last executing test programs: 4m26.256878883s ago: executing program 2 (id=69): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x5, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000340)='mm_page_alloc\x00', r0}, 0x18) socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) socket(0x2, 0x80805, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000006c0)='./bus\x00', 0x200015, &(0x7f0000000180)={[{@jqfmt_vfsv0}, {@resgid}, {@norecovery}, {@usrquota}, {@nombcache}]}, 0x8, 0x61c, &(0x7f0000000700)="$eJzs3c1vVFUbAPDn3n7Svq9TiFFxIU2MgURpaQFDjImwJwQ/dq4qLQQplNAaLZJYEtyYGDcuTFy5EP8LJXHrwp1x4caVISHGsBBDZMydmVum05kyLTOdMvP7JZeec2/nnjPNPDxnzpx7J4CeNZ79k0bsjYjLSUSh6lh/VA6Ol3/v7l/XzmRbEsXi238mce2TZKX6XEnl52jlwf8WIvk5jdjTt77dxeWrF2bm5+euVOqTSxcvTy4uXz14/uLMublzc5emX50+dvTI0WNThx7r+aVV5ZM33v+w8Nmpd7/9+n4y9d1vp5I4Hg8qfcueV+1jhyKiTtebNh7jUSy7V70/+7see4zz7iR/F/LXyUNJ7Q52rLOV1+NARDwbhegrverLCvHpmx3tHNBWxSTyHAX0nGRL8T/c+o4A2ywfB+Tv7eu9D14vbfOoBNgOd06UJwDKsT8QEXn895fnBmO4NDcwcjdZM8+TRMTjzcyVZW389OOpG9kWDebhVplXgpZauZ7P99Xm/6QUm2MxXKqN3E3XhF9atWX739pi++M19ebGH0ArrFyPiOcq+X8wNhX/41Xx/94W2xf/AAAAAAAA0Dq3TkTEK/XW/6Wr638G66z/GY2I4y1o/9Gf/6W3K4WkBc0BVe6ciHi97vrf1TW+Y32V2v9L6wEGkrPn5+cORcRTEXEgBoay+lTNeatXCB/8fM9XjdqvXv+XbVn7+VrAyplu9ydro392ZmmmFc8det2d6xHPl9b/7qvsWbv+J8v/SZ38n8X35Sbb2PPSzdONjj06/oF2KX4Tsb9u/n+YcJON788xWRoPTOajgvVe+PiL7xu1L/6hc7L8P7Jx/A8l1ffrWdzc+Qcj4vByf7HR8abG/0NrH5ON/weTd/ry82c+mllaujIVMZicXL9/enN9hm6Vx0MeL1n8H3hx4/m/1fF/VRzuioiVJtt85sHo742Oyf/QOVn8z26c/8fW5v/NF6Zvjv3QqP3TTeX/I6WcfqCyx/wfVFt/P45mA7Qj3QUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAJ1waEf+LJJ1YLafpxETEaEQ8HSPp/MLi0stnFz64NJsdK33/f5p/02+hXE/y7/8fq6pP19QPR8TuiPiyb1epPnFmYX62008eAAAAAAAAAAAAAAAAAAAAdojR0jX/xaHa6/8zf/R1undA2/VXfop36D39W35kcailHQG23dbjH3jSNR//A23tB7D9Gsf/vfvFkm3tDrCNjP+hd20x/n1cAF1A/ode1eSc3nC7+wF0gvwPAAAAAABdZfe+W78mEbHy2q7SlhmsHLPYH7pb2ukOAB1jDS/0rv6FTvcA6BTv8YFktfRP3Yv9G6/+T9rTIQAAAAAAAAAAAABgnf17Xf8PvWrj6/+t7YdutsH1//WC3+0CoIs0/uoPuR+6nff40NOKhSayvev/AQAAAAAAAAAAAGAHGL56YWZ+fu7K4vKTV3hjw9/JFybviK4+LKzM7IhutLTwoD1nHoiI1p3wl6Hy62FH/MUeUchvwdHBbnTqPyQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKDWfwEAAP//Nb8imQ==") sched_setscheduler(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3}, 0x18) syz_genetlink_get_family_id$mptcp(&(0x7f0000000280), r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8fe00000000bfa200000000000007020000f8ffffffb703000008000000b70400008f20"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) syz_usb_connect$cdc_ncm(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r1) 4m23.286589443s ago: executing program 2 (id=113): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002305e20000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2, 0x0, 0x5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc5fffffd) socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x4000, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000), 0x4) 4m23.239075263s ago: executing program 2 (id=115): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) pipe(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) openat(0xffffffffffffff9c, 0x0, 0x8d41, 0x43) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kfree\x00'}, 0x18) socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000980)='./file1\x00', 0x280809a, &(0x7f0000000f40)=ANY=[], 0xd, 0x2b2, &(0x7f00000006c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x103642, 0x0) 4m22.307875199s ago: executing program 2 (id=125): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_route(0x10, 0x3, 0x0) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) (async) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@null, 0x2, 'bridge_slave_0\x00'}) syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000480)={[{@delalloc}]}, 0x1, 0x746, &(0x7f0000000f40)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) mkdirat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x0) (async, rerun: 64) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async, rerun: 64) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) (rerun: 64) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) (async, rerun: 32) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) (async, rerun: 32) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mknod$loop(&(0x7f00000007c0)='./file0/file0/file0\x00', 0x200, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x10, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x2, 0x4, 0x0, 0x1, 0x22}, @jmp={0x5, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffe88}], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) (async, rerun: 32) mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0xf, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000feffffff000000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000cdf0641cb086e92080c48646fc2fb29ad168051f04d8ca11ddacb6ab74da29530b579119ef7d557c196f76bfef5d"], &(0x7f00000001c0)='syzkaller\x00', 0x4878ca99, 0x0, &(0x7f0000000300), 0x40f00, 0x17, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000540), &(0x7f0000000600)=[{0x1, 0x2, 0x9, 0x6}, {0x5, 0x4, 0xe, 0x7}, {0x0, 0x1, 0xd, 0x4}], 0x10, 0x7d94, @void, @value}, 0x94) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000880)={'sit0\x00', 0x0, 0x8000, 0x8, 0x7f, 0x7d552c7e, {{0xc, 0x4, 0x0, 0x38, 0x30, 0x66, 0x0, 0x1, 0x4, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp={0x44, 0x1c, 0xcd, 0x0, 0x9, [0x1ff, 0x10001, 0x200, 0xf87d, 0x5, 0x9]}]}}}}}) (async) r2 = getpid() (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) unshare(0x22020400) r3 = syz_pidfd_open(r2, 0x0) setns(r3, 0x24020000) (async) umount2(&(0x7f0000000040)='.\x00', 0x2) (async, rerun: 32) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000002140)={0x5, &(0x7f00000004c0)=[{0x1004, 0xea, 0x8, 0x87}, {0x723d, 0xdf, 0x5, 0x7}, {0x3ff, 0x53, 0x2, 0x82e}, {0x3, 0x5, 0x4, 0xf}, {0x4, 0x5b, 0x7, 0x7}]}) (async, rerun: 32) set_mempolicy(0x8001, &(0x7f0000000080)=0x7e, 0x8000) 4m22.259369899s ago: executing program 2 (id=126): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x50) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000000c0)={0xffff, 0xa, 0x3, 0x9fc}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f00000001c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f00000004c0)={[{@jqfmt_vfsv1}, {@auto_da_alloc}, {@barrier_val}, {@journal_ioprio}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@resuid}, {@nodelalloc}, {@acl}, {@noinit_itable}]}, 0xfc, 0x572, &(0x7f0000003780)="$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") chdir(&(0x7f0000000100)='./file0\x00') link(&(0x7f0000001240)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 4m21.955794498s ago: executing program 2 (id=129): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000807000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, r0, 0x97cb8000) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) mkdir(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000440)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x0, 0x20020, &(0x7f0000000140)=""/24}, &(0x7f0000000380)="851666ce20db", 0x0, 0xfffffffb, 0x39, 0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001280)=ANY=[@ANYBLOB="b702000023000000bfa30000000000000703000000feffff7a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000000000639100000000000000000000ff7f00000000cb04fcbb0ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b839994fb484510bef2e488fbac2fe6faaf75e5cc4815bd2051ade12f41deff6df6a936b4ec3827c739bb39aad16cc75fe369258673b5d053bdec75dcab772be2c9d2d29db3d36dd01797bd3f15aa6aadbeab2a01685108e61aa000000000000000000000000008b798b4f7458d1863cc67d4c6a06e828e5216f601b19db1af1b5d356d0f015d885b4b8ffc0fa3f880287c862137d866d11be4ba3f0151fdbbd4e97d62ecc645e143a60f1b1b71b5f7fc6edc76600000000826151e2b42bf0ed0c8cef3ba2a730a00c87c493db845b10e9468bda6f82881eb8c9cfa72b08eecc972a3fd2c46f3c1cde71a19d1a2982492abaa96665372831210e00d2bfea3bf97ff8836d000000000000000000000000000000000000000000250d623b48a29e330900b8c552202407804f1ba1817256caf1090b71f2928ed030f3c8194cc3cbf48e2f4c9248c4c00a32d4873da3b7d66b1ce6f72aab16c923b16c4bfdbb24fb17bd198139c21c46065c6922fd705e670d0b5d6d495a773b872e8f88"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000017"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x1f00, 0x18, 0x19, &(0x7f00000007c0)="9f44948721919580684010a40566", 0x0, 0x7ff, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000380)="8c5911c525f5cf4c4ecf207ad2ec", 0x0, 0x0, 0xffffffff}, 0x23) r6 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, &(0x7f0000000000)=""/108, &(0x7f0000000080)=0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) setpriority(0x2, r1, 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 4m21.943535268s ago: executing program 32 (id=129): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000807000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, r0, 0x97cb8000) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) mkdir(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000440)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x0, 0x20020, &(0x7f0000000140)=""/24}, &(0x7f0000000380)="851666ce20db", 0x0, 0xfffffffb, 0x39, 0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000017"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x1f00, 0x18, 0x19, &(0x7f00000007c0)="9f44948721919580684010a40566", 0x0, 0x7ff, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000380)="8c5911c525f5cf4c4ecf207ad2ec", 0x0, 0x0, 0xffffffff}, 0x23) r6 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, &(0x7f0000000000)=""/108, &(0x7f0000000080)=0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) setpriority(0x2, r1, 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 1m57.1123374s ago: executing program 5 (id=3071): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000700)={0xffffffffffffffff, 0x6, 0x3, 0xb63}) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) sendto$inet6(r0, &(0x7f0000000200)="da", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x80000000, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) 1m56.98442248s ago: executing program 5 (id=3075): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004180)=ANY=[@ANYBLOB="020000000400000007000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xff4d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r5 = socket$inet(0x2, 0x3, 0x8) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x338, 0x1c0, 0xe138, 0x198, 0x1c0, 0x198, 0x2a0, 0x358, 0x358, 0x2a0, 0x358, 0x3, 0x0, {[{{@ip={@broadcast, @loopback, 0x0, 0x0, '\x00', 'veth0_to_bond\x00', {}, {}, 0x21}, 0x0, 0x158, 0x1c0, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'fsm\x00', "0d0004000000000000000004fff0cf81dfd28c89544e14cd3e01dd24289831867846c88621039b284c3ff45c42995560a99952bed40cf5a8c1df6cdbdb7e2378d5afd35f4c16827f55b3af494e39e8fb330200000000000032b6a99a8d87298e88a94cb519f5c17631af916a0002000000000000000000000000000000000049", 0xc}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00', {0xfffffffffffffffc}}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x398) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r6, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) rt_sigpending(0x0, 0x0) 1m56.848412859s ago: executing program 5 (id=3077): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000840)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x6) r2 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=@newqdisc={0x90, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0xfffd]}}}}, @TCA_RATE={0x6}]}, 0x90}}, 0x20000000) (fail_nth: 12) 1m56.775596859s ago: executing program 5 (id=3078): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000006000000030000000000000903000000000000000300000d000000000b0700000000000000000000030000000700000000000000005f61610000"], &(0x7f0000000140)=""/27, 0x4e, 0x1b, 0x1, 0x9, 0x0, @void, @value}, 0x28) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x101}}, './file0\x00'}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000001ff0), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x5, 0x0, 0x4, {}, {0x0, 0x2710}, {}, 0x7, @can={{}, 0x4, 0x0, 0x0, 0x0, "8bc7e9385559d457"}}, 0x48}, 0x1, 0x0, 0x0, 0x4000001}, 0x40) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f00000003c0)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x1000410, &(0x7f0000000040)={[{@barrier_val={'barrier', 0x3d, 0x7}}, {@i_version}]}, 0x4, 0x504, &(0x7f0000019940)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40) r6 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', 0x0}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r8 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1000000, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) connect$unix(r8, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) r9 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000d50000002a00c5"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000000c0)='netlink_extack\x00', r10, 0x0, 0x4}, 0x18) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=@getpolicy={0x50, 0x15, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@dev}}}, 0x50}}, 0x0) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) write$binfmt_register(r9, &(0x7f0000000000)={0x3a, 'syz2', 0x3a, 'E', 0x3a, 0x7, 0x3a, 'M', 0x3a, 'M', 0x3a, './file2', 0x3a, [0x46]}, 0x2a) 1m56.208081818s ago: executing program 5 (id=3083): r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x2000)=nil, 0x5000) shmctl$SHM_LOCK(r0, 0xb) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) (async) statx(0xffffffffffffff9c, &(0x7f0000002840)='./file0\x00', 0x2000, 0x800, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) socket$inet_udp(0x2, 0x2, 0x0) (rerun: 64) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100020, 0x0, 0x0, 0x6, 0x3, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) (async) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) (async, rerun: 64) listen(r1, 0x8) (rerun: 64) r2 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x9}, &(0x7f00000001c0)=0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) (async) perf_event_open(&(0x7f00000034c0)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) (async) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x40000000000009f, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000100000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r3}, 0x10) dup(0xffffffffffffffff) (async) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a00000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) syz_usb_connect$hid(0x5, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000000000106a0529000000000000010902"], 0x0) (async) r5 = syz_open_dev$hidraw(&(0x7f00000004c0), 0x0, 0x14a042) writev(r5, &(0x7f0000001400)=[{&(0x7f0000001280)="555a6060d64d", 0x6}], 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1m55.777631676s ago: executing program 5 (id=3089): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) (async) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='+pids'], 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000780)={0x0, 0x0}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x80000000000, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) sigaltstack(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="8000000000000000000000000000000000000000004a0236606d96774efef43db9118057b1b147392618a3549ffe1bf12cd0a59f4d255ebd708f1c09cc7785995c5900000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x6, 0x15, &(0x7f0000001480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f900001ab703000008000000b704000000001500850000003300000095"], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x6, 0x15, &(0x7f0000001480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f900001ab703000008000000b704000000001500850000003300000095"], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef82, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file1\x00', 0x50, &(0x7f0000000280)={[{@usrquota}, {}, {@nobh}, {@user_xattr}, {@dioread_nolock}]}, 0x1, 0x3ee, &(0x7f0000000c80)="$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") creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x200, &(0x7f0000000140)) r7 = open(&(0x7f0000000100)='./bus\x00', 0x14113e, 0x39) write$binfmt_script(r7, &(0x7f0000000080), 0x208e24b) (async) write$binfmt_script(r7, &(0x7f0000000080), 0x208e24b) r8 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x6, 0x0, &(0x7f0000001c00)) (async) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x6, 0x0, &(0x7f0000001c00)) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$nl_xfrm(0x10, 0x3, 0x6) 1m55.754276446s ago: executing program 33 (id=3089): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) (async) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='+pids'], 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000780)={0x0, 0x0}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x80000000000, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) sigaltstack(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="8000000000000000000000000000000000000000004a0236606d96774efef43db9118057b1b147392618a3549ffe1bf12cd0a59f4d255ebd708f1c09cc7785995c5900000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x6, 0x15, &(0x7f0000001480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f900001ab703000008000000b704000000001500850000003300000095"], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x6, 0x15, &(0x7f0000001480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f900001ab703000008000000b704000000001500850000003300000095"], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef82, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file1\x00', 0x50, &(0x7f0000000280)={[{@usrquota}, {}, {@nobh}, {@user_xattr}, {@dioread_nolock}]}, 0x1, 0x3ee, &(0x7f0000000c80)="$eJzs3MtuG1UYAOB/JjeSXhwkFqiwiABBEJDUgQBFSBS2XDbAA0RJWircpmqMREsWBbFixQKxY9EXYMEDVBVCQuIVeAFUqUJpFrALmvGM4yZ2iGWnTp3vk0Y+Z3yc//weZ3TOeHwCOLZmIuJ8RIxExEJEVIr9abHFzcaWtbu/ubG8tbmxnMT29sd/J5EU+8q/lRSPJ4rKbBqRfhvx1M29cdev3/h8qVZbvVbU5+uXr86vX7/xyqXLSxdXL65eqb5xrlpdXHiz+lrfcv3xuRfPjbx3/sxPf1buLI6PT2b9PVk815pHv8zETPM92W2x38EGbHzQHQAA4EDSYuw/mo//KzGSlxoqMb8x0M4BAAAAfbH9TvEIAAAADLHE3B8AAACGXHkfwP3NjeVyO9CNA5VDuyXhobr3bkRM7/y2eauZ/2g8VrQZO8Tft85ExNXnk0q2xSH9DhkAoNWdbPxztt34L40nW9pNROTjock+x5/ZVc/jT7TuSe/2OeQDsvHf2xGxtWf8l5ZNpkeK2ql8qDiWXLhUWz0bEacjYjbGJrJ6dZ8Y7//z80ednsvy/y05dbrcsvjZ406L9O7oxIOvWVmqL/WSc6t7X0ecGW2Xf9Ic/yYRMdVDjJGvbr3V6bn/z/9wbd+KeKHt8d9ZuSfZf32i+fzzMF9+Kvb695tfPuwUf9D5Z8d/av/8p5PW9ZrWu49x+7M/ns4LbbJqnf908/kfTz7Jy+W87Mulev1aNWI8+WDv/oWd15b1sn2W/+yz7f//y/NfUqxpdbI4B3Tru+9/fXn/Fo38sy2LX84FH4Ys/5Wujn/3hddv//5pp/itx799/tnxb6wBNlvsOcj576Ad7OW9AwAAgEdFml/XSNK5ZjlN5+Ya1zueiKm0trZef+nC2hdXVhrXP6ZjLC2vdFVarodWG1+jN+sLu+qvRsTjEfFDZTKvzy2v1VYGnTwAAAAcEyc6zP8zfw3JPf4AAABA8UU9AAAAMNzM/wEAAGCo9bKu3/EtZO/cEejGkS88czS6MYDCWByJbvRQGPSZCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4NH2XwAAAP///T6zAw==") creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x200, &(0x7f0000000140)) r7 = open(&(0x7f0000000100)='./bus\x00', 0x14113e, 0x39) write$binfmt_script(r7, &(0x7f0000000080), 0x208e24b) (async) write$binfmt_script(r7, &(0x7f0000000080), 0x208e24b) r8 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x6, 0x0, &(0x7f0000001c00)) (async) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x6, 0x0, &(0x7f0000001c00)) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$nl_xfrm(0x10, 0x3, 0x6) 2.577400689s ago: executing program 0 (id=5095): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000cf3ff8f70000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000080)='./bus\x00', 0x300001a, &(0x7f0000001ec0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r4, @ANYRES8=r5, @ANYBLOB="bb959014fe42bd878edddb9788f4cec96dd69d130caf3587695510e2e5987ce4e8cbaff59efc3d3c58c0c3439984819fc27464bed0d18293eda9357efd79ab67bf796f5164692cf674a118050b7e8ff6eb204c5edb96fbd5ceda7b64ad7d0fea8dc14cc2c51d75c9d7f9da697eb093587e71b198fa9138a6df88de934750de851b955b1bdc4ab72d5ef6bd1f12dee6476705b678d54b3a090958e506f98abb503521dd4c874d61017a6ec5a772fa084b992fc638e44ebe8261b74243d71c88146ffffeb84b108e736f"], 0xd, 0x2a7, &(0x7f0000000f00)="$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") close(r5) creat(&(0x7f0000000380)='./bus\x00', 0x80) write$binfmt_misc(r4, &(0x7f0000000000), 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe6, 0x0) dup3(r2, r1, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket(0x400000000010, 0x3, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r9, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001300)=@newtfilter={0x38, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r9, {0x0, 0x1}, {}, {0x7}}, [@filter_kind_options=@f_fw={{0x7}, {0xc, 0x2, [@TCA_FW_CLASSID={0xfffffffffffffd51, 0x1, {0xf, 0x10}}]}}]}, 0x38}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x10, &(0x7f0000000980)=ANY=[@ANYRES32=r1, @ANYRESDEC=r4], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000840)='sys_enter\x00', r10}, 0x18) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3c, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000100)}, 0x0, 0x3, 0xffff, 0x8, 0x0, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet6(0xa, 0x1, 0x8010800000000084) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r11}, 0x38) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000cf365f620000000085000050a6c25dc975dde500", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r12, 0x0, 0x2}, 0x18) r13 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000180)={'geneve1\x00', 0x0}) sendto$packet(r13, &(0x7f00000002c0)="1441c05465f0006fc8afa8e40800", 0xe, 0x0, &(0x7f00000000c0)={0x11, 