14017): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="05000000210000000a00000008000000000000002273b9cddcb034a39248cf4f7cda725a4854f9ff82a9838c107847762c30c6f3ca821929e146a5dea8d93571ec5ebf818281e969f5f7201ebda87c87b1abddb519f3413371de1fa35b8a60217f0d824a53aec2bb439871d2f76dee4687a0f79fec80fe", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socket$inet(0x2, 0x2, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00"/11], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x7, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x0, 0x0, 0x2) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r4, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) 1.012248748s ago: executing program 5 (id=14018): socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0, @ANYRES16=r0], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x6293dca2, 0xc0020, r2, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4, 0xc, @void, @value, @void, @value}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4}, &(0x7f0000000200), &(0x7f0000000280)=r5}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r6 = memfd_secret(0x80000) fcntl$setlease(r6, 0x400, 0x0) close(r6) 806.55506ms ago: executing program 5 (id=14019): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x401) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = open(0x0, 0x60840, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) socket(0xa, 0x2400000001, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x3, 0x4, 0x7}]}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x9}}}, 0x24}}, 0x0) 769.712381ms ago: executing program 1 (id=14020): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r0, 0x0, 0x10000}, 0x18) accept(0xffffffffffffffff, &(0x7f0000000440)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x0) setrlimit(0x4, &(0x7f00000003c0)={0x0, 0x100203}) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x0, &(0x7f0000000080), 0xc1, 0x7b7, &(0x7f00000007c0)="$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") ioprio_get$uid(0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x20) sendfile(r1, r1, 0x0, 0x7a680000) 629.447423ms ago: executing program 1 (id=14021): openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001200)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10, 0x0}}], 0x1, 0x2000c054) bind$inet(r0, &(0x7f0000000980)={0x2, 0x4e22, @broadcast}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0x7}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001c80)=@newtfilter={0x118c, 0x2c, 0xd27, 0x470bd28, 0x2, {0x0, 0x0, 0x0, r4, {0x0, 0x17}, {}, {0x7, 0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x115c, 0x2, [@TCA_BASIC_POLICE={0x818, 0x4, [@TCA_POLICE_RATE64={0xc, 0x8, 0x3}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x612, 0x7, 0x5, 0x2, 0x9, 0x9, 0x4, 0x7, 0xb7, 0x2, 0x5, 0x0, 0x7, 0x7, 0x1, 0x4, 0xc000000, 0x9, 0x0, 0x0, 0x100, 0x6, 0x4, 0x7, 0x0, 0xffffffff, 0x10001, 0x8, 0x8, 0x3, 0x2, 0xc3, 0x0, 0x2, 0x4, 0x7, 0x7fff, 0x7, 0x1000, 0x4431, 0xc, 0x9d69, 0xb, 0x4, 0x1, 0x9, 0x3, 0x8, 0xfba6, 0x5, 0x0, 0xffffff3a, 0x0, 0x9, 0x1, 0x5, 0x6, 0x9, 0xad, 0x72, 0x3, 0x6b880000, 0x101, 0x0, 0xd, 0x5, 0x0, 0x9, 0x3, 0x7, 0xfffffffc, 0x2, 0x8878, 0x1, 0x9, 0x23ae4e85, 0x5, 0xfffffbff, 0x9, 0x0, 0x8000, 0x1, 0x10000, 0x7ff, 0xc769, 0x1, 0x4, 0x9, 0x6, 0xb930000, 0xc, 0xb, 0x0, 0x1, 0x0, 0xf, 0x9e, 0x2, 0x0, 0x0, 0xfffffff8, 0x7, 0x3, 0x2d7, 0x1, 0x8, 0xb, 0x1, 0x0, 0xfffffff7, 0x1, 0x3, 0x0, 0xaa, 0xda0, 0x1, 0x78, 0xac, 0x10000, 0xfe, 0x0, 0x9, 0x1, 0x2, 0x1000, 0x4, 0x2, 0x3, 0x4, 0x5, 0x400, 0x2, 0x7f, 0xd, 0x7, 0x0, 0x1, 0x61, 0x4, 0x3, 0x5, 0x2, 0x2, 0x8, 0xfffffffa, 0xd845, 0xfff, 0x8, 0x3, 0x6d, 0x1, 0x5, 0x8, 0x6, 0x40, 0xd, 0x3, 0x2, 0x1, 0xfffffffa, 0x0, 0xca, 0x2, 0x1000, 0x57, 0x6, 0x49ff, 0x9, 0xffff, 0x6, 0x5, 0x2, 0xfffffffd, 0x1, 0x0, 0xc, 0x1ff, 0x3, 0x1, 0x3, 0x6748, 0xfffffff8, 0x81, 0x6, 0x8, 0x1, 0xfff, 0x4, 0x9, 0xff, 0x3a9, 0x4, 0x7, 0x9, 0x9, 0x9, 0x3, 0x0, 0x2bccdac2, 0xec3, 0xc1e7, 0x1ff, 0xf96, 0x7fffffff, 0x0, 0x4, 0x4, 0x6, 0x81, 0x0, 0x4, 0xa, 0x1000, 0x5, 0x48, 0x80000000, 0x2, 0x4, 0x3, 0x9d8, 0x9, 0x7, 0x0, 0x7, 0x2, 0x1, 0x6, 0x388f, 0x7f, 0xbeb1, 0x635, 0x1, 0x5, 0x7, 0x2, 0x5, 0x200, 0xf, 0x5, 0x38000, 0xe4, 0x9, 0x5, 0x9, 0x10, 0x2, 0x4, 0x7fff, 0x0, 0x81, 0x3, 0x2, 0x7fffffff, 0x2, 0x7]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x200, 0x9, 0xe, 0x4, 0x9, 0xc1, 0x0, 0x80000000, 0x0, 0x1, 0x8, 0x9, 0xfc49, 0x4, 0x20000000, 0x10000, 0xffffff1c, 0x7, 0x69, 0x3, 0x5a, 0x1, 0x3, 0x8, 0x401, 0x80000000, 0x8, 0xfff, 0x40, 0x5, 0xfffffffb, 0x8000, 0xdf, 0x9000000, 0x3, 0xfff, 0x1, 0x7fff, 0x7, 0x1, 0x8, 0x2, 0x6, 0x3ba6, 0x5, 0x6a2, 0x5, 0x7, 0x8000, 0x2, 0x0, 0x5, 0x1c0000, 0x2, 0x7, 0x7f, 0x8001, 0x73fe, 0x0, 0x2, 0x4, 0x8, 0x8, 0xc5c0, 0xffffffff, 0x4, 0xcf, 0xb3, 0x3, 0x8000, 0x3, 0x3, 0x1, 0x6, 0x0, 0xf3f, 0x1000, 0x9, 0x42bd, 0x6, 0x7, 0x4b8, 0x2, 0x890, 0x6, 0x0, 0xfffffffc, 0xce, 0x2, 0x9, 0x2, 0xfffff27a, 0x9, 0x2, 0x9, 0x6, 0x7402, 0x0, 0x5, 0xff, 0x62c, 0x38, 0x8001, 0x84a, 0x5, 0xfffffffc, 0x0, 0x40, 0xf7c, 0x7fffffff, 0xbf4, 0xe, 0x8, 0x3ff, 0x3, 0x80, 0x4, 0x3ff, 0x1, 0x1, 0x5, 0x40, 0x0, 0x3, 0x1000, 0x7, 0xfffffffe, 0xf3, 0x489, 0x5, 0x1, 0xdcc2, 0x7, 0x4, 0x0, 0xac7, 0x7, 0x6, 0xf, 0x10, 0x1, 0x3f7a, 0x4, 0xfff, 0x4, 0x3, 0x3, 0x8, 0x10, 0x4, 0x4, 0x3, 0x1, 0x1000, 0xe0a, 0xeb4, 0x6, 0xa, 0xa000000, 0x746e948c, 0x7, 0x5, 0xfffffffb, 0x2, 0x4, 0x2, 0x9, 0x5, 0xc, 0xa5, 0x50, 0x10001, 0x8, 0x400, 0x6, 0xb2f4, 0x2, 0x1, 0xee6e, 0x3, 0xd74a000, 0x8f5, 0x6, 0x8cc, 0x5, 0x44, 0x2, 0x3, 0x8000, 0x4ae60ce, 0x200, 0xffffffae, 0x5, 0x0, 0x4, 0xc, 0x7f, 0x54, 0x27f1, 0x2, 0x8001, 0x1ad, 0x9, 0xff, 0x0, 0x7fffffff, 0xa7c, 0xfffffffe, 0x7ff, 0x78, 0x6, 0x3b2b, 0x45f0458e, 0x2, 0x3000, 0x7af, 0x7, 0x9c, 0x7, 0x9, 0x9, 0x3, 0x9, 0x5, 0x6, 0x4, 0x9, 0xffff, 0x1, 0xfffffff7, 0x8, 0xd98, 0x80000001, 0x3ff, 0x8001, 0x9, 0x174, 0x3, 0x7, 0x9, 0x3, 0xffffffff, 0x7c57, 0x3, 0x7, 0x6, 0x0, 0xe4b, 0x7fff, 0x6, 0x3, 0x2, 0x9, 0x6, 0x1, 0x4]}]}, @TCA_BASIC_POLICE={0x5c, 0x4, [@TCA_POLICE_RATE64={0xc, 0x8, 0xff}, @TCA_POLICE_RESULT={0x8, 0x5, 0x4}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x53}, @TCA_POLICE_TBF={0x3c, 0x1, {0x6, 0x7, 0x1, 0x9, 0x4, {0x4, 0x2, 0x9, 0x200, 0x1d50, 0x6}, {0xb, 0x0, 0x7, 0x4, 0x3, 0x2}, 0x6, 0xfffff800, 0x7fff}}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0xc, 0x9}}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x9, 0xfff2}}, @TCA_BASIC_POLICE={0x8a0, 0x4, [@TCA_POLICE_RESULT={0x8, 0x5, 0xfffffffb}, @TCA_POLICE_RATE={0x404, 0x2, [0x9d52, 0x3, 0x80000000, 0xe94, 0x3, 0xb, 0x2, 0x3, 0x7, 0x0, 0x5, 0x5, 0x3, 0x9, 0x1, 0x5, 0x1, 0x40, 0x5, 0x401, 0x2, 0x28000000, 0x7, 0x31, 0x80, 0x1, 0xf441, 0x9b8, 0x52, 0x0, 0x5, 0x3, 0x4, 0x860, 0xfffffd1e, 0x9, 0x1, 0x4, 0xb59, 0x2, 0x61, 0x7, 0x0, 0x10, 0x6a, 0xfffffbd4, 0x1, 0x2, 0xf2a, 0x7fff, 0x8641, 0x1, 0x7, 0xb, 0x4, 0x3, 0x1f71, 0x26, 0x5, 0x10000, 0x8001, 0x5, 0x2, 0xf8305fa, 0x3, 0x80000001, 0x6, 0x4, 0x5, 0x8, 0x1, 0x4, 0x4, 0x10001, 0x1, 0x7, 0x8, 0x8, 0x8, 0x3, 0x4, 0x100, 0x0, 0x3, 0xffffffc7, 0x6, 0x10, 0x6, 0xc0000000, 0x8, 0x1, 0x0, 0x8000, 0x8, 0x10, 0x5, 0xffffff80, 0x3, 0x7, 0x6, 0x5, 0x0, 0x4, 0x20bb, 0x9, 0x9, 0x81, 0x7, 0x5, 0x8cb, 0x5cee, 0x8, 0x5, 0x4, 0x7ce9, 0x7fffffff, 0xfff, 0x1000, 0x7, 0xfffff3bd, 0x428, 0x3, 0xa1, 0x7, 0xffffffff, 0x9, 0x5, 0x2, 0x42cb, 0x8f7, 0x7, 0x8, 0x4, 0x7, 0x6, 0x9, 0x6, 0x9, 0xe, 0x7, 0x4, 0x8, 0x80000001, 0x9ef0, 0x101, 0x5, 0x80, 0x4, 0x7, 0x0, 0x1ff, 0x8, 0x1000, 0x800, 0x17fe, 0x7, 0x95, 0x6, 0x10, 0x80, 0x7, 0x6, 0xa62e, 0x59, 0x9bbf, 0x9, 0x5, 0x7ff, 0x7fff, 0xe3f8, 0x7, 0xa9, 0x100, 0x9, 0x7ff, 0x7ff, 0x3, 0x63, 0x3, 0x1, 0x6b, 0x1000, 0x1, 0x2fdf, 0x9, 0x8f62, 0xbf4, 0x9c9e, 0x0, 0xffffff12, 0x9, 0x9, 0x10, 0xfffffffa, 0xfff, 0xdc, 0xbc3, 0x4a56, 0xee, 0x10001, 0x2, 0x8, 0x3, 0x8, 0x2, 0x7, 0xb0, 0x3, 0xc88, 0x400, 0x8000, 0xf8b5, 0x3, 0xfe48, 0x0, 0x4, 0x41cd9f42, 0x2, 0x401, 0x7, 0xc536, 0x0, 0x7, 0x7fffffff, 0xfffffff7, 0x0, 0x7fff, 0x1, 0xfff, 0x400000, 0x4, 0x9f0b, 0x1, 0xb, 0x3, 0xad61, 0x6, 0x942, 0x80, 0x9, 0x8001, 0x1a235f8a, 0x10001, 0x187, 0x9, 0x0, 0x6, 0x1, 0x9, 0x0, 0xd6, 0xa, 0x1ff, 0x7ff, 0x100]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xfffff800, 0x3, 0x0, 0xffff, 0x8, 0x7, 0x2, 0x9, 0x4, 0x80, 0x9, 0x3, 0x9, 0x401, 0xffffffff, 0x9, 0x1, 0x2, 0x2da5, 0x5, 0x5, 0x7, 0x4, 0x5, 0x3ff, 0x3, 0x5, 0x2, 0xd89, 0x7, 0x857, 0x938, 0x5, 0x0, 0xed66, 0x2, 0xfffffffb, 0xa, 0x9, 0x80, 0x2e, 0x6, 0x4, 0x451, 0x80, 0x0, 0x9, 0x2d, 0x2, 0x3, 0x9, 0xaf3, 0x7, 0x3e93, 0x6, 0x93b, 0x0, 0x800, 0x2, 0x8, 0x8, 0x4, 0x0, 0x10001, 0xc2, 0xfffffffe, 0x6, 0x1, 0x400000, 0xfff, 0x7, 0x9, 0x0, 0x304, 0xf, 0x6, 0x800, 0x4, 0x8, 0x7, 0xa, 0x5, 0x6, 0x5, 0x9, 0x10001, 0xc74, 0xffffffff, 0x2, 0x2, 0x4, 0xe3de, 0x9, 0x1, 0xffff, 0x80000000, 0x1000, 0x8, 0x9e6f, 0x3, 0x20, 0x4, 0x8, 0xcc2, 0x7, 0x9, 0x0, 0x4c, 0x902, 0x8, 0x7, 0x9, 0xb3, 0x9220, 0x7, 0x7ff, 0x0, 0x800, 0x4, 0x7, 0xd506, 0xe, 0x1, 0x1, 0x6, 0x5, 0xfffffffb, 0x3fe3fa2, 0x8, 0x5, 0x5, 0xf, 0x7ff, 0x1, 0x7, 0x3, 0x401, 0x6, 0xb, 0x5, 0xffffffff, 0x7, 0x2, 0x5, 0x4, 0x1, 0x646, 0x9ec, 0x6, 0x5, 0x3, 0xfffffff7, 0xa4, 0x2, 0x45ee, 0x1abe, 0x10001, 0x0, 0x4, 0xfffffffc, 0x7, 0x1, 0x80000000, 0x80000001, 0x7, 0x5, 0x800, 0x9, 0x2, 0x0, 0xb, 0x9, 0x8, 0xd08, 0xb, 0x6, 0x3, 0xd, 0x2, 0xaf18, 0xfffff95a, 0x11, 0xc, 0x0, 0x4, 0x778, 0xc, 0xffffffff, 0xce5f, 0xf40, 0x6, 0xd, 0x7, 0x6b, 0x1, 0x4, 0x400, 0x7fff, 0x8, 0xfffffffa, 0x8, 0x7, 0x8, 0x0, 0x9152, 0x4, 0x2, 0x9, 0x6, 0x8001, 0xffff, 0x100, 0x5ac3, 0xc2, 0x3, 0x800, 0xde7c, 0x80000001, 0x2, 0xa3, 0x2, 0x4, 0x9, 0x4, 0x45, 0x18, 0x2, 0x5, 0x401, 0xaaa4, 0x9, 0x0, 0x3, 0x29, 0x7, 0x6, 0x8, 0x3, 0x2, 0x0, 0x7, 0xe, 0x8, 0x5, 0x1, 0xf74, 0x5, 0x5, 0x0, 0x0, 0x4, 0x361, 0x7, 0xf4ae, 0x3, 0x7]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x6, 0x6, 0x9, 0x1, {0x8, 0x2, 0x40, 0x3, 0x9, 0x6}, {0x4, 0x1, 0xfffb, 0xfff, 0x5, 0x4}, 0x2, 0x8, 0x2}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x1}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7fffffff}, @TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x20000000, 0x6, 0x5, 0xef2b, {0x7, 0x1, 0x1, 0x1, 0x5, 0x5}, {0xff, 0x1, 0x2, 0x3, 0x9, 0x5}, 0x2, 0x3, 0xfffffe00}}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0xfff2, 0xfff3}}, @TCA_BASIC_EMATCHES={0x2c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7, 0x7, 0x522}, {{0x4, 0x1, 0x0, 0x1}, {0x4}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9}}]}]}}]}, 0x118c}}, 0x4000004) 565.230034ms ago: executing program 3 (id=14022): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000fc0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='cpu>=0||!') 518.268034ms ago: executing program 6 (id=14023): socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0, @ANYRES16=r0], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x6293dca2, 0xc0020, r2, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4, 0xc, @void, @value, @void, @value}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4}, &(0x7f0000000200), &(0x7f0000000280)=r5}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r6 = memfd_secret(0x80000) fcntl$setlease(r6, 0x400, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000009f910000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r6) 513.499574ms ago: executing program 1 (id=14024): munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x40, 0x3, 0x0, 0x0, 0x2005e, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100987, 0xfffffffffffffffa, 0x7, 0x0, 0x81, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x4, 0x12011, r6, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000a40)='GPL\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000080)=0x9, 0x8, 0x0) mbind(&(0x7f00005f7000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000011c0)=@newtaction={0xe6c, 0x30, 0x25, 0x0, 0x0, {}, [{0xe58, 0x1, [@m_pedit={0xe54, 0x1, 0x0, 0x0, {{0xa}, {0xe28, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x4}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x609}, {}, {0x0, 0x0, 0x600}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}], [{}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe6c}}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='9', 0x1, 0xfffffffffffffffc) keyctl$chown(0x4, r9, 0x0, 0xee00) 423.337975ms ago: executing program 3 (id=14025): gettid() ustat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848140000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x8, &(0x7f0000000000)=[{&(0x7f0000000340)="5c00000013006bcd9e3fe3dc4e48aa31086b8703140000001f03000000330000040014000d000a000d0000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x840) 396.684885ms ago: executing program 6 (id=14026): munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x40, 0x3, 0x0, 0x0, 0x2005e, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100987, 0xfffffffffffffffa, 0x7, 0x0, 0x81, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x4, 0x12011, r6, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000a40)='GPL\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000080)=0x9, 0x8, 0x0) mbind(&(0x7f00005f7000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000011c0)=@newtaction={0xe6c, 0x30, 0x25, 0x0, 0x0, {}, [{0xe58, 0x1, [@m_pedit={0xe54, 0x1, 0x0, 0x0, {{0xa}, {0xe28, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x4}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x609}, {}, {0x0, 0x0, 0x600}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}], [{}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe6c}}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='9', 0x1, 0xfffffffffffffffc) keyctl$chown(0x4, r9, 0x0, 0xee00) 206.590928ms ago: executing program 9 (id=14027): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7fe, 0xf83, 0x8}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000003800)=@newtaction={0xf98, 0x30, 0x4, 0x70bd27, 0x25dfdbfe, {}, [{0x2c8, 0x1, [@m_nat={0x70, 0x9, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x663b, 0x6, 0xffffffffffffffff, 0x80, 0x3}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x1}}]}, {0x1e, 0x6, "a33ec379d98024f511d516e54741d6b6b3f29a5f596b8427b0e6"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_connmark={0x11c, 0x7, 0x0, 0x0, {{0xd}, {0xe4, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xffffffff, 0x3, 0x8, 0x0, 0x7990}, 0x3}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x9, 0x23f39604, 0xffffffffdffffff7, 0x3ff, 0x3}, 0x2438}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xb, 0x3, 0x6, 0x2, 0x4}, 0x2a}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x11, 0x80, 0x10000000, 0x9, 0x8}, 0x81}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xffffff07, 0x4, 0x0, 0x8000, 0x4}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xb, 0x9, 0x7, 0x2}, 0x1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x60, 0x1, 0xffffffffffffffff, 0x4, 0x1}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xad, 0x2, 0x7, 0x3}, 0x8}}]}, {0xb, 0x6, "dadd7130454af6"}, {0xc, 0x7, {0x1, 0x19d2e634c533f6a5}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_bpf={0x138, 0x14, 0x0, 0x0, {{0x8}, {0x84, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8, 0x5, r0}, @TCA_ACT_BPF_FD={0x8, 0x5, r1}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xfff, 0x9, 0x6, 0xad, 0xfff}}, @TCA_ACT_BPF_OPS={0x34, 0x4, [{0x4, 0x3, 0x1, 0x80}, {0x9, 0x4, 0x4, 0x5}, {0xffc0, 0x6, 0x5, 0x9}, {0x7f, 0x8, 0x6, 0x3}, {0x7, 0x2, 0x7, 0xc232}, {0x54, 0x0, 0x6, 0x101}]}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x7, 0x401, 0x2, 0xfffffffe, 0xfffffe00}}]}, {0x8d, 0x6, "7ed78b8fed35f5f39ad497aed527b0f9ca497fe5e5fab6dacf415b2a1afe2da8593210b12f992ff17d3ba4a732f56698b60c84fcb35d68befbfc6286d06d0141893006162de36cf62d33063a5a470fce000f8e4ab03c163de524f3b4c7c9551014fa566748a4c08e84cfbb72a8d048b10d392a9acf388cee36d76c481a50816fddf0b498c44b891d52"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}, {0x480, 0x1, [@m_skbmod={0x168, 0xe, 0x0, 0x0, {{0xb}, {0x78, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x24, 0x2, {{0xd, 0x2357, 0x4, 0x3, 0x9}}}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x5, 0x1, 0xffffffffdffffffa, 0xd66, 0x7}}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x400, 0x80000001, 0x1, 0x7, 0x6}, 0x1}}]}, {0xc5, 0x6, "1290412dbeb6520df10b559c3b782acfd81c4654dffd4337e648b86281eafef0ea6a57e0adf9a98b79ce4d75d36c14e6cde7ce10f2e398b12b154609af925cebb64f915580a5cbba9c2ac47f4bd49a1b035e041187ade0fe48f0a86139e297c3b6803b305bf1915b017f795bb1ab6595e896d543684d98e4a44d31c9464ab314c955c4289cf0e6f29de8b0319589de6b3a15398cc120455dba4eb8df773d260a336f843d24ce4411a8468801b2d41151e9dc0cbebc06e029a2afc424d5f5627313"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_tunnel_key={0xcc, 0x1c, 0x0, 0x0, {{0xf}, {0x6c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @initdev={0xac, 0x1e, 0x1, 0x0}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x2d}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e23}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @multicast1}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e20}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e20}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x8, 0x6, 0x8, 0x6, 0x6}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, {0x31, 0x6, "965f8c0c91502ab159daffc20dfe2a6c1d0d653047e37d93e7681c313c67a1b293ce644bc5a1185089ab3e2606"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_skbedit={0x160, 0x12, 0x0, 0x0, {{0xc}, {0x44, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x3}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xf, 0x1}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xb, 0xe}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x1, 0xc}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x0, 0x3}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x7f, 0x10, 0x4, 0x8, 0x1}}]}, {0xf1, 