0x0, r14, 0x1, 0x0, 0x6, @multicast}, 0x14) 2.398071469s ago: executing program 3 (id=5100): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xa, 0x4, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv2(r4, &(0x7f00000004c0), 0x0, 0x867, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000340)={0x0, r2, 0x4, 0x80000001, 0x81, 0x9}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000092a7375f23c8a3870a67d8bc761f0f0d005fb26e732b5ad5b4d65ae644f88032c2a2d327073eba63f4a0a0bfde34cf885b4b4adbef40fd352853dfb6dcda4e80a5c829ea1d346c6d5932a7a5ffe42ecf3187dab669265843102ae34c7c628e1efec96126b408f751f940b5ebd1eeb68006ea9c032ef97814b1247fbfab9bdfb89b7cf886974670fa0c3839c47da530c13129b7207a1315d663386b431af6", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) creat(&(0x7f0000000040)='./file0\x00', 0x0) msgget$private(0x0, 0x298) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="dc", 0x1}], 0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = getgid() r7 = geteuid() mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x80, &(0x7f0000000680)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_mmap}, {@cache_mmap}, {@cache_loose}, {@uname={'uname', 0x3d, '*/'}}, {@dfltgid={'dfltgid', 0x3d, r6}}, {@dfltuid={'dfltuid', 0x3d, r7}}, {@cache_fscache}, {@uname={'uname', 0x3d, '/proc/sys/net/ipv4/tcp_congestion_control\x00'}}], [{@smackfsdef={'smackfsdef', 0x3d, '\'{u(\\*'}}]}}) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x40000, &(0x7f0000000600)={[{}, {}, {@mode={'mode', 0x3d, 0x1ff}}, {@mode}, {@gid}, {@gid={'gid', 0x3d, r6}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0xfff}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, '{+'}}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000500)=0x100000001, 0x4) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000440)='./file1\x00', 0x4000, &(0x7f0000000140)={[{@journal_dev={'journal_dev', 0x3d, 0x8}}, {@nogrpid}, {@init_itable}, {@dioread_nolock}, {@errors_remount}]}, 0x2, 0xbb8, &(0x7f00000017c0)="$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") r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioperm(0x7, 0x81, 0x8) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r9 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r9, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@version_u}]}}) 2.144342708s ago: executing program 3 (id=5105): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000f40), r2) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x34, r3, 0x1, 0x7ffffc, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}]}, 0x34}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000000019000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000007b00000000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="020300001b0000000000000000000000040003000000000000000000000000000000000000000000000000000000000005000600000000000a00000000000000fe8000000000000000000000000000bb00000000000000000400040000000000000000000000000000000000000000000000000000000000020001000000000000000000000000ff05000500000000000a00000000000000fe8896380000000000000001000000010000000000000000030007000000000002004e24ac14141f0000000000000000020013"], 0xd8}}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)={0x44, 0x0, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0xb}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x8) r8 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000200)={[{@grpquota}, {@auto_da_alloc}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x50c, &(0x7f0000000ac0)="$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") r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.idle_time\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r9, 0x40086602, &(0x7f0000000040)=0x80) openat(r8, &(0x7f0000000540)='./bus\x00', 0x4a0801, 0x80) write$binfmt_script(r9, &(0x7f0000000380), 0x208e24b) ioctl$EXT4_IOC_MIGRATE(r9, 0x6609) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r10}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) 2.024405117s ago: executing program 4 (id=5108): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x5, 0x1c, 0xe8, 0x0, 0x5, 0x2, 0x0, @private=0x500, @private=0xa010100}, @address_request={0x11, 0x2}}}}}, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x29, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1100}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="4b090000fd9493205c7b6bec24d847da4c95f112fb3b8ba3140a9468f696ebbe5b511e7fa3f83b517db632f482e93d0ee52adef0ee8dc08deb7c5ffd2738f748df5b6e70dd5ca034c140c1b255c3b6c3ac9e3742bd804cd100fb4028bac2bc5dd32240cceb1f0f7ae36a716d4bbf48f9e09c8a5091a34f570fce3c9bfcac73f80f549fd98f694022978402f4cc9fa1abbe5835eae27ad5bf8b"], 0x9) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x80000000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}, @in6={0xa, 0x4e24, 0x7b8b, @mcast2, 0x10000000}], 0x38) 1.926903287s ago: executing program 1 (id=5110): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000140)={[0x9]}, 0x8) r1 = syz_io_uring_setup(0xddf, &(0x7f0000000300)={0x0, 0x0, 0x10100, 0x0, 0x242, 0x0, r0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x3, r0}) io_uring_enter(r1, 0x353, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) r6 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r7, 0x5452, &(0x7f0000000180)=0xffffffffffffffff) fcntl$setsig(r7, 0xa, 0x12) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000200)={0x0, r9+10000000}, 0x0) ppoll(&(0x7f0000000100)=[{r8}], 0x1, 0x0, 0x0, 0x0) dup2(r7, r8) fcntl$setown(r8, 0x8, r6) tkill(r6, 0x13) 1.919387687s ago: executing program 3 (id=5111): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002078316e00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000006000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$nci(r1, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001a40)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010000000000fdffffff0200000008000100", @ANYRES32=r2, @ANYBLOB="331a81ada975fcc9e902a51082b7a5c50f213f51e32b541fc619ba671c04361397e121d972af82ed1596233ee5f0222de24e7817f45d6ef35d922e206573344055f53e247a009f4e8604e22e285dd84878d0895d344220be896ac98b4426ed29e28d90a48909e169c53735d39c18369e90a1148a6d927c55c22f06fdea4ba550179b11c180b1340b5115a575a91fd631552dbfa530136088beeee35bef8cc28d4e581495cc0a36600eb113d34ac9952b9dc8b4afb17c32373d8e081b476b0e603820ce56a28e180400fde948a0667007cc2ea14381c2f136d37c96f447"], 0x1c}}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket(0x40000000015, 0x5, 0x0) connect$inet(r6, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r6, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$NL80211_CMD_JOIN_MESH(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYRESHEX=r5], 0x1a000}}, 0x0) read(r6, &(0x7f0000000a40)=""/4096, 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa1000000000000070100000000b70300000000a5df850000002d000000955f547b591d1dfdf9f6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000280)={0x0, 0x9, 0x3da0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000003d00000095"], &(0x7f00000000c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=ANY=[@ANYBLOB="1200000004000000080000000b00000000000000", @ANYRES64=0x0, @ANYRESOCT=r8], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000001d80)=ANY=[@ANYRESOCT=r7, @ANYRES32=r9, @ANYRESHEX=r4, @ANYRES32, @ANYBLOB="6f1955a3462866b296ee077b83e3", @ANYBLOB="ebe21f39896ffbab4e8645f12c6a80b88803da4ffb6860809ba797c9963a1667388f485612098e70c588b4747c49c880b5a68e38545b05ad5b27e34af88c042e895673231b1dc617f2d007a3901f53d27d8aa207e035be", @ANYRES32=r4], 0x10) sendmsg$IPCTNL_MSG_EXP_GET(r6, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000540)={&(0x7f0000000780)=ANY=[@ANYBLOB="1400000001020101000000002c00a348532d0a000000e90007d9262ea25c599a7ccb9c800442cdfff43bb42e081858472a5f675b9eeda0423ca1cc74c22b1a45f4cd4dc20696e7dc39070250fd1c18f256ac65c258af8c36577cf28a2fcf0d6adc2d610c7a53a9e823a7a76cdb5df622b73bfa66822c4678a02162ef7d9f7ddb2caeb2f56047a15056be397a2fb8ccfe0deff4df8678fa0697dd85f4d00b1812e3b3a78fa237cc7800840309518d3408ba9115745305ee3e033b74a2d5059b4ab4e21cead913b5f3369f7f03d61ed0c5708b4a2a270a9f670dc7b54bc04b6466b7136e8c61a7871a0291c307885b9f5ef9fcedfd4806200a"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x20040840) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r10, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r8}, 0x20) r11 = fcntl$dupfd(r8, 0x0, r9) sendto$inet6(r11, &(0x7f0000000280)='t', 0xf4240, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001e40)=ANY=[@ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x46844}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r0, 0x0, 0x2}, 0x18) 1.856919537s ago: executing program 4 (id=5112): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000007c0)='kfree\x00', r1}, 0x18) r2 = socket$inet_smc(0x2b, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000800)={'filter\x00', 0x10, 0x4, 0x3f0, 0x110, 0x0, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="e5fce0c960bc", @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x1e}, 0xf, 0xffffffff}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x2}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @broadcast, @loopback, 0x1, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @broadcast}, 0x9) 1.816293216s ago: executing program 4 (id=5113): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x2) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000440)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="dc", 0x1}], 0x8) r5 = dup(r1) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000240)={0x80, 0x6, 0x300, 0x0, 0x0, 0x0, 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r7, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x28, r6, 0x10ada85e65c25359, 0x0, 0x8000000, {{0x6b}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x72}}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(r5, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x4c, r6, 0x1, 0x70bd29, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x7d}}}}, [@NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "950a385e08"}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "03d68b46131bb6b3feb6149233"}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8010}, 0x8060) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r9}, 0x10) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="640000000206050000000000000000000000000015000300686173683a69702c706f72742c6e6574000000000900020073797a30000000000500040000400000050005000a000000050001000600000014000780080006400000000008001340"], 0x64}}, 0x24002800) sendmsg$IPSET_CMD_DESTROY(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000030601020000000000000000000000000500010007"], 0x1c}}, 0x0) 1.815312256s ago: executing program 4 (id=5114): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000490000000000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000008c0)="89", 0x0}, 0x32) 1.798769367s ago: executing program 4 (id=5115): socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r1}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0xfd, 0x0, 0x7fff0000}]}) getrusage(0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000640)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, r2, 0x0) r3 = gettid() rt_sigtimedwait(&(0x7f0000000080)={[0x3ff]}, &(0x7f0000005c80), 0x0, 0x8) tkill(r3, 0x7) fspick(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b81, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000fedbdf25080000001800028014000380100001800400030008000100050000000c00018008000100", @ANYRES32=r6], 0x38}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000006000000090000000800000000000000", @ANYRES32, @ANYBLOB="00001f0000000000994a7ca50000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYRES8=0x0], 0xb4}, 0x1, 0x0, 0x0, 0x4004805}, 0x14) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r9, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000300)={{{@in=@multicast1, @in=@private=0xa010101, 0x4e24, 0x4, 0x4e20, 0x0, 0xa, 0x80, 0x0, 0x6, r8, r9}, {0x7fffffffffffffff, 0x8, 0x8000, 0x3, 0x7, 0x2, 0x0, 0x29e5}, {0x10001, 0x3, 0x6, 0x6}, 0x694, 0x6e6bb9, 0x2, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x4d6}, 0xa, @in=@broadcast, 0x3506, 0x3, 0x0, 0x6, 0x4, 0xff, 0x2}}, 0xe8) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0xc020660b, &(0x7f0000000280)={0x400, 0xffffffff001, 0x5, 0x100000}) 1.313591485s ago: executing program 6 (id=5119): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2014800, 0x0) creat(&(0x7f0000000240)='./file0/bus\x00', 0x0) 1.312783324s ago: executing program 6 (id=5120): r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r4}, 0x10) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)=r3}, 0x20) (async, rerun: 64) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f0000000140)='./file0\x00') (rerun: 64) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x515a02, 0x52abe154ad664f66) 1.211631295s ago: executing program 6 (id=5121): r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1e000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff1f, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x20, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, [@ldst={0x1, 0x0, 0x4, 0x2, 0x1, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(r0, &(0x7f0000000540)={&(0x7f0000000200)=@name={0x1e, 0x2, 0x2, {{0x40, 0x4}, 0x4}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x4014050) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@fallback=r2, 0x0, 0x0, 0x8800000, &(0x7f0000000080)=[0x0], 0x1, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0]}, 0x40) r4 = inotify_init() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, &(0x7f0000000140)=0x7, r5, 0x0, 0x8, 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) unshare(0x2a020400) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) vmsplice(r8, &(0x7f00000000c0)=[{&(0x7f0000000200)='=', 0x1}], 0x1, 0x0) unshare(0x68040200) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x8205, &(0x7f0000000480)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x8}}, {@data_err_abort}, {@minixdf}, {@errors_remount}, {@abort}, {@noblock_validity}, {@barrier}, {@journal_dev={'journal_dev', 0x3d, 0xf35}}]}, 0x1, 0x618, &(0x7f0000000640)="$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") perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x3f8, 0x0, 0x940c, 0x3002, 0x0, 0x2c0, 0x328, 0x3d8, 0x3d8, 0x328, 0x3d8, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @private1, [0xffffff00, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xffffffff, 0xff000000, 0xff], 'geneve0\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x11, 0x81, 0x6, 0x1d}, 0x0, 0x1d0, 0x1f0, 0x0, {}, [@common=@srh={{0x30}, {0x2b, 0x2, 0x5, 0x4, 0x6, 0x401, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz0\x00', 0x4}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x2, 0xfffffffc, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r6, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000d00)={r10}, 0x4) recvmsg$can_raw(r3, &(0x7f0000000c80)={&(0x7f00000002c0)=@nl=@unspec, 0x80, &(0x7f0000001840)=[{&(0x7f0000000580)=""/243, 0xf3}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f00000008c0)=""/235, 0xeb}, {&(0x7f0000000b00)=""/185, 0xb9}, {&(0x7f00000009c0)=""/127, 0x7f}, {&(0x7f0000000680)=""/1, 0x1}, {&(0x7f0000000bc0)=""/148, 0x94}, {&(0x7f0000000840)=""/51, 0x33}, {&(0x7f0000001740)=""/233, 0xe9}], 0x9, &(0x7f0000001900)=""/4096, 0x1000}, 0x40002002) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.189597615s ago: executing program 6 (id=5122): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_buf(r4, 0x1, 0x1f, &(0x7f0000000040)=""/195, &(0x7f0000000140)=0xc3) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)={{0x1, 0x1, 0x18, r6, {0x8, 0x9}}, './bus\x00'}) process_madvise(r7, &(0x7f0000000400)=[{&(0x7f0000000340)="97c2e7a6c9410dc0ff3f657bd738decb4be336f7e6aab346cfe5856629a7a34d5cc9eac67902124b13187a6f4d7c1e251e86163c320158d86449f326dfbea00df8c34ffaae782434f02fa3e694b1ec3084ca2b026dfdb8685da7b267", 0x5c}], 0x1, 0x1c, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000080)={'batadv_slave_1\x00', {0x2, 0x0, @remote}}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x0, &(0x7f0000000080)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}], [{@flag='nomand'}]}, 0x64, 0x529, &(0x7f0000000a40)="$eJzs3c9vI1cdAPDvOPF2s5ttUuAARZRCi3ZXsPamoW3EoRQJwakSUO5LSLxRFCeOYqfdWBXJij8ACSFA4gQXLkj8AUioEheOCKkSnEGAQAi2cOBQOmjscZpNxol3ceNs/PlIk3lvfvj7nqM3njfzNBPA2Ho6Il6OiHfTNL0eETP58lI+xV53yrZ7+94bS9mURJq++o8kknxZ77OSfH453+1iRHztyxHfTI7Gbe601xbr9dpWnq+21jerzZ32jdX1xZXaSm1jfn7uhYUXF55fuDmUel6JiJe++Jfvf+enX3rpl595/Y+3/nbtW1mxpvP1B+vxgCaPW9mp+keP7rD1kMHOoqw+5V5mqmiLiSNL7r7PZQIAoFh2jv+BiPhkRFyPmZg4/nQWAAAAeASln5+Od5KItNiFPssBAACAR0ipMwY2KVXysQDTUSpVKt0xvB+KS6V6o9n69O3G9sZyd6zsbJRLt1frtZv5WOHZKCdZfq6Tfi//3KH8fEQ8ERHfm5nq5CtLjfryqC9+AAAAwJi4fKj//++Zbv8fAAAAOGdmR10AAAAA4H2n/w8AAADnn/4/AAAAnGtfeeWVbEp7779efm1ne63x2o3lWnOtsr69VFlqbG1WVhqNlc4z+9ZP+rx6o7H52djYvlNt1ZqtanOnfWu9sb3RurXaeR04AAAAMAJPfPzN3ycRsfe5qc6UuTDYrgNuBpxVk/upJJ8XNOs/PN6d//mUCgWciolRFwAYmclRFwAYmfKoCwCMXHJ/9ki3oO/gnd/k808Mv0wAAMBwXf1I//v/pWP33Dt+NXDmacQwvtz/h/HVuf8/6EheJwtwrpSdAcDYO3D/P90tWH/i/f8TpemDlwoAABim6c6UlCr55b3pKJUqlYgrndcClJPbq/XazYh4PCJ+N1N+LMvPdfZMDo8ZBgAAAAAAAAAAAAAAAAAAAAAAAAD6SNMkUgAAAOBciyj9NflV91n+V2eenT58feBC8p+ZyF8R+vqPXv3BncVWa2suW/7P/eWtH+bLnxvFFQwAAAAYCw/0Av9eP73XjwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAYXr73htLvek04/79CxExWxR/Mi525hejHBGX/pXE5IH9koiYGEL8qezPh4viJ1mx9kMWxZ8aQvy9u8fGj9n8WyiKf3kI8WGcvZkdf14uan+leLozL25/kxH35R9W/+Nf7B//Jvq0/ysDxnjyrZ9X+8a/G/HkZPHxpxc/6RP/mQHjf+Pr7Xa/demPI64W/v4k98WqttY3q82d9o3V9cWV2kptY35+7oWFFxeeX7hZvb1ar+V/47GCGN/92C/ePa7+l/rEnz2h/s8OWP//vnXn3ge7yXJR/GvPFMT/9U/yLY7GL+W/fZ/K09n6q730Xjd90FM/++1Tx9V/uU/9i///u/v1vzZg/a9/9dt/GnBTAOAUNHfaa4v1em3r3CayXvoZKMY4Jd5Jz0QxTk7sttcW091htYI0TdOsTf0fn5PEWfhaOolRH5kAAIBhe++k/6F2vzj0AgEAAAAAAAAAAAAAAAAAAMAYOo3HiR2OubefSobxCG0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgKH4XwAAAP//X6XccA==") 1.129563464s ago: executing program 1 (id=5123): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="4b090000fd9493205c7b6bec24d847da4c95f112fb3b8ba3140a9468f696ebbe5b511e7fa3f83b517db632f482e93d0ee52adef0ee8dc08deb7c5ffd2738f748df5b6e70dd5ca034c140c1b255c3b6c3ac9e3742bd804cd100fb4028bac2bc5dd32240cceb1f0f7ae36a716d4bbf48f9e09c8a5091a34f570fce3c9bfcac73f80f549fd98f694022978402f4cc9fa1abbe5835eae27ad5bf8b"], 0x9) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x80000000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}, @in6={0xa, 0x4e24, 0x7b8b, @mcast2, 0x10000000}], 0x38) 1.103665854s ago: executing program 1 (id=5124): r0 = socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000007c0)=@newtaction={0x1a4, 0x30, 0xffffffffffffffff, 0x0, 0x0, {}, [{0x190, 0x1, [@m_bpf={0x4c, 0x1, 0x0, 0x0, {{0x8}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1}}, @TCA_ACT_BPF_FD={0x8}]}, {0x4}, {0xc}, {0xc}}}, @m_ct={0x140, 0x9, 0x0, 0x0, {{0x7}, {0x20, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @private=0xa010100}, @TCA_CT_LABELS_MASK={0x14, 0x8, "94dceb4b50a510809d5319f386ccce5e"}]}, {0xfa, 0x6, "51b65d0c59ffd5fe52fcf69d1e4b53da62131b26267d36a52608f0acf4d3408b04af803acea6fdab446907968167a0539fafcd7874451ebae30b66391da1c777f8af239980b035db6c764716c7559ea456201da3a287d4ff6f0236349fa767b53dcafc62854aa02486d0cb958927a6891ee6d5f4eb39661596da30d826e57a3511f268944a562eee3307c926813bf082f7443d46a033d23b0e18680d0c7ccddbc55d4da02b6a6350e07e944aae83dd3864186e41292c6ac1b138ededb0fe373fc7e78692008daa45246cf8d28d84bfbbfade5ba70c572d77848cabb93457865545212ffc2d26ada340e731efde31b0b2ce7ddcce16e6"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}]}, 0x1a4}}, 0x0) (fail_nth: 8) 752.064023ms ago: executing program 1 (id=5125): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/ldiscs\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f00000004c0)='./file0\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0xfd, 0x1bf, &(0x7f0000000300)="$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") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) 751.058643ms ago: executing program 4 (id=5126): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) r3 = socket$kcm(0x10, 0x2, 0x4) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000000000070200000000cd5806e0a3b4df49000052089ca3a0c9238f91261ce88c30a125145ffde3c2aacc7700603c3be94626bec559313a25c13db8395ea26954b32a69477f3c33bdac3f468b52ae2827edf17d36b25b64b95554b3720a1fce6dc6c01bef1bdc313c41e496df80a8f4f7133a48870753ca4cd937afdef28bb085d0ccb7e69580b8de79f0adba055880750340e536f1e698f89f9bc91b552c051bbdee1c50863487a5f148e58bf8b93259bdd0319cee1d0200829596276e567f391d31ceb0bdd41856a60d58916617a37acbec2a65e5c8de535c11e6ae5531cc3c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r5, 0x84, 0x81, &(0x7f0000000240)="1a00000002000000", 0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000440), &(0x7f0000000540)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) clock_nanosleep(0xfffffff2, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file1\x00', 0x14542, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000001280)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./bus\x00', 0x1c3002, 0x162) write(r7, &(0x7f0000004200)='t', 0x1) sendfile(r7, r6, 0x0, 0x3ffff) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r8, &(0x7f0000000000), 0x6db6e559) fcntl$notify(0xffffffffffffffff, 0x402, 0x8000003d) clock_gettime(0x0, &(0x7f0000000180)) close(r3) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="e03f030013006bcd9e3fe3dc6e48aa31086b8700350000007ea60264160af3653c002e000d000af08bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000280)='ext4_free_blocks\x00', r0}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000940)={[{@user_xattr}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@auto_da_alloc}, {@block_validity}, {@quota}]}, 0x3, 0x434, &(0x7f00000002c0)="$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") 644.461272ms ago: executing program 0 (id=5127): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000c80)=@mangle={'mangle\x00', 0x64, 0x6, 0x568, 0xe8, 0xe8, 0xe8, 0xe8, 0x1d0, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'dvmrp0\x00', 'veth1_virt_wifi\x00', {0xff}}, 0x0, 0xa8, 0xe8, 0x0, {0x7a00000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x9, {0x4}}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'syzkaller1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private0}}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [0xff], [], 'veth1_to_batadv\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty}}}, {{@ipv6={@private0, @mcast2, [], [0x0, 0x0, 0x0, 0xff000000], 'veth1_to_team\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5c8) 595.135932ms ago: executing program 3 (id=5128): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r0, @ANYRES32=r0, @ANYRES8=0xffffffffffffffff], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, 0x0, &(0x7f0000000340)=r1}, 0x20) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES64=r4, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000480)='svc_xprt_dequeue\x00', r5}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29, 0xffffffffffffffff}, './file0\x00'}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(r6, 0x80247008, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) 384.730842ms ago: executing program 3 (id=5129): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = io_uring_setup(0x67bb, &(0x7f00000000c0)={0x0, 0xfffffffe, 0x3000}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSSOFTCAR(r4, 0x5453, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) io_uring_enter(r3, 0x0, 0x0, 0xf, &(0x7f0000000000), 0x18) sendmsg$NFC_CMD_DEP_LINK_UP(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="01002abd70004cb1b158a2c6f3fbdbd5f96b1404d72dd899de7cf9ddfba81fc4aef53e65c2e88fc108182cb75cf5b1495ed39b721c458010091c89dff421849595bd7eda"], 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) uname(&(0x7f0000000100)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a00000014000780050015000000000008001240"], 0x60}}, 0x0) 327.781681ms ago: executing program 1 (id=5130): r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x18) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578"], 0x65) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f00000001c0)=""/113, 0x71, 0x0, &(0x7f0000000080)=""/48, 0x30}}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') read$eventfd(r8, &(0x7f0000000100), 0xfffffd79) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0xfffffffffffffec2, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) unshare(0x24040000) unshare(0x2c020400) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000b946db1118110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r11, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xac}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r11, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac0000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8000000000000000000000000000aa0c00028005000100000000000800074000000000180006801400040020010000000000000000000000000001"], 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x4000894) 309.465581ms ago: executing program 6 (id=5131): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0xfffffffffffffee4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000a80)='net/vlan/config\x00') preadv(r1, &(0x7f00000024c0)=[{&(0x7f0000002dc0)=""/4088, 0xff8}, {&(0x7f0000000440)=""/104, 0x68}, {&(0x7f0000000cc0)=""/148, 0x94}, {&(0x7f0000000ac0)=""/20, 0x14}, {&(0x7f0000000d80)=""/246, 0xf6}, {&(0x7f0000000f80)=""/4096, 0x1000}, {&(0x7f0000000e80)=""/94, 0x5e}, {&(0x7f0000001f80)=""/235, 0x104}, {&(0x7f0000002080)=""/239, 0xef}, {&(0x7f00000025c0)=""/38, 0x26}, {&(0x7f00000021c0)=""/190, 0xbe}, {&(0x7f0000002280)=""/241, 0xf1}, {&(0x7f0000002380)=""/216, 0xd8}, {&(0x7f0000002480)=""/56, 0x38}], 0xe, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="00c7d77c0000b7084bb3000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095fefb1a4877a7c63c3383a1c64771f845e0f0c880c3534dac01329ad83e09faa66c4fba5f1c3099e810300459bed2197f1238e6960bc5f16b8c4b2863df59c3fc5ca25b222cef83eef9554909bcf96d4a6f6be070bab0dfa0c66bc5a6b12b2edf3b2a240c5015dc99f485a8d79ba8c58f9c4a35b2953d115fd0ac8098cef05e37619592c5f7c11287398cbf0d9b298b57a0224b725b7b42718d"], 0x0, 0x77, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x1e8, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8, 0x0, {0x200003ae, 0x7f00}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x248) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x13, &(0x7f0000000900)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100e89392600007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c25000000c9ccb66dba6863e47d84a52ea792dcfe000020384e8d539b56694ffaa26eb871bb207b1af8ff00000000bfa100000000e1ff06070000f8ffffffb702000008000000b70300000000000085000000100000009591f7a3c808666dec50faeb4bb65369a89af96b5e7fd38663cc5d96004d15401e3934628b30b273f7398fd21ed109cbed66fab8fbecf6a155e71b04c227a5ee9f332439a825e29a09c444fd6111fe48ce8a75f0cecd2aa67b88e21ac66b9e2545bf10942db31e3a08518324df4830c5b6cbddf8b631045128cdf7f16f48df27fcb248b3a660a6a3c561270e180de96cc4ffc8e1b347d77ad5226a33be2b927106849acffd769f3dc6823cdcd690"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x46, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) r7 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) fsync(r7) r8 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)=0x0) timer_settime(r9, 0x0, &(0x7f0000000280)={{}, {0x0, 0x3938700}}, 0x0) readv(r5, &(0x7f0000000840)=[{&(0x7f0000000080)=""/41, 0x29}], 0x1) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000002600)={'#! ', './file0', [{0x20, '(}&'}, {0x20, '/*:'}, {0x20, '.@^^\'\x98('}, {0x20, 'cgroup.controllers\x001\x85\x9e\xbf\x90\xef\xce\x01Y\x8c\xf3\x00\x00\x00\x00\x00\x00\x00\xe4\x82\xee(\x01\xb1\x1d\x7f\xb8P\"\xb3\xa4\v\xab\xf3\xb4\xb7\xa7|\x84p\x83\xaaW\xa2\xca\x1d\xd3ya\xeb\r\x91\xa2u\xd2R\xc1\xbc\b\x1c\xd2\xdb\x0f\"\xe2\xe2\xd2\xce\x17\xb8k1)\x1a\xa4\x9a\xdb\\\xc8\x182k\xa1\xce\xe3T\a9\xac9$\xb72\xda\x91\xb51i\xd9\xb6\xceF5<\x92\\\xd4\t%]\xc2}1\x7f\xcf\xfb\xad\x82\n]'}, {0x20, 'MARK\x00'}, {0x20, 'veth0\x00'}, {0x20, '#}$/\r'}, {0x20, 'm^$'}]}, 0xbe) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r10, 0x0) (async) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r11, 0x29, 0x20, &(0x7f0000000880)="0bbb268dd6ffa80800000000007cbeb3b84754a3b46711109e0a300000000000210d0000aaa8fa017242ba9380d4400e745c4280f4dac600000034000000", 0x3e) r12 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r12, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021602000e0000002dbd7000ffdbdf250c001800eeb358007e877e18486a8cd1dc2efb321241bb6403d9db9a3ae11acdaa8ec6f2f6c054deb2e3e471f8876263d3845d9a89ffc3927cc6419e36a4fbbbde814da63198a38f163ee67e372bfd7fbd50e759679c6dd2c51d3e841b7a5e00"], 0x70}}, 0x34044801) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) r13 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r13, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 280.530171ms ago: executing program 1 (id=5132): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0500000004000000ff0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000dc0)={0x14, r4, 0x5, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000010c0)={0x3, 0xc, &(0x7f0000000f80)=ANY=[@ANYRESDEC=r4, @ANYRESHEX=0x0, @ANYRES64=r1, @ANYBLOB="598f4b66b0df7378bfac2a43602293871e7a45f1791d65d3e6cc28cd60008fe4a8eec8305188fdfac5766a8bdb58fd25a4c119adfc387c8ae0ea76c373566aa38ada3cbfeb98b85b434c9fdd39d8b8c369cfcab908216e97fa3e1a66f636189995776b8d4cd284bb151f4875cc8873a64da0e5513804934e818b6418abe67ebe434e9472936431960d95b2b890f02d6124a5cdfbe3d95921f78c852fb95784352a6e3422c24f95b00ecf0c7e6aa42b05e5cb98bbb9d2c58a54ca5271f535867076d024d436acd9e2134cc73b60da5bd2522bafec07633154b42e3dac9310d095128db8a2b6fe17705e560679d0a268", @ANYRES16=0x0, @ANYRES32=r0], 0x0, 0xfffffffc, 0xfffffffffffffde3, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000001200)={0x1c, r4, 0x320, 0x70bd27, 0x25dfdbfe, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) recvmmsg(r2, &(0x7f00000057c0)=[{{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f00000003c0)=""/31, 0x1f}, {&(0x7f00000017c0)=""/130, 0x82}], 0x2}, 0xa1}], 0x2, 0x0, 0x0) 277.410031ms ago: executing program 3 (id=5133): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, 0x0, 0x7, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000570000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001400b59500000000000000000a000000", @ANYBLOB="14000200fe"], 0x48}}, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[], 0x50}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x4000000000001f2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x1200000, &(0x7f0000000940)={[{@noblock_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@noquota}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x1, 0x57e, &(0x7f0000000f40)="$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") setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file1\x00', &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) llistxattr(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 229.231951ms ago: executing program 6 (id=5134): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000140)={[0x9]}, 0x8) r1 = syz_io_uring_setup(0xddf, &(0x7f0000000300)={0x0, 0x0, 0x10100, 0x0, 0x242, 0x0, r0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x3, r0}) io_uring_enter(r1, 0x353, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) r6 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r7, 0x5452, &(0x7f0000000180)=0xffffffffffffffff) fcntl$setsig(r7, 0xa, 0x12) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000200)={0x0, r9+10000000}, 0x0) ppoll(&(0x7f0000000100)=[{r8}], 0x1, 0x0, 0x0, 0x0) dup2(r7, r8) fcntl$setown(r8, 0x8, r6) tkill(r6, 0x13) 227.557081ms ago: executing program 0 (id=5135): pipe2(&(0x7f0000000040), 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000240)='./file0\x00', 0x18000, &(0x7f0000002f40)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16=0x0, @ANYRESDEC, @ANYRES32, @ANYRES32], 0x1, 0x2ee, &(0x7f00000006c0)="$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") r0 = inotify_init1(0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x400f4}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000060a0bfc0000000000000000020000000900010073797a30000000000900020073797a320000000014000000110001"], 0x54}}, 0x0) writev(r1, &(0x7f0000000040), 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) r3 = epoll_create1(0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40088a01, &(0x7f0000000000)=0x100) write$binfmt_script(r2, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) fdatasync(r2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x5dd469bd, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x5}, r5}}, 0x30) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fc0f00000a00000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000010", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x400}, 0x18) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001880)={{0x14, 0x10, 0x4}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}]}, @NFT_MSG_NEWSETELEM={0x6c, 0xc, 0xa, 0x301, 0x0, 0x0, {0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x40, 0x3, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_EXPRESSIONS={0x34, 0xb, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @quota={{0xa}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x9}]}}}, {0x10, 0x1, 0x0, 0x1, @last={{0x9}, @void}}]}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xf0}, 0x1, 0x0, 0x0, 0x10}, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioperm(0x7, 0x63, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) 143.796571ms ago: executing program 0 (id=5136): openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) (async) r0 = socket$kcm(0x2, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) (async, rerun: 32) sendmsg$inet(r0, &(0x7f0000002400)={&(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10, 0x0}, 0x24000891) (rerun: 32) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x8000}, 0x8) (async) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$bt_hci(r1, 0x84, 0x7f, &(0x7f0000000080)=""/4057, &(0x7f0000001180)=0xfd9) clock_gettime(0x0, &(0x7f0000000000)) (async) clock_gettime(0x0, &(0x7f0000001080)) (async, rerun: 64) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (rerun: 64) recvmmsg$unix(r2, &(0x7f00000029c0)=[{{&(0x7f0000002480)=@abs, 0x6e, &(0x7f0000002880)=[{&(0x7f0000002500)=""/85, 0x55}, {&(0x7f0000002580)=""/202, 0xca}, {&(0x7f0000002680)=""/158, 0x9e}, {&(0x7f000000b0c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/205, 0xcd}, {&(0x7f000000c0c0)=""/4096, 0x1000}, {&(0x7f0000002840)=""/14, 0xe}], 0x7, &(0x7f0000002900)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}}], 0x1, 0x2002, &(0x7f0000002a00)) (async, rerun: 64) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000ae80)=[{{&(0x7f00000010c0)=@abs, 0x6e, &(0x7f0000002340)=[{&(0x7f00000011c0)=""/170, 0xaa}, {&(0x7f0000001280)=""/111, 0x6f}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000001140)=""/33, 0x21}, {&(0x7f0000002300)=""/14, 0xe}], 0x5, &(0x7f00000023c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f0000003640), 0x0, &(0x7f00000036c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{&(0x7f0000003800)=@abs, 0x6e, &(0x7f0000004900)=[{&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)=""/128, 0x80}], 0x2, &(0x7f0000004940)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000004a00), 0x6e, &(0x7f0000006cc0)=[{&(0x7f0000004a80)=""/4096, 0x1000}, {&(0x7f0000005a80)=""/71, 0x47}, {&(0x7f0000005b00)=""/108, 0x6c}, {&(0x7f0000005b80)=""/152, 0x98}, {&(0x7f0000005c40)=""/4096, 0x1000}, {&(0x7f0000006c40)=""/120, 0x78}], 0x6, &(0x7f0000006d40)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{0x0, 0x0, &(0x7f0000009f80)=[{&(0x7f0000006dc0)=""/47, 0x2f}, {&(0x7f0000006e00)=""/181, 0xb5}, {&(0x7f0000006ec0)=""/148, 0x94}, {&(0x7f0000006f80)=""/4096, 0x1000}, {&(0x7f0000007f80)=""/4096, 0x1000}, {&(0x7f0000008f80)=""/4096, 0x1000}], 0x6, &(0x7f000000a000)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{&(0x7f000000a080)=@abs, 0x6e, &(0x7f000000a540)=[{&(0x7f000000a100)=""/182, 0xb6}, {&(0x7f000000a1c0)=""/24, 0x18}, {&(0x7f000000a200)=""/200, 0xc8}, {&(0x7f000000a300)=""/229, 0xe5}, {&(0x7f000000a400)=""/47, 0x2f}, {&(0x7f000000a440)=""/209, 0xd1}], 0x6, &(0x7f000000a5c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}}, {{&(0x7f000000a600), 0x6e, &(0x7f000000a700)=[{&(0x7f000000a680)=""/76, 0x4c}], 0x1}}, {{&(0x7f000000a740), 0x6e, &(0x7f000000ac80)=[{&(0x7f000000a7c0)=""/160, 0xa0}, {&(0x7f000000a880)=""/74, 0x4a}, {&(0x7f000000a900)=""/149, 0x95}, {&(0x7f000000a9c0)=""/141, 0x8d}, {&(0x7f000000aa80)=""/185, 0xb9}, {&(0x7f000000ab40)=""/44, 0x2c}, {&(0x7f000000ab80)=""/236, 0xec}], 0x7, &(0x7f000000ad00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}}, {{&(0x7f000000adc0), 0x6e, &(0x7f000000ae40)}}], 0x9, 0x2041, &(0x7f0000000040)={0x77359400}) (rerun: 64) 0s ago: executing program 0 (id=5137): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000800}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@empty}, 0x14) close(r2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) socket$inet6_mptcp(0xa, 0x1, 0x106) execve(0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): pages_mpol+0xb4/0x260 [ 259.900331][T15685] vma_alloc_folio_noprof+0x1a0/0x310 [ 259.900374][T15685] do_wp_page+0x64b/0x2340 [ 259.900429][T15685] ? __rcu_read_lock+0x36/0x50 [ 259.900457][T15685] handle_mm_fault+0xc63/0x2ac0 [ 259.900515][T15685] exc_page_fault+0x3b9/0x650 [ 259.900535][T15685] asm_exc_page_fault+0x26/0x30 [ 259.900581][T15685] RIP: 0033:0x7f3e7cbcfc50 [ 259.900596][T15685] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 259.900626][T15685] RSP: 002b:00007f3e7b3704a0 EFLAGS: 00010202 [ 259.900644][T15685] RAX: 0000000000006005 RBX: 00007f3e7b370540 RCX: 000000000000001c [ 259.900736][T15685] RDX: 00000000000003cb RSI: 00000000000003cc RDI: 00007f3e7b3705e0 [ 259.900751][T15685] RBP: 000000000000001d R08: 00007f3e72f51000 R09: 0000000000000004 [ 259.900765][T15685] R10: 00000000200006c2 R11: 0000000000000448 R12: 0000000000000301 [ 259.900779][T15685] R13: 00007f3e7cda93e0 R14: 0000000000000013 R15: 00007f3e7b3705e0 [ 259.900801][T15685] [ 259.900810][T15685] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 260.075826][T15685] loop0: detected capacity change from 0 to 512 [ 260.091338][T15685] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 260.113266][T15685] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.4325: corrupted in-inode xattr: e_name out of bounds [ 260.182694][T15685] EXT4-fs (loop0): Remounting filesystem read-only [ 260.189322][T15685] EXT4-fs (loop0): 1 truncate cleaned up [ 260.206072][T15685] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 260.218659][T15685] SELinux: (dev loop0, type ext4) getxattr errno 5 [ 260.231912][T15685] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 260.459185][T15704] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 260.506836][T15706] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15706 comm=syz.0.4334 [ 260.519449][T15706] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=15706 comm=syz.0.4334 [ 260.799099][T15719] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 261.172659][T15730] netlink: 'syz.6.4344': attribute type 61 has an invalid length. [ 261.337895][T15745] netem: change failed [ 261.409984][T15754] wireguard0: entered promiscuous mode [ 261.416227][T15754] wireguard0: entered allmulticast mode [ 261.431048][T15757] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4355'. [ 261.523080][T15764] loop0: detected capacity change from 0 to 256 [ 261.549143][T15764] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 261.625212][T15770] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15770 comm=syz.0.4361 [ 261.637826][T15770] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=15770 comm=syz.0.4361 [ 261.695786][T15772] lo speed is unknown, defaulting to 1000 [ 262.019354][T15776] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 262.212784][T15794] netlink: 'syz.4.4370': attribute type 1 has an invalid length. [ 262.229380][T15793] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15793 comm=syz.4.4370 [ 262.340039][T15798] loop4: detected capacity change from 0 to 128 [ 262.346834][T15798] vfat: Unknown parameter '' [ 262.370529][T15801] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4373'. [ 262.498283][T15807] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 262.701143][T15813] loop0: detected capacity change from 0 to 512 [ 262.721000][T15813] EXT4-fs: Ignoring removed oldalloc option [ 262.736309][T15813] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 262.742933][T15815] lo speed is unknown, defaulting to 1000 [ 262.749928][T15813] EXT4-fs (loop0): 1 truncate cleaned up [ 262.758787][T15813] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 262.789923][T15813] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.4378: corrupted in-inode xattr: overlapping e_value [ 262.804537][T15813] EXT4-fs warning (device loop0): ext4_xattr_set_entry:1772: inode #15: comm syz.0.4378: unable to update i_inline_off [ 262.817332][T15813] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.4378: corrupted in-inode xattr: overlapping e_value [ 262.837042][T15813] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.4378: corrupted in-inode xattr: overlapping e_value [ 262.867707][T11898] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 262.898973][T15823] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4383'. [ 262.926468][T15825] FAULT_INJECTION: forcing a failure. [ 262.926468][T15825] name failslab, interval 1, probability 0, space 0, times 0 [ 262.939188][T15825] CPU: 0 UID: 0 PID: 15825 Comm: syz.0.4381 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 262.939237][T15825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 262.939270][T15825] Call Trace: [ 262.939343][T15825] [ 262.939351][T15825] dump_stack_lvl+0xf2/0x150 [ 262.939493][T15825] dump_stack+0x15/0x1a [ 262.939517][T15825] should_fail_ex+0x24a/0x260 [ 262.939557][T15825] ? sctp_add_bind_addr+0x6f/0x1e0 [ 262.939595][T15825] should_failslab+0x8f/0xb0 [ 262.939635][T15825] __kmalloc_cache_noprof+0x4e/0x320 [ 262.939675][T15825] ? sctp_get_port_local+0x79c/0xa90 [ 262.939707][T15825] sctp_add_bind_addr+0x6f/0x1e0 [ 262.939758][T15825] sctp_do_bind+0x434/0x4c0 [ 262.939810][T15825] sctp_connect_new_asoc+0x15b/0x3b0 [ 262.939837][T15825] sctp_sendmsg+0xf05/0x1920 [ 262.939918][T15825] ? __pfx_sctp_sendmsg+0x10/0x10 [ 262.939946][T15825] inet_sendmsg+0xc5/0xd0 [ 262.939975][T15825] __sock_sendmsg+0x102/0x180 [ 262.939999][T15825] __sys_sendto+0x1a8/0x230 [ 262.940039][T15825] __x64_sys_sendto+0x78/0x90 [ 262.940075][T15825] x64_sys_call+0x29fa/0x2dc0 [ 262.940152][T15825] do_syscall_64+0xc9/0x1c0 [ 262.940176][T15825] ? clear_bhb_loop+0x55/0xb0 [ 262.940204][T15825] ? clear_bhb_loop+0x55/0xb0 [ 262.940295][T15825] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 262.940368][T15825] RIP: 0033:0x7f3e7cd0cda9 [ 262.940382][T15825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 262.940519][T15825] RSP: 002b:00007f3e7b371038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 262.940537][T15825] RAX: ffffffffffffffda RBX: 00007f3e7cf25fa0 RCX: 00007f3e7cd0cda9 [ 262.940550][T15825] RDX: 000000000000fee4 RSI: 0000000020847fff RDI: 0000000000000004 [ 262.940562][T15825] RBP: 00007f3e7b371090 R08: 000000002005ffe4 R09: 000000000000001c [ 262.940574][T15825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 262.940585][T15825] R13: 0000000000000000 R14: 00007f3e7cf25fa0 R15: 00007ffcf9f05008 [ 262.940611][T15825] [ 263.229675][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 263.229694][ T29] audit: type=1326 audit(1738535935.288:12503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15830 comm="syz.0.4386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 263.281258][ T29] audit: type=1326 audit(1738535935.288:12504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15830 comm="syz.0.4386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 263.304993][ T29] audit: type=1326 audit(1738535935.288:12505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15830 comm="syz.0.4386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 263.328638][ T29] audit: type=1326 audit(1738535935.288:12506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15830 comm="syz.0.4386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 263.352362][ T29] audit: type=1326 audit(1738535935.288:12507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15830 comm="syz.0.4386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 263.375988][ T29] audit: type=1326 audit(1738535935.288:12508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15830 comm="wtpn" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 263.399192][ T29] audit: type=1326 audit(1738535935.288:12509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15830 comm="wtpn" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 263.422489][ T29] audit: type=1326 audit(1738535935.288:12510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15830 comm="wtpn" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3e7cd0b710 code=0x7ffc0000 [ 263.445887][ T29] audit: type=1326 audit(1738535935.298:12511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15830 comm="wtpn" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f3e7cd0e5d7 code=0x7ffc0000 [ 263.466393][T15845] loop0: detected capacity change from 0 to 512 [ 263.468976][ T29] audit: type=1326 audit(1738535935.298:12512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15830 comm="wtpn" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 263.477814][T15845] EXT4-fs: Ignoring removed oldalloc option [ 263.525290][T15847] lo speed is unknown, defaulting to 1000 [ 263.531076][T15845] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 263.582388][T15853] wireguard0: entered promiscuous mode [ 263.587919][T15853] wireguard0: entered allmulticast mode [ 263.619102][T15845] EXT4-fs (loop0): 1 truncate cleaned up [ 263.626595][T15845] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 263.668780][T15860] Cannot find add_set index 0 as target [ 263.707034][T15860] Process accounting resumed [ 263.740782][T15845] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.4392: corrupted in-inode xattr: overlapping e_value [ 263.763430][T15845] EXT4-fs warning (device loop0): ext4_xattr_set_entry:1772: inode #15: comm syz.0.4392: unable to update i_inline_off [ 263.776150][T15845] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.4392: corrupted in-inode xattr: overlapping e_value [ 263.804825][T15864] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.4392: corrupted in-inode xattr: overlapping e_value [ 263.858132][T11898] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 264.285942][T15869] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4399'. [ 264.400920][T15888] FAULT_INJECTION: forcing a failure. [ 264.400920][T15888] name failslab, interval 1, probability 0, space 0, times 0 [ 264.413639][T15888] CPU: 1 UID: 0 PID: 15888 Comm: syz.4.4408 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 264.413699][T15888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 264.413714][T15888] Call Trace: [ 264.413723][T15888] [ 264.413732][T15888] dump_stack_lvl+0xf2/0x150 [ 264.413766][T15888] dump_stack+0x15/0x1a [ 264.413849][T15888] should_fail_ex+0x24a/0x260 [ 264.413882][T15888] should_failslab+0x8f/0xb0 [ 264.413989][T15888] kmem_cache_alloc_noprof+0x52/0x320 [ 264.414027][T15888] ? security_inode_alloc+0x37/0x100 [ 264.414102][T15888] security_inode_alloc+0x37/0x100 [ 264.414136][T15888] inode_init_always_gfp+0x4a2/0x4f0 [ 264.414240][T15888] ? __pfx_sock_alloc_inode+0x10/0x10 [ 264.414264][T15888] alloc_inode+0x82/0x160 [ 264.414291][T15888] new_inode_pseudo+0x15/0x20 [ 264.414469][T15888] do_accept+0xa3/0x390 [ 264.414490][T15888] ? vfs_write+0x644/0x920 [ 264.414514][T15888] ? __schedule+0x75b/0x990 [ 264.414612][T15888] __sys_accept4+0xc3/0x150 [ 264.414636][T15888] __x64_sys_accept+0x44/0x50 [ 264.414664][T15888] x64_sys_call+0x29f0/0x2dc0 [ 264.414696][T15888] do_syscall_64+0xc9/0x1c0 [ 264.414764][T15888] ? clear_bhb_loop+0x55/0xb0 [ 264.414838][T15888] ? clear_bhb_loop+0x55/0xb0 [ 264.414894][T15888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 264.414925][T15888] RIP: 0033:0x7f52b0f6cda9 [ 264.414942][T15888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.414963][T15888] RSP: 002b:00007f52af5d1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 264.414993][T15888] RAX: ffffffffffffffda RBX: 00007f52b1185fa0 RCX: 00007f52b0f6cda9 [ 264.415008][T15888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 264.415061][T15888] RBP: 00007f52af5d1090 R08: 0000000000000000 R09: 0000000000000000 [ 264.415075][T15888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.415086][T15888] R13: 0000000000000000 R14: 00007f52b1185fa0 R15: 00007fff62620988 [ 264.415104][T15888] [ 264.679523][T15894] FAULT_INJECTION: forcing a failure. [ 264.679523][T15894] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 264.692902][T15894] CPU: 1 UID: 0 PID: 15894 Comm: +|[@ Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 264.692931][T15894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 264.693009][T15894] Call Trace: [ 264.693016][T15894] [ 264.693024][T15894] dump_stack_lvl+0xf2/0x150 [ 264.693125][T15894] dump_stack+0x15/0x1a [ 264.693148][T15894] should_fail_ex+0x24a/0x260 [ 264.693242][T15894] should_fail+0xb/0x10 [ 264.693275][T15894] should_fail_usercopy+0x1a/0x20 [ 264.693293][T15894] _copy_from_iter+0xd5/0xd00 [ 264.693370][T15894] ? kmalloc_reserve+0x16e/0x190 [ 264.693397][T15894] ? __build_skb_around+0x196/0x1f0 [ 264.693427][T15894] ? __alloc_skb+0x21f/0x310 [ 264.693454][T15894] ? __virt_addr_valid+0x1ed/0x250 [ 264.693477][T15894] ? __check_object_size+0x364/0x520 [ 264.693549][T15894] netlink_sendmsg+0x460/0x6e0 [ 264.693590][T15894] ? __pfx_netlink_sendmsg+0x10/0x10 [ 264.693637][T15894] __sock_sendmsg+0x140/0x180 [ 264.693661][T15894] ____sys_sendmsg+0x312/0x410 [ 264.693692][T15894] __sys_sendmsg+0x19d/0x230 [ 264.693741][T15894] __x64_sys_sendmsg+0x46/0x50 [ 264.693773][T15894] x64_sys_call+0x2734/0x2dc0 [ 264.693850][T15894] do_syscall_64+0xc9/0x1c0 [ 264.693875][T15894] ? clear_bhb_loop+0x55/0xb0 [ 264.693988][T15894] ? clear_bhb_loop+0x55/0xb0 [ 264.694059][T15894] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 264.694085][T15894] RIP: 0033:0x7f3e7cd0cda9 [ 264.694129][T15894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.694151][T15894] RSP: 002b:00007f3e7b371038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 264.694174][T15894] RAX: ffffffffffffffda RBX: 00007f3e7cf25fa0 RCX: 00007f3e7cd0cda9 [ 264.694188][T15894] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 264.694200][T15894] RBP: 00007f3e7b371090 R08: 0000000000000000 R09: 0000000000000000 [ 264.694211][T15894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.694222][T15894] R13: 0000000000000000 R14: 00007f3e7cf25fa0 R15: 00007ffcf9f05008 [ 264.694311][T15894] [ 264.922526][T15900] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15900 comm=syz.3.4412 [ 264.935189][T15900] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=15900 comm=syz.3.4412 [ 264.967951][T15904] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4415'. [ 265.162780][T15912] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 265.286539][T15918] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 265.325279][T15919] wireguard0: entered promiscuous mode [ 265.330869][T15919] wireguard0: entered allmulticast mode [ 265.505295][T15927] netem: change failed [ 266.330957][T15954] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4435'. [ 266.346733][T15956] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 266.441997][T15968] FAULT_INJECTION: forcing a failure. [ 266.441997][T15968] name failslab, interval 1, probability 0, space 0, times 0 [ 266.455415][T15968] CPU: 0 UID: 0 PID: 15968 Comm: syz.1.4439 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 266.455445][T15968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 266.455460][T15968] Call Trace: [ 266.455467][T15968] [ 266.455475][T15968] dump_stack_lvl+0xf2/0x150 [ 266.455565][T15968] dump_stack+0x15/0x1a [ 266.455586][T15968] should_fail_ex+0x24a/0x260 [ 266.455618][T15968] ? tcf_action_init_1+0x121/0x490 [ 266.455643][T15968] should_failslab+0x8f/0xb0 [ 266.455716][T15968] __kmalloc_cache_noprof+0x4e/0x320 [ 266.455752][T15968] tcf_action_init_1+0x121/0x490 [ 266.455818][T15968] ? tc_action_load_ops+0x1a9/0x410 [ 266.455847][T15968] tcf_action_init+0x1cc/0x610 [ 266.455898][T15968] tc_ctl_action+0x292/0x840 [ 266.455989][T15968] ? __pfx_tc_ctl_action+0x10/0x10 [ 266.456014][T15968] rtnetlink_rcv_msg+0x6aa/0x710 [ 266.456048][T15968] ? ref_tracker_free+0x3a5/0x410 [ 266.456078][T15968] ? __dev_queue_xmit+0x186/0x2090 [ 266.456109][T15968] netlink_rcv_skb+0x12c/0x230 [ 266.456199][T15968] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 266.456235][T15968] rtnetlink_rcv+0x1c/0x30 [ 266.456261][T15968] netlink_unicast+0x599/0x670 [ 266.456358][T15968] netlink_sendmsg+0x5cc/0x6e0 [ 266.456422][T15968] ? __pfx_netlink_sendmsg+0x10/0x10 [ 266.456467][T15968] __sock_sendmsg+0x140/0x180 [ 266.456487][T15968] ____sys_sendmsg+0x312/0x410 [ 266.456519][T15968] __sys_sendmsg+0x19d/0x230 [ 266.456588][T15968] __x64_sys_sendmsg+0x46/0x50 [ 266.456616][T15968] x64_sys_call+0x2734/0x2dc0 [ 266.456642][T15968] do_syscall_64+0xc9/0x1c0 [ 266.456666][T15968] ? clear_bhb_loop+0x55/0xb0 [ 266.456693][T15968] ? clear_bhb_loop+0x55/0xb0 [ 266.456728][T15968] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 266.456786][T15968] RIP: 0033:0x7f0e3bddcda9 [ 266.456802][T15968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 266.456820][T15968] RSP: 002b:00007f0e3a447038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 266.456837][T15968] RAX: ffffffffffffffda RBX: 00007f0e3bff5fa0 RCX: 00007f0e3bddcda9 [ 266.456887][T15968] RDX: 0000000000000000 RSI: 00000000200037c0 RDI: 0000000000000003 [ 266.456898][T15968] RBP: 00007f0e3a447090 R08: 0000000000000000 R09: 0000000000000000 [ 266.456909][T15968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 266.456920][T15968] R13: 0000000000000000 R14: 00007f0e3bff5fa0 R15: 00007ffd2d7e4918 [ 266.456939][T15968] [ 266.465194][T15970] netem: change failed [ 267.050272][T15987] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4449'. [ 267.103325][T15989] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 267.273677][T15997] devpts: called with bogus options [ 267.319485][T15997] loop0: detected capacity change from 0 to 512 [ 267.348730][T15997] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 267.384247][T15997] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.4453: corrupted in-inode xattr: e_name out of bounds [ 267.414134][T15997] EXT4-fs (loop0): Remounting filesystem read-only [ 267.420797][T15997] EXT4-fs (loop0): 1 truncate cleaned up [ 267.441759][T15997] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 267.456012][T15997] SELinux: (dev loop0, type ext4) getxattr errno 5 [ 267.463742][T15997] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 267.694721][T16023] 9pnet: Could not find request transport: tûa[ùñ5ù‰ˆ8_ìoæË“µêÔN [ 268.304036][T16074] netem: change failed [ 268.320603][T16075] loop4: detected capacity change from 0 to 512 [ 268.352011][T16075] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 268.361195][T16075] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 268.416146][T16075] EXT4-fs (loop4): warning: checktime reached, running e2fsck is recommended [ 268.446756][T16075] EXT4-fs error (device loop4): ext4_orphan_get:1389: comm syz.4.4486: inode #15: comm syz.4.4486: iget: illegal inode # [ 268.464367][T16075] EXT4-fs (loop4): Remounting filesystem read-only [ 268.471245][T16075] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 268.484350][T16075] SELinux: (dev loop4, type ext2) getxattr errno 5 [ 268.491116][T16075] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 268.517468][ T29] kauditd_printk_skb: 277 callbacks suppressed [ 268.517485][ T29] audit: type=1326 audit(1738535940.578:12790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16085 comm="syz.3.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 268.587497][ T29] audit: type=1326 audit(1738535940.608:12791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16085 comm="syz.3.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 268.611202][ T29] audit: type=1326 audit(1738535940.608:12792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16085 comm="syz.3.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 268.634937][ T29] audit: type=1326 audit(1738535940.608:12793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16085 comm="syz.3.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 268.658562][ T29] audit: type=1326 audit(1738535940.608:12794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16085 comm="syz.3.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 268.682221][ T29] audit: type=1326 audit(1738535940.608:12795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16085 comm="syz.3.4493" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 268.705912][ T29] audit: type=1326 audit(1738535940.608:12796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16085 comm="wtpn" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 268.729000][ T29] audit: type=1326 audit(1738535940.608:12797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16085 comm="wtpn" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d694ab710 code=0x7ffc0000 [ 268.752164][ T29] audit: type=1326 audit(1738535940.608:12798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16085 comm="wtpn" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f2d694ae5d7 code=0x7ffc0000 [ 268.775341][ T29] audit: type=1326 audit(1738535940.608:12799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16085 comm="wtpn" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 268.893581][T16101] FAULT_INJECTION: forcing a failure. [ 268.893581][T16101] name failslab, interval 1, probability 0, space 0, times 0 [ 268.906356][T16101] CPU: 1 UID: 0 PID: 16101 Comm: syz.3.4499 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 268.906384][T16101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 268.906396][T16101] Call Trace: [ 268.906403][T16101] [ 268.906472][T16101] dump_stack_lvl+0xf2/0x150 [ 268.906504][T16101] dump_stack+0x15/0x1a [ 268.906525][T16101] should_fail_ex+0x24a/0x260 [ 268.906584][T16101] should_failslab+0x8f/0xb0 [ 268.906687][T16101] kmem_cache_alloc_node_noprof+0x59/0x320 [ 268.906745][T16101] ? __alloc_skb+0x10b/0x310 [ 268.906770][T16101] __alloc_skb+0x10b/0x310 [ 268.906794][T16101] tipc_msg_build+0xc6/0x820 [ 268.906815][T16101] ? __rcu_read_unlock+0x4e/0x70 [ 268.906873][T16101] ? tipc_node_find+0xf0/0x1d0 [ 268.906913][T16101] tipc_send_group_msg+0x180/0x290 [ 268.906953][T16101] tipc_send_group_unicast+0x3e7/0x450 [ 268.907052][T16101] ? __pfx_woken_wake_function+0x10/0x10 [ 268.907117][T16101] __tipc_sendmsg+0x861/0x1c40 [ 268.907201][T16101] ? __rcu_read_unlock+0x4e/0x70 [ 268.907224][T16101] __tipc_sendstream+0xa2b/0xb20 [ 268.907341][T16101] ? avc_has_perm+0xd4/0x160 [ 268.907382][T16101] ? selinux_socket_sendmsg+0x185/0x1c0 [ 268.907419][T16101] ? _raw_spin_unlock_bh+0x36/0x40 [ 268.907454][T16101] ? lock_sock_nested+0x10f/0x140 [ 268.907476][T16101] ? __pfx_tipc_send_packet+0x10/0x10 [ 268.907514][T16101] tipc_send_packet+0x65/0x80 [ 268.907558][T16101] __sock_sendmsg+0x140/0x180 [ 268.907647][T16101] ____sys_sendmsg+0x312/0x410 [ 268.907682][T16101] __sys_sendmsg+0x19d/0x230 [ 268.907727][T16101] __x64_sys_sendmsg+0x46/0x50 [ 268.907814][T16101] x64_sys_call+0x2734/0x2dc0 [ 268.907840][T16101] do_syscall_64+0xc9/0x1c0 [ 268.907863][T16101] ? clear_bhb_loop+0x55/0xb0 [ 268.907902][T16101] ? clear_bhb_loop+0x55/0xb0 [ 268.907935][T16101] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.907961][T16101] RIP: 0033:0x7f2d694acda9 [ 268.907980][T16101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.908002][T16101] RSP: 002b:00007f2d67b17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 268.908024][T16101] RAX: ffffffffffffffda RBX: 00007f2d696c5fa0 RCX: 00007f2d694acda9 [ 268.908057][T16101] RDX: 0000000000000000 RSI: 00000000200005c0 RDI: 0000000000000006 [ 268.908071][T16101] RBP: 00007f2d67b17090 R08: 0000000000000000 R09: 0000000000000000 [ 268.908083][T16101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 268.908095][T16101] R13: 0000000000000000 R14: 00007f2d696c5fa0 R15: 00007fff42986438 [ 268.908115][T16101] [ 269.320792][T16128] netem: change failed [ 269.353131][T16132] FAULT_INJECTION: forcing a failure. [ 269.353131][T16132] name failslab, interval 1, probability 0, space 0, times 0 [ 269.366701][T16132] CPU: 0 UID: 0 PID: 16132 Comm: syz.4.4513 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 269.366739][T16132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 269.366754][T16132] Call Trace: [ 269.366761][T16132] [ 269.366771][T16132] dump_stack_lvl+0xf2/0x150 [ 269.366798][T16132] dump_stack+0x15/0x1a [ 269.366937][T16132] should_fail_ex+0x24a/0x260 [ 269.366979][T16132] ? sctp_add_bind_addr+0x6f/0x1e0 [ 269.367021][T16132] should_failslab+0x8f/0xb0 [ 269.367068][T16132] __kmalloc_cache_noprof+0x4e/0x320 [ 269.367110][T16132] ? sctp_get_port_local+0x79c/0xa90 [ 269.367225][T16132] sctp_add_bind_addr+0x6f/0x1e0 [ 269.367267][T16132] sctp_do_bind+0x434/0x4c0 [ 269.367299][T16132] sctp_connect_new_asoc+0x15b/0x3b0 [ 269.367334][T16132] sctp_sendmsg+0xf05/0x1920 [ 269.367431][T16132] ? __pfx_sctp_sendmsg+0x10/0x10 [ 269.367465][T16132] inet_sendmsg+0xc5/0xd0 [ 269.367498][T16132] __sock_sendmsg+0x102/0x180 [ 269.367524][T16132] __sys_sendto+0x1a8/0x230 [ 269.367566][T16132] __x64_sys_sendto+0x78/0x90 [ 269.367598][T16132] x64_sys_call+0x29fa/0x2dc0 [ 269.367658][T16132] do_syscall_64+0xc9/0x1c0 [ 269.367684][T16132] ? clear_bhb_loop+0x55/0xb0 [ 269.367711][T16132] ? clear_bhb_loop+0x55/0xb0 [ 269.367757][T16132] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 269.367792][T16132] RIP: 0033:0x7f52b0f6cda9 [ 269.367816][T16132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 269.367839][T16132] RSP: 002b:00007f52af5d1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 269.367861][T16132] RAX: ffffffffffffffda RBX: 00007f52b1185fa0 RCX: 00007f52b0f6cda9 [ 269.367877][T16132] RDX: 000000000000fee4 RSI: 0000000020847fff RDI: 0000000000000004 [ 269.367950][T16132] RBP: 00007f52af5d1090 R08: 000000002005ffe4 R09: 000000000000001c [ 269.367966][T16132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.367980][T16132] R13: 0000000000000000 R14: 00007f52b1185fa0 R15: 00007fff62620988 [ 269.368003][T16132] [ 269.755185][T16147] FAULT_INJECTION: forcing a failure. [ 269.755185][T16147] name failslab, interval 1, probability 0, space 0, times 0 [ 269.768056][T16147] CPU: 1 UID: 0 PID: 16147 Comm: syz.1.4519 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 269.768086][T16147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 269.768113][T16147] Call Trace: [ 269.768121][T16147] [ 269.768130][T16147] dump_stack_lvl+0xf2/0x150 [ 269.768163][T16147] dump_stack+0x15/0x1a [ 269.768186][T16147] should_fail_ex+0x24a/0x260 [ 269.768236][T16147] should_failslab+0x8f/0xb0 [ 269.768265][T16147] __kmalloc_node_noprof+0xad/0x410 [ 269.768327][T16147] ? crypto_create_tfm_node+0x57/0x230 [ 269.768363][T16147] crypto_create_tfm_node+0x57/0x230 [ 269.768463][T16147] crypto_spawn_tfm2+0x43/0x70 [ 269.768493][T16147] crypto_gcm_init_tfm+0x32/0x100 [ 269.768515][T16147] ? __pfx_crypto_gcm_init_tfm+0x10/0x10 [ 269.768570][T16147] crypto_aead_init_tfm+0x9a/0xb0 [ 269.768601][T16147] crypto_create_tfm_node+0xe7/0x230 [ 269.768660][T16147] crypto_alloc_tfm_node+0xd1/0x250 [ 269.768682][T16147] crypto_alloc_aead+0x2f/0x40 [ 269.768708][T16147] macsec_validate_attr+0x109/0x600 [ 269.768740][T16147] rtnl_newlink+0x7c4/0x1250 [ 269.768845][T16147] ? cmp_ex_search+0x56/0x70 [ 269.768940][T16147] ? queue_stack_map_push_elem+0xe2/0x300 [ 269.768967][T16147] ? bpf_trace_run3+0x12b/0x1d0 [ 269.768991][T16147] ? __kfree_skb+0x102/0x150 [ 269.769076][T16147] ? memcg_list_lru_alloc+0xce/0x4e0 [ 269.769111][T16147] ? mod_objcg_state+0x2ea/0x4f0 [ 269.769143][T16147] ? __kfree_skb+0x102/0x150 [ 269.769216][T16147] ? __rcu_read_unlock+0x4e/0x70 [ 269.769241][T16147] ? avc_has_perm_noaudit+0x1cc/0x210 [ 269.769341][T16147] ? selinux_capable+0x1f2/0x260 [ 269.769373][T16147] ? security_capable+0x81/0x90 [ 269.769471][T16147] ? ns_capable+0x7d/0xb0 [ 269.769497][T16147] ? __pfx_rtnl_newlink+0x10/0x10 [ 269.769531][T16147] rtnetlink_rcv_msg+0x651/0x710 [ 269.769676][T16147] ? ref_tracker_free+0x3a5/0x410 [ 269.769736][T16147] ? __dev_queue_xmit+0x186/0x2090 [ 269.769765][T16147] netlink_rcv_skb+0x12c/0x230 [ 269.769799][T16147] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 269.769844][T16147] rtnetlink_rcv+0x1c/0x30 [ 269.769909][T16147] netlink_unicast+0x599/0x670 [ 269.769940][T16147] netlink_sendmsg+0x5cc/0x6e0 [ 269.769981][T16147] ? __pfx_netlink_sendmsg+0x10/0x10 [ 269.770028][T16147] __sock_sendmsg+0x140/0x180 [ 269.770052][T16147] ____sys_sendmsg+0x312/0x410 [ 269.770092][T16147] __sys_sendmsg+0x19d/0x230 [ 269.770190][T16147] __x64_sys_sendmsg+0x46/0x50 [ 269.770275][T16147] x64_sys_call+0x2734/0x2dc0 [ 269.770360][T16147] do_syscall_64+0xc9/0x1c0 [ 269.770384][T16147] ? clear_bhb_loop+0x55/0xb0 [ 269.770415][T16147] ? clear_bhb_loop+0x55/0xb0 [ 269.770449][T16147] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 269.770560][T16147] RIP: 0033:0x7f0e3bddcda9 [ 269.770575][T16147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 269.770597][T16147] RSP: 002b:00007f0e3a447038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 269.770620][T16147] RAX: ffffffffffffffda RBX: 00007f0e3bff5fa0 RCX: 00007f0e3bddcda9 [ 269.770635][T16147] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000005 [ 269.770649][T16147] RBP: 00007f0e3a447090 R08: 0000000000000000 R09: 0000000000000000 [ 269.770663][T16147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.770746][T16147] R13: 0000000000000000 R14: 00007f0e3bff5fa0 R15: 00007ffd2d7e4918 [ 269.770764][T16147] [ 270.214421][T16154] netlink: 36 bytes leftover after parsing attributes in process `syz.3.4523'. [ 270.334865][T16172] lo speed is unknown, defaulting to 1000 [ 270.346310][T16174] block device autoloading is deprecated and will be removed. [ 270.387331][T16171] netem: change failed [ 270.612416][T16187] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 270.686755][T16195] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 270.728560][T16195] bridge0: port 3(batadv1) entered blocking state [ 270.735217][T16195] bridge0: port 3(batadv1) entered disabled state [ 270.748353][T16195] batadv1: entered allmulticast mode [ 270.754562][T16195] batadv1: entered promiscuous mode [ 270.831195][T16205] netem: change failed [ 270.899865][T16211] FAULT_INJECTION: forcing a failure. [ 270.899865][T16211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 270.913140][T16211] CPU: 0 UID: 0 PID: 16211 Comm: syz.1.4545 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 270.913234][T16211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 270.913247][T16211] Call Trace: [ 270.913252][T16211] [ 270.913259][T16211] dump_stack_lvl+0xf2/0x150 [ 270.913289][T16211] dump_stack+0x15/0x1a [ 270.913314][T16211] should_fail_ex+0x24a/0x260 [ 270.913359][T16211] should_fail+0xb/0x10 [ 270.913388][T16211] should_fail_usercopy+0x1a/0x20 [ 270.913470][T16211] _copy_to_user+0x20/0xa0 [ 270.913499][T16211] simple_read_from_buffer+0xa0/0x110 [ 270.913529][T16211] proc_fail_nth_read+0xf9/0x140 [ 270.913556][T16211] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 270.913616][T16211] vfs_read+0x19b/0x6f0 [ 270.913638][T16211] ? __rcu_read_unlock+0x4e/0x70 [ 270.913701][T16211] ? __fget_files+0x17c/0x1c0 [ 270.913733][T16211] ksys_read+0xe8/0x1b0 [ 270.913761][T16211] __x64_sys_read+0x42/0x50 [ 270.913782][T16211] x64_sys_call+0x2874/0x2dc0 [ 270.913887][T16211] do_syscall_64+0xc9/0x1c0 [ 270.913917][T16211] ? clear_bhb_loop+0x55/0xb0 [ 270.913951][T16211] ? clear_bhb_loop+0x55/0xb0 [ 270.913984][T16211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 270.914012][T16211] RIP: 0033:0x7f0e3bddb7bc [ 270.914027][T16211] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 270.914045][T16211] RSP: 002b:00007f0e3a447030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 270.914067][T16211] RAX: ffffffffffffffda RBX: 00007f0e3bff5fa0 RCX: 00007f0e3bddb7bc [ 270.914082][T16211] RDX: 000000000000000f RSI: 00007f0e3a4470a0 RDI: 0000000000000006 [ 270.914097][T16211] RBP: 00007f0e3a447090 R08: 0000000000000000 R09: 0000000000000000 [ 270.914135][T16211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 270.914149][T16211] R13: 0000000000000000 R14: 00007f0e3bff5fa0 R15: 00007ffd2d7e4918 [ 270.914202][T16211] [ 270.914696][T16209] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 271.113564][T16215] loop1: detected capacity change from 0 to 256 [ 271.134884][T16215] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 271.232455][ T9361] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 271.241752][ T9361] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 271.322457][T16236] netem: change failed [ 271.350938][T16240] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4553'. [ 271.466876][T16255] loop4: detected capacity change from 0 to 256 [ 271.475604][T16255] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 271.599085][T16261] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 272.174290][T16273] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16273 comm=syz.0.4567 [ 272.187007][T16273] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=16273 comm=syz.0.4567 [ 272.249065][T16282] loop1: detected capacity change from 0 to 256 [ 272.260465][T16282] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 272.590371][T16293] netlink: 'syz.3.4575': attribute type 4 has an invalid length. [ 272.756221][T16310] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 273.046051][T16323] netem: change failed [ 273.351734][T16346] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16346 comm=syz.6.4597 [ 273.364433][T16346] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=16346 comm=syz.6.4597 [ 273.495995][T16353] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4599'. [ 273.511792][T16353] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 273.519333][T16353] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 273.528778][ T29] kauditd_printk_skb: 528 callbacks suppressed [ 273.528792][ T29] audit: type=1400 audit(1738535945.588:13325): avc: denied { read } for pid=16345 comm="syz.6.4597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 273.555623][ T29] audit: type=1400 audit(1738535945.588:13326): avc: denied { open } for pid=16345 comm="syz.6.4597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 273.575158][ T29] audit: type=1400 audit(1738535945.588:13327): avc: denied { kernel } for pid=16345 comm="syz.6.4597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 273.595328][T16353] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 273.597600][ T29] audit: type=1400 audit(1738535945.628:13328): avc: denied { map } for pid=16345 comm="syz.6.4597" path="socket:[45141]" dev="sockfs" ino=45141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 273.603562][T16353] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 273.627008][ T29] audit: type=1400 audit(1738535945.628:13329): avc: denied { accept } for pid=16345 comm="syz.6.4597" path="socket:[45141]" dev="sockfs" ino=45141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 273.663375][T16357] netem: change failed [ 273.669865][T16341] lo speed is unknown, defaulting to 1000 [ 273.688563][ T29] audit: type=1400 audit(1738535945.748:13330): avc: denied { create } for pid=16359 comm="syz.4.4601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 273.725156][ T29] audit: type=1400 audit(1738535945.768:13331): avc: denied { connect } for pid=16359 comm="syz.4.4601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 273.745120][ T29] audit: type=1400 audit(1738535945.768:13332): avc: denied { create } for pid=16359 comm="syz.4.4601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 273.764739][ T29] audit: type=1400 audit(1738535945.768:13333): avc: denied { bind } for pid=16359 comm="syz.4.4601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 273.784320][ T29] audit: type=1400 audit(1738535945.778:13334): avc: denied { write } for pid=16359 comm="syz.4.4601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 273.847133][T16341] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 273.856899][T16341] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 273.946902][T16371] wireguard0: entered promiscuous mode [ 273.952548][T16371] wireguard0: entered allmulticast mode [ 273.961611][T16370] loop4: detected capacity change from 0 to 256 [ 273.975089][T16370] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 274.235413][T16379] loop4: detected capacity change from 0 to 128 [ 274.256640][T16379] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 274.278191][T16379] ext4 filesystem being mounted at /334/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 274.419356][T11718] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 274.697140][T16398] pimreg: entered allmulticast mode [ 274.753613][T16398] dvmrp0: left allmulticast mode [ 274.758662][T16398] pimreg: left allmulticast mode [ 275.104129][T16403] 9pnet_fd: Insufficient options for proto=fd [ 275.232301][T16406] loop1: detected capacity change from 0 to 128 [ 275.264703][T16406] syz.1.4615: attempt to access beyond end of device [ 275.264703][T16406] loop1: rw=2049, sector=145, nr_sectors = 896 limit=128 [ 275.314817][T16405] syz.1.4615: attempt to access beyond end of device [ 275.314817][T16405] loop1: rw=524288, sector=401, nr_sectors = 256 limit=128 [ 275.328964][T16405] syz.1.4615: attempt to access beyond end of device [ 275.328964][T16405] loop1: rw=0, sector=529, nr_sectors = 8 limit=128 [ 275.354158][T16405] syz.1.4615: attempt to access beyond end of device [ 275.354158][T16405] loop1: rw=0, sector=529, nr_sectors = 8 limit=128 [ 275.394797][T16405] syz.1.4615: attempt to access beyond end of device [ 275.394797][T16405] loop1: rw=0, sector=529, nr_sectors = 8 limit=128 [ 275.432877][T16405] syz.1.4615: attempt to access beyond end of device [ 275.432877][T16405] loop1: rw=0, sector=529, nr_sectors = 8 limit=128 [ 275.455109][T16405] syz.1.4615: attempt to access beyond end of device [ 275.455109][T16405] loop1: rw=0, sector=529, nr_sectors = 8 limit=128 [ 275.473794][T16405] syz.1.4615: attempt to access beyond end of device [ 275.473794][T16405] loop1: rw=0, sector=529, nr_sectors = 8 limit=128 [ 275.487518][T16405] syz.1.4615: attempt to access beyond end of device [ 275.487518][T16405] loop1: rw=0, sector=529, nr_sectors = 8 limit=128 [ 275.504914][T16405] syz.1.4615: attempt to access beyond end of device [ 275.504914][T16405] loop1: rw=0, sector=529, nr_sectors = 8 limit=128 [ 275.534246][T16419] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=16419 comm=syz.6.4619 [ 275.590266][T16423] FAULT_INJECTION: forcing a failure. [ 275.590266][T16423] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 275.603516][T16423] CPU: 1 UID: 0 PID: 16423 Comm: syz.0.4621 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 275.603574][T16423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 275.603586][T16423] Call Trace: [ 275.603591][T16423] [ 275.603599][T16423] dump_stack_lvl+0xf2/0x150 [ 275.603627][T16423] dump_stack+0x15/0x1a [ 275.603677][T16423] should_fail_ex+0x24a/0x260 [ 275.603716][T16423] should_fail+0xb/0x10 [ 275.603752][T16423] should_fail_usercopy+0x1a/0x20 [ 275.603774][T16423] strncpy_from_user+0x25/0x210 [ 275.603859][T16423] ? kstrtouint_from_user+0xb0/0xe0 [ 275.603899][T16423] path_setxattrat+0xed/0x310 [ 275.603969][T16423] __x64_sys_fsetxattr+0x6d/0x80 [ 275.603995][T16423] x64_sys_call+0x29d2/0x2dc0 [ 275.604024][T16423] do_syscall_64+0xc9/0x1c0 [ 275.604073][T16423] ? clear_bhb_loop+0x55/0xb0 [ 275.604107][T16423] ? clear_bhb_loop+0x55/0xb0 [ 275.604212][T16423] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 275.604238][T16423] RIP: 0033:0x7f3e7cd0cda9 [ 275.604253][T16423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 275.604274][T16423] RSP: 002b:00007f3e7b371038 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 275.604343][T16423] RAX: ffffffffffffffda RBX: 00007f3e7cf25fa0 RCX: 00007f3e7cd0cda9 [ 275.604419][T16423] RDX: 0000000020000400 RSI: 0000000020000340 RDI: 0000000000000006 [ 275.604460][T16423] RBP: 00007f3e7b371090 R08: 0000000000000000 R09: 0000000000000000 [ 275.604474][T16423] R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000001 [ 275.604487][T16423] R13: 0000000000000000 R14: 00007f3e7cf25fa0 R15: 00007ffcf9f05008 [ 275.604509][T16423] [ 275.830316][T16433] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 275.924134][T16445] syzkaller1: entered promiscuous mode [ 275.929650][T16445] syzkaller1: entered allmulticast mode [ 276.157633][T16457] loop1: detected capacity change from 0 to 512 [ 276.164401][T16457] EXT4-fs: Ignoring removed oldalloc option [ 276.170746][T16457] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 276.184750][T16457] EXT4-fs (loop1): 1 truncate cleaned up [ 276.190604][T16460] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4634'. [ 276.200175][T16457] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 276.223405][T16457] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz.1.4636: corrupted in-inode xattr: overlapping e_value [ 276.238956][T16457] EXT4-fs warning (device loop1): ext4_xattr_set_entry:1772: inode #15: comm syz.1.4636: unable to update i_inline_off [ 276.251603][T16457] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz.1.4636: corrupted in-inode xattr: overlapping e_value [ 276.266995][T16457] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz.1.4636: corrupted in-inode xattr: overlapping e_value [ 276.298142][T13057] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 276.348598][T16466] netem: change failed [ 276.369041][T16468] netem: change failed [ 276.793798][T16496] sg_write: data in/out 1179612/14 bytes for SCSI command 0x0-- guessing data in; [ 276.793798][T16496] program syz.3.4652 not setting count and/or reply_len properly [ 277.118140][T16517] vlan2: entered promiscuous mode [ 277.357202][T16526] loop1: detected capacity change from 0 to 256 [ 277.365196][T16526] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 277.437311][T16530] loop1: detected capacity change from 0 to 1024 [ 277.444747][T16530] EXT4-fs: Ignoring removed nomblk_io_submit option [ 277.474378][T16530] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 277.523171][T16535] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 277.899738][T16543] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4666'. [ 278.024396][T16562] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4672'. [ 278.220813][T16578] xt_TPROXY: Can be used only with -p tcp or -p udp [ 278.274754][T13057] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 278.322530][T16584] loop1: detected capacity change from 0 to 128 [ 278.366278][T16586] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4681'. [ 278.450392][T16595] netlink: 'syz.1.4685': attribute type 21 has an invalid length. [ 278.458474][T16595] netlink: 'syz.1.4685': attribute type 20 has an invalid length. [ 278.469032][T16595] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4685'. [ 278.478015][T16595] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4685'. [ 278.510667][T16598] loop1: detected capacity change from 0 to 128 [ 278.520288][T16598] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4687'. [ 278.542113][ T29] kauditd_printk_skb: 283 callbacks suppressed [ 278.542132][ T29] audit: type=1400 audit(1738535950.608:13618): avc: denied { create } for pid=16601 comm="syz.3.4688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 278.580931][ T29] audit: type=1326 audit(1738535950.608:13619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16601 comm="syz.3.4688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 278.604660][ T29] audit: type=1326 audit(1738535950.608:13620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16601 comm="syz.3.4688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=128 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 278.628416][ T29] audit: type=1326 audit(1738535950.608:13621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16601 comm="syz.3.4688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 278.652065][ T29] audit: type=1326 audit(1738535950.608:13622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16601 comm="syz.3.4688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 278.675630][ T29] audit: type=1400 audit(1738535950.608:13623): avc: denied { setopt } for pid=16601 comm="syz.3.4688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 278.695304][ T29] audit: type=1326 audit(1738535950.608:13624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16601 comm="syz.3.4688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 278.719429][ T29] audit: type=1326 audit(1738535950.608:13625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16601 comm="syz.3.4688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 278.742967][ T29] audit: type=1326 audit(1738535950.608:13626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16601 comm="syz.3.4688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 278.766551][ T29] audit: type=1326 audit(1738535950.608:13627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16601 comm="syz.3.4688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 278.810762][T16607] loop1: detected capacity change from 0 to 2048 [ 278.902225][T16611] netem: change failed [ 278.938958][T16617] syzkaller1: entered promiscuous mode [ 278.945137][T16617] syzkaller1: entered allmulticast mode [ 279.169732][T16627] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 279.293545][T16631] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4700'. [ 279.471871][T16635] lo speed is unknown, defaulting to 1000 [ 280.359788][T16650] netem: change failed [ 281.114898][T16673] netlink: 24 bytes leftover after parsing attributes in process `syz.1.4714'. [ 281.123969][T16673] netlink: 264 bytes leftover after parsing attributes in process `syz.1.4714'. [ 281.256643][T16681] netem: change failed [ 281.384012][T16694] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16694 comm=syz.3.4723 [ 281.396743][T16694] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=16694 comm=syz.3.4723 [ 281.421774][T16697] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 281.575799][T16706] netem: change failed [ 281.772631][T16726] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 281.927372][T16733] wireguard0: entered promiscuous mode [ 281.933081][T16733] wireguard0: entered allmulticast mode [ 283.194236][T16773] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16773 comm=syz.4.4750 [ 283.206952][T16773] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=16773 comm=syz.4.4750 [ 283.295803][T16784] siw: device registration error -23 [ 283.528074][T16817] loop1: detected capacity change from 0 to 128 [ 283.534904][T16817] vfat: Unknown parameter '' [ 283.558018][T16820] xt_l2tp: v2 sid > 0xffff: 16777216 [ 283.607065][ T29] kauditd_printk_skb: 453 callbacks suppressed [ 283.607084][ T29] audit: type=1326 audit(1738535955.668:14081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16812 comm="syz.0.4756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 283.621522][T16813] pim6reg: entered allmulticast mode [ 283.643700][ T29] audit: type=1326 audit(1738535955.668:14082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16812 comm="syz.0.4756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 283.668225][ T29] audit: type=1326 audit(1738535955.668:14083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16812 comm="syz.0.4756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 283.692546][ T29] audit: type=1326 audit(1738535955.668:14084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16812 comm="syz.0.4756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 283.716253][ T29] audit: type=1326 audit(1738535955.668:14085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16812 comm="syz.0.4756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 283.740718][ T29] audit: type=1326 audit(1738535955.668:14086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16812 comm="syz.0.4756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 283.765086][ T29] audit: type=1326 audit(1738535955.668:14087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16812 comm="syz.0.4756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 283.789185][ T29] audit: type=1326 audit(1738535955.668:14088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16812 comm="syz.0.4756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f3e7cd0cda9 code=0x7ffc0000 [ 283.813577][ T29] audit: type=1326 audit(1738535955.668:14089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16812 comm="syz.0.4756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f3e7cd0cde3 code=0x7ffc0000 [ 283.837122][ T29] audit: type=1326 audit(1738535955.668:14090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16812 comm="syz.0.4756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f3e7cd0b85f code=0x7ffc0000 [ 283.862077][T16827] netem: change failed [ 283.963589][T16846] __nla_validate_parse: 2 callbacks suppressed [ 283.963606][T16846] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4764'. [ 283.984654][T16833] dvmrp0: entered allmulticast mode [ 284.023019][T16844] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 284.151380][T16861] can: request_module (can-proto-0) failed. [ 284.184969][T16867] loop1: detected capacity change from 0 to 512 [ 284.199680][T16867] EXT4-fs: Ignoring removed oldalloc option [ 284.215799][T16867] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 284.252438][T16867] EXT4-fs (loop1): 1 truncate cleaned up [ 284.267123][T16867] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 284.314802][T16867] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz.1.4777: corrupted in-inode xattr: overlapping e_value [ 284.338006][T16883] FAULT_INJECTION: forcing a failure. [ 284.338006][T16883] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 284.351283][T16883] CPU: 1 UID: 0 PID: 16883 Comm: syz.0.4784 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 284.351316][T16883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 284.351331][T16883] Call Trace: [ 284.351389][T16883] [ 284.351399][T16883] dump_stack_lvl+0xf2/0x150 [ 284.351432][T16883] dump_stack+0x15/0x1a [ 284.351467][T16883] should_fail_ex+0x24a/0x260 [ 284.351567][T16883] should_fail+0xb/0x10 [ 284.351596][T16883] should_fail_usercopy+0x1a/0x20 [ 284.351637][T16883] _copy_from_iter+0xd5/0xd00 [ 284.351660][T16883] ? alloc_pages_mpol+0x208/0x260 [ 284.351697][T16883] copy_page_from_iter+0x14f/0x280 [ 284.351720][T16883] tun_get_user+0x68b/0x25c0 [ 284.351817][T16883] ? avc_has_perm+0xd4/0x160 [ 284.351885][T16883] ? ref_tracker_alloc+0x1f5/0x2f0 [ 284.351922][T16883] tun_chr_write_iter+0x188/0x240 [ 284.352019][T16883] vfs_write+0x77b/0x920 [ 284.352041][T16883] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 284.352079][T16883] ksys_write+0xe8/0x1b0 [ 284.352154][T16883] __x64_sys_write+0x42/0x50 [ 284.352175][T16883] x64_sys_call+0x287e/0x2dc0 [ 284.352202][T16883] do_syscall_64+0xc9/0x1c0 [ 284.352226][T16883] ? clear_bhb_loop+0x55/0xb0 [ 284.352282][T16883] ? clear_bhb_loop+0x55/0xb0 [ 284.352315][T16883] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 284.352347][T16883] RIP: 0033:0x7f3e7cd0b85f [ 284.352365][T16883] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 284.352519][T16883] RSP: 002b:00007f3e7b371000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 284.352545][T16883] RAX: ffffffffffffffda RBX: 00007f3e7cf25fa0 RCX: 00007f3e7cd0b85f [ 284.352558][T16883] RDX: 0000000000000042 RSI: 0000000020000340 RDI: 00000000000000c8 [ 284.352570][T16883] RBP: 00007f3e7b371090 R08: 0000000000000000 R09: 0000000000000000 [ 284.352582][T16883] R10: 0000000000000042 R11: 0000000000000293 R12: 0000000000000001 [ 284.352594][T16883] R13: 0000000000000000 R14: 00007f3e7cf25fa0 R15: 00007ffcf9f05008 [ 284.352613][T16883] [ 284.570468][T16867] EXT4-fs warning (device loop1): ext4_xattr_set_entry:1772: inode #15: comm syz.1.4777: unable to update i_inline_off [ 284.593913][T16867] EXT4-fs error (device loop1): ext4_xattr_ibody_get:653: inode #15: comm syz.1.4777: corrupted in-inode xattr: overlapping e_value [ 284.649688][T16865] loop4: detected capacity change from 0 to 512 [ 284.661594][T16867] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz.1.4777: corrupted in-inode xattr: overlapping e_value [ 284.679662][T16865] ext4: Unknown parameter 'rootcontext [ 284.679662][T16865] staff_u' [ 284.722543][T13057] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 284.775146][T16902] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4792'. [ 284.786057][T16903] FAULT_INJECTION: forcing a failure. [ 284.786057][T16903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 284.799201][T16903] CPU: 1 UID: 0 PID: 16903 Comm: syz.1.4791 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 284.799227][T16903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 284.799309][T16903] Call Trace: [ 284.799316][T16903] [ 284.799324][T16903] dump_stack_lvl+0xf2/0x150 [ 284.799352][T16903] dump_stack+0x15/0x1a [ 284.799372][T16903] should_fail_ex+0x24a/0x260 [ 284.799405][T16903] should_fail+0xb/0x10 [ 284.799452][T16903] should_fail_usercopy+0x1a/0x20 [ 284.799471][T16903] _copy_from_user+0x1c/0xa0 [ 284.799499][T16903] copy_msghdr_from_user+0x54/0x2a0 [ 284.799520][T16903] ? __fget_files+0x17c/0x1c0 [ 284.799598][T16903] __sys_sendmsg+0x13e/0x230 [ 284.799641][T16903] __x64_sys_sendmsg+0x46/0x50 [ 284.799715][T16903] x64_sys_call+0x2734/0x2dc0 [ 284.799770][T16903] do_syscall_64+0xc9/0x1c0 [ 284.799793][T16903] ? clear_bhb_loop+0x55/0xb0 [ 284.799820][T16903] ? clear_bhb_loop+0x55/0xb0 [ 284.799905][T16903] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 284.800004][T16903] RIP: 0033:0x7f0e3bddcda9 [ 284.800019][T16903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 284.800037][T16903] RSP: 002b:00007f0e3a447038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 284.800056][T16903] RAX: ffffffffffffffda RBX: 00007f0e3bff5fa0 RCX: 00007f0e3bddcda9 [ 284.800086][T16903] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 284.800152][T16903] RBP: 00007f0e3a447090 R08: 0000000000000000 R09: 0000000000000000 [ 284.800164][T16903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 284.800175][T16903] R13: 0000000000000000 R14: 00007f0e3bff5fa0 R15: 00007ffd2d7e4918 [ 284.800194][T16903] [ 285.072354][T16918] netem: change failed [ 285.236267][T16931] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 285.283841][T16935] loop4: detected capacity change from 0 to 512 [ 285.291508][T16933] loop1: detected capacity change from 0 to 512 [ 285.298267][T16935] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 285.392373][T16933] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz.1.4805: corrupted in-inode xattr: invalid ea_ino [ 285.406787][T16935] EXT4-fs (loop4): 1 truncate cleaned up [ 285.416256][T16935] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 285.452548][T16933] EXT4-fs error (device loop1): ext4_orphan_get:1394: comm syz.1.4805: couldn't read orphan inode 15 (err -117) [ 285.475155][T16933] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 285.527796][T16935] netlink: 200 bytes leftover after parsing attributes in process `syz.4.4804'. [ 285.583644][T16943] netlink: 24 bytes leftover after parsing attributes in process `+}[@'. [ 285.597280][T13057] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 285.632839][T11718] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 285.674468][T16953] loop1: detected capacity change from 0 to 1024 [ 285.683646][T16953] EXT4-fs: Ignoring removed nomblk_io_submit option [ 285.711032][T16953] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 285.857504][T16976] 9pnet: Could not find request transport: 0xffffffffffffffff [ 286.151798][T17013] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4835'. [ 286.186516][T17017] netem: change failed [ 286.227931][T17021] netlink: 56 bytes leftover after parsing attributes in process `syz.6.4839'. [ 286.238008][T17021] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4839'. [ 286.314464][T17033] FAULT_INJECTION: forcing a failure. [ 286.314464][T17033] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.327736][T17033] CPU: 0 UID: 0 PID: 17033 Comm: syz.3.4845 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 286.327766][T17033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 286.327804][T17033] Call Trace: [ 286.327812][T17033] [ 286.327821][T17033] dump_stack_lvl+0xf2/0x150 [ 286.327855][T17033] dump_stack+0x15/0x1a [ 286.327914][T17033] should_fail_ex+0x24a/0x260 [ 286.327944][T17033] should_fail+0xb/0x10 [ 286.327968][T17033] should_fail_usercopy+0x1a/0x20 [ 286.327994][T17033] strncpy_from_user+0x25/0x210 [ 286.328016][T17033] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 286.328045][T17033] ? getname_flags+0x81/0x3b0 [ 286.328102][T17033] getname_flags+0xb0/0x3b0 [ 286.328127][T17033] getname+0x17/0x20 [ 286.328149][T17033] path_listxattrat+0x7d/0x2a0 [ 286.328182][T17033] ? ksys_write+0x176/0x1b0 [ 286.328205][T17033] __x64_sys_llistxattr+0x4d/0x60 [ 286.328232][T17033] x64_sys_call+0x204f/0x2dc0 [ 286.328283][T17033] do_syscall_64+0xc9/0x1c0 [ 286.328304][T17033] ? clear_bhb_loop+0x55/0xb0 [ 286.328363][T17033] ? clear_bhb_loop+0x55/0xb0 [ 286.328397][T17033] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 286.328421][T17033] RIP: 0033:0x7f2d694acda9 [ 286.328442][T17033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.328513][T17033] RSP: 002b:00007f2d67b17038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3 [ 286.328529][T17033] RAX: ffffffffffffffda RBX: 00007f2d696c5fa0 RCX: 00007f2d694acda9 [ 286.328539][T17033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 286.328549][T17033] RBP: 00007f2d67b17090 R08: 0000000000000000 R09: 0000000000000000 [ 286.328559][T17033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.328647][T17033] R13: 0000000000000000 R14: 00007f2d696c5fa0 R15: 00007fff42986438 [ 286.328663][T17033] [ 286.539447][T13057] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 286.583643][T17043] IPv6: Can't replace route, no match found [ 286.609305][T17046] netem: change failed [ 286.656041][T17054] netlink: 72 bytes leftover after parsing attributes in process `syz.0.4853'. [ 286.878423][T17062] loop4: detected capacity change from 0 to 512 [ 286.890278][T17062] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.4854: bg 0: block 248: padding at end of block bitmap is not set [ 286.906166][T17062] EXT4-fs error (device loop4): ext4_acquire_dquot:6927: comm syz.4.4854: Failed to acquire dquot type 1 [ 286.918536][T17062] EXT4-fs (loop4): 1 truncate cleaned up [ 286.924679][T17062] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 286.937382][T17062] ext4 filesystem being mounted at /360/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 286.957663][T11718] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 287.360170][T17082] netem: change failed [ 287.487734][T17092] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 287.539584][T17098] loop1: detected capacity change from 0 to 512 [ 287.555514][T17098] EXT4-fs warning (device loop1): ext4_enable_quotas:7145: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 287.571034][T17098] EXT4-fs (loop1): mount failed [ 287.595514][T17106] loop1: detected capacity change from 0 to 512 [ 287.602134][T17106] EXT4-fs: Ignoring removed oldalloc option [ 287.608462][T17106] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 287.629961][T17106] EXT4-fs (loop1): 1 truncate cleaned up [ 287.636081][T17106] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 287.656116][T17106] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz.1.4869: corrupted in-inode xattr: overlapping e_value [ 287.670252][T17106] EXT4-fs warning (device loop1): ext4_xattr_set_entry:1772: inode #15: comm syz.1.4869: unable to update i_inline_off [ 287.682893][T17106] EXT4-fs error (device loop1): ext4_xattr_ibody_get:653: inode #15: comm syz.1.4869: corrupted in-inode xattr: overlapping e_value [ 287.696818][T17106] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz.1.4869: corrupted in-inode xattr: overlapping e_value [ 287.723893][T13057] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 287.743218][T17111] loop1: detected capacity change from 0 to 128 [ 287.749691][T17111] vfat: Unknown parameter '' [ 287.771273][T17113] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4871'. [ 287.843641][T17115] loop4: detected capacity change from 0 to 2048 [ 287.863238][T17115] bio_check_eod: 78 callbacks suppressed [ 287.863254][T17115] syz.4.4872: attempt to access beyond end of device [ 287.863254][T17115] loop4: rw=0, sector=1552, nr_sectors = 512 limit=2048 [ 287.916893][T17121] lo speed is unknown, defaulting to 1000 [ 287.975029][ T3377] IPVS: starting estimator thread 0... [ 287.987201][T17120] xt_CT: No such helper "snmp_trap" [ 288.005793][T17121] lo speed is unknown, defaulting to 1000 [ 288.023093][T17129] loop4: detected capacity change from 0 to 2048 [ 288.044108][T17129] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 288.074663][T17123] IPVS: using max 2016 ests per chain, 100800 per kthread [ 288.091291][T17134] FAULT_INJECTION: forcing a failure. [ 288.091291][T17134] name failslab, interval 1, probability 0, space 0, times 0 [ 288.104081][T17134] CPU: 1 UID: 0 PID: 17134 Comm: syz.1.4877 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 288.104115][T17134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 288.104127][T17134] Call Trace: [ 288.104132][T17134] [ 288.104138][T17134] dump_stack_lvl+0xf2/0x150 [ 288.104163][T17134] dump_stack+0x15/0x1a [ 288.104181][T17134] should_fail_ex+0x24a/0x260 [ 288.104246][T17134] should_failslab+0x8f/0xb0 [ 288.104269][T17134] kmem_cache_alloc_node_noprof+0x59/0x320 [ 288.104374][T17134] ? __alloc_skb+0x10b/0x310 [ 288.104396][T17134] __alloc_skb+0x10b/0x310 [ 288.104416][T17134] ? audit_log_start+0x34c/0x6b0 [ 288.104444][T17134] audit_log_start+0x368/0x6b0 [ 288.104471][T17134] ? futex_requeue+0xdea/0xf10 [ 288.104513][T17134] audit_seccomp+0x4b/0x130 [ 288.104537][T17134] __seccomp_filter+0x6fa/0x1180 [ 288.104558][T17134] ? do_futex+0x304/0x370 [ 288.104584][T17134] __secure_computing+0x9f/0x1c0 [ 288.104624][T17134] syscall_trace_enter+0xd1/0x1f0 [ 288.104644][T17134] ? fpregs_assert_state_consistent+0x83/0xa0 [ 288.104678][T17134] do_syscall_64+0xaa/0x1c0 [ 288.104742][T17134] ? clear_bhb_loop+0x55/0xb0 [ 288.104766][T17134] ? clear_bhb_loop+0x55/0xb0 [ 288.104790][T17134] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.104814][T17134] RIP: 0033:0x7f0e3bddb7bc [ 288.104826][T17134] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 288.104859][T17134] RSP: 002b:00007f0e3a447030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 288.104875][T17134] RAX: ffffffffffffffda RBX: 00007f0e3bff5fa0 RCX: 00007f0e3bddb7bc [ 288.104886][T17134] RDX: 000000000000000f RSI: 00007f0e3a4470a0 RDI: 0000000000000006 [ 288.104896][T17134] RBP: 00007f0e3a447090 R08: 0000000000000000 R09: 0000000000000000 [ 288.104907][T17134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 288.104917][T17134] R13: 0000000000000000 R14: 00007f0e3bff5fa0 R15: 00007ffd2d7e4918 [ 288.104973][T17134] [ 288.323474][T17136] FAULT_INJECTION: forcing a failure. [ 288.323474][T17136] name failslab, interval 1, probability 0, space 0, times 0 [ 288.336157][T17136] CPU: 1 UID: 0 PID: 17136 Comm: syz.1.4878 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 288.336185][T17136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 288.336243][T17136] Call Trace: [ 288.336300][T17136] [ 288.336309][T17136] dump_stack_lvl+0xf2/0x150 [ 288.336340][T17136] dump_stack+0x15/0x1a [ 288.336360][T17136] should_fail_ex+0x24a/0x260 [ 288.336398][T17136] should_failslab+0x8f/0xb0 [ 288.336428][T17136] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 288.336508][T17136] ? __d_alloc+0x3d/0x340 [ 288.336605][T17136] __d_alloc+0x3d/0x340 [ 288.336689][T17136] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 288.336798][T17136] ? security_inode_alloc+0x37/0x100 [ 288.336831][T17136] d_alloc_pseudo+0x1e/0x80 [ 288.336871][T17136] alloc_file_pseudo+0x73/0x140 [ 288.336920][T17136] ? inode_init_always_gfp+0x4b8/0x4f0 [ 288.336953][T17136] sock_alloc_file+0x9b/0x1c0 [ 288.336974][T17136] do_accept+0x1e3/0x390 [ 288.337005][T17136] __sys_accept4+0xc3/0x150 [ 288.337034][T17136] __x64_sys_accept4+0x53/0x60 [ 288.337131][T17136] x64_sys_call+0x2824/0x2dc0 [ 288.337164][T17136] do_syscall_64+0xc9/0x1c0 [ 288.337236][T17136] ? clear_bhb_loop+0x55/0xb0 [ 288.337269][T17136] ? clear_bhb_loop+0x55/0xb0 [ 288.337302][T17136] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.337332][T17136] RIP: 0033:0x7f0e3bddcda9 [ 288.337347][T17136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.337402][T17136] RSP: 002b:00007f0e3a447038 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 288.337425][T17136] RAX: ffffffffffffffda RBX: 00007f0e3bff5fa0 RCX: 00007f0e3bddcda9 [ 288.337440][T17136] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 288.337454][T17136] RBP: 00007f0e3a447090 R08: 0000000000000000 R09: 0000000000000000 [ 288.337491][T17136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.337505][T17136] R13: 0000000000000000 R14: 00007f0e3bff5fa0 R15: 00007ffd2d7e4918 [ 288.337571][T17136] [ 288.579883][T11718] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 288.603060][T17140] SELinux: syz.1.4880 (17140) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 288.669967][ T29] kauditd_printk_skb: 369 callbacks suppressed [ 288.669982][ T29] audit: type=1326 audit(1738535960.754:14453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.4.4883" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52b0f6cda9 code=0x7ffc0000 [ 288.699867][ T29] audit: type=1326 audit(1738535960.754:14454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.4.4883" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52b0f6cda9 code=0x7ffc0000 [ 288.723551][ T29] audit: type=1326 audit(1738535960.754:14455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.4.4883" exe="/root/syz-executor" sig=0 arch=c000003e syscall=443 compat=0 ip=0x7f52b0f6cda9 code=0x7ffc0000 [ 288.747247][ T29] audit: type=1326 audit(1738535960.754:14456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.4.4883" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52b0f6cda9 code=0x7ffc0000 [ 288.770913][ T29] audit: type=1326 audit(1738535960.754:14457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.4.4883" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f52b0f6cda9 code=0x7ffc0000 [ 288.794530][ T29] audit: type=1326 audit(1738535960.754:14458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.4.4883" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52b0f6cda9 code=0x7ffc0000 [ 288.818221][ T29] audit: type=1326 audit(1738535960.754:14459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.4.4883" exe="/root/syz-executor" sig=0 arch=c000003e syscall=47 compat=0 ip=0x7f52b0f6cda9 code=0x7ffc0000 [ 288.827339][T17159] netlink: 88 bytes leftover after parsing attributes in process `syz.1.4886'. [ 288.841793][ T29] audit: type=1326 audit(1738535960.754:14460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.4.4883" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52b0f6cda9 code=0x7ffc0000 [ 288.841831][ T29] audit: type=1326 audit(1738535960.754:14461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.4.4883" exe="/root/syz-executor" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7f52b0f6cda9 code=0x7ffc0000 [ 288.841935][ T29] audit: type=1326 audit(1738535960.754:14462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.4.4883" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52b0f6cda9 code=0x7ffc0000 [ 288.982937][T17162] wireguard0: entered promiscuous mode [ 288.988533][T17162] wireguard0: entered allmulticast mode [ 289.154115][T17170] lo speed is unknown, defaulting to 1000 [ 289.159996][T17158] lo speed is unknown, defaulting to 1000 [ 289.180259][T17170] lo speed is unknown, defaulting to 1000 [ 289.216008][T17170] lo speed is unknown, defaulting to 1000 [ 289.294442][T17170] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 289.322220][T17170] lo speed is unknown, defaulting to 1000 [ 289.339591][T17170] lo speed is unknown, defaulting to 1000 [ 289.359057][T17170] lo speed is unknown, defaulting to 1000 [ 289.365458][T17170] lo speed is unknown, defaulting to 1000 [ 289.374196][T17170] lo speed is unknown, defaulting to 1000 [ 289.381253][T17170] lo speed is unknown, defaulting to 1000 [ 289.387761][T17170] lo speed is unknown, defaulting to 1000 [ 289.396481][T17170] lo speed is unknown, defaulting to 1000 [ 289.403065][T17170] lo speed is unknown, defaulting to 1000 [ 289.409558][T17170] lo speed is unknown, defaulting to 1000 [ 289.419879][T17170] lo speed is unknown, defaulting to 1000 [ 289.432797][T17170] lo speed is unknown, defaulting to 1000 [ 289.700218][T17186] loop4: detected capacity change from 0 to 1024 [ 289.706927][T17186] EXT4-fs: Ignoring removed nomblk_io_submit option [ 289.751628][T17190] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 289.773325][T17186] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 289.848011][T17195] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4896'. [ 290.054564][T17206] netem: change failed [ 290.092106][T17208] x_tables: ip_tables: osf match: only valid for protocol 6 [ 290.433275][T17228] netlink: 28 bytes leftover after parsing attributes in process `syz.6.4906'. [ 290.443172][T17228] netlink: 28 bytes leftover after parsing attributes in process `syz.6.4906'. [ 290.503059][T17234] FAULT_INJECTION: forcing a failure. [ 290.503059][T17234] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.516269][T17234] CPU: 0 UID: 0 PID: 17234 Comm: syz.0.4912 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 290.516297][T17234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 290.516312][T17234] Call Trace: [ 290.516319][T17234] [ 290.516408][T17234] dump_stack_lvl+0xf2/0x150 [ 290.516503][T17234] dump_stack+0x15/0x1a [ 290.516529][T17234] should_fail_ex+0x24a/0x260 [ 290.516570][T17234] should_fail+0xb/0x10 [ 290.516607][T17234] should_fail_usercopy+0x1a/0x20 [ 290.516630][T17234] _copy_from_user+0x1c/0xa0 [ 290.516702][T17234] bpf_obj_get_info_by_fd+0x2cd/0x1cb0 [ 290.516740][T17234] ? kstrtoull+0x110/0x140 [ 290.516774][T17234] ? kstrtouint+0x77/0xc0 [ 290.516818][T17234] __sys_bpf+0x613/0x7a0 [ 290.516879][T17234] __x64_sys_bpf+0x43/0x50 [ 290.516902][T17234] x64_sys_call+0x2914/0x2dc0 [ 290.516933][T17234] do_syscall_64+0xc9/0x1c0 [ 