0x6, "d687809646481d68f24e0d27e9e77efb0ae7eaa161c4dfd04227b93cfe58cd22ee21bd561b5429a448faf13fb56eabf9b909f992213cd32cbd9ae44ed1d894ae03f3a55c6adc21e811a9670c02644dddd9f3c1af78831d81c9e4ec3e4ad43dd2a84c37e16a3f53ebf534413ac61544137d633bebf9fe9d491df6a14647e40b25d502a652d71aa92fcd191bb31e5e12cf54340c89436799ec190e5028f18e6b7aa61b43ffad43d891dfc93fde6a4c7ccd3e77a663539839e871952081e9704f80846b483580481528ef0f90b85575a4a0f2016a0e628ed967c4e932ee5d02b6e6571371a34952e1c8ee019734c3"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_sample={0xe8, 0x15, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x6}]}, {0xb1, 0x6, "617b6718e85a7e862f1e76b85db1a66153a751a641fc122bf601ae1127cd03dda92ef6f458a4e70e0d42fa1f3bc916f04d2d83c291b6d9c626f8aa5e7ada4b686a3cb4196e6bcb513dc226adbd7152b498fe7ade4815e7669e33373738d2731b8da78a6ec8c3acb72b321b810fccdbd92f4b43623ae49826ab8691e92efed52a58cea5164fe6f29bd5c4641f4bcbec0b8e57499d1825a3dcda405898aa4f3d9c992afaeed163094d3926d29003"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}, {0x83c, 0x1, [@m_police={0x838, 0x10, 0x0, 0x0, {{0xb}, {0x80c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x4, 0x800, 0x10, 0x151, 0x3, 0x66, 0x0, 0x5, 0x400, 0x800, 0xd2f5, 0x5a, 0x5, 0x401, 0xffffffff, 0x0, 0x81, 0xffffffab, 0x0, 0x80000001, 0x8, 0x9, 0x8001, 0x1ff, 0x3, 0x4, 0x4, 0x7, 0x9, 0x7, 0x1, 0x3, 0x9, 0x6, 0x321ec986, 0x9, 0x8, 0x5, 0x0, 0x8000, 0x5, 0x2, 0xa7, 0xfffffff7, 0x7, 0x1, 0x7fff, 0x5, 0x4a169186, 0x18, 0xac4, 0x5, 0x80000000, 0x4f1, 0x7, 0xffffff77, 0x0, 0x21, 0x0, 0x8, 0x3, 0xb72, 0x6, 0xb4, 0xf40, 0x10000, 0xa619, 0xffff, 0xfffffffb, 0x4, 0x1, 0x100, 0x101, 0xfaf3, 0x6, 0x76, 0xfffffffe, 0x10, 0x401, 0x6, 0x2, 0x6, 0xfffffff7, 0x8, 0x5, 0xffffffff, 0x9, 0x0, 0x0, 0x6, 0x3, 0x7, 0x30b, 0x4, 0xfff, 0x0, 0x60c9d684, 0x6, 0x5, 0x80000, 0x2, 0x1, 0x9, 0x8, 0xc, 0x5, 0xb, 0x8, 0x7, 0x6ae000, 0xfffffffc, 0x8000, 0x0, 0x1, 0x9, 0x0, 0x81, 0x5, 0xfffffdd9, 0xffffffff, 0x28bcfe1e, 0x4, 0x1, 0xf845, 0x0, 0x0, 0x5, 0x8001, 0x5, 0xfffffff7, 0xffff, 0x4, 0x95f, 0x3, 0x3, 0x8, 0x6, 0xfc27, 0x10001, 0x0, 0xfffffffe, 0x8, 0x8, 0x3, 0x401, 0x3, 0x8, 0x9, 0x1, 0x7b44, 0x3, 0x8, 0xf3, 0x4, 0x10, 0x5, 0x5567, 0x24000, 0xffffffd9, 0xa44, 0x1, 0x2, 0xfffffff9, 0x10001, 0x8, 0x1, 0x200, 0x40015a2b, 0xe, 0xe7d3, 0xbe67, 0x3, 0x7, 0x7ff, 0x9, 0x7, 0x200040, 0x1, 0x9, 0x6, 0x816f, 0x10001, 0x5, 0xa, 0xc, 0x8, 0x3, 0x1000, 0x6, 0x9, 0x3, 0x5, 0x3, 0x101, 0x100, 0xd, 0x0, 0xffff7fff, 0x10, 0x6, 0x0, 0x7fffffff, 0x7, 0x8001, 0x71, 0x7, 0x2, 0x3ff, 0x1, 0x6e, 0xd7, 0xeb9c, 0x3, 0x8, 0x8, 0x100, 0xfffffff7, 0xfffffffe, 0x1, 0x3, 0x557d, 0x7, 0x0, 0xc, 0x8ecc, 0x0, 0x9, 0xf, 0x8, 0x5e26, 0x1c00, 0x7, 0x3, 0x21bb, 0x3559, 0x2, 0xe, 0xd, 0xfab8, 0x5ae2, 0x9, 0x7, 0x6, 0x1, 0x3, 0xffffffff, 0x3ff, 0x300000, 0x7, 0x4, 0x1, 0x80, 0x2, 0x2, 0x6]}, @TCA_POLICE_RATE={0x404, 0x2, [0x3, 0xa60e, 0x9, 0x6, 0x3, 0x0, 0x200, 0x5, 0x40, 0x80000001, 0x80000001, 0xffffffff, 0x2, 0x3, 0x1, 0x9, 0x3, 0x5, 0xb3, 0x1, 0x7, 0x3ff, 0x8, 0x135a, 0x800, 0x1, 0x1, 0x10000, 0x9, 0xfffff49f, 0x1, 0x5, 0x5cfc, 0xa, 0x740, 0x9, 0x7, 0x8000, 0x5, 0x7, 0x1c, 0x0, 0x2, 0x8, 0xa, 0x1, 0x37f, 0x70, 0x1, 0x1, 0x2, 0x96, 0x3, 0x3, 0x80, 0x7ff, 0xfffffff7, 0xb9, 0x5, 0x1, 0x593c5bf1, 0x7, 0x1, 0x7ff, 0xecb, 0x1, 0x646, 0x3, 0x4, 0x1, 0x0, 0x1, 0x100, 0x2, 0x9, 0x4, 0xffff, 0xfffffffc, 0x6, 0x101, 0x401, 0x0, 0x1, 0xfffffffc, 0x9, 0x101, 0x6, 0xe, 0x70ed7ce6, 0x3d, 0x1, 0x100, 0x5, 0x6bbc, 0xfffffffa, 0xffffffff, 0x1, 0x8, 0x4, 0x4, 0x2, 0x2, 0x5, 0xfffffff4, 0x35e, 0x3, 0x5, 0x6d0, 0x80, 0x9a, 0xa1f3, 0x130, 0x10000, 0x8, 0x5, 0x7, 0x4608, 0x4, 0x1, 0xfffffff8, 0xff, 0x7, 0x5, 0x60ee, 0x3ff, 0x6, 0x7, 0x8, 0xc00, 0xb05, 0xfffffffc, 0x1, 0x8, 0x8, 0x62ec, 0xbae1, 0x2, 0x6, 0x1, 0x2, 0x9, 0x5, 0xfffffffe, 0x9, 0x9, 0x5, 0x101, 0xf4b, 0x1, 0x0, 0x6, 0x101, 0x51, 0x4, 0x2, 0xf238, 0x4, 0x800, 0x6, 0xa, 0xfffffff8, 0x6, 0x7ff, 0x0, 0x100, 0xe, 0x3, 0x9, 0xfffffff7, 0x9, 0x2, 0x2, 0x32, 0x200, 0xffffffff, 0x8, 0x8, 0x656a, 0x2, 0x8, 0x2, 0x8, 0x6, 0x5, 0x2, 0xb0, 0x4, 0x1, 0x4, 0x200, 0xa, 0x81, 0x4, 0x2, 0x6, 0x9, 0x80000000, 0x7fff, 0x800, 0x16, 0x9, 0x0, 0x9, 0x1, 0x0, 0x5, 0xfff, 0xffffffff, 0x8000, 0x2, 0x7fff, 0x5, 0x8, 0x3, 0x1, 0x7fffffff, 0xffffffff, 0x9, 0x0, 0x9, 0x63f4a65, 0x7, 0xa62, 0x50, 0x8, 0x3, 0x56b, 0x400, 0xb, 0x4, 0x10001, 0x9, 0x0, 0x3, 0x4, 0x5, 0x101, 0x0, 0x6, 0x400, 0xffff, 0x0, 0x8, 0x10, 0xb, 0x7, 0x3, 0x5, 0xfffffff7, 0x5, 0x6, 0x6, 0x6, 0x5, 0xf81, 0x3]}]]}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0xf98}}, 0x0) 189.860688ms ago: executing program 1 (id=14028): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001800", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x18) getuid() 0s ago: executing program 1 (id=14029): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c3942, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): BIOS Google 04/19/2025 [ 789.035523][ T9547] Call Trace: [ 789.035531][ T9547] [ 789.035539][ T9547] __dump_stack+0x1d/0x30 [ 789.035568][ T9547] dump_stack_lvl+0xe8/0x140 [ 789.035596][ T9547] dump_stack+0x15/0x1b [ 789.035641][ T9547] should_fail_ex+0x265/0x280 [ 789.035700][ T9547] should_fail+0xb/0x20 [ 789.035741][ T9547] should_fail_usercopy+0x1a/0x20 [ 789.035786][ T9547] _copy_to_user+0x20/0xa0 [ 789.035819][ T9547] simple_read_from_buffer+0xb5/0x130 [ 789.035855][ T9547] proc_fail_nth_read+0x100/0x140 [ 789.035893][ T9547] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 789.035999][ T9547] vfs_read+0x1a0/0x6f0 [ 789.036092][ T9547] ? avc_has_perm+0xd3/0x150 [ 789.036132][ T9547] ? __rcu_read_unlock+0x4f/0x70 [ 789.036163][ T9547] ? __fget_files+0x184/0x1c0 [ 789.036205][ T9547] ksys_read+0xda/0x1a0 [ 789.036278][ T9547] __x64_sys_read+0x40/0x50 [ 789.036319][ T9547] x64_sys_call+0x2d77/0x2fb0 [ 789.036375][ T9547] do_syscall_64+0xd0/0x1a0 [ 789.036408][ T9547] ? clear_bhb_loop+0x40/0x90 [ 789.036437][ T9547] ? clear_bhb_loop+0x40/0x90 [ 789.036467][ T9547] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 789.036558][ T9547] RIP: 0033:0x7f8c2636d37c [ 789.036579][ T9547] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 789.036609][ T9547] RSP: 002b:00007f8c249d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 789.036634][ T9547] RAX: ffffffffffffffda RBX: 00007f8c26595fa0 RCX: 00007f8c2636d37c [ 789.036652][ T9547] RDX: 000000000000000f RSI: 00007f8c249d70a0 RDI: 0000000000000003 [ 789.036680][ T9547] RBP: 00007f8c249d7090 R08: 0000000000000000 R09: 0000000000000000 [ 789.036750][ T9547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 789.036767][ T9547] R13: 0000000000000000 R14: 00007f8c26595fa0 R15: 00007fff911a9e38 [ 789.036795][ T9547] [ 789.073479][ T9549] netlink: 'syz.1.12815': attribute type 1 has an invalid length. [ 789.272612][ T9549] 8021q: adding VLAN 0 to HW filter on device bond1 [ 789.328663][ T9558] netlink: 'syz.1.12817': attribute type 3 has an invalid length. [ 789.336675][ T9558] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12817'. [ 789.351652][ T9456] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 789.385106][ T9558] 9pnet_fd: Insufficient options for proto=fd [ 789.395152][ T9564] netlink: 'syz.3.12820': attribute type 10 has an invalid length. [ 789.403148][ T9564] netlink: 40 bytes leftover after parsing attributes in process `syz.3.12820'. [ 789.422163][ T9456] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 789.481334][ T9570] netlink: 'syz.3.12823': attribute type 3 has an invalid length. [ 789.489262][ T9570] netlink: 8 bytes leftover after parsing attributes in process `syz.3.12823'. [ 789.504418][ T9574] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 789.516114][ T9456] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 789.537100][ T9570] 9pnet: Could not find request transport: fd0x0000000000000009yŽgKÌ~Á7nñ°²Ÿ‡©"$U²f¤™©ü(†cRjÿ&¥+š‹ˆË7ñ0"ß³…×T¸î«yQç4ûñ‹äq^çTU¯•=U…`dÁô]«iC [ 789.581746][ T9576] loop9: detected capacity change from 0 to 1024 [ 789.595099][ T9573] syzkaller0: entered promiscuous mode [ 789.600648][ T9573] syzkaller0: entered allmulticast mode [ 789.623458][ T9456] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 789.654742][ T9586] netlink: 'syz.3.12830': attribute type 3 has an invalid length. [ 789.662802][ T9586] netlink: 8 bytes leftover after parsing attributes in process `syz.3.12830'. [ 789.717729][ T9456] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 789.738507][ T9456] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 789.766208][ T9456] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 789.770329][ T9597] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 789.788608][ T9456] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 789.804359][ T9599] netlink: 'syz.3.12836': attribute type 10 has an invalid length. [ 789.821179][ T9599] batadv0: left allmulticast mode [ 789.826318][ T9599] batadv0: left promiscuous mode [ 789.831546][ T9599] bridge0: port 1(batadv0) entered disabled state [ 789.847834][ T9599] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 789.859834][ T9599] batadv0: entered promiscuous mode [ 789.865216][ T9599] batadv0: entered allmulticast mode [ 789.873922][ T9599] : (slave batadv0): Enslaving as an active interface with an up link [ 789.886693][ T9604] netlink: 'syz.3.12836': attribute type 10 has an invalid length. [ 789.894712][ T9604] netlink: 40 bytes leftover after parsing attributes in process `syz.3.12836'. [ 789.909132][ T9604] : (slave batadv0): Releasing backup interface [ 789.919137][ T9604] bridge0: port 1(batadv0) entered blocking state [ 789.926100][ T9604] bridge0: port 1(batadv0) entered disabled state [ 789.976499][ T9456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 789.994968][ T9456] 8021q: adding VLAN 0 to HW filter on device team0 [ 790.005384][ T9612] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12841'. [ 790.021341][ T1719] bridge0: port 1(bridge_slave_0) entered blocking state [ 790.028536][ T1719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 790.051439][ T1719] bridge0: port 2(bridge_slave_1) entered blocking state [ 790.058609][ T1719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 790.129019][ T9618] syzkaller0: entered promiscuous mode [ 790.134651][ T9618] syzkaller0: entered allmulticast mode [ 790.167279][ T9626] 9pnet: Could not find request transport: fd0x0000000000000009yŽgKÌ~Á7nñ°²Ÿ‡©"$U²f¤™©ü(†cRjÿ&¥+š‹ˆË7ñ0"ß³…×T¸î«yQç4ûñ‹äq^çTU¯•=U…`dÁô]«iC [ 790.229449][ T9456] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 790.259015][ T29] kauditd_printk_skb: 1190 callbacks suppressed [ 790.259034][ T29] audit: type=1326 audit(1747747925.903:56597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.12849" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 790.295922][ T29] audit: type=1326 audit(1747747925.943:56598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.12849" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 790.349587][ T29] audit: type=1326 audit(1747747925.943:56599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.12849" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 790.373483][ T29] audit: type=1326 audit(1747747925.943:56600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.12849" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 790.397244][ T29] audit: type=1326 audit(1747747925.943:56601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.12849" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 790.413759][T25236] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 790.420983][ T29] audit: type=1326 audit(1747747925.953:56602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.12849" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 790.430208][T25236] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 790.463121][ T29] audit: type=1326 audit(1747747925.953:56603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.12849" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 790.486942][ T29] audit: type=1326 audit(1747747925.953:56604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.12849" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 790.510619][ T29] audit: type=1326 audit(1747747925.953:56605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.12849" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 790.534316][ T29] audit: type=1326 audit(1747747925.953:56606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.12849" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 790.767456][ T9456] veth0_vlan: entered promiscuous mode [ 790.796311][ T9456] veth1_vlan: entered promiscuous mode [ 790.823448][ T9456] veth0_macvtap: entered promiscuous mode [ 790.833766][ T9456] veth1_macvtap: entered promiscuous mode [ 790.856081][ T9456] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 790.872757][ T9456] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 790.926757][ T9456] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 790.935821][ T9456] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 790.944682][ T9456] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 790.953484][ T9456] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 790.993936][ T9673] syzkaller0: entered promiscuous mode [ 790.999464][ T9673] syzkaller0: entered allmulticast mode [ 791.125023][ T9691] 9pnet_fd: Insufficient options for proto=fd [ 791.323555][ T9705] 9pnet_fd: Insufficient options for proto=fd [ 791.481254][ T9716] syzkaller0: entered promiscuous mode [ 791.486775][ T9716] syzkaller0: entered allmulticast mode [ 791.531937][ T9718] 9pnet_fd: Insufficient options for proto=fd [ 791.566388][ T9720] loop9: detected capacity change from 0 to 1024 [ 791.593591][ T9720] EXT4-fs mount: 70 callbacks suppressed [ 791.593611][ T9720] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 791.613968][ T9720] ext4 filesystem being mounted at /518/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 791.641852][ T9720] EXT4-fs error (device loop9): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 21 vs 268369941 free clusters [ 791.658421][ T9720] EXT4-fs (loop9): Delayed block allocation failed for inode 15 at logical offset 21 with max blocks 43 with error 28 [ 791.670900][ T9720] EXT4-fs (loop9): This should not happen!! Data will be lost [ 791.670900][ T9720] [ 791.680641][ T9720] EXT4-fs (loop9): Total free blocks count 0 [ 791.686710][ T9720] EXT4-fs (loop9): Free/Dirty block details [ 791.692733][ T9720] EXT4-fs (loop9): free_blocks=4293918720 [ 791.698478][ T9720] EXT4-fs (loop9): dirty_blocks=48 [ 791.703667][ T9720] EXT4-fs (loop9): Block reservation details [ 791.709669][ T9720] EXT4-fs (loop9): i_reserved_data_blocks=3 [ 791.755552][ T3388] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 791.898346][ T9745] 9pnet_fd: Insufficient options for proto=fd [ 792.015299][ T9747] syzkaller0: entered promiscuous mode [ 792.021613][ T9747] syzkaller0: entered allmulticast mode [ 792.107158][ T9758] batadv0: left allmulticast mode [ 792.112482][ T9758] batadv0: left promiscuous mode [ 792.117794][ T9758] bridge0: port 3(batadv0) entered disabled state [ 792.135588][ T9758] batadv0: entered promiscuous mode [ 792.140940][ T9758] batadv0: entered allmulticast mode [ 792.146784][ T9758] bridge0: port 3(batadv0) entered blocking state [ 792.153709][ T9758] bridge0: port 3(batadv0) entered disabled state [ 792.303817][ T9784] loop9: detected capacity change from 0 to 128 [ 792.310890][ T9782] macsec1: entered allmulticast mode [ 792.329778][ T9784] EXT4-fs (loop9): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 792.353564][ T9784] ext4 filesystem being mounted at /525/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 792.567819][ T9792] syzkaller0: entered promiscuous mode [ 792.573498][ T9792] syzkaller0: entered allmulticast mode [ 792.815489][ T3388] EXT4-fs (loop9): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 793.144739][ T9811] validate_nla: 12 callbacks suppressed [ 793.144795][ T9811] netlink: 'syz.1.12916': attribute type 10 has an invalid length. [ 793.159271][ T9811] batadv0: left allmulticast mode [ 793.164623][ T9811] batadv0: left promiscuous mode [ 793.169872][ T9811] bridge0: port 3(batadv0) entered disabled state [ 793.178381][ T9811] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 793.203585][ T9813] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 793.210632][ T9814] netlink: 'syz.1.12916': attribute type 10 has an invalid length. [ 793.215286][ T9811] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 793.219879][ T9814] __nla_validate_parse: 12 callbacks suppressed [ 793.219914][ T9814] netlink: 40 bytes leftover after parsing attributes in process `syz.1.12916'. [ 793.256342][ T9814] batadv0: entered promiscuous mode [ 793.261716][ T9814] batadv0: entered allmulticast mode [ 793.268261][ T9814] bond0: (slave batadv0): Releasing backup interface [ 793.280749][ T9814] bridge0: port 3(batadv0) entered blocking state [ 793.287344][ T9814] bridge0: port 3(batadv0) entered disabled state [ 793.299535][ T9816] netlink: 388 bytes leftover after parsing attributes in process `syz.6.12918'. [ 793.350935][ T9821] netlink: 12 bytes leftover after parsing attributes in process `syz.3.12921'. [ 793.366088][ T9818] syzkaller0: entered promiscuous mode [ 793.371744][ T9818] syzkaller0: entered allmulticast mode [ 793.522926][ T9839] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 793.576210][ T9843] netlink: 388 bytes leftover after parsing attributes in process `syz.5.12930'. [ 793.664122][ T9849] netlink: 'syz.5.12933': attribute type 10 has an invalid length. [ 793.672174][ T9849] netlink: 40 bytes leftover after parsing attributes in process `syz.5.12933'. [ 793.956220][ T9867] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 793.996189][ T9865] syzkaller0: entered promiscuous mode [ 794.001730][ T9865] syzkaller0: entered allmulticast mode [ 794.012671][ T9869] netlink: 'syz.6.12942': attribute type 3 has an invalid length. [ 794.020661][ T9869] netlink: 8 bytes leftover after parsing attributes in process `syz.6.12942'. [ 794.039393][ T9869] 9pnet_fd: Insufficient options for proto=fd [ 794.049372][ T9873] netlink: 'syz.9.12944': attribute type 10 has an invalid length. [ 794.057407][ T9873] netlink: 40 bytes leftover after parsing attributes in process `syz.9.12944'. [ 794.226060][ T9892] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 794.264425][ T9897] netlink: 8 bytes leftover after parsing attributes in process `syz.5.12955'. [ 794.265728][ T9898] netlink: 'syz.6.12956': attribute type 10 has an invalid length. [ 794.281601][ T9898] netlink: 40 bytes leftover after parsing attributes in process `syz.6.12956'. [ 794.292157][ T9898] batadv0: entered promiscuous mode [ 794.297389][ T9898] batadv0: entered allmulticast mode [ 794.305368][ T9898] bridge0: port 3(batadv0) entered blocking state [ 794.311940][ T9898] bridge0: port 3(batadv0) entered disabled state [ 794.320946][ T9898] bridge0: port 3(batadv0) entered blocking state [ 794.327445][ T9898] bridge0: port 3(batadv0) entered forwarding state [ 794.378806][ T9906] netlink: 'syz.6.12960': attribute type 10 has an invalid length. [ 794.385828][ T9902] syzkaller0: entered promiscuous mode [ 794.392457][ T9902] syzkaller0: entered allmulticast mode [ 794.412262][ T9906] bridge0: port 3(batadv0) entered disabled state [ 794.423347][ T9906] batadv0: left allmulticast mode [ 794.428551][ T9906] batadv0: left promiscuous mode [ 794.434002][ T9906] bridge0: port 3(batadv0) entered disabled state [ 794.438546][ T9910] netlink: 'syz.6.12960': attribute type 10 has an invalid length. [ 794.448441][ T9910] netlink: 40 bytes leftover after parsing attributes in process `syz.6.12960'. [ 794.463386][ T9906] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 794.471837][ T9906] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 794.480653][ T9910] batadv0: entered promiscuous mode [ 794.485876][ T9910] batadv0: entered allmulticast mode [ 794.493321][ T9910] bond0: (slave batadv0): Releasing backup interface [ 794.503940][ T9910] bridge0: port 3(batadv0) entered blocking state [ 794.510544][ T9910] bridge0: port 3(batadv0) entered disabled state [ 794.562806][ T9919] netlink: 'syz.1.12965': attribute type 3 has an invalid length. [ 794.577072][ T9919] 9pnet_fd: Insufficient options for proto=fd [ 794.634473][ T9930] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 794.669737][ T9936] netlink: 'syz.6.12973': attribute type 3 has an invalid length. [ 794.680132][ T9936] 9pnet_fd: Insufficient options for proto=fd [ 794.690724][T25237] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 794.700000][T25237] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 794.822661][ T9954] syzkaller0: entered promiscuous mode [ 794.828163][ T9954] syzkaller0: entered allmulticast mode [ 794.868586][ T9958] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 794.922247][ T9964] batadv0: left allmulticast mode [ 794.927451][ T9964] batadv0: left promiscuous mode [ 794.932656][ T9964] bridge0: port 3(batadv0) entered disabled state [ 794.941956][ T9964] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 794.950381][ T9964] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 794.960265][ T9964] batadv0: entered promiscuous mode [ 794.965532][ T9964] batadv0: entered allmulticast mode [ 794.972510][ T9964] bond0: (slave batadv0): Releasing backup interface [ 794.983559][ T9964] bridge0: port 3(batadv0) entered blocking state [ 794.990114][ T9964] bridge0: port 3(batadv0) entered disabled state [ 795.094410][ T9979] 9pnet_fd: Insufficient options for proto=fd [ 795.125339][ T9985] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 795.299623][T10007] 9pnet_fd: Insufficient options for proto=fd [ 795.325335][T10009] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 795.344848][ T29] kauditd_printk_skb: 344 callbacks suppressed [ 795.344865][ T29] audit: type=1326 audit(1747747930.993:56951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.6.13007" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 795.390934][ T29] audit: type=1326 audit(1747747930.993:56952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.6.13007" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 795.414756][ T29] audit: type=1326 audit(1747747930.993:56953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.6.13007" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 795.438686][ T29] audit: type=1326 audit(1747747930.993:56954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.6.13007" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 795.462476][ T29] audit: type=1326 audit(1747747930.993:56955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.6.13007" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 795.486371][ T29] audit: type=1326 audit(1747747930.993:56956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.6.13007" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 795.510192][ T29] audit: type=1326 audit(1747747930.993:56957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.6.13007" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 795.533919][ T29] audit: type=1326 audit(1747747930.993:56958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.6.13007" exe="/root/syz-executor" sig=0 arch=c000003e syscall=102 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 795.557646][ T29] audit: type=1326 audit(1747747930.993:56959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.6.13007" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 795.581781][ T29] audit: type=1326 audit(1747747931.033:56960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.6.13007" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 795.731549][T10035] 9pnet_fd: Insufficient options for proto=fd [ 795.778919][T10037] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 795.836095][T10033] syzkaller0: entered promiscuous mode [ 795.841750][T10033] syzkaller0: entered allmulticast mode [ 796.731838][T10088] syzkaller0: entered promiscuous mode [ 796.737469][T10088] syzkaller0: entered allmulticast mode [ 796.745470][T10096] batadv0: left allmulticast mode [ 796.750641][T10096] batadv0: left promiscuous mode [ 796.755757][T10096] bridge0: port 3(batadv0) entered disabled state [ 796.763461][T10104] batadv0: entered promiscuous mode [ 796.768723][T10104] batadv0: entered allmulticast mode [ 796.774938][T10104] bridge0: port 3(batadv0) entered blocking state [ 796.781648][T10104] bridge0: port 3(batadv0) entered disabled state [ 796.896896][T10115] batadv0: left allmulticast mode [ 796.899092][T10113] 9pnet_fd: Insufficient options for proto=fd [ 796.902085][T10115] batadv0: left promiscuous mode [ 796.913616][T10115] bridge0: port 3(batadv0) entered disabled state [ 796.923404][T10115] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 796.934557][T10115] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 796.961402][T10115] batadv0: entered promiscuous mode [ 796.966780][T10115] batadv0: entered allmulticast mode [ 796.988667][T10115] bond0: (slave batadv0): Releasing backup interface [ 797.004715][T10115] bridge0: port 3(batadv0) entered blocking state [ 797.011367][T10115] bridge0: port 3(batadv0) entered disabled state [ 797.101377][T10119] loop9: detected capacity change from 0 to 128 [ 797.125121][T10119] EXT4-fs (loop9): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 797.163594][T10119] ext4 filesystem being mounted at /553/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 797.282854][ T3388] EXT4-fs (loop9): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 797.346883][T10133] loop9: detected capacity change from 0 to 128 [ 797.394094][T10133] EXT4-fs (loop9): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 797.421201][T10133] ext4 filesystem being mounted at /554/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 797.709331][T10146] syzkaller0: entered promiscuous mode [ 797.714941][T10146] syzkaller0: entered allmulticast mode [ 797.734594][T10148] 9pnet_fd: Insufficient options for proto=fd [ 797.980728][ T3388] EXT4-fs (loop9): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 798.542331][T10174] validate_nla: 18 callbacks suppressed [ 798.542348][T10174] netlink: 'syz.3.13073': attribute type 3 has an invalid length. [ 798.555798][T10174] __nla_validate_parse: 21 callbacks suppressed [ 798.555885][T10174] netlink: 8 bytes leftover after parsing attributes in process `syz.3.13073'. [ 798.602875][T10174] 9pnet_fd: Insufficient options for proto=fd [ 798.628192][T10178] netlink: 'syz.6.13075': attribute type 10 has an invalid length. [ 798.636175][T10178] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13075'. [ 798.835628][T10181] syzkaller0: entered promiscuous mode [ 798.841279][T10181] syzkaller0: entered allmulticast mode [ 798.873172][T10192] netlink: 'syz.6.13080': attribute type 10 has an invalid length. [ 798.920269][T10192] batadv0: left allmulticast mode [ 798.925441][T10192] batadv0: left promiscuous mode [ 798.925921][T10196] netlink: 'syz.6.13080': attribute type 10 has an invalid length. [ 798.930526][T10192] bridge0: port 3(batadv0) entered disabled state [ 798.938393][T10196] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13080'. [ 798.956292][T10192] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 798.967306][T10192] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 798.996416][T10200] netlink: 'syz.1.13082': attribute type 10 has an invalid length. [ 799.004466][T10200] netlink: 40 bytes leftover after parsing attributes in process `syz.1.13082'. [ 799.014916][T10196] batadv0: entered promiscuous mode [ 799.020412][T10196] batadv0: entered allmulticast mode [ 799.027931][T10196] bond0: (slave batadv0): Releasing backup interface [ 799.036788][T10196] bridge0: port 3(batadv0) entered blocking state [ 799.043301][T10196] bridge0: port 3(batadv0) entered disabled state [ 799.193823][T10215] netlink: 8 bytes leftover after parsing attributes in process `syz.6.13089'. [ 799.197517][T10213] netlink: 'syz.3.13088': attribute type 10 has an invalid length. [ 799.210966][T10213] netlink: 40 bytes leftover after parsing attributes in process `syz.3.13088'. [ 799.356235][T10222] syzkaller0: entered promiscuous mode [ 799.361853][T10222] syzkaller0: entered allmulticast mode [ 799.427896][T10231] netlink: 'syz.6.13096': attribute type 10 has an invalid length. [ 799.443782][T10231] batadv0: left allmulticast mode [ 799.448967][T10231] batadv0: left promiscuous mode [ 799.454359][T10231] bridge0: port 3(batadv0) entered disabled state [ 799.465876][T10231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 799.484116][T10236] netlink: 'syz.6.13096': attribute type 10 has an invalid length. [ 799.487718][T10231] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 799.492137][T10236] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13096'. [ 799.509986][T10236] batadv0: entered promiscuous mode [ 799.515439][T10236] batadv0: entered allmulticast mode [ 799.526468][T10236] bond0: (slave batadv0): Releasing backup interface [ 799.543081][T10236] bridge0: port 3(batadv0) entered blocking state [ 799.549590][T10236] bridge0: port 3(batadv0) entered disabled state [ 799.588627][T10241] netlink: 'syz.3.13100': attribute type 10 has an invalid length. [ 799.596657][T10241] netlink: 40 bytes leftover after parsing attributes in process `syz.3.13100'. [ 799.621000][T10243] netlink: 8 bytes leftover after parsing attributes in process `syz.6.13101'. [ 799.676983][T10245] netlink: 'syz.3.13102': attribute type 10 has an invalid length. [ 799.685160][T10245] netlink: 40 bytes leftover after parsing attributes in process `syz.3.13102'. [ 799.997233][T10263] syzkaller0: entered promiscuous mode [ 800.002902][T10263] syzkaller0: entered allmulticast mode [ 800.111389][T10268] 9pnet_fd: Insufficient options for proto=fd [ 800.335688][T10296] batadv0: left allmulticast mode [ 800.340842][T10296] batadv0: left promiscuous mode [ 800.345954][T10296] bridge0: port 1(batadv0) entered disabled state [ 800.355095][T10296] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 800.364883][T10296] batadv0: entered promiscuous mode [ 800.370319][T10296] batadv0: entered allmulticast mode [ 800.389476][T10296] : (slave batadv0): Enslaving as an active interface with an up link [ 800.403488][T10299] 9pnet_fd: Insufficient options for proto=fd [ 800.409893][T10300] : (slave batadv0): Releasing backup interface [ 800.429275][T10300] bridge0: port 1(batadv0) entered blocking state [ 800.435917][T10300] bridge0: port 1(batadv0) entered disabled state [ 800.856567][T10347] 9pnet_fd: Insufficient options for proto=fd [ 801.151733][T10366] 9pnet_fd: Insufficient options for proto=fd [ 801.346919][T10393] 9pnet_fd: Insufficient options for proto=fd [ 801.568774][T10421] 9pnet_fd: Insufficient options for proto=fd [ 801.893623][T10444] batadv0: left allmulticast mode [ 801.898726][T10444] batadv0: left promiscuous mode [ 801.903908][T10444] bridge0: port 1(batadv0) entered disabled state [ 801.920976][T10444] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 801.935771][T10444] batadv0: entered promiscuous mode [ 801.941174][T10444] batadv0: entered allmulticast mode [ 801.953050][T10444] : (slave batadv0): Enslaving as an active interface with an up link [ 801.967285][T10450] : (slave batadv0): Releasing backup interface [ 801.973914][T10449] 9pnet_virtio: no channels available for device [ 802.013057][T10450] bridge0: port 1(batadv0) entered blocking state [ 802.019659][T10450] bridge0: port 1(batadv0) entered disabled state [ 802.074464][T10453] batadv0: left allmulticast mode [ 802.079624][T10453] batadv0: left promiscuous mode [ 802.084982][T10453] bridge0: port 3(batadv0) entered disabled state [ 802.134213][T10453] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 802.145382][T10453] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 802.154772][T10459] batadv0: entered promiscuous mode [ 802.160446][T10459] batadv0: entered allmulticast mode [ 802.168559][T10459] bond0: (slave batadv0): Releasing backup interface [ 802.189773][T10459] bridge0: port 3(batadv0) entered blocking state [ 802.196351][T10459] bridge0: port 3(batadv0) entered disabled state [ 802.265235][T10474] 9pnet_fd: Insufficient options for proto=fd [ 802.375579][T10489] batadv0: left allmulticast mode [ 802.381040][T10489] batadv0: left promiscuous mode [ 802.386234][T10489] bridge0: port 1(batadv0) entered disabled state [ 802.423513][T10489] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 802.433751][T10489] batadv0: entered promiscuous mode [ 802.439183][T10489] batadv0: entered allmulticast mode [ 802.445684][T10489] : (slave batadv0): Enslaving as an active interface with an up link [ 802.458245][T10494] : (slave batadv0): Releasing backup interface [ 802.473314][T10494] bridge0: port 1(batadv0) entered blocking state [ 802.479838][T10494] bridge0: port 1(batadv0) entered disabled state [ 802.623134][T10508] 9pnet_fd: Insufficient options for proto=fd [ 803.151538][T10538] 9pnet_fd: Insufficient options for proto=fd [ 803.499704][T10558] batadv0: left allmulticast mode [ 803.504856][T10558] batadv0: left promiscuous mode [ 803.509971][T10558] bridge0: port 1(batadv0) entered disabled state [ 803.562853][T10558] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 803.569795][T10562] validate_nla: 38 callbacks suppressed [ 803.569812][T10562] netlink: 'syz.3.13233': attribute type 10 has an invalid length. [ 803.571456][T10558] batadv0: entered promiscuous mode [ 803.575459][T10562] __nla_validate_parse: 64 callbacks suppressed [ 803.575478][T10562] netlink: 40 bytes leftover after parsing attributes in process `syz.3.13233'. [ 803.583520][T10558] batadv0: entered allmulticast mode [ 803.641375][T10558] : (slave batadv0): Enslaving as an active interface with an up link [ 803.654562][T10563] netlink: 388 bytes leftover after parsing attributes in process `syz.6.13235'. [ 803.667460][T10562] : (slave batadv0): Releasing backup interface [ 803.698668][T10562] bridge0: port 1(batadv0) entered blocking state [ 803.705262][T10562] bridge0: port 1(batadv0) entered disabled state [ 803.938598][T10579] netlink: 'syz.9.13242': attribute type 10 has an invalid length. [ 803.946621][T10579] netlink: 40 bytes leftover after parsing attributes in process `syz.9.13242'. [ 804.067145][T10590] netlink: 'syz.9.13246': attribute type 10 has an invalid length. [ 804.075168][T10590] netlink: 40 bytes leftover after parsing attributes in process `syz.9.13246'. [ 804.155162][T10592] netlink: 'syz.9.13247': attribute type 10 has an invalid length. [ 804.163354][T10592] netlink: 40 bytes leftover after parsing attributes in process `syz.9.13247'. [ 804.256278][T10595] dummy0: entered promiscuous mode [ 804.268438][T10595] macsec1: entered allmulticast mode [ 804.280076][T10595] dummy0: entered allmulticast mode [ 804.709134][T25247] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 804.744396][T10619] netlink: 'syz.5.13255': attribute type 10 has an invalid length. [ 804.752390][T10619] netlink: 40 bytes leftover after parsing attributes in process `syz.5.13255'. [ 804.792529][T10623] netlink: 'syz.3.13257': attribute type 10 has an invalid length. [ 804.800695][T10623] netlink: 40 bytes leftover after parsing attributes in process `syz.3.13257'. [ 804.824673][T10625] netlink: 'syz.6.13258': attribute type 10 has an invalid length. [ 804.832647][T10625] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13258'. [ 804.844659][T25247] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 804.883626][T10597] chnl_net:caif_netlink_parms(): no params data found [ 804.903512][T25247] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 804.969699][T25247] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 805.006877][T10634] syzkaller0: entered promiscuous mode [ 805.012440][T10634] syzkaller0: entered allmulticast mode [ 805.083521][T10597] bridge0: port 1(bridge_slave_0) entered blocking state [ 805.090746][T10597] bridge0: port 1(bridge_slave_0) entered disabled state [ 805.098343][T10597] bridge_slave_0: entered allmulticast mode [ 805.105052][T10597] bridge_slave_0: entered promiscuous mode [ 805.125159][T10597] bridge0: port 2(bridge_slave_1) entered blocking state [ 805.132385][T10597] bridge0: port 2(bridge_slave_1) entered disabled state [ 805.139643][T10597] bridge_slave_1: entered allmulticast mode [ 805.146364][T10597] bridge_slave_1: entered promiscuous mode [ 805.192555][T10597] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 805.209114][T10649] netlink: 8 bytes leftover after parsing attributes in process `syz.5.13266'. [ 805.312726][T10656] netlink: 'syz.3.13269': attribute type 10 has an invalid length. [ 805.320761][T10656] netlink: 40 bytes leftover after parsing attributes in process `syz.3.13269'. [ 805.372073][T25247] bond0 (unregistering): left promiscuous mode [ 805.381448][T25247] bond0 (unregistering): Released all slaves [ 805.391331][T10597] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 805.429386][T10597] team0: Port device team_slave_0 added [ 805.438406][T10597] team0: Port device team_slave_1 added [ 805.442829][T10659] netlink: 'syz.3.13271': attribute type 10 has an invalid length. [ 805.454699][T25247] tipc: Left network mode [ 805.477192][T10597] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 805.484324][T10597] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 805.486101][T10662] netlink: 'syz.5.13272': attribute type 10 has an invalid length. [ 805.510516][T10597] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 805.533014][T25247] hsr_slave_0: left promiscuous mode [ 805.538892][T25247] hsr_slave_1: left promiscuous mode [ 805.548254][T25247] dummy0: left allmulticast mode [ 805.553586][T25247] veth1_macvtap: left promiscuous mode [ 805.559154][T25247] veth0_macvtap: left allmulticast mode [ 805.564746][T25247] veth0_macvtap: left promiscuous mode [ 805.570507][T25247] veth1_vlan: left promiscuous mode [ 805.575758][T25247] veth0_vlan: left promiscuous mode [ 805.678682][T10597] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 805.685852][T10597] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 805.711967][T10597] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 805.734942][T10664] batadv0: left allmulticast mode [ 805.740028][T10664] batadv0: left promiscuous mode [ 805.745396][T10664] bridge0: port 1(batadv0) entered disabled state [ 805.755629][T10664] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 805.764532][T10664] batadv0: entered promiscuous mode [ 805.769879][T10664] batadv0: entered allmulticast mode [ 805.776402][T10664] : (slave batadv0): Enslaving as an active interface with an up link [ 805.787990][T10665] : (slave batadv0): Releasing backup interface [ 805.804252][T10665] bridge0: port 1(batadv0) entered blocking state [ 805.810836][T10665] bridge0: port 1(batadv0) entered disabled state [ 805.818561][ T1039] infiniband syz1: ib_query_port failed (-19) [ 805.879669][T10668] syzkaller0: entered promiscuous mode [ 805.885633][T10668] syzkaller0: entered allmulticast mode [ 805.910457][T10675] macsec1: entered allmulticast mode [ 805.920826][T10597] hsr_slave_0: entered promiscuous mode [ 805.930407][T10597] hsr_slave_1: entered promiscuous mode [ 805.936545][T10597] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 805.950611][T10597] Cannot create hsr debugfs directory [ 806.255718][T10700] 9pnet_fd: Insufficient options for proto=fd [ 806.387480][T10713] syzkaller0: entered promiscuous mode [ 806.393150][T10713] syzkaller0: entered allmulticast mode [ 806.498233][T10597] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 806.527560][T10597] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 806.564362][T10597] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 806.602742][T10597] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 806.758427][T10597] 8021q: adding VLAN 0 to HW filter on device bond0 [ 806.824644][T10597] 8021q: adding VLAN 0 to HW filter on device team0 [ 806.845647][T25242] bridge0: port 1(bridge_slave_0) entered blocking state [ 806.853010][T25242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 806.890353][T25242] bridge0: port 2(bridge_slave_1) entered blocking state [ 806.897518][T25242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 806.947901][T10597] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 806.958414][T10597] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 807.022345][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 807.022363][ T29] audit: type=1326 audit(1747747942.673:56986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10748 comm="syz.1.13307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 807.099898][ T29] audit: type=1326 audit(1747747942.703:56987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10748 comm="syz.1.13307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 807.117999][T10750] syzkaller0: entered promiscuous mode [ 807.123897][ T29] audit: type=1326 audit(1747747942.703:56988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10748 comm="syz.1.13307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 807.129080][T10750] syzkaller0: entered allmulticast mode [ 807.158633][ T29] audit: type=1326 audit(1747747942.703:56989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10748 comm="syz.1.13307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 807.182486][ T29] audit: type=1326 audit(1747747942.703:56990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10748 comm="syz.1.13307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 807.206566][ T29] audit: type=1326 audit(1747747942.703:56991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10748 comm="syz.1.13307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 807.230524][ T29] audit: type=1326 audit(1747747942.703:56992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10748 comm="syz.1.13307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 807.254422][ T29] audit: type=1326 audit(1747747942.703:56993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10748 comm="syz.1.13307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 807.278198][ T29] audit: type=1326 audit(1747747942.703:56994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10748 comm="syz.1.13307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 807.302153][ T29] audit: type=1326 audit(1747747942.703:56995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10748 comm="syz.1.13307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 807.369332][T10597] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 807.523078][T10776] dummy0: entered promiscuous mode [ 807.529195][T10776] macsec1: entered allmulticast mode [ 807.535305][T10776] dummy0: entered allmulticast mode [ 807.598507][T10782] batadv0: left allmulticast mode [ 807.603676][T10782] batadv0: left promiscuous mode [ 807.608889][T10782] bridge0: port 3(batadv0) entered disabled state [ 807.645285][T10782] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 807.661400][T10782] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 807.679234][T10791] batadv0: entered promiscuous mode [ 807.684755][T10791] batadv0: entered allmulticast mode [ 807.705117][T10791] bond0: (slave batadv0): Releasing backup interface [ 807.728008][T10791] bridge0: port 3(batadv0) entered blocking state [ 807.734914][T10791] bridge0: port 3(batadv0) entered disabled state [ 807.745243][T10794] batadv0: left allmulticast mode [ 807.750407][T10794] batadv0: left promiscuous mode [ 807.755517][T10794] bridge0: port 3(batadv0) entered disabled state [ 807.769197][T10794] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 807.792417][T10794] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 807.802945][T10796] batadv0: entered promiscuous mode [ 807.808218][T10796] batadv0: entered allmulticast mode [ 807.822988][T10796] bond0: (slave batadv0): Releasing backup interface [ 807.840071][T10796] bridge0: port 3(batadv0) entered blocking state [ 807.846838][T10796] bridge0: port 3(batadv0) entered disabled state [ 807.958334][T10806] syzkaller0: entered promiscuous mode [ 807.964049][T10806] syzkaller0: entered allmulticast mode [ 807.997920][T10597] veth0_vlan: entered promiscuous mode [ 808.007006][T10597] veth1_vlan: entered promiscuous mode [ 808.030972][T10597] veth0_macvtap: entered promiscuous mode [ 808.039439][T10597] veth1_macvtap: entered promiscuous mode [ 808.055355][T10597] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 808.068474][T10597] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 808.082005][T10597] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 808.090916][T10597] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 808.099708][T10597] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 808.108610][T10597] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 808.445633][T10847] syzkaller0: entered promiscuous mode [ 808.451212][T10847] syzkaller0: entered allmulticast mode [ 808.704961][T10854] validate_nla: 13 callbacks suppressed [ 808.705057][T10854] netlink: 'syz.9.13342': attribute type 10 has an invalid length. [ 808.718839][T10854] __nla_validate_parse: 22 callbacks suppressed [ 808.718854][T10854] netlink: 40 bytes leftover after parsing attributes in process `syz.9.13342'. [ 808.744279][T10854] batadv0: entered promiscuous mode [ 808.749809][T10854] batadv0: entered allmulticast mode [ 808.758733][T10854] bridge0: port 3(batadv0) entered blocking state [ 808.765521][T10854] bridge0: port 3(batadv0) entered disabled state [ 808.815812][T10854] bridge0: port 3(batadv0) entered blocking state [ 808.822359][T10854] bridge0: port 3(batadv0) entered forwarding state [ 808.840526][T10858] netlink: 'syz.6.13343': attribute type 10 has an invalid length. [ 808.848594][T10858] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13343'. [ 808.970292][T25237] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 808.979656][T25237] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 808.993619][T10866] bridge0: port 3(batadv0) entered disabled state [ 809.004171][T10866] bridge_slave_0: left allmulticast mode [ 809.009948][T10866] bridge_slave_0: left promiscuous mode [ 809.015975][T10866] bridge0: port 1(bridge_slave_0) entered disabled state [ 809.026354][T10866] bridge_slave_1: left allmulticast mode [ 809.032103][T10866] bridge_slave_1: left promiscuous mode [ 809.037762][T10866] bridge0: port 2(bridge_slave_1) entered disabled state [ 809.048342][T10866] bond0: (slave bond_slave_0): Releasing backup interface [ 809.064388][T10866] bond0: (slave bond_slave_1): Releasing backup interface [ 809.077535][T10866] team0: Port device team_slave_0 removed [ 809.087023][T10866] team0: Port device team_slave_1 removed [ 809.094246][T10866] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 809.101924][T10866] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 809.111371][T10866] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 809.118828][T10866] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 809.176816][T10875] syzkaller0: entered promiscuous mode [ 809.182672][T10875] syzkaller0: entered allmulticast mode [ 809.257482][T10885] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 809.277202][T10885] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 809.386268][T10894] netlink: 'syz.3.13357': attribute type 10 has an invalid length. [ 809.394390][T10894] netlink: 40 bytes leftover after parsing attributes in process `syz.3.13357'. [ 809.572568][T10911] netlink: 8 bytes leftover after parsing attributes in process `syz.9.13365'. [ 809.581674][T10911] netlink: 24 bytes leftover after parsing attributes in process `syz.9.13365'. [ 809.632744][T10913] syzkaller0: entered promiscuous mode [ 809.638299][T10913] syzkaller0: entered allmulticast mode [ 809.744050][T10918] FAULT_INJECTION: forcing a failure. [ 809.744050][T10918] name failslab, interval 1, probability 0, space 0, times 0 [ 809.756761][T10918] CPU: 1 UID: 0 PID: 10918 Comm: syz.3.13367 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT(voluntary) [ 809.756789][T10918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 809.756804][T10918] Call Trace: [ 809.756811][T10918] [ 809.756821][T10918] __dump_stack+0x1d/0x30 [ 809.756843][T10918] dump_stack_lvl+0xe8/0x140 [ 809.756862][T10918] dump_stack+0x15/0x1b [ 809.756877][T10918] should_fail_ex+0x265/0x280 [ 809.756917][T10918] should_failslab+0x8c/0xb0 [ 809.756954][T10918] kmem_cache_alloc_noprof+0x50/0x310 [ 809.756974][T10918] ? vm_area_dup+0x32/0x230 [ 809.756997][T10918] vm_area_dup+0x32/0x230 [ 809.757017][T10918] __split_vma+0xe9/0x610 [ 809.757037][T10918] ? selinux_file_open+0x31c/0x370 [ 809.757075][T10918] vms_gather_munmap_vmas+0x172/0x7a0 [ 809.757103][T10918] ? mntput_no_expire+0x6f/0x3d0 [ 809.757125][T10918] ? mntput+0x4b/0x80 [ 809.757145][T10918] do_vmi_align_munmap+0x1a4/0x3d0 [ 809.757188][T10918] do_vmi_munmap+0x1db/0x220 [ 809.757224][T10918] mremap_at+0x100/0x690 [ 809.757253][T10918] __se_sys_mremap+0x452/0x6f0 [ 809.757284][T10918] ? ksys_write+0x16e/0x1a0 [ 809.757310][T10918] __x64_sys_mremap+0x67/0x80 [ 809.757336][T10918] x64_sys_call+0x2ba9/0x2fb0 [ 809.757361][T10918] do_syscall_64+0xd0/0x1a0 [ 809.757390][T10918] ? clear_bhb_loop+0x40/0x90 [ 809.757416][T10918] ? clear_bhb_loop+0x40/0x90 [ 809.757442][T10918] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 809.757466][T10918] RIP: 0033:0x7f417972e969 [ 809.757480][T10918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 809.757502][T10918] RSP: 002b:00007f4177d97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 809.757524][T10918] RAX: ffffffffffffffda RBX: 00007f4179955fa0 RCX: 00007f417972e969 [ 809.757536][T10918] RDX: 0000000000001000 RSI: 0000000000c00000 RDI: 0000200000400000 [ 809.757547][T10918] RBP: 00007f4177d97090 R08: 00002000008b5000 R09: 0000000000000000 [ 809.757558][T10918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 809.757568][T10918] R13: 0000000000000000 R14: 00007f4179955fa0 R15: 00007ffdf2fae5b8 [ 809.757586][T10918] [ 809.993998][T10920] netlink: 'syz.6.13368': attribute type 10 has an invalid length. [ 810.002018][T10920] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13368'. [ 810.142844][T10933] netlink: 'syz.6.13374': attribute type 3 has an invalid length. [ 810.150745][T10933] netlink: 8 bytes leftover after parsing attributes in process `syz.6.13374'. [ 810.211717][T10933] 9pnet: Could not find request transport: fd0x0000000000000009yŽgKÌ~Á7nñ°²Ÿ‡©"$U²f¤™©ü(†cRjÿ&¥+š‹ˆË7ñ0"ß³…×T¸î«yQç4ûñ‹äq^çTU¯•=U…`dÁô]«iC [ 810.322362][T10940] syzkaller0: entered promiscuous mode [ 810.327922][T10940] syzkaller0: entered allmulticast mode [ 810.331965][T10950] FAULT_INJECTION: forcing a failure. [ 810.331965][T10950] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 810.346611][T10950] CPU: 0 UID: 0 PID: 10950 Comm: syz.1.13381 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT(voluntary) [ 810.346638][T10950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 810.346651][T10950] Call Trace: [ 810.346658][T10950] [ 810.346744][T10950] __dump_stack+0x1d/0x30 [ 810.346768][T10950] dump_stack_lvl+0xe8/0x140 [ 810.346789][T10950] dump_stack+0x15/0x1b [ 810.346807][T10950] should_fail_ex+0x265/0x280 [ 810.346877][T10950] should_fail+0xb/0x20 [ 810.346915][T10950] should_fail_usercopy+0x1a/0x20 [ 810.347016][T10950] strncpy_from_user+0x25/0x230 [ 810.347049][T10950] path_setxattrat+0xeb/0x310 [ 810.347199][T10950] __x64_sys_fsetxattr+0x6b/0x80 [ 810.347231][T10950] x64_sys_call+0x2f7c/0x2fb0 [ 810.347257][T10950] do_syscall_64+0xd0/0x1a0 [ 810.347289][T10950] ? clear_bhb_loop+0x40/0x90 [ 810.347319][T10950] ? clear_bhb_loop+0x40/0x90 [ 810.347425][T10950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 810.347450][T10950] RIP: 0033:0x7f8c2636e969 [ 810.347466][T10950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 810.347518][T10950] RSP: 002b:00007f8c249d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 810.347537][T10950] RAX: ffffffffffffffda RBX: 00007f8c26595fa0 RCX: 00007f8c2636e969 [ 810.347550][T10950] RDX: 0000200000000540 RSI: 00002000000005c0 RDI: 0000000000000000 [ 810.347562][T10950] RBP: 00007f8c249d7090 R08: 0000000000000000 R09: 0000000000000000 [ 810.347576][T10950] R10: 0000000000000021 R11: 0000000000000246 R12: 0000000000000001 [ 810.347593][T10950] R13: 0000000000000000 R14: 00007f8c26595fa0 R15: 00007fff911a9e38 [ 810.347622][T10950] [ 810.544841][T10952] netlink: 'syz.5.13382': attribute type 10 has an invalid length. [ 810.552865][T10952] netlink: 40 bytes leftover after parsing attributes in process `syz.5.13382'. [ 810.836576][T10975] netlink: 'syz.1.13390': attribute type 3 has an invalid length. [ 810.846684][T10975] 9pnet: Could not find request transport: fd0x0000000000000009yŽgKÌ~Á7nñ°²Ÿ‡©"$U²f¤™©ü(†cRjÿ&¥+š‹ˆË7ñ0"ß³…×T¸î«yQç4ûñ‹äq^çTU¯•=U…`dÁô]«iC [ 810.979844][T10985] netlink: 'syz.5.13395': attribute type 10 has an invalid length. [ 811.213715][T10987] syzkaller0: entered promiscuous mode [ 811.219340][T10987] syzkaller0: entered allmulticast mode [ 811.755423][T11019] netlink: 'syz.6.13408': attribute type 1 has an invalid length. [ 811.787237][T11021] netlink: 'syz.3.13409': attribute type 3 has an invalid length. [ 811.797562][T11021] 9pnet_fd: Insufficient options for proto=fd [ 812.134665][T11036] 9pnet_fd: Insufficient options for proto=fd [ 812.494077][T11054] 9pnet_fd: Insufficient options for proto=fd [ 812.676545][ T29] kauditd_printk_skb: 255 callbacks suppressed [ 812.676563][ T29] audit: type=1326 audit(1747747948.323:57251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11061 comm="syz.3.13425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 812.722465][ T29] audit: type=1326 audit(1747747948.363:57252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11061 comm="syz.3.13425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 812.748374][ T29] audit: type=1326 audit(1747747948.363:57253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11061 comm="syz.3.13425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 812.772158][ T29] audit: type=1326 audit(1747747948.363:57254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11061 comm="syz.3.13425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 812.795846][ T29] audit: type=1326 audit(1747747948.363:57255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11061 comm="syz.3.13425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 812.819542][ T29] audit: type=1326 audit(1747747948.363:57256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11061 comm="syz.3.13425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 812.834590][ T23] hid-generic 0000:0000:0000.0112: unknown main item tag 0x0 [ 812.843437][ T29] audit: type=1326 audit(1747747948.363:57257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11061 comm="syz.3.13425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 812.874478][ T29] audit: type=1326 audit(1747747948.363:57258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11061 comm="syz.3.13425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 812.889190][ T23] hid-generic 0000:0000:0000.0112: hidraw0: HID v0.00 Device [syz1] on syz0 [ 812.898190][ T29] audit: type=1326 audit(1747747948.363:57259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11061 comm="syz.3.13425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 812.931677][ T29] audit: type=1326 audit(1747747948.363:57260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11061 comm="syz.3.13425" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 812.963170][T11064] FAULT_INJECTION: forcing a failure. [ 812.963170][T11064] name failslab, interval 1, probability 0, space 0, times 0 [ 812.975871][T11064] CPU: 1 UID: 0 PID: 11064 Comm: syz.6.13426 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT(voluntary) [ 812.975906][T11064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 812.975990][T11064] Call Trace: [ 812.975997][T11064] [ 812.976007][T11064] __dump_stack+0x1d/0x30 [ 812.976041][T11064] dump_stack_lvl+0xe8/0x140 [ 812.976105][T11064] dump_stack+0x15/0x1b [ 812.976121][T11064] should_fail_ex+0x265/0x280 [ 812.976245][T11064] should_failslab+0x8c/0xb0 [ 812.976281][T11064] kmem_cache_alloc_noprof+0x50/0x310 [ 812.976307][T11064] ? audit_log_start+0x365/0x6c0 [ 812.976386][T11064] audit_log_start+0x365/0x6c0 [ 812.976433][T11064] audit_seccomp+0x48/0x100 [ 812.976467][T11064] ? __seccomp_filter+0x68c/0x10d0 [ 812.976497][T11064] __seccomp_filter+0x69d/0x10d0 [ 812.976540][T11064] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 812.976612][T11064] ? vfs_write+0x75e/0x8d0 [ 812.976653][T11064] ? __rcu_read_unlock+0x4f/0x70 [ 812.976706][T11064] ? __fget_files+0x184/0x1c0 [ 812.976748][T11064] __secure_computing+0x82/0x150 [ 812.976771][T11064] syscall_trace_enter+0xcf/0x1e0 [ 812.976812][T11064] do_syscall_64+0xaa/0x1a0 [ 812.976872][T11064] ? clear_bhb_loop+0x40/0x90 [ 812.976899][T11064] ? clear_bhb_loop+0x40/0x90 [ 812.976927][T11064] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 812.976948][T11064] RIP: 0033:0x7efe4506e969 [ 812.977016][T11064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 812.977039][T11064] RSP: 002b:00007efe436d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 812.977061][T11064] RAX: ffffffffffffffda RBX: 00007efe45295fa0 RCX: 00007efe4506e969 [ 812.977078][T11064] RDX: 0000200000000080 RSI: 0000000080404805 RDI: 0000000000000006 [ 812.977135][T11064] RBP: 00007efe436d7090 R08: 0000000000000000 R09: 0000000000000000 [ 812.977150][T11064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 812.977213][T11064] R13: 0000000000000000 R14: 00007efe45295fa0 R15: 00007ffded392378 [ 812.977239][T11064] [ 813.224889][T11069] batadv0: left allmulticast mode [ 813.229985][T11069] batadv0: left promiscuous mode [ 813.235163][T11069] bridge0: port 3(batadv0) entered disabled state [ 813.245908][T11069] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 813.261294][T11069] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 813.289402][T11069] batadv0: entered promiscuous mode [ 813.294705][T11069] batadv0: entered allmulticast mode [ 813.339631][T11069] bond0: (slave batadv0): Releasing backup interface [ 813.367931][T11069] bridge0: port 3(batadv0) entered blocking state [ 813.374611][T11069] bridge0: port 3(batadv0) entered disabled state [ 813.459638][T11080] syzkaller0: entered promiscuous mode [ 813.465339][T11080] syzkaller0: entered allmulticast mode [ 813.609093][T11100] FAULT_INJECTION: forcing a failure. [ 813.609093][T11100] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 813.622556][T11100] CPU: 1 UID: 0 PID: 11100 Comm: syz.3.13440 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT(voluntary) [ 813.622666][T11100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 813.622682][T11100] Call Trace: [ 813.622689][T11100] [ 813.622698][T11100] __dump_stack+0x1d/0x30 [ 813.622720][T11100] dump_stack_lvl+0xe8/0x140 [ 813.622744][T11100] dump_stack+0x15/0x1b [ 813.622835][T11100] should_fail_ex+0x265/0x280 [ 813.622883][T11100] should_fail_alloc_page+0xf2/0x100 [ 813.622918][T11100] __alloc_frozen_pages_noprof+0xff/0x360 [ 813.623019][T11100] alloc_pages_mpol+0xb3/0x250 [ 813.623052][T11100] vma_alloc_folio_noprof+0x1aa/0x300 [ 813.623146][T11100] handle_mm_fault+0x1056/0x2ae0 [ 813.623301][T11100] ? mas_walk+0xf2/0x120 [ 813.623332][T11100] do_user_addr_fault+0x636/0x1090 [ 813.623414][T11100] exc_page_fault+0x54/0xc0 [ 813.623436][T11100] asm_exc_page_fault+0x26/0x30 [ 813.623463][T11100] RIP: 0033:0x7f41796dbf6b [ 813.623484][T11100] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 813.623505][T11100] RSP: 002b:00007f4177d94e10 EFLAGS: 00010246 [ 813.623529][T11100] RAX: 00007f4177d96f30 RBX: 00007f4179923620 RCX: 0000000000000000 [ 813.623546][T11100] RDX: 00007f4177d96f78 RSI: 00007f417978dbf8 RDI: 00007f4177d94e30 [ 813.623564][T11100] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 813.623581][T11100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 813.623599][T11100] R13: 0000000000000000 R14: 00007f4179955fa0 R15: 00007ffdf2fae5b8 [ 813.623627][T11100] [ 813.623640][T11100] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 814.020144][T11122] syzkaller0: entered promiscuous mode [ 814.025796][T11122] syzkaller0: entered allmulticast mode [ 814.120652][T11132] __nla_validate_parse: 14 callbacks suppressed [ 814.120732][T11132] netlink: 8 bytes leftover after parsing attributes in process `syz.5.13453'. [ 814.275633][T11146] veth1_to_bond: entered allmulticast mode [ 814.283963][T11146] veth1_to_bond: left allmulticast mode [ 814.289887][T11146] FAULT_INJECTION: forcing a failure. [ 814.289887][T11146] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 814.303169][T11146] CPU: 1 UID: 0 PID: 11146 Comm: syz.9.13459 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT(voluntary) [ 814.303256][T11146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 814.303314][T11146] Call Trace: [ 814.303320][T11146] [ 814.303328][T11146] __dump_stack+0x1d/0x30 [ 814.303355][T11146] dump_stack_lvl+0xe8/0x140 [ 814.303432][T11146] dump_stack+0x15/0x1b [ 814.303516][T11146] should_fail_ex+0x265/0x280 [ 814.303558][T11146] should_fail_alloc_page+0xf2/0x100 [ 814.303627][T11146] __alloc_frozen_pages_noprof+0xff/0x360 [ 814.303667][T11146] alloc_pages_mpol+0xb3/0x250 [ 814.303701][T11146] vma_alloc_folio_noprof+0x1aa/0x300 [ 814.303790][T11146] handle_mm_fault+0x1056/0x2ae0 [ 814.303836][T11146] ? mas_walk+0xf2/0x120 [ 814.303876][T11146] do_user_addr_fault+0x636/0x1090 [ 814.303948][T11146] exc_page_fault+0x54/0xc0 [ 814.303974][T11146] asm_exc_page_fault+0x26/0x30 [ 814.304001][T11146] RIP: 0033:0x7f7a586fbf6b [ 814.304052][T11146] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 814.304075][T11146] RSP: 002b:00007f7a56db4e10 EFLAGS: 00010246 [ 814.304094][T11146] RAX: 00007f7a56db6f30 RBX: 00007f7a58943620 RCX: 0000000000000000 [ 814.304109][T11146] RDX: 00007f7a56db6f78 RSI: 00007f7a587adbf8 RDI: 00007f7a56db4e30 [ 814.304124][T11146] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 814.304136][T11146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 814.304148][T11146] R13: 0000000000000000 R14: 00007f7a58975fa0 R15: 00007ffe96504648 [ 814.304170][T11146] [ 814.304182][T11146] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 814.386639][T11148] netlink: 20 bytes leftover after parsing attributes in process `syz.5.13460'. [ 814.437365][T11157] validate_nla: 3 callbacks suppressed [ 814.437383][T11157] netlink: 'syz.9.13463': attribute type 10 has an invalid length. [ 814.492293][T11159] netlink: 'syz.9.13463': attribute type 10 has an invalid length. [ 814.506872][T11159] netlink: 40 bytes leftover after parsing attributes in process `syz.9.13463'. [ 814.516193][T11159] bridge0: port 1(batadv0) entered blocking state [ 814.522746][T11159] bridge0: port 1(batadv0) entered disabled state [ 814.533926][T11159] bridge0: port 1(batadv0) entered blocking state [ 814.540475][T11159] bridge0: port 1(batadv0) entered forwarding state [ 814.554099][T11157] bridge0: port 1(batadv0) entered disabled state [ 814.575849][T11157] batadv0: left allmulticast mode [ 814.581283][T11157] batadv0: left promiscuous mode [ 814.586793][T11157] bridge0: port 1(batadv0) entered disabled state [ 814.595429][T11165] netlink: 'syz.6.13466': attribute type 10 has an invalid length. [ 814.596151][T11157] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 814.612276][T11157] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 814.622432][T11165] batadv0: left allmulticast mode [ 814.627551][T11165] batadv0: left promiscuous mode [ 814.632727][T11165] bridge0: port 3(batadv0) entered disabled state [ 814.644536][T11165] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 814.653148][T11165] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 814.667645][T11165] netlink: 'syz.6.13466': attribute type 10 has an invalid length. [ 814.675676][T11165] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13466'. [ 814.704410][T11163] syzkaller0: entered promiscuous mode [ 814.709994][T11163] syzkaller0: entered allmulticast mode [ 814.716402][T11165] batadv0: entered promiscuous mode [ 814.721884][T11165] batadv0: entered allmulticast mode [ 814.731855][T11165] bond0: (slave batadv0): Releasing backup interface [ 814.742515][T11165] bridge0: port 3(batadv0) entered blocking state [ 814.749025][T11165] bridge0: port 3(batadv0) entered disabled state [ 814.798402][T11177] netlink: 'syz.6.13469': attribute type 10 has an invalid length. [ 814.811011][T11177] batadv0: left allmulticast mode [ 814.816188][T11177] batadv0: left promiscuous mode [ 814.821522][T11177] bridge0: port 3(batadv0) entered disabled state [ 814.829711][T11177] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 814.838432][T11177] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 814.861298][T11177] netlink: 'syz.6.13469': attribute type 10 has an invalid length. [ 814.869327][T11177] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13469'. [ 814.895533][ T23] hid-generic 0000:0000:0000.0113: unknown main item tag 0x0 [ 814.903414][T11177] batadv0: entered promiscuous mode [ 814.908674][T11177] batadv0: entered allmulticast mode [ 814.920910][ T23] hid-generic 0000:0000:0000.0113: hidraw0: HID v0.00 Device [syz1] on syz0 [ 814.932803][T11177] bond0: (slave batadv0): Releasing backup interface [ 814.943104][T11177] bridge0: port 3(batadv0) entered blocking state [ 814.949776][T11177] bridge0: port 3(batadv0) entered disabled state [ 814.957923][T11184] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13470'. [ 814.968090][ T23] hid-generic 0000:0000:0000.0114: unknown main item tag 0x0 [ 814.993116][ T23] hid-generic 0000:0000:0000.0114: hidraw1: HID v0.00 Device [syz1] on syz0 [ 815.067095][T11188] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 815.130022][T11188] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 815.195217][T11204] syzkaller0: entered promiscuous mode [ 815.200796][T11204] syzkaller0: entered allmulticast mode [ 815.246514][ T51] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 815.255939][ T51] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 815.407722][T11212] netlink: 'syz.5.13485': attribute type 10 has an invalid length. [ 815.415741][T11212] netlink: 40 bytes leftover after parsing attributes in process `syz.5.13485'. [ 815.504736][T11214] netlink: 'syz.5.13486': attribute type 10 has an invalid length. [ 815.516948][T11214] batadv0: left allmulticast mode [ 815.522392][T11214] batadv0: left promiscuous mode [ 815.527750][T11214] bridge0: port 3(batadv0) entered disabled state [ 815.539935][T11214] netlink: 'syz.5.13486': attribute type 10 has an invalid length. [ 815.547977][T11214] netlink: 40 bytes leftover after parsing attributes in process `syz.5.13486'. [ 815.566959][T11214] batadv0: entered promiscuous mode [ 815.572663][T11214] batadv0: entered allmulticast mode [ 815.578326][T11214] bridge0: port 3(batadv0) entered blocking state [ 815.584942][T11214] bridge0: port 3(batadv0) entered disabled state [ 815.769305][T11235] netlink: 'syz.9.13496': attribute type 10 has an invalid length. [ 815.789832][T11233] syzkaller0: entered promiscuous mode [ 815.795488][T11233] syzkaller0: entered allmulticast mode [ 815.804904][T11235] batadv0: entered promiscuous mode [ 815.810272][T11235] batadv0: entered allmulticast mode [ 815.817870][T11235] bond0: (slave batadv0): Releasing backup interface [ 815.827584][T11235] bridge0: port 1(batadv0) entered blocking state [ 815.834121][T11235] bridge0: port 1(batadv0) entered disabled state [ 815.998514][T11242] batadv0: left allmulticast mode [ 816.003645][T11242] batadv0: left promiscuous mode [ 816.008898][T11242] bridge0: port 1(batadv0) entered disabled state [ 816.022274][T11242] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 816.036079][T11242] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 816.047872][T11242] batadv0: entered promiscuous mode [ 816.053446][T11242] batadv0: entered allmulticast mode [ 816.062904][T11242] bond0: (slave batadv0): Releasing backup interface [ 816.075818][T11242] bridge0: port 1(batadv0) entered blocking state [ 816.082396][T11242] bridge0: port 1(batadv0) entered disabled state [ 816.147397][T11252] batadv0: left allmulticast mode [ 816.152837][T11252] batadv0: left promiscuous mode [ 816.158355][T11252] bridge0: port 3(batadv0) entered disabled state [ 816.166641][T11252] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 816.175216][T11252] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 816.185839][T11255] batadv0: entered promiscuous mode [ 816.191181][T11255] batadv0: entered allmulticast mode [ 816.198501][T11255] bond0: (slave batadv0): Releasing backup interface [ 816.209438][T11255] bridge0: port 3(batadv0) entered blocking state [ 816.216101][T11255] bridge0: port 3(batadv0) entered disabled state [ 816.262432][T25236] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 816.271709][T25236] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 816.441663][T11264] syzkaller0: entered promiscuous mode [ 816.447290][T11264] syzkaller0: entered allmulticast mode [ 816.844833][T11281] batadv0: left allmulticast mode [ 816.850005][T11281] batadv0: left promiscuous mode [ 816.855146][T11281] bridge0: port 3(batadv0) entered disabled state [ 816.877944][T11281] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 816.904592][T11281] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 816.913336][T11282] batadv0: entered promiscuous mode [ 816.918598][T11282] batadv0: entered allmulticast mode [ 816.950063][T11282] bond0: (slave batadv0): Releasing backup interface [ 816.969089][T11282] bridge0: port 3(batadv0) entered blocking state [ 816.975653][T11282] bridge0: port 3(batadv0) entered disabled state [ 817.042505][T11287] batadv0: left allmulticast mode [ 817.047690][T11287] batadv0: left promiscuous mode [ 817.053273][T11287] bridge0: port 1(batadv0) entered disabled state [ 817.064899][T11287] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 817.074792][T11287] batadv0: entered promiscuous mode [ 817.080209][T11287] batadv0: entered allmulticast mode [ 817.086586][T11287] : (slave batadv0): Enslaving as an active interface with an up link [ 817.116362][T11287] : (slave batadv0): Releasing backup interface [ 817.128822][T11287] bridge0: port 1(batadv0) entered blocking state [ 817.135706][T11287] bridge0: port 1(batadv0) entered disabled state [ 817.253413][T11301] syzkaller0: entered promiscuous mode [ 817.259168][T11301] syzkaller0: entered allmulticast mode [ 817.265989][T11306] batadv0: left allmulticast mode [ 817.271375][T11306] batadv0: left promiscuous mode [ 817.276737][T11306] bridge0: port 3(batadv0) entered disabled state [ 817.287406][T11306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 817.296519][T11306] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 817.306095][T11307] batadv0: entered promiscuous mode [ 817.311375][T11307] batadv0: entered allmulticast mode [ 817.335504][T11307] bond0: (slave batadv0): Releasing backup interface [ 817.348060][T11307] bridge0: port 3(batadv0) entered blocking state [ 817.354647][T11307] bridge0: port 3(batadv0) entered disabled state [ 817.634800][T11335] batadv0: left allmulticast mode [ 817.639961][T11335] batadv0: left promiscuous mode [ 817.645179][T11335] bridge0: port 1(batadv0) entered disabled state [ 817.680097][T11335] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 817.689427][T11335] batadv0: entered promiscuous mode [ 817.695084][T11335] batadv0: entered allmulticast mode [ 817.701802][T11335] : (slave batadv0): Enslaving as an active interface with an up link [ 817.712165][T11338] : (slave batadv0): Releasing backup interface [ 817.722961][T11338] bridge0: port 1(batadv0) entered blocking state [ 817.729506][T11338] bridge0: port 1(batadv0) entered disabled state [ 817.808150][T25236] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 817.817783][T25236] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 817.979440][T11349] syzkaller0: entered promiscuous mode [ 817.985280][T11349] syzkaller0: entered allmulticast mode [ 818.083762][T11364] batadv0: left allmulticast mode [ 818.088870][T11364] batadv0: left promiscuous mode [ 818.094456][T11364] bridge0: port 3(batadv0) entered disabled state [ 818.128367][T11364] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 818.139091][T11364] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 818.155784][T11364] batadv0: entered promiscuous mode [ 818.161433][T11364] batadv0: entered allmulticast mode [ 818.193664][T11364] bond0: (slave batadv0): Releasing backup interface [ 818.231221][T11364] bridge0: port 3(batadv0) entered blocking state [ 818.237817][T11364] bridge0: port 3(batadv0) entered disabled state [ 818.247965][T11375] batadv0: left allmulticast mode [ 818.253100][T11375] batadv0: left promiscuous mode [ 818.258231][T11375] bridge0: port 3(batadv0) entered disabled state [ 818.300983][T11375] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 818.309844][T11375] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 818.321735][T11379] batadv0: left allmulticast mode [ 818.326859][T11379] batadv0: left promiscuous mode [ 818.332427][T11379] bridge0: port 3(batadv0) entered disabled state [ 818.369154][T11379] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 818.379476][T11379] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 818.388393][T11382] batadv0: entered promiscuous mode [ 818.393641][T11382] batadv0: entered allmulticast mode [ 818.401780][T11382] bond0: (slave batadv0): Releasing backup interface [ 818.414289][T11382] bridge0: port 3(batadv0) entered blocking state [ 818.420942][T11382] bridge0: port 3(batadv0) entered disabled state [ 818.517689][ T29] kauditd_printk_skb: 323 callbacks suppressed [ 818.517708][ T29] audit: type=1400 audit(1747747954.163:57582): avc: denied { create } for pid=11390 comm="syz.6.13563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 818.545486][T11392] Cannot find del_set index 0 as target [ 818.561204][T11396] Cannot find del_set index 0 as target [ 818.570439][ T29] audit: type=1400 audit(1747747954.193:57583): avc: denied { setopt } for pid=11390 comm="syz.6.13563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 818.590446][ T29] audit: type=1400 audit(1747747954.213:57584): avc: denied { setopt } for pid=11395 comm="syz.1.13564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 818.614662][T11394] syzkaller0: entered promiscuous mode [ 818.620214][T11394] syzkaller0: entered allmulticast mode [ 818.998098][T11428] syzkaller0: entered promiscuous mode [ 819.003941][T11428] syzkaller0: entered allmulticast mode [ 819.052386][ T29] audit: type=1326 audit(1747747954.703:57585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11437 comm="syz.5.13582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb2c5ce969 code=0x7ffc0000 [ 819.076301][ T29] audit: type=1326 audit(1747747954.703:57586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11437 comm="syz.5.13582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb2c5ce969 code=0x7ffc0000 [ 819.076348][ T29] audit: type=1326 audit(1747747954.703:57587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11437 comm="syz.5.13582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feb2c5ce969 code=0x7ffc0000 [ 819.123884][ T29] audit: type=1326 audit(1747747954.703:57588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11437 comm="syz.5.13582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb2c5ce969 code=0x7ffc0000 [ 819.147748][ T29] audit: type=1326 audit(1747747954.703:57589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11437 comm="syz.5.13582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb2c5ce969 code=0x7ffc0000 [ 819.167214][T11433] __nla_validate_parse: 15 callbacks suppressed [ 819.167269][T11433] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 819.180437][ T29] audit: type=1326 audit(1747747954.703:57590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11437 comm="syz.5.13582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feb2c5ce969 code=0x7ffc0000 [ 819.210892][ T29] audit: type=1326 audit(1747747954.703:57591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11437 comm="syz.5.13582" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb2c5ce969 code=0x7ffc0000 [ 819.377734][T11451] batadv0: left allmulticast mode [ 819.383104][T11451] batadv0: left promiscuous mode [ 819.388244][T11451] bridge0: port 3(batadv0) entered disabled state [ 819.406165][T11451] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 819.423586][T11451] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 819.434539][T11456] netlink: 40 bytes leftover after parsing attributes in process `syz.1.13587'. [ 819.446632][T11454] netlink: 3 bytes leftover after parsing attributes in process `syz.5.13589'. [ 819.552916][T11456] batadv0: entered promiscuous mode [ 819.558287][T11456] batadv0: entered allmulticast mode [ 819.565954][T11456] bond0: (slave batadv0): Releasing backup interface [ 819.580840][T11456] bridge0: port 3(batadv0) entered blocking state [ 819.587443][T11456] bridge0: port 3(batadv0) entered disabled state [ 819.617781][T11454] batadv1: entered promiscuous mode [ 819.623473][T11454] batadv1: entered allmulticast mode [ 819.710837][T11464] netlink: 388 bytes leftover after parsing attributes in process `syz.6.13591'. [ 819.732902][T11466] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13593'. [ 819.812434][T11471] validate_nla: 21 callbacks suppressed [ 819.812449][T11471] netlink: 'syz.1.13595': attribute type 10 has an invalid length. [ 819.826227][T11471] netlink: 40 bytes leftover after parsing attributes in process `syz.1.13595'. [ 819.896825][T11475] syzkaller0: entered promiscuous mode [ 819.902735][T11475] syzkaller0: entered allmulticast mode [ 820.394840][T11498] FAULT_INJECTION: forcing a failure. [ 820.394840][T11498] name failslab, interval 1, probability 0, space 0, times 0 [ 820.407713][T11498] CPU: 0 UID: 0 PID: 11498 Comm: syz.6.13604 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT(voluntary) [ 820.407770][T11498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 820.407783][T11498] Call Trace: [ 820.407789][T11498] [ 820.407796][T11498] __dump_stack+0x1d/0x30 [ 820.407823][T11498] dump_stack_lvl+0xe8/0x140 [ 820.407941][T11498] dump_stack+0x15/0x1b [ 820.407965][T11498] should_fail_ex+0x265/0x280 [ 820.408013][T11498] should_failslab+0x8c/0xb0 [ 820.408055][T11498] kmem_cache_alloc_noprof+0x50/0x310 [ 820.408113][T11498] ? copy_fs_struct+0x31/0x110 [ 820.408179][T11498] copy_fs_struct+0x31/0x110 [ 820.408264][T11498] ksys_unshare+0x2c6/0x6d0 [ 820.408301][T11498] ? ksys_write+0x16e/0x1a0 [ 820.408340][T11498] __x64_sys_unshare+0x1f/0x30 [ 820.408429][T11498] x64_sys_call+0x2d4b/0x2fb0 [ 820.408535][T11498] do_syscall_64+0xd0/0x1a0 [ 820.408569][T11498] ? clear_bhb_loop+0x40/0x90 [ 820.408594][T11498] ? clear_bhb_loop+0x40/0x90 [ 820.408639][T11498] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 820.408661][T11498] RIP: 0033:0x7efe4506e969 [ 820.408676][T11498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 820.408700][T11498] RSP: 002b:00007efe436d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 820.408749][T11498] RAX: ffffffffffffffda RBX: 00007efe45295fa0 RCX: 00007efe4506e969 [ 820.408767][T11498] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000062040200 [ 820.408784][T11498] RBP: 00007efe436d7090 R08: 0000000000000000 R09: 0000000000000000 [ 820.408801][T11498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 820.408817][T11498] R13: 0000000000000000 R14: 00007efe45295fa0 R15: 00007ffded392378 [ 820.408842][T11498] [ 820.647840][T11501] netlink: 8 bytes leftover after parsing attributes in process `syz.6.13606'. [ 820.683183][T11503] netlink: 388 bytes leftover after parsing attributes in process `syz.6.13608'. [ 820.714269][T11505] netlink: 'syz.5.13607': attribute type 3 has an invalid length. [ 820.722214][T11505] netlink: 8 bytes leftover after parsing attributes in process `syz.5.13607'. [ 820.749072][T11505] 9pnet_fd: Insufficient options for proto=fd [ 820.931480][T11513] netlink: 'syz.6.13612': attribute type 10 has an invalid length. [ 820.968937][T11513] netlink: 'syz.6.13612': attribute type 10 has an invalid length. [ 820.977145][T11513] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13612'. [ 821.009654][T11513] batadv0: entered promiscuous mode [ 821.015007][T11513] batadv0: entered allmulticast mode [ 821.027106][T11513] bond0: (slave batadv0): Releasing backup interface [ 821.035160][T11513] bridge0: port 3(batadv0) entered blocking state [ 821.041733][T11513] bridge0: port 3(batadv0) entered disabled state [ 821.051643][T11521] netlink: 'syz.9.13615': attribute type 10 has an invalid length. [ 821.069681][T11521] batadv0: left allmulticast mode [ 821.074820][T11521] batadv0: left promiscuous mode [ 821.080011][T11521] bridge0: port 1(batadv0) entered disabled state [ 821.101832][T11525] netlink: 'syz.1.13617': attribute type 10 has an invalid length. [ 821.112173][T11521] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 821.121625][T11521] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 821.149845][T11521] netlink: 'syz.9.13615': attribute type 10 has an invalid length. [ 821.153710][T11519] syzkaller0: entered promiscuous mode [ 821.163460][T11519] syzkaller0: entered allmulticast mode [ 821.170578][T11525] batadv0: left allmulticast mode [ 821.175649][T11525] batadv0: left promiscuous mode [ 821.180850][T11525] bridge0: port 3(batadv0) entered disabled state [ 821.189710][T11525] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 821.198556][T11525] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 821.216136][T11521] batadv0: entered promiscuous mode [ 821.221559][T11521] batadv0: entered allmulticast mode [ 821.228624][T11521] bond0: (slave batadv0): Releasing backup interface [ 821.238963][T11521] bridge0: port 1(batadv0) entered blocking state [ 821.245545][T11521] bridge0: port 1(batadv0) entered disabled state [ 821.312298][T11536] netlink: 'syz.9.13620': attribute type 3 has an invalid length. [ 821.323598][T11536] 9pnet_fd: Insufficient options for proto=fd [ 821.431869][T25236] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 821.441226][T25236] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 821.609147][T11554] netlink: 'syz.5.13628': attribute type 10 has an invalid length. [ 821.621827][T11554] batadv0: left allmulticast mode [ 821.626974][T11554] batadv0: left promiscuous mode [ 821.632713][T11554] bridge0: port 3(batadv0) entered disabled state [ 821.647876][T11554] netlink: 'syz.5.13628': attribute type 10 has an invalid length. [ 821.663256][T11554] batadv0: entered promiscuous mode [ 821.668682][T11554] batadv0: entered allmulticast mode [ 821.701821][T11554] bridge0: port 3(batadv0) entered blocking state [ 821.708339][T11554] bridge0: port 3(batadv0) entered disabled state [ 822.344367][T11594] Cannot find del_set index 0 as target [ 822.478072][T11600] batadv0: left allmulticast mode [ 822.483278][T11600] batadv0: left promiscuous mode [ 822.488383][T11600] bridge0: port 3(batadv0) entered disabled state [ 823.776206][ T29] kauditd_printk_skb: 282 callbacks suppressed [ 823.776226][ T29] audit: type=1326 audit(1747747959.423:57874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11673 comm="syz.3.13667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 823.829154][ T29] audit: type=1326 audit(1747747959.453:57875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11673 comm="syz.3.13667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 823.853282][ T29] audit: type=1326 audit(1747747959.453:57876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11673 comm="syz.3.13667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 823.877122][ T29] audit: type=1326 audit(1747747959.453:57877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11673 comm="syz.3.13667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 823.900811][ T29] audit: type=1326 audit(1747747959.453:57878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11673 comm="syz.3.13667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 823.924653][ T29] audit: type=1326 audit(1747747959.453:57879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11673 comm="syz.3.13667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 823.948362][ T29] audit: type=1326 audit(1747747959.453:57880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11673 comm="syz.3.13667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 823.972185][ T29] audit: type=1326 audit(1747747959.453:57881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11673 comm="syz.3.13667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 823.995895][ T29] audit: type=1326 audit(1747747959.453:57882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11673 comm="syz.3.13667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 824.019629][ T29] audit: type=1326 audit(1747747959.453:57883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11673 comm="syz.3.13667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 824.155982][T11680] __nla_validate_parse: 12 callbacks suppressed [ 824.156073][T11680] netlink: 8 bytes leftover after parsing attributes in process `syz.6.13670'. [ 824.197448][T11686] batadv0: left allmulticast mode [ 824.202589][T11686] batadv0: left promiscuous mode [ 824.207810][T11686] bridge0: port 1(batadv0) entered disabled state [ 824.236857][T11686] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 824.253456][T11686] batadv0: entered promiscuous mode [ 824.258849][T11686] batadv0: entered allmulticast mode [ 824.265770][T11686] : (slave batadv0): Enslaving as an active interface with an up link [ 824.277981][T11685] batadv0: left allmulticast mode [ 824.281213][T11697] netlink: 40 bytes leftover after parsing attributes in process `syz.9.13673'. [ 824.283420][T11685] batadv0: left promiscuous mode [ 824.297711][T11685] bridge0: port 1(batadv0) entered disabled state [ 824.326085][T11698] netlink: 40 bytes leftover after parsing attributes in process `syz.5.13677'. [ 824.326544][T11685] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 824.347894][T11685] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 824.359756][T11700] netlink: 3 bytes leftover after parsing attributes in process `syz.3.13679'. [ 824.370707][T11697] batadv0: entered promiscuous mode [ 824.375986][T11697] batadv0: entered allmulticast mode [ 824.384434][T11697] bond0: (slave batadv0): Releasing backup interface [ 824.394359][T11697] bridge0: port 1(batadv0) entered blocking state [ 824.400927][T11697] bridge0: port 1(batadv0) entered disabled state [ 824.408736][T11698] batadv0: entered promiscuous mode [ 824.414300][T11698] batadv0: entered allmulticast mode [ 824.420823][T11698] bridge0: port 3(batadv0) entered blocking state [ 824.427469][T11698] bridge0: port 3(batadv0) entered disabled state [ 824.445163][T11700] batadv1: entered promiscuous mode [ 824.450471][T11700] batadv1: entered allmulticast mode [ 824.632532][T11728] netlink: 8 bytes leftover after parsing attributes in process `syz.3.13688'. [ 824.674324][T11728] 9pnet_fd: Insufficient options for proto=fd [ 824.684658][ T51] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 824.694091][ T51] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 824.710613][T11733] netlink: 8 bytes leftover after parsing attributes in process `syz.5.13690'. [ 824.786357][T11739] batadv0: left allmulticast mode [ 824.791519][T11739] batadv0: left promiscuous mode [ 824.796630][T11739] bridge0: port 3(batadv0) entered disabled state [ 824.837869][T11746] validate_nla: 10 callbacks suppressed [ 824.837919][T11746] netlink: 'syz.5.13692': attribute type 10 has an invalid length. [ 824.851771][T11746] netlink: 40 bytes leftover after parsing attributes in process `syz.5.13692'. [ 824.867919][T11746] batadv0: entered promiscuous mode [ 824.873707][T11746] batadv0: entered allmulticast mode [ 824.887269][T11746] bridge0: port 3(batadv0) entered blocking state [ 824.893884][T11746] bridge0: port 3(batadv0) entered disabled state [ 824.992642][T11759] netlink: 'syz.6.13701': attribute type 3 has an invalid length. [ 824.995237][T11763] netlink: 8 bytes leftover after parsing attributes in process `syz.5.13702'. [ 825.000663][T11759] netlink: 8 bytes leftover after parsing attributes in process `syz.6.13701'. [ 825.054452][T11769] 9pnet_fd: Insufficient options for proto=fd [ 825.060812][T11768] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 825.074263][T11770] netlink: 'syz.9.13703': attribute type 10 has an invalid length. [ 825.102967][T11770] batadv0: left allmulticast mode [ 825.108052][T11770] batadv0: left promiscuous mode [ 825.113258][T11770] bridge0: port 1(batadv0) entered disabled state [ 825.133281][T11770] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 825.173520][T11770] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 825.352134][T11797] netlink: 'syz.5.13712': attribute type 1 has an invalid length. [ 825.591991][T11811] netlink: 'syz.9.13717': attribute type 10 has an invalid length. [ 825.643460][T11811] netlink: 'syz.9.13717': attribute type 10 has an invalid length. [ 825.673847][T11811] batadv0: entered promiscuous mode [ 825.679112][T11811] batadv0: entered allmulticast mode [ 825.711107][T11811] bond0: (slave batadv0): Releasing backup interface [ 825.732212][T11811] bridge0: port 1(batadv0) entered blocking state [ 825.738744][T11811] bridge0: port 1(batadv0) entered disabled state [ 825.833960][T11821] netlink: 'syz.9.13719': attribute type 10 has an invalid length. [ 825.842226][T11821] batadv0: left allmulticast mode [ 825.847376][T11821] batadv0: left promiscuous mode [ 825.852883][T11821] bridge0: port 1(batadv0) entered disabled state [ 825.909063][T11821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 825.920067][T11821] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 826.012449][T11838] netlink: 'syz.5.13726': attribute type 1 has an invalid length. [ 826.094911][T11846] netlink: 'syz.9.13729': attribute type 10 has an invalid length. [ 826.118519][T11846] netlink: 'syz.9.13729': attribute type 10 has an invalid length. [ 826.138366][T11846] batadv0: entered promiscuous mode [ 826.144150][T11846] batadv0: entered allmulticast mode [ 826.154486][T11848] FAULT_INJECTION: forcing a failure. [ 826.154486][T11848] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 826.167882][T11848] CPU: 1 UID: 0 PID: 11848 Comm: syz.3.13730 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT(voluntary) [ 826.167915][T11848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 826.167931][T11848] Call Trace: [ 826.167939][T11848] [ 826.167948][T11848] __dump_stack+0x1d/0x30 [ 826.167976][T11848] dump_stack_lvl+0xe8/0x140 [ 826.168016][T11848] dump_stack+0x15/0x1b [ 826.168034][T11848] should_fail_ex+0x265/0x280 [ 826.168069][T11848] should_fail_alloc_page+0xf2/0x100 [ 826.168109][T11848] __alloc_frozen_pages_noprof+0xff/0x360 [ 826.168178][T11848] alloc_pages_mpol+0xb3/0x250 [ 826.168209][T11848] folio_alloc_mpol_noprof+0x39/0x80 [ 826.168240][T11848] shmem_get_folio_gfp+0x3cf/0xd40 [ 826.168273][T11848] ? simple_xattr_get+0xb9/0x120 [ 826.168395][T11848] shmem_write_begin+0xa8/0x190 [ 826.168426][T11848] generic_perform_write+0x184/0x490 [ 826.168464][T11848] shmem_file_write_iter+0xc5/0xf0 [ 826.168519][T11848] do_iter_readv_writev+0x41e/0x4c0 [ 826.168562][T11848] vfs_writev+0x2c9/0x870 [ 826.168604][T11848] __se_sys_pwritev2+0xfc/0x1c0 [ 826.168677][T11848] __x64_sys_pwritev2+0x67/0x80 [ 826.168707][T11848] x64_sys_call+0x1cea/0x2fb0 [ 826.168726][T11848] do_syscall_64+0xd0/0x1a0 [ 826.168756][T11848] ? clear_bhb_loop+0x40/0x90 [ 826.168839][T11848] ? clear_bhb_loop+0x40/0x90 [ 826.168860][T11848] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 826.168916][T11848] RIP: 0033:0x7f417972e969 [ 826.168936][T11848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 826.168959][T11848] RSP: 002b:00007f4177d97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 826.168985][T11848] RAX: ffffffffffffffda RBX: 00007f4179955fa0 RCX: 00007f417972e969 [ 826.169069][T11848] RDX: 0000000000000001 RSI: 00002000000001c0 RDI: 0000000000000009 [ 826.169087][T11848] RBP: 00007f4177d97090 R08: 0000000000000000 R09: 0000000000000000 [ 826.169104][T11848] R10: 0000000000000e7b R11: 0000000000000246 R12: 0000000000000001 [ 826.169120][T11848] R13: 0000000000000000 R14: 00007f4179955fa0 R15: 00007ffdf2fae5b8 [ 826.169147][T11848] [ 826.404512][T11846] bond0: (slave batadv0): Releasing backup interface [ 826.416078][T11846] bridge0: port 1(batadv0) entered blocking state [ 826.422864][T11846] bridge0: port 1(batadv0) entered disabled state [ 826.477722][T11864] batadv0: left allmulticast mode [ 826.483141][T11864] batadv0: left promiscuous mode [ 826.488655][T11864] bridge0: port 3(batadv0) entered disabled state [ 826.501823][T11864] batadv0: entered promiscuous mode [ 826.507090][T11864] batadv0: entered allmulticast mode [ 826.515328][T11864] bridge0: port 3(batadv0) entered blocking state [ 826.521914][T11864] bridge0: port 3(batadv0) entered disabled state [ 826.766394][T11883] 9pnet_fd: Insufficient options for proto=fd [ 826.902572][ T1719] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 826.911948][ T1719] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 826.957670][T11890] 9pnet_fd: Insufficient options for proto=fd [ 827.268369][T11909] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=11909 comm=syz.6.13754 [ 827.280720][T11911] batadv0: entered promiscuous mode [ 827.286286][T11911] batadv0: entered allmulticast mode [ 827.292361][T11911] bond0: (slave batadv0): Releasing backup interface [ 827.303927][T11911] bridge0: port 3(batadv0) entered blocking state [ 827.310511][T11911] bridge0: port 3(batadv0) entered disabled state [ 827.329276][T11909] batadv1: entered allmulticast mode [ 827.335837][T11909] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 827.345511][T11909] bridge0: port 4(batadv1) entered blocking state [ 827.352200][T11909] bridge0: port 4(batadv1) entered disabled state [ 827.359638][T11909] batadv1: entered promiscuous mode [ 827.365898][T11909] bridge0: port 4(batadv1) entered blocking state [ 827.367849][T11915] 9pnet_fd: Insufficient options for proto=fd [ 827.372445][T11909] bridge0: port 4(batadv1) entered forwarding state [ 827.411821][T25247] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 827.421118][T25247] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 827.557325][T11936] batadv0: left allmulticast mode [ 827.562531][T11936] batadv0: left promiscuous mode [ 827.567719][T11936] bridge0: port 3(batadv0) entered disabled state [ 827.579956][T11936] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 827.588798][T11936] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 827.602560][T11936] batadv0: entered promiscuous mode [ 827.607829][T11936] batadv0: entered allmulticast mode [ 827.615320][T11936] bond0: (slave batadv0): Releasing backup interface [ 827.632901][T11936] bridge0: port 3(batadv0) entered blocking state [ 827.639472][T11936] bridge0: port 3(batadv0) entered disabled state [ 827.737240][T11950] 9pnet_fd: Insufficient options for proto=fd [ 827.762044][T11955] batadv0: left allmulticast mode [ 827.767214][T11955] batadv0: left promiscuous mode [ 827.772760][T11955] bridge0: port 3(batadv0) entered disabled state [ 827.791194][T11955] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 827.812467][T11955] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 827.826001][T11963] batadv0: entered promiscuous mode [ 827.831692][T11963] batadv0: entered allmulticast mode [ 827.838894][T25247] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 827.848299][T25247] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 827.864765][T11963] bond0: (slave batadv0): Releasing backup interface [ 827.883322][T11963] bridge0: port 3(batadv0) entered blocking state [ 827.889941][T11963] bridge0: port 3(batadv0) entered disabled state [ 827.955701][T11973] batadv2: entered promiscuous mode [ 827.961263][T11973] batadv2: entered allmulticast mode [ 828.209623][T11989] 9pnet_fd: Insufficient options for proto=fd [ 828.421140][T25247] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 828.430453][T25247] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 828.464742][T11997] bond_slave_0: entered promiscuous mode [ 828.470474][T11997] bond_slave_1: entered promiscuous mode [ 828.476818][T11997] macvlan2: entered promiscuous mode [ 828.482456][T11997] bond0: entered promiscuous mode [ 828.484068][T12009] Cannot find del_set index 0 as target [ 828.491946][T11997] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 828.578979][T12018] 9pnet_fd: Insufficient options for proto=fd [ 828.682174][T12027] geneve1: entered promiscuous mode [ 828.782841][T12027] bond0: (slave geneve1): Enslaving as an active interface with an up link [ 828.788870][ T29] kauditd_printk_skb: 440 callbacks suppressed [ 828.788887][ T29] audit: type=1326 audit(1747747964.433:58324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12028 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 828.900345][ T29] audit: type=1326 audit(1747747964.473:58325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12028 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 828.923462][ T29] audit: type=1326 audit(1747747964.483:58326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12028 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 828.926509][T12033] batadv0: left allmulticast mode [ 828.946575][ T29] audit: type=1326 audit(1747747964.483:58327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12028 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 828.951634][T12033] batadv0: left promiscuous mode [ 828.974636][ T29] audit: type=1326 audit(1747747964.483:58328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12028 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 828.979647][T12033] bridge0: port 1(batadv0) entered disabled state [ 829.002524][ T29] audit: type=1326 audit(1747747964.483:58329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12028 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 829.022695][T12041] Cannot find del_set index 0 as target [ 829.032032][ T29] audit: type=1326 audit(1747747964.493:58330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12028 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 829.060750][ T29] audit: type=1326 audit(1747747964.493:58331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12028 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f417972e969 code=0x7ffc0000 [ 829.101036][T12033] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 829.111771][T12033] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 829.121610][T12039] batadv0: entered promiscuous mode [ 829.126976][T12039] batadv0: entered allmulticast mode [ 829.135828][T12039] bond0: (slave batadv0): Releasing backup interface [ 829.149690][T12039] bridge0: port 1(batadv0) entered blocking state [ 829.156284][T12039] bridge0: port 1(batadv0) entered disabled state [ 829.164410][T12050] 9pnet_fd: Insufficient options for proto=fd [ 829.201415][T12051] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=12051 comm=syz.3.13811 [ 829.355241][T12059] __nla_validate_parse: 34 callbacks suppressed [ 829.355262][T12059] netlink: 40 bytes leftover after parsing attributes in process `syz.9.13815'. [ 829.507849][T12051] netlink: 52 bytes leftover after parsing attributes in process `syz.3.13811'. [ 829.517206][T12051] netlink: 26 bytes leftover after parsing attributes in process `syz.3.13811'. [ 829.526540][T12051] netlink: 26 bytes leftover after parsing attributes in process `syz.3.13811'. [ 829.536179][T12056] batadv0: left allmulticast mode [ 829.541427][T12056] batadv0: left promiscuous mode [ 829.546533][T12056] bridge0: port 1(batadv0) entered disabled state [ 829.557020][T12056] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 829.566103][T12056] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 829.580470][T12059] batadv0: entered promiscuous mode [ 829.585789][T12059] batadv0: entered allmulticast mode [ 829.592793][T12059] bond0: (slave batadv0): Releasing backup interface [ 829.603932][T12059] bridge0: port 1(batadv0) entered blocking state [ 829.610623][T12059] bridge0: port 1(batadv0) entered disabled state [ 829.740301][ T29] audit: type=1326 audit(1747747965.383:58332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.1.13821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 829.764281][ T29] audit: type=1326 audit(1747747965.383:58333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.1.13821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 829.982492][T12082] validate_nla: 24 callbacks suppressed [ 829.982507][T12082] netlink: 'syz.9.13826': attribute type 3 has an invalid length. [ 829.996033][T12082] netlink: 8 bytes leftover after parsing attributes in process `syz.9.13826'. [ 830.036607][T12085] 9pnet_fd: Insufficient options for proto=fd [ 830.063017][T12087] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 830.096727][T12087] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 830.113016][ T1719] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 830.122395][ T1719] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 830.437445][T12108] netlink: 'syz.5.13836': attribute type 10 has an invalid length. [ 830.443144][T12109] netlink: 3 bytes leftover after parsing attributes in process `syz.3.13837'. [ 830.445920][T12108] batadv0: left allmulticast mode [ 830.459563][T12108] batadv0: left promiscuous mode [ 830.465341][T12108] bridge0: port 3(batadv0) entered disabled state [ 830.492699][T12110] netlink: 'syz.5.13836': attribute type 10 has an invalid length. [ 830.500749][T12110] netlink: 40 bytes leftover after parsing attributes in process `syz.5.13836'. [ 830.548550][T12109] batadv1: entered promiscuous mode [ 830.553933][T12109] batadv1: entered allmulticast mode [ 830.570035][T12110] batadv0: entered promiscuous mode [ 830.575413][T12110] batadv0: entered allmulticast mode [ 830.584239][T12110] bridge0: port 3(batadv0) entered blocking state [ 830.590913][T12110] bridge0: port 3(batadv0) entered disabled state [ 830.890884][T12119] netlink: 'syz.1.13840': attribute type 10 has an invalid length. [ 830.920425][T12119] batadv0: left allmulticast mode [ 830.925539][T12119] batadv0: left promiscuous mode [ 830.930715][T12119] bridge0: port 3(batadv0) entered disabled state [ 830.950533][T12120] netlink: 'syz.1.13840': attribute type 10 has an invalid length. [ 830.958499][T12120] netlink: 40 bytes leftover after parsing attributes in process `syz.1.13840'. [ 830.969654][T12119] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 830.995689][T12119] batadv0: entered promiscuous mode [ 831.005767][T12119] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 831.014823][T12120] batadv0: entered allmulticast mode [ 831.024201][T12120] bond0: (slave batadv0): Releasing backup interface [ 831.039496][T12120] bridge0: port 3(batadv0) entered blocking state [ 831.046108][T12120] bridge0: port 3(batadv0) entered disabled state [ 831.080559][T25237] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 831.089829][T25237] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 831.154702][T12133] batadv1: entered allmulticast mode [ 831.176926][T12133] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 831.186008][T12133] bridge0: port 1(batadv1) entered blocking state [ 831.193126][T12133] bridge0: port 1(batadv1) entered disabled state [ 831.211322][T12133] batadv1: entered promiscuous mode [ 831.217356][T12133] bridge0: port 1(batadv1) entered blocking state [ 831.223870][T12133] bridge0: port 1(batadv1) entered forwarding state [ 831.292418][T12139] batadv1: entered promiscuous mode [ 831.297707][T12139] batadv1: entered allmulticast mode [ 831.480270][T12150] macvlan3: entered promiscuous mode [ 831.494064][T12150] 8021q: adding VLAN 0 to HW filter on device macvlan3 [ 831.623167][T12157] netlink: 'syz.1.13855': attribute type 1 has an invalid length. [ 831.668032][T25247] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 831.677352][T25247] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 831.753011][T12161] netlink: 'syz.5.13857': attribute type 3 has an invalid length. [ 831.763986][T12161] 9pnet_fd: Insufficient options for proto=fd [ 831.910684][T12170] netlink: 'syz.5.13862': attribute type 1 has an invalid length. [ 832.110018][T12186] netlink: 'syz.6.13869': attribute type 3 has an invalid length. [ 832.180817][T12187] 9pnet_fd: Insufficient options for proto=fd [ 832.238424][T12191] syzkaller0: entered promiscuous mode [ 832.244119][T12191] syzkaller0: entered allmulticast mode [ 832.263689][T12193] Cannot find del_set index 0 as target [ 832.293607][T12195] Cannot find del_set index 0 as target [ 832.397357][T12205] netlink: 'syz.6.13878': attribute type 10 has an invalid length. [ 832.407453][T12205] batadv0: left allmulticast mode [ 832.412866][T12205] batadv0: left promiscuous mode [ 832.418522][T12205] bridge0: port 3(batadv0) entered disabled state [ 832.451621][T12205] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 832.463433][T12205] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 832.492283][T12207] batadv1: entered promiscuous mode [ 832.497662][T12207] batadv1: entered allmulticast mode [ 832.515689][T12212] batadv0: entered promiscuous mode [ 832.521090][T12212] batadv0: entered allmulticast mode [ 832.532839][T12212] bond0: (slave batadv0): Releasing backup interface [ 832.552145][T12212] bridge0: port 3(batadv0) entered blocking state [ 832.558668][T12212] bridge0: port 3(batadv0) entered disabled state [ 832.584445][T12219] : (slave batadv0): Releasing backup interface [ 832.607673][T12219] bridge0: port 2(batadv0) entered blocking state [ 832.615046][T12219] bridge0: port 2(batadv0) entered disabled state [ 832.641495][T12220] 9pnet_fd: Insufficient options for proto=fd [ 832.687320][T12224] batadv0: left allmulticast mode [ 832.692488][T12224] batadv0: left promiscuous mode [ 832.697568][T12224] bridge0: port 1(batadv0) entered disabled state [ 832.701674][T12226] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=12226 comm=syz.5.13888 [ 832.736995][T12226] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=12226 comm=syz.5.13888 [ 832.750810][ T51] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 832.760057][ T51] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 832.777635][T12226] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=12226 comm=syz.5.13888 [ 832.792577][T12224] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 832.809463][T12224] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 832.818430][T12231] batadv0: entered promiscuous mode [ 832.823810][T12231] batadv0: entered allmulticast mode [ 832.833419][T12231] bond0: (slave batadv0): Releasing backup interface [ 832.844112][T12231] bridge0: port 1(batadv0) entered blocking state [ 832.850723][T12231] bridge0: port 1(batadv0) entered disabled state [ 832.940052][T12237] syzkaller0: entered promiscuous mode [ 832.945709][T12237] syzkaller0: entered allmulticast mode [ 832.957867][T12244] batadv0: left allmulticast mode [ 832.963074][T12244] batadv0: left promiscuous mode [ 832.968135][T12244] bridge0: port 3(batadv0) entered disabled state [ 832.978525][T12244] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 832.987220][T12244] batadv0: entered promiscuous mode [ 832.996984][T12244] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 833.007422][T12250] batadv0: left allmulticast mode [ 833.012859][T12250] batadv0: left promiscuous mode [ 833.018287][T12250] bridge0: port 3(batadv0) entered disabled state [ 833.031247][T12250] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 833.039642][T12250] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 833.048485][T12251] batadv0: entered allmulticast mode [ 833.056448][T12251] bond0: (slave batadv0): Releasing backup interface [ 833.076407][T12251] bridge0: port 3(batadv0) entered blocking state [ 833.083452][T12251] bridge0: port 3(batadv0) entered disabled state [ 833.099002][T12253] batadv0: entered promiscuous mode [ 833.104342][T12253] batadv0: entered allmulticast mode [ 833.116752][T12253] bond0: (slave batadv0): Releasing backup interface [ 833.155661][T12253] bridge0: port 3(batadv0) entered blocking state [ 833.162437][T12253] bridge0: port 3(batadv0) entered disabled state [ 833.236597][T12259] 9pnet_fd: Insufficient options for proto=fd [ 833.295471][T12268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=12268 comm=syz.1.13902 [ 833.332581][T12268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=12268 comm=syz.1.13902 [ 833.374850][T12268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=12268 comm=syz.1.13902 [ 833.501255][T12281] batadv0: left allmulticast mode [ 833.506360][T12281] batadv0: left promiscuous mode [ 833.511579][T12281] bridge0: port 3(batadv0) entered disabled state [ 833.523634][T12281] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 833.542362][T12281] batadv0: entered promiscuous mode [ 833.548683][T12281] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 833.557601][T12286] batadv0: entered allmulticast mode [ 833.573446][T12286] bond0: (slave batadv0): Releasing backup interface [ 833.589058][T12286] bridge0: port 3(batadv0) entered blocking state [ 833.595614][T12286] bridge0: port 3(batadv0) entered disabled state [ 833.677349][T12288] syzkaller0: entered promiscuous mode [ 833.683345][T12288] syzkaller0: entered allmulticast mode [ 833.798221][T12295] 9pnet_fd: Insufficient options for proto=fd [ 833.922737][ T29] kauditd_printk_skb: 316 callbacks suppressed [ 833.922755][ T29] audit: type=1400 audit(1747747969.573:58650): avc: denied { create } for pid=12308 comm="syz.1.13921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 833.981873][ T29] audit: type=1326 audit(1747747969.623:58651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12308 comm="syz.1.13921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 834.005677][ T29] audit: type=1326 audit(1747747969.623:58652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12308 comm="syz.1.13921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 834.029425][ T29] audit: type=1326 audit(1747747969.633:58653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12308 comm="syz.1.13921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 834.068955][ T29] audit: type=1326 audit(1747747969.703:58654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12308 comm="syz.1.13921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 834.092747][ T29] audit: type=1326 audit(1747747969.703:58655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12308 comm="syz.1.13921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 834.116563][ T29] audit: type=1326 audit(1747747969.703:58656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12308 comm="syz.1.13921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 834.140267][ T29] audit: type=1326 audit(1747747969.703:58657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12308 comm="syz.1.13921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 834.164575][ T29] audit: type=1326 audit(1747747969.703:58658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12308 comm="syz.1.13921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 834.188417][ T29] audit: type=1326 audit(1747747969.703:58659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12308 comm="syz.1.13921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 834.278674][T12318] batadv1: entered promiscuous mode [ 834.284037][T12318] batadv1: entered allmulticast mode [ 834.422213][T12325] syzkaller0: entered promiscuous mode [ 834.427826][T12325] syzkaller0: entered allmulticast mode [ 834.440904][T12328] __nla_validate_parse: 26 callbacks suppressed [ 834.440932][T12328] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 834.463722][T12328] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 834.655987][T12346] batadv0: left allmulticast mode [ 834.661129][T12346] batadv0: left promiscuous mode [ 834.666274][T12346] bridge0: port 3(batadv0) entered disabled state [ 834.705227][T12346] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 834.720573][T12350] netlink: 40 bytes leftover after parsing attributes in process `syz.1.13937'. [ 834.751303][T12346] batadv0: entered promiscuous mode [ 834.757445][T12346] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 834.768703][T12350] batadv0: entered allmulticast mode [ 834.785144][T12350] bond0: (slave batadv0): Releasing backup interface [ 834.803759][T12350] bridge0: port 3(batadv0) entered blocking state [ 834.810394][T12350] bridge0: port 3(batadv0) entered disabled state [ 834.817168][T12355] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13939'. [ 834.851602][T12352] batadv0: left allmulticast mode [ 834.856736][T12352] batadv0: left promiscuous mode [ 834.861935][T12352] bridge0: port 3(batadv0) entered disabled state [ 834.897535][T12352] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 834.907564][T12352] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 834.937917][T12355] batadv0: entered promiscuous mode [ 834.943219][T12355] batadv0: entered allmulticast mode [ 834.971294][T12355] bond0: (slave batadv0): Releasing backup interface [ 834.982889][T12355] bridge0: port 3(batadv0) entered blocking state [ 834.989374][T12355] bridge0: port 3(batadv0) entered disabled state [ 835.109876][T12368] Cannot find del_set index 0 as target [ 835.230541][T12382] validate_nla: 18 callbacks suppressed [ 835.230559][T12382] netlink: 'syz.1.13953': attribute type 10 has an invalid length. [ 835.258951][T12382] batadv0: left allmulticast mode [ 835.264069][T12382] batadv0: left promiscuous mode [ 835.269242][T12382] bridge0: port 3(batadv0) entered disabled state [ 835.277901][T12384] netlink: 'syz.6.13952': attribute type 10 has an invalid length. [ 835.294354][T12382] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 835.303583][T12387] netlink: 'syz.1.13953': attribute type 10 has an invalid length. [ 835.311585][T12387] netlink: 40 bytes leftover after parsing attributes in process `syz.1.13953'. [ 835.322863][T12382] batadv0: entered promiscuous mode [ 835.328979][T12382] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 835.339739][T12387] batadv0: entered allmulticast mode [ 835.352562][T12388] netlink: 'syz.6.13952': attribute type 10 has an invalid length. [ 835.360625][T12388] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13952'. [ 835.374904][T12387] bond0: (slave batadv0): Releasing backup interface [ 835.375884][T12386] netlink: 8 bytes leftover after parsing attributes in process `syz.5.13954'. [ 835.395105][T12387] bridge0: port 3(batadv0) entered blocking state [ 835.401776][T12387] bridge0: port 3(batadv0) entered disabled state [ 835.423492][T12386] netlink: 8 bytes leftover after parsing attributes in process `syz.5.13954'. [ 835.434174][T12384] batadv0: left allmulticast mode [ 835.439240][T12384] batadv0: left promiscuous mode [ 835.444394][T12384] bridge0: port 3(batadv0) entered disabled state [ 835.474183][T12384] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 835.483048][T12384] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 835.492424][T12388] batadv0: entered promiscuous mode [ 835.497727][T12388] batadv0: entered allmulticast mode [ 835.537952][T12388] bond0: (slave batadv0): Releasing backup interface [ 835.554719][T12388] bridge0: port 3(batadv0) entered blocking state [ 835.561277][T12388] bridge0: port 3(batadv0) entered disabled state [ 835.856618][T25247] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 835.865943][T25247] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 836.113703][T12431] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=12431 comm=syz.3.13972 [ 836.170378][T12431] netlink: 52 bytes leftover after parsing attributes in process `syz.3.13972'. [ 836.179498][T12431] netlink: 26 bytes leftover after parsing attributes in process `syz.3.13972'. [ 837.210058][T12473] netlink: 'syz.6.13987': attribute type 10 has an invalid length. [ 837.218233][T12473] batadv0: left allmulticast mode [ 837.223460][T12473] batadv0: left promiscuous mode [ 837.228817][T12473] bridge0: port 3(batadv0) entered disabled state [ 837.257858][T12473] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 837.269145][T12473] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 837.279863][T12473] netlink: 'syz.6.13987': attribute type 10 has an invalid length. [ 837.318795][T12473] batadv0: entered promiscuous mode [ 837.324089][T12473] batadv0: entered allmulticast mode [ 837.343506][T12473] bond0: (slave batadv0): Releasing backup interface [ 837.378453][T12473] bridge0: port 3(batadv0) entered blocking state [ 837.385318][T12473] bridge0: port 3(batadv0) entered disabled state [ 837.810013][T12517] batadv2: entered promiscuous mode [ 837.815675][T12517] batadv2: entered allmulticast mode [ 837.818817][T12519] netlink: 'syz.9.14006': attribute type 10 has an invalid length. [ 837.832059][T12519] batadv0: left allmulticast mode [ 837.837190][T12519] batadv0: left promiscuous mode [ 837.842388][T12519] bridge0: port 1(batadv0) entered disabled state [ 837.860792][T12519] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 837.880990][T12521] netlink: 'syz.9.14006': attribute type 10 has an invalid length. [ 837.881180][T12519] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 837.898476][T12521] batadv0: entered promiscuous mode [ 837.903778][T12521] batadv0: entered allmulticast mode [ 837.917967][T12521] bond0: (slave batadv0): Releasing backup interface [ 837.937578][T12521] bridge0: port 1(batadv0) entered blocking state [ 837.944835][T12521] bridge0: port 1(batadv0) entered disabled state [ 838.425781][T25247] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 838.435095][T25247] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 838.845107][T12568] netlink: 'syz.3.14025': attribute type 10 has an invalid length. [ 838.870510][T12568] batadv0: left allmulticast mode [ 838.875752][T12568] bridge0: port 2(batadv0) entered disabled state [ 838.896911][T12568] batadv0: left promiscuous mode [ 838.906740][T12571] netlink: 'syz.3.14025': attribute type 10 has an invalid length. [ 838.915928][T12568] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 838.931769][ T29] kauditd_printk_skb: 468 callbacks suppressed [ 838.931841][ T29] audit: type=1326 audit(1747747974.583:59128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12565 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7f8c2636e969 code=0x7ffc0000 [ 838.935214][T12568] batadv0: entered promiscuous mode [ 838.938166][ T29] audit: type=1326 audit(1747747974.583:59129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12569 comm="syz.6.14026" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 838.961197][T12568] batadv0: entered allmulticast mode [ 838.987598][T12568] : (slave batadv0): Enslaving as an active interface with an up link [ 839.023271][T12571] : (slave batadv0): Releasing backup interface [ 839.049027][T12571] bridge0: port 2(batadv0) entered blocking state [ 839.055823][T12571] bridge0: port 2(batadv0) entered disabled state [ 839.109250][ T29] audit: type=1326 audit(1747747974.613:59130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12569 comm="syz.6.14026" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 839.133271][ T29] audit: type=1326 audit(1747747974.613:59131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12569 comm="syz.6.14026" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 839.157084][ T29] audit: type=1326 audit(1747747974.613:59132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12569 comm="syz.6.14026" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 839.180884][ T29] audit: type=1326 audit(1747747974.613:59133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12569 comm="syz.6.14026" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 839.204689][ T29] audit: type=1326 audit(1747747974.613:59134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12569 comm="syz.6.14026" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 839.204827][ T2995] ================================================================== [ 839.228518][ T29] audit: type=1326 audit(1747747974.613:59135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12569 comm="syz.6.14026" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 839.236366][ T2995] BUG: KCSAN: data-race in _prb_read_valid / data_alloc [ 839.236423][ T2995] [ 839.236430][ T2995] write to 0xffffffff86883e90 of 8 bytes by task 29 on cpu 0: [ 839.236450][ T2995] data_alloc+0x271/0x2b0 [ 839.236486][ T2995] prb_reserve+0x808/0xaf0 [ 839.236522][ T2995] vprintk_store+0x56d/0x860 [ 839.236543][ T2995] vprintk_emit+0x178/0x650 [ 839.236566][ T2995] vprintk_default+0x26/0x30 [ 839.260477][ T29] audit: type=1326 audit(1747747974.613:59136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12569 comm="syz.6.14026" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 839.267101][ T2995] vprintk+0x1d/0x30 [ 839.269441][ T29] audit: type=1326 audit(1747747974.613:59137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12569 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4506e969 code=0x7ffc0000 [ 839.276861][ T2995] _printk+0x79/0xa0 [ 839.276897][ T2995] kauditd_hold_skb+0x1b1/0x1c0 [ 839.276919][ T2995] kauditd_send_queue+0x273/0x2c0 [ 839.276942][ T2995] kauditd_thread+0x421/0x630 [ 839.276976][ T2995] kthread+0x486/0x510 [ 839.277000][ T2995] ret_from_fork+0x4b/0x60 [ 839.277021][ T2995] ret_from_fork_asm+0x1a/0x30 [ 839.277047][ T2995] [ 839.277054][ T2995] read to 0xffffffff86883e90 of 16 bytes by task 2995 on cpu 1: [ 839.277074][ T2995] _prb_read_valid+0x1bc/0x920 [ 839.277108][ T2995] prb_read_valid+0x3c/0x60 [ 839.400732][ T2995] syslog_print+0x23a/0x540 [ 839.405250][ T2995] do_syslog+0x52b/0x7e0 [ 839.409503][ T2995] __x64_sys_syslog+0x41/0x50 [ 839.414187][ T2995] x64_sys_call+0x2ea0/0x2fb0 [ 839.418880][ T2995] do_syscall_64+0xd0/0x1a0 [ 839.423399][ T2995] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 839.429303][ T2995] [ 839.431631][ T2995] Reported by Kernel Concurrency Sanitizer on: [ 839.437787][ T2995] CPU: 1 UID: 0 PID: 2995 Comm: klogd Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT(voluntary) [ 839.448036][ T2995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 839.458100][ T2995] ================================================================== [ 839.478424][ T1719] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 839.487717][ T1719] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 843.224472][ T1719] bridge0: port 4(batadv0) entered disabled state [ 843.232145][ T1719] bond0: left allmulticast mode [ 843.237006][ T1719] bond_slave_0: left allmulticast mode [ 843.242623][ T1719] bond_slave_1: left allmulticast mode [ 843.248133][ T1719] bond0: left promiscuous mode [ 843.252988][ T1719] bond_slave_0: left promiscuous mode [ 843.258485][ T1719] bond_slave_1: left promiscuous mode [ 843.264194][ T1719] bridge0: port 3(bond0) entered disabled state [ 843.272470][ T1719] bridge_slave_1: left allmulticast mode [ 843.278217][ T1719] bridge_slave_1: left promiscuous mode [ 843.283972][ T1719] bridge0: port 2(bridge_slave_1) entered disabled state [ 843.292864][ T1719] bridge_slave_0: left allmulticast mode [ 843.298617][ T1719] bridge_slave_0: left promiscuous mode [ 843.304399][ T1719] bridge0: port 1(bridge_slave_0) entered disabled state [ 843.404034][ T1719] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 843.413956][ T1719] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 843.423748][ T1719] bond0 (unregistering): Released all slaves [ 843.483721][ T1719] tipc: Left network mode [ 843.492418][ T1719] hsr_slave_0: left promiscuous mode [ 843.498126][ T1719] hsr_slave_1: left promiscuous mode [ 843.503887][ T1719] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 843.511395][ T1719] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 843.519165][ T1719] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 843.526862][ T1719] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 843.537294][ T1719] veth1_macvtap: left promiscuous mode [ 843.542914][ T1719] veth0_macvtap: left promiscuous mode [ 843.609300][ T1719] team0 (unregistering): Port device team_slave_1 removed [ 843.619744][ T1719] team0 (unregistering): Port device team_slave_0 removed