290.516960][T17234] ? clear_bhb_loop+0x55/0xb0 [ 290.516992][T17234] ? clear_bhb_loop+0x55/0xb0 [ 290.517079][T17234] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.517148][T17234] RIP: 0033:0x7f3e7cd0cda9 [ 290.517164][T17234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 290.517182][T17234] RSP: 002b:00007f3e7b371038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 290.517200][T17234] RAX: ffffffffffffffda RBX: 00007f3e7cf25fa0 RCX: 00007f3e7cd0cda9 [ 290.517213][T17234] RDX: 0000000000000010 RSI: 00000000200008c0 RDI: 000000000000000f [ 290.517227][T17234] RBP: 00007f3e7b371090 R08: 0000000000000000 R09: 0000000000000000 [ 290.517274][T17234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.517285][T17234] R13: 0000000000000000 R14: 00007f3e7cf25fa0 R15: 00007ffcf9f05008 [ 290.517304][T17234] [ 290.519058][T11718] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 290.528600][T17235] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 290.736835][T17242] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(11) [ 290.743489][T17242] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 290.751104][T17242] vhci_hcd vhci_hcd.0: Device attached [ 290.765301][ T3377] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 290.765734][T17246] loop4: detected capacity change from 0 to 8192 [ 290.775918][ T3377] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 290.781155][T17242] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 290.798050][T17242] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 290.810156][T17247] vhci_hcd: connection closed [ 290.810476][ T9385] vhci_hcd: stop threads [ 290.819474][ T9385] vhci_hcd: release socket [ 290.823948][ T9385] vhci_hcd: disconnect device [ 291.103035][T17257] loop4: detected capacity change from 0 to 512 [ 291.110077][T17257] EXT4-fs (loop4): blocks per group (95) and clusters per group (32768) inconsistent [ 291.124785][T17257] tmpfs: Bad value for 'mpol' [ 291.464033][T17290] FAULT_INJECTION: forcing a failure. [ 291.464033][T17290] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 291.477294][T17290] CPU: 1 UID: 0 PID: 17290 Comm: syz.0.4930 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 291.477323][T17290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 291.477336][T17290] Call Trace: [ 291.477342][T17290] [ 291.477357][T17290] dump_stack_lvl+0xf2/0x150 [ 291.477387][T17290] dump_stack+0x15/0x1a [ 291.477410][T17290] should_fail_ex+0x24a/0x260 [ 291.477445][T17290] should_fail+0xb/0x10 [ 291.477531][T17290] should_fail_usercopy+0x1a/0x20 [ 291.477552][T17290] _copy_to_user+0x20/0xa0 [ 291.477645][T17290] simple_read_from_buffer+0xa0/0x110 [ 291.477792][T17290] proc_fail_nth_read+0xf9/0x140 [ 291.477850][T17290] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 291.477878][T17290] vfs_read+0x19b/0x6f0 [ 291.477900][T17290] ? __rcu_read_unlock+0x4e/0x70 [ 291.477924][T17290] ? __fget_files+0x17c/0x1c0 [ 291.477969][T17290] ksys_read+0xe8/0x1b0 [ 291.477994][T17290] __x64_sys_read+0x42/0x50 [ 291.478019][T17290] x64_sys_call+0x2874/0x2dc0 [ 291.478056][T17290] do_syscall_64+0xc9/0x1c0 [ 291.478084][T17290] ? clear_bhb_loop+0x55/0xb0 [ 291.478115][T17290] ? clear_bhb_loop+0x55/0xb0 [ 291.478208][T17290] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.478258][T17290] RIP: 0033:0x7f3e7cd0b7bc [ 291.478294][T17290] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 291.478316][T17290] RSP: 002b:00007f3e7b371030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 291.478339][T17290] RAX: ffffffffffffffda RBX: 00007f3e7cf25fa0 RCX: 00007f3e7cd0b7bc [ 291.478353][T17290] RDX: 000000000000000f RSI: 00007f3e7b3710a0 RDI: 0000000000000006 [ 291.478367][T17290] RBP: 00007f3e7b371090 R08: 0000000000000000 R09: 0000000000000000 [ 291.478380][T17290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.478425][T17290] R13: 0000000000000000 R14: 00007f3e7cf25fa0 R15: 00007ffcf9f05008 [ 291.478525][T17290] [ 291.515877][ T9385] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 291.618132][T17296] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 292.089601][T17317] netlink: 3 bytes leftover after parsing attributes in process `syz.4.4940'. [ 292.104978][T17317] 0ªX¹¦À: renamed from caif0 [ 292.112151][T17317] 0ªX¹¦À: entered allmulticast mode [ 292.117440][T17317] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 292.156900][T17321] loop1: detected capacity change from 0 to 512 [ 292.168739][T17321] EXT4-fs error (device loop1): ext4_orphan_get:1389: inode #15: comm syz.1.4942: casefold flag without casefold feature [ 292.183269][T17321] EXT4-fs error (device loop1): ext4_orphan_get:1394: comm syz.1.4942: couldn't read orphan inode 15 (err -117) [ 292.196806][T17321] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 292.223169][T13057] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 292.231511][T17330] lo speed is unknown, defaulting to 1000 [ 292.289868][T17330] lo speed is unknown, defaulting to 1000 [ 292.324786][T17339] lo speed is unknown, defaulting to 1000 [ 292.333286][T17343] FAULT_INJECTION: forcing a failure. [ 292.333286][T17343] name failslab, interval 1, probability 0, space 0, times 0 [ 292.345985][T17343] CPU: 1 UID: 0 PID: 17343 Comm: syz.4.4948 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 292.346017][T17343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 292.346032][T17343] Call Trace: [ 292.346039][T17343] [ 292.346046][T17343] dump_stack_lvl+0xf2/0x150 [ 292.346080][T17343] dump_stack+0x15/0x1a [ 292.346106][T17343] should_fail_ex+0x24a/0x260 [ 292.346147][T17343] should_failslab+0x8f/0xb0 [ 292.346178][T17343] kmem_cache_alloc_noprof+0x52/0x320 [ 292.346215][T17343] ? vm_area_dup+0x2c/0x130 [ 292.346238][T17343] vm_area_dup+0x2c/0x130 [ 292.346259][T17343] __split_vma+0xf7/0x6a0 [ 292.346300][T17343] vma_modify+0xd3/0x1e0 [ 292.346335][T17343] vma_modify_policy+0xeb/0x120 [ 292.346378][T17343] mbind_range+0x1d8/0x490 [ 292.346411][T17343] __se_sys_mbind+0x95c/0x11c0 [ 292.346454][T17343] __x64_sys_mbind+0x78/0x90 [ 292.346489][T17343] x64_sys_call+0x2662/0x2dc0 [ 292.346515][T17343] do_syscall_64+0xc9/0x1c0 [ 292.346537][T17343] ? clear_bhb_loop+0x55/0xb0 [ 292.346567][T17343] ? clear_bhb_loop+0x55/0xb0 [ 292.346592][T17343] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.346618][T17343] RIP: 0033:0x7f52b0f6cda9 [ 292.346634][T17343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.346656][T17343] RSP: 002b:00007f52af5d1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 292.346678][T17343] RAX: ffffffffffffffda RBX: 00007f52b1185fa0 RCX: 00007f52b0f6cda9 [ 292.346690][T17343] RDX: 0000000000000004 RSI: 0000000000800000 RDI: 0000000020001000 [ 292.346702][T17343] RBP: 00007f52af5d1090 R08: 0000000000000000 R09: 0000000000000000 [ 292.346714][T17343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.346727][T17343] R13: 0000000000000000 R14: 00007f52b1185fa0 R15: 00007fff62620988 [ 292.346756][T17343] [ 292.542257][T17339] lo speed is unknown, defaulting to 1000 [ 292.585689][T17351] netem: change failed [ 292.622286][T17353] FAULT_INJECTION: forcing a failure. [ 292.622286][T17353] name failslab, interval 1, probability 0, space 0, times 0 [ 292.635080][T17353] CPU: 1 UID: 0 PID: 17353 Comm: syz.4.4951 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 292.635144][T17353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 292.635156][T17353] Call Trace: [ 292.635162][T17353] [ 292.635170][T17353] dump_stack_lvl+0xf2/0x150 [ 292.635198][T17353] dump_stack+0x15/0x1a [ 292.635296][T17353] should_fail_ex+0x24a/0x260 [ 292.635333][T17353] should_failslab+0x8f/0xb0 [ 292.635423][T17353] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 292.635492][T17353] ? __d_alloc+0x3d/0x340 [ 292.635533][T17353] __d_alloc+0x3d/0x340 [ 292.635571][T17353] d_alloc_pseudo+0x1e/0x80 [ 292.635718][T17353] alloc_file_pseudo+0x73/0x140 [ 292.635759][T17353] __shmem_file_setup+0x1bb/0x1f0 [ 292.635803][T17353] shmem_file_setup+0x3b/0x50 [ 292.635831][T17353] __se_sys_memfd_create+0x2e1/0x5a0 [ 292.635852][T17353] __x64_sys_memfd_create+0x31/0x40 [ 292.635872][T17353] x64_sys_call+0x2d4c/0x2dc0 [ 292.635974][T17353] do_syscall_64+0xc9/0x1c0 [ 292.635998][T17353] ? clear_bhb_loop+0x55/0xb0 [ 292.636027][T17353] ? clear_bhb_loop+0x55/0xb0 [ 292.636060][T17353] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.636139][T17353] RIP: 0033:0x7f52b0f6cda9 [ 292.636154][T17353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.636176][T17353] RSP: 002b:00007f52af5d0e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 292.636197][T17353] RAX: ffffffffffffffda RBX: 0000000000000516 RCX: 00007f52b0f6cda9 [ 292.636283][T17353] RDX: 00007f52af5d0ef0 RSI: 0000000000000000 RDI: 00007f52b0feec51 [ 292.636298][T17353] RBP: 0000000020000b00 R08: 00007f52af5d0bb7 R09: 00007f52af5d0e40 [ 292.636313][T17353] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000080 [ 292.636327][T17353] R13: 00007f52af5d0ef0 R14: 00007f52af5d0eb0 R15: 0000000020000600 [ 292.636346][T17353] [ 292.846744][T17357] loop4: detected capacity change from 0 to 256 [ 292.858797][T17349] Â: renamed from pim6reg1 [ 292.867558][T17357] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 292.938090][T17364] FAULT_INJECTION: forcing a failure. [ 292.938090][T17364] name failslab, interval 1, probability 0, space 0, times 0 [ 292.950903][T17364] CPU: 1 UID: 0 PID: 17364 Comm: syz.3.4955 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 292.950931][T17364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 292.950943][T17364] Call Trace: [ 292.950949][T17364] [ 292.950956][T17364] dump_stack_lvl+0xf2/0x150 [ 292.950991][T17364] dump_stack+0x15/0x1a [ 292.951013][T17364] should_fail_ex+0x24a/0x260 [ 292.951129][T17364] should_failslab+0x8f/0xb0 [ 292.951159][T17364] __kmalloc_noprof+0xab/0x3f0 [ 292.951243][T17364] ? ethnl_default_start+0xb1/0x330 [ 292.951284][T17364] ethnl_default_start+0xb1/0x330 [ 292.951323][T17364] ? __pfx_ethnl_default_start+0x10/0x10 [ 292.951357][T17364] genl_start+0x2e8/0x3a0 [ 292.951446][T17364] __netlink_dump_start+0x32a/0x520 [ 292.951487][T17364] genl_rcv_msg+0x4e5/0x6c0 [ 292.951510][T17364] ? __pfx_ethnl_default_start+0x10/0x10 [ 292.951587][T17364] ? __pfx_ethnl_default_dumpit+0x10/0x10 [ 292.951658][T17364] ? __pfx_ethnl_default_done+0x10/0x10 [ 292.951696][T17364] ? __pfx_genl_start+0x10/0x10 [ 292.951722][T17364] ? __pfx_genl_dumpit+0x10/0x10 [ 292.951755][T17364] ? __pfx_genl_done+0x10/0x10 [ 292.951787][T17364] netlink_rcv_skb+0x12c/0x230 [ 292.951818][T17364] ? __pfx_genl_rcv_msg+0x10/0x10 [ 292.951852][T17364] genl_rcv+0x28/0x40 [ 292.951929][T17364] netlink_unicast+0x599/0x670 [ 292.951967][T17364] netlink_sendmsg+0x5cc/0x6e0 [ 292.952007][T17364] ? __pfx_netlink_sendmsg+0x10/0x10 [ 292.952046][T17364] __sock_sendmsg+0x140/0x180 [ 292.952066][T17364] ____sys_sendmsg+0x312/0x410 [ 292.952100][T17364] __sys_sendmsg+0x19d/0x230 [ 292.952227][T17364] __x64_sys_sendmsg+0x46/0x50 [ 292.952262][T17364] x64_sys_call+0x2734/0x2dc0 [ 292.952293][T17364] do_syscall_64+0xc9/0x1c0 [ 292.952322][T17364] ? clear_bhb_loop+0x55/0xb0 [ 292.952350][T17364] ? clear_bhb_loop+0x55/0xb0 [ 292.952411][T17364] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.952437][T17364] RIP: 0033:0x7f2d694acda9 [ 292.952452][T17364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.952517][T17364] RSP: 002b:00007f2d67b17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 292.952539][T17364] RAX: ffffffffffffffda RBX: 00007f2d696c5fa0 RCX: 00007f2d694acda9 [ 292.952554][T17364] RDX: 0000000020048840 RSI: 00000000200001c0 RDI: 0000000000000006 [ 292.952569][T17364] RBP: 00007f2d67b17090 R08: 0000000000000000 R09: 0000000000000000 [ 292.952583][T17364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.952637][T17364] R13: 0000000000000000 R14: 00007f2d696c5fa0 R15: 00007fff42986438 [ 292.952663][T17364] [ 293.274680][T17367] xt_CT: You must specify a L4 protocol and not use inversions on it [ 293.290342][T17377] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 293.310374][T17374] loop1: detected capacity change from 0 to 2048 [ 293.346411][T17385] TCP: TCP_TX_DELAY enabled [ 293.410222][T17391] wireguard0: entered promiscuous mode [ 293.415808][T17391] wireguard0: entered allmulticast mode [ 293.547060][T17399] lo speed is unknown, defaulting to 1000 [ 293.619205][T17401] loop4: detected capacity change from 0 to 8192 [ 293.634071][T17399] lo speed is unknown, defaulting to 1000 [ 293.702134][T17409] loop1: detected capacity change from 0 to 512 [ 293.721165][T17401] loop4: p2 p3 p4 [ 293.725005][T17401] loop4: p2 size 130943 extends beyond EOD, truncated [ 293.764566][T17401] loop4: p3 size 16776960 extends beyond EOD, truncated [ 293.765922][T17413] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 293.773555][T17409] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 293.800992][T17401] loop4: p4 size 3599499392 extends beyond EOD, truncated [ 293.815751][T17409] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 293.856721][ T29] kauditd_printk_skb: 220 callbacks suppressed [ 293.856741][ T29] audit: type=1400 audit(1738535965.981:14683): avc: denied { bind } for pid=17400 comm="syz.4.4969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 293.883258][ T29] audit: type=1400 audit(1738535965.981:14684): avc: denied { name_bind } for pid=17400 comm="syz.4.4969" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 293.905127][ T29] audit: type=1400 audit(1738535965.981:14685): avc: denied { node_bind } for pid=17400 comm="syz.4.4969" saddr=fe88::5 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 293.936802][T17409] EXT4-fs (loop1): 1 truncate cleaned up [ 293.953244][T17409] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 293.974100][T17401] hub 6-0:1.0: USB hub found [ 293.980335][T17401] hub 6-0:1.0: 8 ports detected [ 294.000690][T13057] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 294.081563][T17421] loop1: detected capacity change from 0 to 512 [ 294.117762][T17421] EXT4-fs (loop1): orphan cleanup on readonly fs [ 294.117788][ T29] audit: type=1326 audit(1738535966.253:14686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17422 comm="syz.3.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 294.124822][T17421] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.4975: bg 0: block 248: padding at end of block bitmap is not set [ 294.148788][ T29] audit: type=1326 audit(1738535966.253:14687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17422 comm="syz.3.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 294.223389][T17421] Quota error (device loop1): write_blk: dquota write failed [ 294.230951][T17421] Quota error (device loop1): qtree_write_dquot: Error -117 occurred while creating quota [ 294.240919][T17421] EXT4-fs error (device loop1): ext4_acquire_dquot:6927: comm syz.1.4975: Failed to acquire dquot type 1 [ 294.254915][T17421] EXT4-fs (loop1): 1 truncate cleaned up [ 294.263423][T17421] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 294.276506][ T29] audit: type=1326 audit(1738535966.323:14688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17422 comm="syz.3.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 294.276549][ T29] audit: type=1326 audit(1738535966.323:14689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17422 comm="syz.3.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 294.323893][ T29] audit: type=1326 audit(1738535966.323:14690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17422 comm="syz.3.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 294.471775][T17439] loop4: detected capacity change from 0 to 512 [ 294.483884][T17439] loop4: detected capacity change from 0 to 1024 [ 294.498803][T17439] loop4: detected capacity change from 0 to 1024 [ 294.526829][T17441] loop4: detected capacity change from 0 to 128 [ 294.568000][T17441] syz.4.4982: attempt to access beyond end of device [ 294.568000][T17441] loop4: rw=2049, sector=145, nr_sectors = 896 limit=128 [ 294.596412][T17441] syz.4.4982: attempt to access beyond end of device [ 294.596412][T17441] loop4: rw=524288, sector=145, nr_sectors = 224 limit=128 [ 294.614387][T17441] syz.4.4982: attempt to access beyond end of device [ 294.614387][T17441] loop4: rw=0, sector=145, nr_sectors = 8 limit=128 [ 294.629852][T17441] syz.4.4982: attempt to access beyond end of device [ 294.629852][T17441] loop4: rw=0, sector=145, nr_sectors = 8 limit=128 [ 294.644223][T17441] syz.4.4982: attempt to access beyond end of device [ 294.644223][T17441] loop4: rw=0, sector=145, nr_sectors = 8 limit=128 [ 294.686056][T17446] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 294.718392][T17448] loop4: detected capacity change from 0 to 256 [ 294.728346][T17448] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 294.791130][T17458] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 294.794063][T17460] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4991'. [ 294.823206][T17460] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4991'. [ 294.836524][T17463] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4992'. [ 294.860597][T13057] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 294.878914][T17465] loop1: detected capacity change from 0 to 128 [ 294.883780][T17466] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4991'. [ 294.888458][T17465] vfat: Unknown parameter '' [ 294.895005][T17467] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=17467 comm=syz.3.4992 [ 294.911539][T17467] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=17467 comm=syz.3.4992 [ 294.928360][T17469] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4994'. [ 294.929604][T17466] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4991'. [ 295.065012][T17483] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 295.074976][T17485] loop4: detected capacity change from 0 to 128 [ 295.096579][T17487] netlink: 16 bytes leftover after parsing attributes in process `syz.1.5000'. [ 295.125743][T17489] FAULT_INJECTION: forcing a failure. [ 295.125743][T17489] name failslab, interval 1, probability 0, space 0, times 0 [ 295.138460][T17489] CPU: 0 UID: 0 PID: 17489 Comm: syz.1.5001 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 295.138489][T17489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 295.138575][T17489] Call Trace: [ 295.138583][T17489] [ 295.138672][T17489] dump_stack_lvl+0xf2/0x150 [ 295.138697][T17489] dump_stack+0x15/0x1a [ 295.138720][T17489] should_fail_ex+0x24a/0x260 [ 295.138750][T17489] should_failslab+0x8f/0xb0 [ 295.138772][T17489] __kmalloc_node_noprof+0xad/0x410 [ 295.138877][T17489] ? do_syscall_64+0xc9/0x1c0 [ 295.138930][T17489] ? qdisc_alloc+0x65/0x450 [ 295.138957][T17489] qdisc_alloc+0x65/0x450 [ 295.138985][T17489] qdisc_create_dflt+0x4c/0x280 [ 295.139017][T17489] taprio_init+0x29e/0x610 [ 295.139037][T17489] ? __pfx_taprio_init+0x10/0x10 [ 295.139054][T17489] qdisc_create+0x6c1/0xae0 [ 295.139073][T17489] ? __kfree_skb+0x102/0x150 [ 295.139108][T17489] ? __nla_parse+0x40/0x60 [ 295.139126][T17489] tc_modify_qdisc+0x668/0x1100 [ 295.139154][T17489] ? ns_capable+0x7d/0xb0 [ 295.139172][T17489] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 295.139193][T17489] rtnetlink_rcv_msg+0x6aa/0x710 [ 295.139251][T17489] ? ref_tracker_free+0x3a5/0x410 [ 295.139277][T17489] ? __dev_queue_xmit+0x186/0x2090 [ 295.139417][T17489] netlink_rcv_skb+0x12c/0x230 [ 295.139444][T17489] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 295.139478][T17489] rtnetlink_rcv+0x1c/0x30 [ 295.139646][T17489] netlink_unicast+0x599/0x670 [ 295.139678][T17489] netlink_sendmsg+0x5cc/0x6e0 [ 295.139729][T17489] ? __pfx_netlink_sendmsg+0x10/0x10 [ 295.139860][T17489] __sock_sendmsg+0x140/0x180 [ 295.139884][T17489] ____sys_sendmsg+0x312/0x410 [ 295.139916][T17489] __sys_sendmsg+0x19d/0x230 [ 295.139968][T17489] __x64_sys_sendmsg+0x46/0x50 [ 295.140010][T17489] x64_sys_call+0x2734/0x2dc0 [ 295.140038][T17489] do_syscall_64+0xc9/0x1c0 [ 295.140063][T17489] ? clear_bhb_loop+0x55/0xb0 [ 295.140097][T17489] ? clear_bhb_loop+0x55/0xb0 [ 295.140144][T17489] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 295.140175][T17489] RIP: 0033:0x7f0e3bddcda9 [ 295.140190][T17489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.140227][T17489] RSP: 002b:00007f0e3a447038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 295.140247][T17489] RAX: ffffffffffffffda RBX: 00007f0e3bff5fa0 RCX: 00007f0e3bddcda9 [ 295.140262][T17489] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000006 [ 295.140277][T17489] RBP: 00007f0e3a447090 R08: 0000000000000000 R09: 0000000000000000 [ 295.140292][T17489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 295.140306][T17489] R13: 0000000000000000 R14: 00007f0e3bff5fa0 R15: 00007ffd2d7e4918 [ 295.140353][T17489] [ 295.426805][T17491] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 295.505639][T17502] serio: Serial port ptm0 [ 295.701018][T17515] FAULT_INJECTION: forcing a failure. [ 295.701018][T17515] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 295.715032][T17515] CPU: 0 UID: 0 PID: 17515 Comm: syz.3.5010 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 295.715063][T17515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 295.715079][T17515] Call Trace: [ 295.715086][T17515] [ 295.715095][T17515] dump_stack_lvl+0xf2/0x150 [ 295.715129][T17515] dump_stack+0x15/0x1a [ 295.715231][T17515] should_fail_ex+0x24a/0x260 [ 295.715319][T17515] should_fail_alloc_page+0xfd/0x110 [ 295.715346][T17515] __alloc_frozen_pages_noprof+0x109/0x340 [ 295.715375][T17515] alloc_pages_mpol+0xb4/0x260 [ 295.715417][T17515] vma_alloc_folio_noprof+0x1a0/0x310 [ 295.715477][T17515] handle_mm_fault+0xdd7/0x2ac0 [ 295.715526][T17515] exc_page_fault+0x3b9/0x650 [ 295.715568][T17515] asm_exc_page_fault+0x26/0x30 [ 295.715596][T17515] RIP: 0033:0x7f2d6936fc50 [ 295.715611][T17515] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 295.715629][T17515] RSP: 002b:00007f2d67b164a0 EFLAGS: 00010202 [ 295.715645][T17515] RAX: 0000000000001000 RBX: 00007f2d67b16540 RCX: 0000000000000003 [ 295.715659][T17515] RDX: 0000000000000fe3 RSI: 0000000000000be4 RDI: 00007f2d67b165e0 [ 295.715687][T17515] RBP: 0000000000000004 R08: 00007f2d5f6f7000 R09: 0000000000000002 [ 295.715702][T17515] R10: 0000000020000202 R11: 0000000000000516 R12: 0000000000000801 [ 295.715724][T17515] R13: 00007f2d695493e0 R14: 0000000000000016 R15: 00007f2d67b165e0 [ 295.715747][T17515] [ 295.715759][T17515] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 295.720989][T17517] netem: change failed [ 295.912646][ T9361] kworker/u8:41: attempt to access beyond end of device [ 295.912646][ T9361] loop4: rw=1, sector=145, nr_sectors = 896 limit=128 [ 295.930418][T17525] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 295.958173][T17532] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6gre0, syncid = 1, id = 0 [ 296.085881][T17540] netlink: 24 bytes leftover after parsing attributes in process `syz.6.5019'. [ 296.108201][T17540] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=17540 comm=syz.6.5019 [ 296.120910][T17540] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=17540 comm=syz.6.5019 [ 296.137035][T17543] loop4: detected capacity change from 0 to 512 [ 296.143839][T17543] EXT4-fs: Ignoring removed nobh option [ 296.151210][T17543] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 296.159534][T17543] EXT4-fs error (device loop4): ext4_free_branches:1023: inode #13: comm syz.4.5020: invalid indirect mapped block 2683928664 (level 1) [ 296.175541][T17543] EXT4-fs (loop4): 1 truncate cleaned up [ 296.181741][T17543] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 296.197934][T17543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=42177 sclass=netlink_route_socket pid=17543 comm=syz.4.5020 [ 296.212975][T17543] hub 1-0:1.0: USB hub found [ 296.217710][T17543] hub 1-0:1.0: 8 ports detected [ 296.253196][T11718] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 296.273142][T17548] lo: entered promiscuous mode [ 296.375377][T17557] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 296.446126][T17560] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 296.632110][T17569] FAULT_INJECTION: forcing a failure. [ 296.632110][T17569] name failslab, interval 1, probability 0, space 0, times 0 [ 296.644874][T17569] CPU: 1 UID: 0 PID: 17569 Comm: syz.3.5030 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 296.644899][T17569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 296.644912][T17569] Call Trace: [ 296.644919][T17569] [ 296.644928][T17569] dump_stack_lvl+0xf2/0x150 [ 296.644963][T17569] dump_stack+0x15/0x1a [ 296.644995][T17569] should_fail_ex+0x24a/0x260 [ 296.645036][T17569] should_failslab+0x8f/0xb0 [ 296.645067][T17569] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 296.645113][T17569] ? sock_alloc_inode+0x34/0xa0 [ 296.645206][T17569] sock_alloc_inode+0x34/0xa0 [ 296.645229][T17569] ? __pfx_sock_alloc_inode+0x10/0x10 [ 296.645255][T17569] alloc_inode+0x3c/0x160 [ 296.645347][T17569] new_inode_pseudo+0x15/0x20 [ 296.645381][T17569] __sock_create+0x12b/0x5a0 [ 296.645416][T17569] __sys_socket+0xae/0x240 [ 296.645441][T17569] __x64_sys_socket+0x3f/0x50 [ 296.645467][T17569] x64_sys_call+0x2cf2/0x2dc0 [ 296.645532][T17569] do_syscall_64+0xc9/0x1c0 [ 296.645601][T17569] ? clear_bhb_loop+0x55/0xb0 [ 296.645631][T17569] ? clear_bhb_loop+0x55/0xb0 [ 296.645660][T17569] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.645693][T17569] RIP: 0033:0x7f2d694acda9 [ 296.645788][T17569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 296.645845][T17569] RSP: 002b:00007f2d67b17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 296.645869][T17569] RAX: ffffffffffffffda RBX: 00007f2d696c5fa0 RCX: 00007f2d694acda9 [ 296.645884][T17569] RDX: 0000000000000011 RSI: 0000000000000002 RDI: 000000000000000a [ 296.645898][T17569] RBP: 00007f2d67b17090 R08: 0000000000000000 R09: 0000000000000000 [ 296.645913][T17569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.645928][T17569] R13: 0000000000000000 R14: 00007f2d696c5fa0 R15: 00007fff42986438 [ 296.645951][T17569] [ 296.645959][T17569] socket: no more sockets [ 296.647688][T17571] netlink: 40 bytes leftover after parsing attributes in process `syz.1.5031'. [ 296.685626][T17573] FAULT_INJECTION: forcing a failure. [ 296.685626][T17573] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 296.722958][T17571] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=17571 comm=syz.1.5031 [ 296.723126][T17573] CPU: 1 UID: 0 PID: 17573 Comm: syz.3.5032 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 296.723214][T17573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 296.723230][T17573] Call Trace: [ 296.723237][T17573] [ 296.723246][T17573] dump_stack_lvl+0xf2/0x150 [ 296.723281][T17573] dump_stack+0x15/0x1a [ 296.723308][T17573] should_fail_ex+0x24a/0x260 [ 296.723388][T17573] should_fail+0xb/0x10 [ 296.723431][T17573] should_fail_usercopy+0x1a/0x20 [ 296.723454][T17573] _copy_to_user+0x20/0xa0 [ 296.723514][T17573] simple_read_from_buffer+0xa0/0x110 [ 296.723604][T17573] proc_fail_nth_read+0xf9/0x140 [ 296.723637][T17573] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 296.723740][T17573] vfs_read+0x19b/0x6f0 [ 296.723765][T17573] ? __rcu_read_unlock+0x4e/0x70 [ 296.723790][T17573] ? __fget_files+0x17c/0x1c0 [ 296.723828][T17573] ksys_read+0xe8/0x1b0 [ 296.723856][T17573] __x64_sys_read+0x42/0x50 [ 296.723882][T17573] x64_sys_call+0x2874/0x2dc0 [ 296.723955][T17573] do_syscall_64+0xc9/0x1c0 [ 296.723984][T17573] ? clear_bhb_loop+0x55/0xb0 [ 296.724016][T17573] ? clear_bhb_loop+0x55/0xb0 [ 296.724050][T17573] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.724136][T17573] RIP: 0033:0x7f2d694ab7bc [ 296.724156][T17573] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 296.724178][T17573] RSP: 002b:00007f2d67b17030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 296.724200][T17573] RAX: ffffffffffffffda RBX: 00007f2d696c5fa0 RCX: 00007f2d694ab7bc [ 296.724221][T17573] RDX: 000000000000000f RSI: 00007f2d67b170a0 RDI: 0000000000000007 [ 296.724236][T17573] RBP: 00007f2d67b17090 R08: 0000000000000000 R09: 0000000000000000 [ 296.724251][T17573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.724265][T17573] R13: 0000000000000000 R14: 00007f2d696c5fa0 R15: 00007fff42986438 [ 296.724322][T17573] [ 297.076856][T17571] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=17571 comm=syz.1.5031 [ 297.210197][T17584] xt_hashlimit: max too large, truncated to 1048576 [ 297.244380][ T9365] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 297.424498][T17600] netlink: 24 bytes leftover after parsing attributes in process `syz.6.5043'. [ 297.472389][T17600] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=17600 comm=syz.6.5043 [ 297.485736][T17600] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=17600 comm=syz.6.5043 [ 297.588870][T17610] FAULT_INJECTION: forcing a failure. [ 297.588870][T17610] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.602088][T17610] CPU: 1 UID: 0 PID: 17610 Comm: syz.3.5046 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 297.602275][T17610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 297.602290][T17610] Call Trace: [ 297.602297][T17610] [ 297.602307][T17610] dump_stack_lvl+0xf2/0x150 [ 297.602349][T17610] dump_stack+0x15/0x1a [ 297.602374][T17610] should_fail_ex+0x24a/0x260 [ 297.602419][T17610] should_fail+0xb/0x10 [ 297.602450][T17610] should_fail_usercopy+0x1a/0x20 [ 297.602531][T17610] _copy_from_user+0x1c/0xa0 [ 297.602554][T17610] core_sys_select+0x1c3/0x530 [ 297.602608][T17610] __se_sys_select+0x1c7/0x210 [ 297.602642][T17610] __x64_sys_select+0x67/0x80 [ 297.602692][T17610] x64_sys_call+0x2b3a/0x2dc0 [ 297.602720][T17610] do_syscall_64+0xc9/0x1c0 [ 297.602797][T17610] ? clear_bhb_loop+0x55/0xb0 [ 297.602828][T17610] ? clear_bhb_loop+0x55/0xb0 [ 297.602861][T17610] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 297.602887][T17610] RIP: 0033:0x7f2d694acda9 [ 297.602905][T17610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.602973][T17610] RSP: 002b:00007f2d67b17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000017 [ 297.602992][T17610] RAX: ffffffffffffffda RBX: 00007f2d696c5fa0 RCX: 00007f2d694acda9 [ 297.603021][T17610] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000040 [ 297.603036][T17610] RBP: 00007f2d67b17090 R08: 0000000000000000 R09: 0000000000000000 [ 297.603051][T17610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.603063][T17610] R13: 0000000000000000 R14: 00007f2d696c5fa0 R15: 00007fff42986438 [ 297.603086][T17610] [ 297.898372][T17619] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 298.222018][T17638] FAULT_INJECTION: forcing a failure. [ 298.222018][T17638] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 298.235312][T17638] CPU: 1 UID: 0 PID: 17638 Comm: syz.0.5058 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 298.235412][T17638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 298.235424][T17638] Call Trace: [ 298.235431][T17638] [ 298.235439][T17638] dump_stack_lvl+0xf2/0x150 [ 298.235473][T17638] dump_stack+0x15/0x1a [ 298.235500][T17638] should_fail_ex+0x24a/0x260 [ 298.235541][T17638] should_fail+0xb/0x10 [ 298.235612][T17638] should_fail_usercopy+0x1a/0x20 [ 298.235631][T17638] _copy_from_user+0x1c/0xa0 [ 298.235658][T17638] copy_msghdr_from_user+0x54/0x2a0 [ 298.235684][T17638] ? __fget_files+0x17c/0x1c0 [ 298.235723][T17638] __sys_sendmmsg+0x1e8/0x4b0 [ 298.235814][T17638] __x64_sys_sendmmsg+0x57/0x70 [ 298.235846][T17638] x64_sys_call+0x29aa/0x2dc0 [ 298.235929][T17638] do_syscall_64+0xc9/0x1c0 [ 298.235988][T17638] ? clear_bhb_loop+0x55/0xb0 [ 298.236053][T17638] ? clear_bhb_loop+0x55/0xb0 [ 298.236148][T17638] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 298.236174][T17638] RIP: 0033:0x7f3e7cd0cda9 [ 298.236231][T17638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.236255][T17638] RSP: 002b:00007f3e7b371038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 298.236278][T17638] RAX: ffffffffffffffda RBX: 00007f3e7cf25fa0 RCX: 00007f3e7cd0cda9 [ 298.236294][T17638] RDX: 0000000000000001 RSI: 0000000020002240 RDI: 0000000000000003 [ 298.236344][T17638] RBP: 00007f3e7b371090 R08: 0000000000000000 R09: 0000000000000000 [ 298.236357][T17638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 298.236371][T17638] R13: 0000000000000000 R14: 00007f3e7cf25fa0 R15: 00007ffcf9f05008 [ 298.236456][T17638] [ 298.461903][T17643] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 298.732647][T17661] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5066'. [ 298.779517][T17661] bond2: entered promiscuous mode [ 298.784605][T17661] bond2: entered allmulticast mode [ 298.792496][T17661] 8021q: adding VLAN 0 to HW filter on device bond2 [ 298.871933][T17669] lo speed is unknown, defaulting to 1000 [ 298.904540][T17672] loop1: detected capacity change from 0 to 512 [ 298.932846][T17672] EXT4-fs: Ignoring removed oldalloc option [ 298.949810][T17672] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 298.979157][ T29] kauditd_printk_skb: 234 callbacks suppressed [ 298.979204][ T29] audit: type=1326 audit(1738535971.134:14925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.3.5069" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 299.009733][ T29] audit: type=1326 audit(1738535971.134:14926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.3.5069" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 299.033398][ T29] audit: type=1326 audit(1738535971.134:14927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.3.5069" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 299.047774][T17669] lo speed is unknown, defaulting to 1000 [ 299.057630][ T29] audit: type=1326 audit(1738535971.134:14928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.3.5069" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 299.087073][ T29] audit: type=1326 audit(1738535971.134:14929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.3.5069" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 299.110712][ T29] audit: type=1326 audit(1738535971.134:14930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.3.5069" exe="/root/syz-executor" sig=0 arch=c000003e syscall=434 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 299.122926][T17672] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended [ 299.135077][ T29] audit: type=1326 audit(1738535971.134:14931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.3.5069" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 299.147779][T17672] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=b846c01c, mo2=0102] [ 299.167622][ T29] audit: type=1326 audit(1738535971.134:14932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.3.5069" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 299.174954][T17672] System zones: 0-2, 18-18, 34-34 [ 299.198976][ T29] audit: type=1326 audit(1738535971.134:14933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.3.5069" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 299.213120][T17672] EXT4-fs (loop1): Cannot turn on journaled quota: type 0: error -117 [ 299.227858][ T29] audit: type=1326 audit(1738535971.134:14934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.3.5069" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2d694acda9 code=0x7ffc0000 [ 299.247852][T17672] EXT4-fs error (device loop1): ext4_orphan_get:1415: comm syz.1.5068: bad orphan inode 15 [ 299.269666][T17672] ext4_test_bit(bit=14, block=18) = 1 [ 299.275115][T17672] is_bad_inode(inode)=0 [ 299.279290][T17672] NEXT_ORPHAN(inode)=2264924160 [ 299.284254][T17672] max_ino=32 [ 299.287478][T17672] i_nlink=0 [ 299.290718][T17672] EXT4-fs warning (device loop1): ext4_update_dynamic_rev:1145: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 299.310378][T17672] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.5068: bg 0: block 80: padding at end of block bitmap is not set [ 299.324987][T17672] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 299.334577][T17672] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 299.391771][T17680] netem: change failed [ 299.528414][T17698] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 299.683448][T13057] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 299.933032][T17725] __nla_validate_parse: 3 callbacks suppressed [ 299.933052][T17725] netlink: 104 bytes leftover after parsing attributes in process `syz.6.5086'. [ 300.554299][T17748] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5095'. [ 300.597974][T17752] loop4: detected capacity change from 0 to 2048 [ 300.609002][T17754] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5098'. [ 300.655643][T17747] rdma_rxe: rxe_newlink: failed to add veth0_to_bond [ 300.668175][T17752] Alternate GPT is invalid, using primary GPT. [ 300.674875][T17752] loop4: p2 p3 p7 [ 300.691166][T17764] 9pnet_fd: Insufficient options for proto=fd [ 300.727747][T17752] bridge0: port 3(vlan0) entered blocking state [ 300.734168][T17752] bridge0: port 3(vlan0) entered disabled state [ 300.740808][T17752] vlan0: entered allmulticast mode [ 300.749598][T17752] vlan0: left allmulticast mode [ 300.856141][T17775] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 300.973333][T17781] netlink: 100 bytes leftover after parsing attributes in process `syz.4.5106'. [ 301.025598][T17769] loop1: detected capacity change from 0 to 512 [ 301.964872][T17833] FAULT_INJECTION: forcing a failure. [ 301.964872][T17833] name failslab, interval 1, probability 0, space 0, times 0 [ 301.978164][T17833] CPU: 0 UID: 0 PID: 17833 Comm: syz.1.5124 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 301.978195][T17833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 301.978235][T17833] Call Trace: [ 301.978243][T17833] [ 301.978253][T17833] dump_stack_lvl+0xf2/0x150 [ 301.978299][T17833] dump_stack+0x15/0x1a [ 301.978322][T17833] should_fail_ex+0x24a/0x260 [ 301.978372][T17833] should_failslab+0x8f/0xb0 [ 301.978403][T17833] __kmalloc_noprof+0xab/0x3f0 [ 301.978494][T17833] ? tcf_idr_create+0x42/0x4c0 [ 301.978523][T17833] tcf_idr_create+0x42/0x4c0 [ 301.978552][T17833] tcf_bpf_init+0x25c/0x600 [ 301.978583][T17833] ? should_fail_ex+0xd7/0x260 [ 301.978692][T17833] tcf_action_init_1+0x339/0x490 [ 301.978724][T17833] tcf_action_init+0x1cc/0x610 [ 301.978746][T17833] ? __rmqueue_pcplist+0xf7e/0x1110 [ 301.978832][T17833] tc_ctl_action+0x292/0x840 [ 301.978900][T17833] ? __pfx_tc_ctl_action+0x10/0x10 [ 301.978924][T17833] rtnetlink_rcv_msg+0x6aa/0x710 [ 301.979014][T17833] ? ref_tracker_free+0x3a5/0x410 [ 301.979051][T17833] ? __dev_queue_xmit+0x186/0x2090 [ 301.979082][T17833] netlink_rcv_skb+0x12c/0x230 [ 301.979231][T17833] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 301.979276][T17833] rtnetlink_rcv+0x1c/0x30 [ 301.979376][T17833] netlink_unicast+0x599/0x670 [ 301.979415][T17833] netlink_sendmsg+0x5cc/0x6e0 [ 301.979485][T17833] ? __pfx_netlink_sendmsg+0x10/0x10 [ 301.979525][T17833] __sock_sendmsg+0x140/0x180 [ 301.979556][T17833] ____sys_sendmsg+0x312/0x410 [ 301.979593][T17833] __sys_sendmsg+0x19d/0x230 [ 301.979720][T17833] __x64_sys_sendmsg+0x46/0x50 [ 301.979754][T17833] x64_sys_call+0x2734/0x2dc0 [ 301.979780][T17833] do_syscall_64+0xc9/0x1c0 [ 301.979834][T17833] ? clear_bhb_loop+0x55/0xb0 [ 301.979872][T17833] ? clear_bhb_loop+0x55/0xb0 [ 301.979943][T17833] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 301.979976][T17833] RIP: 0033:0x7f0e3bddcda9 [ 301.979994][T17833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 301.980017][T17833] RSP: 002b:00007f0e3a447038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 301.980095][T17833] RAX: ffffffffffffffda RBX: 00007f0e3bff5fa0 RCX: 00007f0e3bddcda9 [ 301.980108][T17833] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 301.980160][T17833] RBP: 00007f0e3a447090 R08: 0000000000000000 R09: 0000000000000000 [ 301.980175][T17833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 301.980190][T17833] R13: 0000000000000000 R14: 00007f0e3bff5fa0 R15: 00007ffd2d7e4918 [ 301.980213][T17833] [ 302.325350][ T9296] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 302.457072][T17838] loop1: detected capacity change from 0 to 256 [ 302.684395][T17837] loop4: detected capacity change from 0 to 8192 [ 302.707923][T17845] SELinux: policydb version 0 does not match my version range 15-34 [ 302.719200][T17845] SELinux: failed to load policy [ 302.729995][T17846] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 302.848852][T17860] netlink: 'syz.4.5126': attribute type 46 has an invalid length. [ 302.856806][T17860] netlink: 212852 bytes leftover after parsing attributes in process `syz.4.5126'. [ 303.068982][T17853] ================================================================== [ 303.077109][T17853] BUG: KCSAN: data-race in mark_buffer_dirty_inode / sync_mapping_buffers [ 303.085659][T17853] [ 303.088003][T17853] write to 0xffff88812c52b6d8 of 8 bytes by task 17837 on cpu 1: [ 303.095730][T17853] sync_mapping_buffers+0x159/0x7c0 [ 303.100961][T17853] fat_file_fsync+0xa7/0x100 [ 303.105588][T17853] vfs_fsync_range+0x116/0x130 [ 303.110387][T17853] generic_file_write_iter+0x1c3/0x310 [ 303.115874][T17853] iter_file_splice_write+0x5f1/0x980 [ 303.121271][T17853] direct_splice_actor+0x160/0x2c0 [ 303.126408][T17853] splice_direct_to_actor+0x302/0x670 [ 303.131810][T17853] do_splice_direct+0xd7/0x150 [ 303.136597][T17853] do_sendfile+0x398/0x660 [ 303.141050][T17853] __x64_sys_sendfile64+0x110/0x150 [ 303.146293][T17853] x64_sys_call+0xfbd/0x2dc0 [ 303.150946][T17853] do_syscall_64+0xc9/0x1c0 [ 303.155475][T17853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.161406][T17853] [ 303.163754][T17853] read to 0xffff88812c52b6d8 of 8 bytes by task 17853 on cpu 0: [ 303.171439][T17853] mark_buffer_dirty_inode+0x96/0x1c0 [ 303.176842][T17853] fat_mirror_bhs+0x241/0x330 [ 303.181561][T17853] fat_alloc_clusters+0x994/0xa80 [ 303.186626][T17853] fat_get_block+0x25c/0x5e0 [ 303.191279][T17853] __block_write_begin_int+0x417/0xfa0 [ 303.196770][T17853] cont_write_begin+0x546/0x860 [ 303.201635][T17853] fat_write_begin+0x51/0xe0 [ 303.206249][T17853] generic_perform_write+0x1a8/0x4a0 [ 303.211552][T17853] __generic_file_write_iter+0xa1/0x120 [ 303.217215][T17853] generic_file_write_iter+0x8f/0x310 [ 303.222703][T17853] vfs_write+0x77b/0x920 [ 303.226965][T17853] ksys_write+0xe8/0x1b0 [ 303.231235][T17853] __x64_sys_write+0x42/0x50 [ 303.235857][T17853] x64_sys_call+0x287e/0x2dc0 [ 303.240608][T17853] do_syscall_64+0xc9/0x1c0 [ 303.245141][T17853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.251074][T17853] [ 303.253409][T17853] value changed: 0xffff8881065b0b08 -> 0x0000000000000000 [ 303.260536][T17853] [ 303.262873][T17853] Reported by Kernel Concurrency Sanitizer on: [ 303.269027][T17853] CPU: 0 UID: 0 PID: 17853 Comm: syz.4.5126 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 303.279459][T17853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 303.289544][T17853] ================================================================== [ 308.062767][ T9296] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration