last executing test programs: 33m28.248565701s ago: executing program 32 (id=1753): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x2008004, &(0x7f0000000000), 0x1, 0x29b, &(0x7f0000000180)="$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") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000400)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x18, 0x1, 0x2, 0x101, 0x0, 0x0, {0x2, 0x0, 0x1}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x8081}, 0x240088d0) syz_emit_ethernet(0x0, 0x0, 0x0) ptrace(0x10, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x2008042, &(0x7f00000000c0), 0x2, 0x587, &(0x7f0000001280)="$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") setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="02000000010004000000000004000500a9930000100000000000000020"], 0x24, 0x0) sendto$inet(r1, &(0x7f00000012c0)="09268a927f1f65", 0x7, 0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={&(0x7f00000010c0)='kfree\x00', r4, 0x0, 0x8}, 0x18) r5 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r5, &(0x7f0000000440)={&(0x7f0000001000)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000400)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_tos_u8={{0x17}}], 0x38}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x3, 0x11, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_key={0x3, 0x9, 0x80, 0x0, "1cdc0dca1d9f68846960e56de42944af"}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x7}}]}, 0x88}, 0x1, 0x7}, 0x0) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000000000)={0x1, 0x4, 0x4, 0x3, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0x26}, @dev={0xac, 0x14, 0x14, 0x36}}, 0x10) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000a88000/0x2000)=nil, 0x3) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x50032, 0xffffffffffffffff, 0x0) 32m1.314826854s ago: executing program 33 (id=2330): openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="7a0a00ff00000000711081000000000095"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$netlink(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)={0x28, 0x12, 0x1, 0x0, 0x0, "", [@nested={0x10, 0x0, 0x0, 0x0, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @nested={0x8, 0x1d, 0x0, 0x1, [@generic="b112ed56"]}]}, 0x28}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000010040b7080000000000007b8af8ff00000000b7080000000000107b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb702000008"], 0x0, 0x9, 0x0, 0x0, 0x0, 0xa}, 0x94) socket$nl_route(0x10, 0x3, 0x0) socket$xdp(0x2c, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x9}, @IFLA_GRE_ERSPAN_DIR={0x5, 0x17, 0x1}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x2}]}}}]}, 0x54}}, 0x0) socket(0x10, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x10, &(0x7f0000000080)=ANY=[@ANYRES64=0x0], 0x4, 0x34a, &(0x7f0000000900)="$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") ioprio_set$pid(0x3, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x242, 0x81) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="d8000000140081044e81f782db44b904021d080207000000040000a118000200e000000100000e1208000f0100810401a80016ea1f000840032e5f54c92011148ed08734843c8802033d0803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x50) fsopen(&(0x7f0000000380)='cgroup2\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000e3ffffffffffffe018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x18, 0x1404, 0x1, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) unshare(0x64000600) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x48241, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r7 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r6, &(0x7f0000000740)={@val={0x70, 0xf8}, @void, @eth={@broadcast, @remote, @val={@void, {0x8100, 0x3, 0x0, 0x3}}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {0x0, 0x6558, 0x18, 0x0, @wg=@data={0x4, 0x0, 0xffffdd86}}}}}}}, 0x42) socket$inet6(0x10, 0x2, 0x0) 27m13.163665053s ago: executing program 34 (id=7802): io_setup(0x5, &(0x7f0000000e80)=0x0) syz_io_uring_setup(0x4, &(0x7f0000000580)={0x0, 0x1716, 0xc840, 0x2, 0x2b6}, &(0x7f0000000080), 0x0) (async) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001580)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000080)="8c", 0x1}]) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_aout(r3, &(0x7f00000000c0)=ANY=[@ANYRES8=0x0], 0x20) (async) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r3, 0x20, &(0x7f0000000400)={&(0x7f00000004c0)=""/94, 0x5e, 0x0, &(0x7f0000001500)=""/4096, 0x1000}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0x13, &(0x7f0000000340)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0xf}, @map_fd={0x18, 0x1, 0x1, 0x0, r2}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff9}, @map_fd={0x18, 0xa, 0x1, 0x0, r3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffff001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x3}], &(0x7f0000000040)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x41100, 0x2a, '\x00', 0x0, @fallback=0xa, r3, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, r5, 0xffffffffffffffff, 0xa, &(0x7f0000000580)=[r3, r3], &(0x7f0000000740)=[{0x1, 0x3, 0xc, 0x9}, {0x4, 0x5, 0xc, 0x1}, {0x4, 0x2, 0x9, 0x4}, {0x4, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x5, 0x9}, {0x4, 0x2, 0xb}, {0x1, 0x5, 0xa}, {0x4, 0x4, 0x0, 0xb}, {0x3, 0x2, 0xc, 0xb}, {0x0, 0x3, 0x2}], 0x10, 0xcd51}, 0x94) (async) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r4, 0x0) (async) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4507}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000600)={0x43, 0x1, 0x3}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) (async) r8 = perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000180)='cpu==0||!') r9 = open$dir(&(0x7f0000000080)='./file0\x00', 0x804000, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x12, r9, 0x0) 23m11.709492799s ago: executing program 35 (id=13643): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={0x0, 0xcc}, 0x8) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback, 0x7}], 0x1c) sendmmsg$inet6(r0, &(0x7f0000000640)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x2, @loopback, 0x3}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000300)="06", 0x1}], 0x1}}], 0x1, 0x3404c8d4) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES16=r0, @ANYRES16=r1], 0x1000f) 23m10.257937466s ago: executing program 36 (id=13691): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000280)='workqueue_activate_work\x00', r0}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x3, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x98}}, &(0x7f0000000000)='GPL\x00'}, 0x94) 23m7.360940659s ago: executing program 37 (id=13771): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="07000000040000008000000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000c40)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) 22m45.094403998s ago: executing program 38 (id=14592): r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x40010000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$can_raw(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000140)=@canfd={{0x1}, 0xf8, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x48}, 0xee, 0x0, 0x0, 0x40041}, 0x88801) 22m40.556748083s ago: executing program 39 (id=14731): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r4, 0x0, 0xffffffffffffffff}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000500), 0x20900, 0x0) r5 = io_uring_setup(0xf07, &(0x7f0000000580)={0x0, 0x4008672, 0x1, 0x3, 0xf0}) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1) syz_clone3(&(0x7f0000000000)={0x285002400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x46) io_uring_register$IORING_REGISTER_FILES(r5, 0x1e, &(0x7f0000000000)=[r5], 0x1) 22m33.930757996s ago: executing program 40 (id=14934): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r0}, 0x18) mkdir(&(0x7f0000000580)='./file0\x00', 0x92) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x2000414, &(0x7f0000000340)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000540)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r5 = getpid() sched_setscheduler(r5, 0x1, &(0x7f0000000040)=0x4) ioprio_set$uid(0x3, 0x0, 0x0) ioprio_get$pid(0x2, 0x0) fcntl$setpipe(r4, 0x407, 0x6) r6 = openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) inotify_init1(0x800) 22m33.019901419s ago: executing program 41 (id=14464): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='contention_begin\x00', r0}, 0x18) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newtaction={0x6c, 0x30, 0x305, 0x70bd27, 0x800001, {}, [{0x58, 0x1, [@m_nat={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x5c, 0x7ffc, 0x3, 0x5, 0xfffffff8}, @multicast2, @empty, 0xffffffff, 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}]}]}, 0x6c}}, 0x4) 20m30.796716592s ago: executing program 42 (id=18119): chdir(&(0x7f0000000480)='./cgroup\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="08000000020001009a"], 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYRES16=r1], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000580)='kfree\x00', r3}, 0x18) unshare(0x64000600) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x0) 19m54.338401292s ago: executing program 43 (id=18886): chdir(&(0x7f0000000480)='./cgroup\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="08000000020001009a"], 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYRES16=r1], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) unshare(0x6a040000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000580)='kfree\x00', r3}, 0x18) unshare(0x64000600) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) socket(0x2, 0x80805, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x18) 19m1.139520188s ago: executing program 44 (id=19755): chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x64000600) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket(0x2, 0x80805, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 18m35.746208489s ago: executing program 45 (id=20343): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) fchdir(r0) getcwd(0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(r1, 0x0, 0x0, 0x20004041, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x2, @dev={0xfe, 0x80, '\x00', 0x13}, 0x7}, 0x1c) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x0, 0x41}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, {0x3}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4040004}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), r5) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x2, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000006c0f00000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00'}, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x15, 0x1c, &(0x7f00000002c0)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x4d}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff8}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x7, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r7}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000001b00)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0900000000000000000002000000140001800500020001"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x2f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xb4}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x70) 16m34.218983377s ago: executing program 46 (id=20605): sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r1, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3, 0x0, 0x401}, 0x18) r4 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) close(0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000540)='./cgroup\x00', &(0x7f0000000580), 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'default', '=relative', @void}}}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) getpid() socket(0x1e, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xc, &(0x7f0000000080)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x23}, 0x94) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r5}, 0x18) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req={0x6, 0x1, 0x80000001, 0x1ff}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000002c0)={0xa, 0xffff, @rand_addr=0x64010101}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=ANY=[], 0x6b}, 0xc000040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0xa}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x5, r6}, 0x38) 16m4.114992536s ago: executing program 47 (id=21396): r0 = socket(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000ec0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) write(r0, &(0x7f0000000040)="1c0000001a009b8a140000003b9b301f00"/28, 0x1c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002ec0), 0x0, 0x2, 0x0) 16m3.040489912s ago: executing program 48 (id=21413): io_setup(0x7, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000140)={0x0, 0x4, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="01", 0x400000}]) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r8, 0x0, 0x1ffffffffffffffd}, 0x18) r9 = add_key$keyring(&(0x7f0000000500), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r9, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', 0x0, 0x2}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r10, 0x0, 0x1, 0x4) vmsplice(r10, &(0x7f0000000880)=[{&(0x7f0000000180)="04", 0x1}, {&(0x7f0000000200)='\b', 0x1}, {&(0x7f0000001300)="da02e0", 0x3}, {&(0x7f00000002c0)='@', 0x1}, {&(0x7f0000000440)="15", 0x1}, {&(0x7f0000003040)="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", 0xfc1}, {&(0x7f0000000480)="37c2", 0x2}], 0x7, 0x0) ioctl$sock_inet_udp_SIOCINQ(r10, 0x541b, 0x0) write(r5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0x4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) symlink(&(0x7f0000000dc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') readlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001200)=""/4096, 0x1000) setxattr$incfs_metadata(&(0x7f0000000800)='./cgroup\x00', &(0x7f0000000840), 0x0, 0x0, 0x1) removexattr(&(0x7f0000000200)='./cgroup\x00', &(0x7f0000000240)=@known='user.incfs.metadata\x00') io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}]) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000048000000030a05020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a3000000000080007006e6174"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x0) 14m58.622142391s ago: executing program 49 (id=22101): open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x24c01, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) alarm(0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000980)='./file0\x00', 0x8, &(0x7f0000000000)=ANY=[], 0x1, 0x94d, &(0x7f00000009c0)="$eJzs3U9vHOUdB/DvOHZxDYIAKY0iSDahgQCus3aaUCuXOvbaWeo/le1IRD00lIQqilUqaCVAPaRS1VNpe6h6aG8ce0LiApcqr6KHXngDPaCecnM1s2vigHfXMbY3hM/HGs/Mzm+e5zc7s/NoZ3fnCV8vf/rv5rn19fVq2OH8pX/uQ8bcxy7MfPrBh++Xw+9u5ls5kLPFx8lwkloymORwMjQ9s7y0sNXaA3cmbyRXktxKiiQPpTXelisp/pxH7szfSvGPsl723jrfaP0+/gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4H5UTM/U6+NF5puLl16tdVZ1Ad5l+UZ5n1S9fhef9Kw3Kcohw8MbXX0fPnRn8VPlvxN5ujX3dNUheYbz3sNPHTz/5ODAxvpdEtoXb7/73o3X1tauvXWvK6bYm4T22Vxjsbmy1FyYmmvUmitLtclz5+qnL86u1Gab842VyyurjYXa9HJjanVpuXZq+oXa+OTkmVpj7PLSpcW5man5xsaDL39/ol4/V3tl7CeNqeWVpcXTr4ytTF9szs83F+eqmHJxGfNyeSD+uLlaW21MLdRqb1xfu3amV5Jl0Hj3kKQMmuhV0kR9YmJ8fGJi/NzZybMv1+uDX3qg/gX5UkT/D1r6a9fP4bBTA+32P/NpZjGX8mpqW/5NZybLWcpCh+VtG+3/ydONrvVubv83WvnDdxYfSdX+H201/Ec7tf8dctm/v7fzbt7LjbyWtazlWt7qe0Zf7a/1RG//eZ1LI4tpZiVLaWYhU9UjtfYjtUzmXM6lnp/lYmazklpm08x8GlnJ5axkNY3qiJrOchqZymqWspxaTmU6L6SW8UxmMmdSSyNjuZylXMpi5jKTqaqUN3K9et7PdNumjaDx7QRNdAnS/vPV7cFZHHZmfaP9BwAAAB5YRXX1vXz/P5RnqqnZ5nyj3u+0AAAAgF1UffL/dDkaKqeeSeH9PwAAADxoihxtXwUYybHW1MYvoVwEAAAAgAdE9fn/0XI0Uk4dS+H9PwAAADxoet9jv2dEMbpx+9/a1db4ajuifZ/fkdnmfGNsemn+/Hieq+4yUP3SYMvShqqfH7yY462o4yOt8cjdJQ6XUeNj58fzYk60N+TUs+Xo2VNbRE60Ip9vRT7fJfJMGQkAD7oTPdrj7bT/L2a0FTF6pGxMM3hki5a1rmUFgPvF8MZExz52TlS/EOgSUfyg+/v/PPH5VwrG8nrezFquZrT6tUH1jYMtSx3Z9DWE0R5XA1qxQ1UPL6NdrwcMZ2RTRy+jPa4IjGzqXgYAHiQnerTD22n/R3u8/x/xlUIAuK983oP9Hk70exsBgLtppQEAAAAAAAAAAAAAAAAAAAAAAAAAAGD37cf9/02YMPF1m+j3mQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID9UCQHtnp8IHkoST3J6f3P6h4V2w+9uZd59MPZewsvbud23smje5UOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMA3Vfv+/wNpjR9u301/cCA5meRKkp/2O8fddLvfCfTZpvv/l/s860UGW7s9xdD0zPLSQtWZwkPl8k8/+PD9cthJPWUBZQ13dS7RrqHzWo9Xa43MXHv7xq/f/FVt5kKV5IXV2fmZhbnlH90JfKr4KKmlNWzYyPe3J//1ly22/KNyS7dX72xV78yX6/3uVmt3r7eb62vXJsqaVhuvrv7ml9ff2bToiRxPnj2VnLq7pl+UQ4eajmeoW23FZ8Ufikfzt1yp9n/5bBTrRbmLHqu2/9tvXF+7Nvb6m2tXO+R0MMeSXE2Gt5/Tsc69c1RH3cBQWWu9Cir/HepRXlebShzvsA2PV4fMyD1tQ61HDyM9nvd2Rmc6ZPRknrvnPf1cjxq3VHxW/Ke4mH/n95v6/xgo9//JbOfVWcZUkZuOlI6RA63IassnupbZ8VXJHvhjfp4ffr7/Bzad/9v7an/OR5tq3KfXRdUiHfpCi9Q++3Rap53noVZUhzy/k5eSwSPtM8r5beX5Uq8+i/bo9f/34lT+l5v6/wEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAO5/RXJgq8cHkpNJDiZ5rJyvJeu7Ud/ASLEbxezYzb7W3n/F7dzOO3m033kAAAAAAAAAsDsuzHz6wYfvl0P1efyBfK/4OBlufdI/mORg8deh6ZnlpYUeBQ0lV5Lc2kEO5Xp55M78rXLu8A4KAgC25f8BAAD//8ZSZ1g=") r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) 12m47.405280386s ago: executing program 50 (id=23961): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000656000/0x3000)=nil, 0x3000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mbind(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4003, &(0x7f0000000c00)=0xc, 0x6, 0x2) set_mempolicy_home_node(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x0) mlockall(0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000240)=0xe8) getresgid(&(0x7f0000000280), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) fchown(r4, r6, r7) sendmsg$IPCTNL_MSG_CT_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x24, 0x1, 0x1, 0x301, 0x0, 0x0, {0x2}, [@CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x487}]}, @CTA_TUPLE_ORIG={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8c0}, 0x0) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') readv(r8, &(0x7f0000001440)=[{&(0x7f0000000040)=""/20, 0x5}, {0x0, 0x2}], 0x2) mmap$usbfs(&(0x7f000044b000/0x4000)=nil, 0x4000, 0x1, 0x40010, r8, 0xca) mlock(&(0x7f000033c000/0x1000)=nil, 0x1000) sendmsg$nl_xfrm(r1, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001700)=ANY=[@ANYBLOB="540200001600050000000000fedbdf25ff0100000000000000000000000000010a0101010000000000000000000000004e2200004e2300000a00200021000000", @ANYRES32=r1, @ANYRES32, @ANYBLOB="fc0000000000000000000000000000000000000033000000e0000002000000000000000000000000060000000000000019d000000000000009000000000000000000000000000000000000000000000008000000000000000000000000000000ff030000100000000300000000000000ffffffff00000000ffffff7f000000000900000000000000000000007f000000070000002bbd7000000000000200013f000000000000000001000000060000002c001300200100000000000000000000000000010000000000000000000000020000001c00040003004e204e210000fe"], 0x254}}, 0x40808) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'dummy0\x00', &(0x7f0000000080)=@ethtool_eee={0x44, 0x6, 0x40, 0x5, 0x7, 0x4, 0x1, 0x9, [0x2, 0xc]}}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 11m12.737176115s ago: executing program 51 (id=25022): unshare(0x62040200) semop(0x0, &(0x7f0000000000)=[{0x3, 0xfff7, 0x1000}], 0x1) unshare(0x0) (async) semop(0x0, &(0x7f00000000c0)=[{0x3, 0xa78d, 0x1000}], 0x1) (async) unshare(0x40080) (async) r0 = semget(0x2, 0x2, 0x400) (async) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x30) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xfffffec7, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r1, 0x8, 0xf0bd26, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0xf}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000011}, 0x40080) close(0xffffffffffffffff) (async) r2 = socket(0x2b, 0x1, 0x1) (async) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) (async) listen(0xffffffffffffffff, 0x5) (async) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) (async) r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000003980)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) r7 = getegid() accept$packet(r2, &(0x7f0000004ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004f00)=0x14) (async) sendmmsg$unix(r2, &(0x7f0000004fc0)=[{{&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001780)=[{0x0}], 0x1, &(0x7f0000001b00), 0x0, 0x24000050}}, {{&(0x7f0000002f80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003540)=[{0x0}, {&(0x7f0000003100)="5927df4b265852360de9e82e0fb97dd9566a8af109c950313ce19ab9845f73b10b695ce722f0507d06a2fa75a26f05a0a99f175fad44e25b738d2c781d329ffb7a875c6dd276c549120e019f386660bd57fa96ab110e62508d6e4713a7105c6dc561c02ffff6ac2c5c231ab641ac12cf65dfbe1e5419ddf56fcc3133089ccb86230402aa7bc13d2b62847abc6197f9ed32c8cebac8166f57fa", 0x99}, {&(0x7f0000000440)="23f94b4b76eb5fe774a57c35e59cbfb304ef88a7aa11fc91a389605c37011a5c53e17dbeb4e8bafc359ee30aeac2f70ea1f46cf516231a30c166931317631027be736c50e2864e316a4b1b40f3c7845347d572cdde39a4ea47107eaeaf90154041efb26c71dcb604674e0a9e3a2b73deb58ddcb58b3c98fe9b07ce476a20c2dc143ff358876e2b448e3ff104e7f6eb90a3c057f86baa45cf16ef20303150d18948deff1e7647c904cec3cc3ca8f25bc44c70ea77", 0xb4}], 0x3, 0x0, 0x0, 0x80}}, {{0x0, 0x0, &(0x7f00000038c0), 0x0, &(0x7f0000003a00)=[@rights={{0x30, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, r4, r2, r3, r3, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r3, r5, r6, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}], 0x70, 0x94}}, {{0x0, 0x0, &(0x7f0000003d00), 0x0, &(0x7f0000003d40), 0x0, 0x2000c011}}], 0x4, 0x41) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000300)={{0x0, 0xee01, 0x0, 0xffffffffffffffff, r7, 0x22, 0x2}, 0x3ff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x57}) (async) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000280)) (async) semtimedop(r0, &(0x7f0000000240)=[{0x0, 0x401, 0x1000}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}) r8 = socket$nl_generic(0x10, 0x3, 0x10) (async) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40), 0xffffffffffffffff) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={'\x00', 0x9, 0x6, 0xffffff36, 0x7fffffff, 0x5e5c, 0x0}) syz_pidfd_open(r10, 0x0) (async) sendmsg$TIPC_NL_BEARER_ENABLE(r8, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000000)={0x6c, r9, 0x1, 0x0, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @loopback={0x5f00000000000000}}}, {0xcc, 0x2, @in={0x2, 0x4e23, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x6c}}, 0x0) 10m52.825150056s ago: executing program 52 (id=25225): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$binfmt_elf64(r3, 0x0, 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) 10m36.157223385s ago: executing program 53 (id=25390): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00'}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 9m15.875607907s ago: executing program 54 (id=26223): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) socket(0x15, 0x5, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r5}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m50.07315904s ago: executing program 55 (id=27812): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0xc, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x1}, 0x1205, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r3}, 0x9) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={0x28, r1, 0x1, 0x70bd25, 0x0, {0x2, 0x2, 0x2}, [@SMC_PNETID_IBPORT={0x5, 0x3}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x28}, 0x1, 0x40030000000000}, 0x14) r4 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000780)=""/198, 0xc6) 6m46.299822545s ago: executing program 0 (id=27995): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) rt_sigsuspend(&(0x7f0000000080)={[0x7]}, 0x8) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000003010104000000000000002002000000240001801400018008000100e000000108000200e00000010c000280"], 0x38}}, 0x4048000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000dc0)=@newtaction={0x198, 0x30, 0x1, 0x4000000, 0x0, {0x0, 0x0, 0x6a00}, [{0x184, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x10000000, 0x0, 0x4}, 0x3, r2}}]}, {0x4, 0xa}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_vlan={0x130, 0x1c, 0x0, 0x0, {{0x9}, {0x40, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0xf101, 0x4, 0x20000006, 0x7ff, 0x3}, 0x3}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x9e6}]}, {0xc5, 0x6, "03563fa0d9bd6e37a13e487040111699a1812ab081418b3454f4cbc45eac9fd93ccc4923079eb6f0600a1d4e5387a8145514ae9769cde09fc4f36876bf42b72aae7c24962a49e3f786c461fccfb42024e6cdf82ac222fda2078fcd4455af4f9d21ee436c4406c51de094418e6cdce59b91e7106b52222084a6026409268ba51e9a0d946bcd9894a600c5b1d5d9ed1b733b544a2dea62dcd1fb1f89fc536d5b6adcaf1b902bd893e8c58c87c216f9904e2cd771a7d44c9a42ce8bef7f1adfd4ffe8"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0x198}}, 0x0) 6m46.202162882s ago: executing program 0 (id=27996): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x40404) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x6000)=nil, 0x3000) shmdt(r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r5, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) io_getevents(r3, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x0) write$char_usb(r2, &(0x7f00000003c0)="1638ed960905d217f5ab342a1a194c82a932b5b3104fa55c1e04cd34f9a9381630d5e6f1063c44f16f29b7b10e354749212d2ffc8db92f85b6c0ad4ccce2a1cfa8b5030bb9cab112cb7c600b5956d39d45b45a441eec6446c2d110799f7d63107554d95f5135225f7eaef8fa2b0b8714aa6d6bf04d6b24461ddba3a3546fcbf50f563c69909416f5c4de", 0x8a) r8 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x1, 0x410000) capset(&(0x7f0000000200)={0x19980330, r4}, &(0x7f00000004c0)={0x1ff, 0x1, 0x3, 0x7f, 0x7, 0x2}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00800000000008000000000200000000000000", @ANYRES32=0x1, @ANYBLOB="ffffff7f00"/20, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="00000000000000000300"/28], 0x50) keyctl$clear(0x3, 0xfffffffffffffffd) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='q\xa9', 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, &(0x7f0000000040)) io_pgetevents(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 6m45.183507214s ago: executing program 0 (id=28005): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e0000000800000000001800038014000380100001"], 0x44}}, 0x20008000) r1 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000340)={r1}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001480)=@newtfilter={0x30, 0x2c, 0xd27, 0x70bd25, 0x8000, {0x0, 0x0, 0x0, r6, {0x0, 0x7}, {}, {0x7, 0x2}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x81}, 0x800) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x11d, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000040), 0x500c, 0x721140) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) 6m45.101247991s ago: executing program 9 (id=28006): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) mount$nfs(&(0x7f0000000080)='/dev/mISDNtimer\x00', &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000200), 0x1, &(0x7f0000000280)={[{'\x00'}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='contention_end\x00') r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000680)=ANY=[@ANYRES64=r0, @ANYRESDEC=r0, @ANYRES8, @ANYRES64=r0, @ANYRESDEC=r0, @ANYBLOB="2ddcf2e4b058de17585a37cc42f0a9f8e90f98e928b58553fecd599f3688216573a00deacea3b73ab29b264a6962aca59da09ab5dc5f360bea1e69e422a60592d5757d5e1128de8a73b6eaa855698935a9c53ff108d235b818ef66ba76e62c3924047df114acfe6120fa172efd51132a8b3757d5640c04dd348bb0030cdca46072427310a5c6d1d2bc5ac07b4177e05db66163b475ff1e53d8ace64d7d09c89f9825eddc3b0e0bf68b05196c846986a5390157ba8901d510866a078c3031ac3be8cb8dc21236d45e5f0d7a50a685d186d58686647e1dc17a17e8", @ANYRES32=r0, @ANYRES64=r0, @ANYBLOB="929f0c198fe641ed0df9e9e40ed832c62c26421f6d025dda8a09eaaaf3da2d7080c552411ed2548ed9e33a576791231baebb8eb3f2d25b96f83b0c3008a0c69d98397feae599eaad0a663b8bd3449780aff11fe9b71a42fafa213018d963fa94ed4ae6e27c15b37081c6d382bc4b326e7fc868e2bfca7ac0d53241bae76a9769385086993d9ad88a0d3ec2568eacff4b18d380fcc812155e19ff3a7dcb45c05d6c02567f0776ef4da3a99f51e506952f0356f4bebdd7e5ba3f295d32d2e5f25849c374660b2aeff1e0c813c6c5430f8b59daed9476", @ANYRES16=r0], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x10, &(0x7f0000000500)=ANY=[@ANYBLOB="18020000ff070000000000000300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x46) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, 0x2, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x2107, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000200), &(0x7f0000000240)=r4}, 0x20) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000305000000200000000000000000", @ANYRES32=0x0, @ANYBLOB="1546010000000000140012800b0001006d616373656300000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) pwrite64(r7, &(0x7f0000000080)='3', 0x1, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r8}, 0x10) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) close(r9) 6m45.085616523s ago: executing program 9 (id=28007): r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x0, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, 0x0, 0x0) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc4e48aa31086b8703380000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xbb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r9}, 0x10) listen(r6, 0x3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) mount$bpf(0x0, &(0x7f00000023c0)='./file0\x00', 0x0, 0x958028, &(0x7f0000000280)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r10, @ANYBLOB="77b7f7e9a8fdefea6f622287b92830bfb24d0912d390fecde92b27379d2efecdd0a7abcf28ee5e4737b5760ba521de04994dc5cf464ee9182e77d7ab090eb7895ca20ae2622cb817d317827556e00fb36ceb9759a76f6ebeaa3346a34fdee0c7ce47d1027c38ed8f15183411892c87e5658a6a7537be478592b0c99aa26f172d471aeba9658c26b88a5e2e5621d0abbfe267b7b84333fc675dca4d5b416d"]) setregid(r2, r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) modify_ldt$write(0x1, &(0x7f0000000340)={0x8, 0x20000000}, 0x10) modify_ldt$read(0x0, &(0x7f0000002140)=""/4129, 0x1021) timer_create(0x4, &(0x7f0000000200)={0x0, 0x28, 0x1, @thr={&(0x7f0000000380)="a936b3cf4ef61806798adc77b9afa329df2c0f551d4748fe5ef24e5809b649f104eca9187b56a97fdcaad73ee4dd61833cff644b29828e71655c8fc65003fb3f4c288d188328faa0e700b52a7da8c3674ce31d79428ddc84e35f1c85471d41a85da7036db824a883b8b3881a945fe884a2", &(0x7f0000000400)="75866f3b30812e306c4cc889e813d685e485955895431b590f50e8641ce6ea509047b854f61d971eac839c7534feeaa6d728665561fbb51d3f79d5a1ac0aa13ae0b652ad63befedbdca6a8ff8d71cd91ccaf4cfa16191be157dd94a04857dc2df623f3fe1596929b64ade365b59f4fe0a18fb2f1b5ac0844b84739753f8eae08554f2118cb1ad474cd14a2a359dcaccde7c312b1bf2b5443bea5679e99927ae173b1b5aed14aad8644d583fdfe6b4ccc7f18e22752fc1fd6822ed0ab8dfbc6a5205702dc720ed2cc59b27455846e9b87e4b113281e759dea5468c17e"}}, &(0x7f0000000500)=0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timer_settime(r11, 0x1, &(0x7f0000000580)={{0x0, 0x3938700}, {r12, r13+10000000}}, &(0x7f0000000700)) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) 6m45.008966409s ago: executing program 0 (id=28008): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) rt_sigsuspend(&(0x7f0000000080)={[0x7]}, 0x8) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, 0x0, 0x4048000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000dc0)=@newtaction={0x198, 0x30, 0x1, 0x4000000, 0x0, {0x0, 0x0, 0x6a00}, [{0x184, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x10000000, 0x0, 0x4}, 0x3, r2}}]}, {0x4, 0xa}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_vlan={0x130, 0x1c, 0x0, 0x0, {{0x9}, {0x40, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0xf101, 0x4, 0x20000006, 0x7ff, 0x3}, 0x3}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x9e6}]}, {0xc5, 0x6, "03563fa0d9bd6e37a13e487040111699a1812ab081418b3454f4cbc45eac9fd93ccc4923079eb6f0600a1d4e5387a8145514ae9769cde09fc4f36876bf42b72aae7c24962a49e3f786c461fccfb42024e6cdf82ac222fda2078fcd4455af4f9d21ee436c4406c51de094418e6cdce59b91e7106b52222084a6026409268ba51e9a0d946bcd9894a600c5b1d5d9ed1b733b544a2dea62dcd1fb1f89fc536d5b6adcaf1b902bd893e8c58c87c216f9904e2cd771a7d44c9a42ce8bef7f1adfd4ffe8"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0x198}}, 0x0) 6m44.998822969s ago: executing program 9 (id=28009): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x17, 0x0) r2 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0x1064, 0x80, 0x200003, 0x1af}, &(0x7f00000001c0)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000200)=[{0x0}, {0x0}], 0x2}, 0x0, 0x3, 0x0, {0x2}}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffff9e, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_enter(r2, 0x47f8, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r5, 0x0, 0x20004004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x40000000000009f, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") r7 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) eventfd(0x8) sendfile(r7, r7, 0x0, 0x800000009) 6m44.889138778s ago: executing program 0 (id=28012): fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 6m44.852010051s ago: executing program 0 (id=28013): prlimit64(0x0, 0xe, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00'}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m44.694840734s ago: executing program 9 (id=28014): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e0000000800000000001800038014000380100001"], 0x44}}, 0x20008000) r2 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000340)={r2}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket(0x400000000010, 0x3, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) 6m43.899692848s ago: executing program 9 (id=28016): recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x48, &(0x7f0000000140), 0x100}, 0x2001) socket$kcm(0xa, 0x5, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket(0x10, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400}, 0x94) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) 6m43.860532511s ago: executing program 9 (id=28017): prlimit64(0x0, 0xe, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00'}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m28.344842232s ago: executing program 56 (id=28013): prlimit64(0x0, 0xe, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00'}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m27.424416346s ago: executing program 57 (id=28017): prlimit64(0x0, 0xe, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00'}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m26.026281319s ago: executing program 7 (id=28182): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x6}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r6, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port1\x00', 0x72, 0x11cfa, 0x0, 0x8000007, 0x3, 0x4, 0x1, 0x0, 0x6}) close_range(r5, 0xffffffffffffffff, 0x0) 6m26.003658271s ago: executing program 7 (id=28183): r0 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r0, 0x0, 0x20000000) 6m25.937329906s ago: executing program 7 (id=28184): prlimit64(0x0, 0xe, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={0x0, 0x1c}}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m25.009193131s ago: executing program 7 (id=28190): r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r1, @ANYBLOB="0100"], 0x3c}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c0000003e000701fcfffffff6dbdf25017c0000080003"], 0x1c}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) 6m24.918018319s ago: executing program 7 (id=28191): r0 = socket(0x1, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000040000000400000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmmsg$unix(r0, &(0x7f0000001680)=[{{&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) 6m24.848342744s ago: executing program 7 (id=28192): sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r7}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m8.513527961s ago: executing program 58 (id=28192): sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r7}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5m39.377633139s ago: executing program 2 (id=28666): r0 = io_uring_setup(0x2f74, &(0x7f0000000080)={0x0, 0x310, 0x10000, 0xffffffff, 0x279}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000005000000080000000f"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000065bbc80f0896b5594cd5662d060100000090b1b600"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800011aa29d6c5ee41dff00000000bfa200000000000007020000f8ffffffb7030000958500000001000000181100"/68, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x3, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000300)=r3) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) write$cgroup_devices(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r7 = socket$unix(0x1, 0x1, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r8, 0x0) connect$unix(r7, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000001c0)=0x0) quotactl$Q_QUOTAON(0xffffffff80000200, &(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, r9, &(0x7f0000000280)='./file0\x00') accept(r8, 0x0, 0x0) 5m39.015123589s ago: executing program 2 (id=28675): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x40404) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x6000)=nil, 0x3000) shmdt(r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r5, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) io_getevents(r3, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x0) write$char_usb(r2, &(0x7f00000003c0)="1638ed960905d217f5ab342a1a194c82a932b5b3104fa55c1e04cd34f9a9381630d5e6f1063c44f16f29b7b10e354749212d2ffc8db92f85b6c0ad4ccce2a1cfa8b5030bb9cab112cb7c600b5956d39d45b45a441eec6446c2d110799f7d63107554d95f5135225f7eaef8fa2b0b8714aa6d6bf04d6b24461ddba3a3546fcbf50f563c69909416f5c4de", 0x8a) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00800000000008000000000200000000000000", @ANYRES32=0x1, @ANYBLOB="ffffff7f00"/20, @ANYRES32=r7, @ANYRES32, @ANYBLOB="00000000000000000300"/28], 0x50) keyctl$clear(0x3, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='q\xa9', 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) getsockopt$inet6_tcp_buf(r8, 0x6, 0x1a, 0x0, &(0x7f0000000040)) io_pgetevents(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 5m38.024642789s ago: executing program 2 (id=28693): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth1_to_bond\x00', 0x0}) r3 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000440)={r0, r2, 0x25, 0x0, @void}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000140)=r3, 0x4) 5m37.929297826s ago: executing program 2 (id=28696): prlimit64(0x0, 0xe, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00'}, 0x18) 5m36.814178006s ago: executing program 2 (id=28705): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x40404) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x6000)=nil, 0x3000) shmdt(r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)=0x0) timer_settime(r4, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r4, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) io_getevents(0x0, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x0) write$char_usb(r2, &(0x7f00000003c0)="1638ed960905d217f5ab342a1a194c82a932b5b3104fa55c1e04cd34f9a9381630d5e6f1063c44f16f29b7b10e354749212d2ffc8db92f85b6c0ad4ccce2a1cfa8b5030bb9cab112cb7c600b5956d39d45b45a441eec6446c2d110799f7d63107554d95f5135225f7eaef8fa2b0b8714aa6d6bf04d6b24461ddba3a3546fcbf50f563c69909416f5c4de", 0x8a) r7 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x1, 0x410000) capset(&(0x7f0000000200)={0x19980330, r3}, &(0x7f00000004c0)={0x1ff, 0x1, 0x3, 0x7f, 0x7, 0x2}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00800000000008000000000200000000000000", @ANYRES32=0x1, @ANYBLOB="ffffff7f00"/20, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="00000000000000000300"/28], 0x50) keyctl$clear(0x3, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='q\xa9', 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, &(0x7f0000000040)) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 5m36.658501439s ago: executing program 2 (id=28712): prlimit64(0x0, 0xe, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00'}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5m20.329007455s ago: executing program 59 (id=28712): prlimit64(0x0, 0xe, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00'}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4m38.630098267s ago: executing program 1 (id=29839): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r0, 0x0, 0x4}, 0x18) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x101201, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000600)=0x14) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000080)=0x14) close(r1) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000bfc1000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r3}, 0x18) openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000600)='.\x00', &(0x7f0000000640), 0x2008000, &(0x7f0000000000)={[{@favordynmods}]}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r4, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) sendmsg$tipc(r4, &(0x7f00000005c0)={&(0x7f0000000000), 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="f7", 0x101d0}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f00000006c0)=@newtaction={0x4c, 0x30, 0x9, 0xf00, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8}, {0xc, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x40040c0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 4m38.426439064s ago: executing program 1 (id=29844): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2000042, &(0x7f0000002240)={[{@nombcache}, {@oldalloc}, {@inlinecrypt}, {@delalloc}, {@mblk_io_submit}, {@delalloc}, {@noload}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@lazytime}]}, 0x3, 0x4ea, &(0x7f00000006c0)="$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") umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 4m37.486095569s ago: executing program 1 (id=29857): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f0000000080)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = syz_open_procfs(0x0, &(0x7f0000004600)='map_files\x00') fchdir(r7) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r7}, &(0x7f0000000100), &(0x7f0000000740)='%-5lx \x00'}, 0x20) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f0000000a40)={@loopback, @multicast1}, &(0x7f0000000a80)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r7, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2a, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, {{&(0x7f0000000080)=@abs={0x1, 0x30, 0x4e21}, 0x6e, 0x0}}], 0x2, 0x40008004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, 0x36) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x17, 0x0, 0x0, 0x0) 4m37.392457467s ago: executing program 1 (id=29858): r0 = io_uring_setup(0x2f74, &(0x7f0000000080)={0x0, 0x310, 0x10000, 0xffffffff, 0x279}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000005000000080000000f"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800011aa29d6c5ee41dff00000000bfa200000000000007020000f8ffffffb7030000958500000001000000181100"/68, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x3, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000300)=r3) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) socket$unix(0x1, 0x1, 0x0) io_uring_setup(0x4a5c, &(0x7f0000000000)={0x0, 0x4075, 0x400, 0x2, 0x27a, 0x0, r0}) 4m37.064737103s ago: executing program 1 (id=29869): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b0000000000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/rt_acct\x00') r2 = timerfd_create(0x0, 0x80800) fstat(r2, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket(0x18, 0x5, 0x0) connect$pppoe(r3, &(0x7f0000000100)={0x18, 0x0, {0x2, @multicast, 'veth0_to_bridge\x00'}}, 0x1e) sendfile(r3, r1, 0x0, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) readahead(r0, 0xfffffffffffffffe, 0xd737) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0xffffffffffffff54}, 0x18) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000002c0)=0x1) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000280)={0x0, 0x3, 0x7, 0x0, 0x10040, 0x8f}) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x2) arch_prctl$ARCH_GET_XCOMP_GUEST_PERM(0x1024, &(0x7f0000000040)) io_setup(0x202, &(0x7f0000000200)) 4m36.85415626s ago: executing program 1 (id=29873): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=0x0], 0x1c}}, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a2, &(0x7f0000000000)='bridge0\x00') (async) ioctl$sock_SIOCBRDELBR(r2, 0x89a2, &(0x7f0000000000)='bridge0\x00') sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000005e00679a3601ffc4910700004f78d4c1a0731cccff"], 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) creat(&(0x7f0000000240)='./file1\x00', 0x0) (async) r3 = creat(&(0x7f0000000240)='./file1\x00', 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='rxrpc_call\x00', r4}, 0x10) r5 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0x0, 0x4, @dev}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) (async) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0x0, 0x4, @dev}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) close_range(r3, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) fchdir(r6) close(r6) (async) close(r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={@map=0x1, 0x11, 0x0, 0x578, &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={@map=0x1, 0x11, 0x0, 0x578, &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000840)='syz0\x00', 0x200002, 0x0) socket$inet(0x2, 0x2, 0x1) (async) r7 = socket$inet(0x2, 0x2, 0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) sendmsg$inet(r7, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0xffff, @remote}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x14}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000000500000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 4m20.576345593s ago: executing program 60 (id=29873): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=0x0], 0x1c}}, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a2, &(0x7f0000000000)='bridge0\x00') (async) ioctl$sock_SIOCBRDELBR(r2, 0x89a2, &(0x7f0000000000)='bridge0\x00') sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000005e00679a3601ffc4910700004f78d4c1a0731cccff"], 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) creat(&(0x7f0000000240)='./file1\x00', 0x0) (async) r3 = creat(&(0x7f0000000240)='./file1\x00', 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='rxrpc_call\x00', r4}, 0x10) r5 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0x0, 0x4, @dev}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) (async) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0x0, 0x4, @dev}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) close_range(r3, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) fchdir(r6) close(r6) (async) close(r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={@map=0x1, 0x11, 0x0, 0x578, &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={@map=0x1, 0x11, 0x0, 0x578, &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000840)='syz0\x00', 0x200002, 0x0) socket$inet(0x2, 0x2, 0x1) (async) r7 = socket$inet(0x2, 0x2, 0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) sendmsg$inet(r7, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0xffff, @remote}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x14}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000000500000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 3.502694047s ago: executing program 6 (id=33189): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f0000000080)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = syz_open_procfs(0x0, &(0x7f0000004600)='map_files\x00') fchdir(r7) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r7}, 0x0, &(0x7f0000000740)='%-5lx \x00'}, 0x20) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f0000000a40)={@loopback, @multicast1}, &(0x7f0000000a80)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r7, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2a, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x8c, 0x8, 0x0, 0x0}}, 0x10) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, {{&(0x7f0000000080)=@abs={0x1, 0x30, 0x4e21}, 0x6e, 0x0}}], 0x2, 0x40008004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, 0x36) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x17, 0x0, 0x0, 0x0) 2.696752112s ago: executing program 6 (id=33190): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@decl_tag={0xb, 0x0, 0x0, 0x11, 0x3}]}}, 0x0, 0x2a, 0x0, 0x1, 0x7}, 0x28) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000340)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x5a}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f900f5", 0x18, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x1e, 0x2}]}}}}}}}}, 0x0) (fail_nth: 2) 2.667020214s ago: executing program 5 (id=33191): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="180200000000000000000000000d4ddd1dcfa2000000b7080000000000007b8af8ff00000000b7080000f43400007b8af0ff00000000bfa100001b00000007010000f8ffffffa1a400000000000007040000f0ffffffb70200000800", @ANYRES32=r0, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1, 0x0, 0x4}, 0x18) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x101201, 0x0) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000600)=0x14) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000080)=0x14) close(r2) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00"/12], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000bfc1000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r4}, 0x18) openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000600)='.\x00', &(0x7f0000000640), 0x2008000, &(0x7f0000000000)={[{@favordynmods}]}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r5, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) sendmsg$tipc(r5, &(0x7f00000005c0)={&(0x7f0000000000), 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="f7", 0x101d0}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f00000006c0)=@newtaction={0x4c, 0x30, 0x9, 0xf00, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8}, {0xc, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x40040c0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.35295071s ago: executing program 6 (id=33194): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="180200000000000000000000000d4ddd1dcfa2000000b7080000000000007b8af8ff00000000b7080000f43400007b8af0ff00000000bfa100001b00000007010000f8ffffffa1a400000000000007040000f0ffffffb70200000800", @ANYRES32=r0, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1, 0x0, 0x4}, 0x18) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x101201, 0x0) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000600)=0x14) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000080)=0x14) close(r2) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000bfc1000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r4}, 0x18) openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000600)='.\x00', &(0x7f0000000640), 0x2008000, &(0x7f0000000000)={[{@favordynmods}]}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r5, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) sendmsg$tipc(r5, &(0x7f00000005c0)={&(0x7f0000000000), 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="f7", 0x101d0}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f00000006c0)=@newtaction={0x4c, 0x30, 0x9, 0xf00, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8}, {0xc, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x40040c0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.283433505s ago: executing program 4 (id=33197): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = getpgrp(0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000ac0)='kmem_cache_free\x00', r2}, 0x10) r3 = syz_pidfd_open(r1, 0x0) r4 = pidfd_getfd(r3, r3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70200001400000bb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f00000005c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000700)='kfree\x00', r7}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv_slave_0\x00'}) r8 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r8, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) r9 = socket$tipc(0x1e, 0x1, 0x0) sendmsg$tipc(r9, &(0x7f00000008c0)={&(0x7f0000000600)=@name, 0x10, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x80) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={0x0, 0xac}, 0x1, 0x0, 0x0, 0xc0c1}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r4) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x95}, 0x40000804) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r11, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r12, 0x0, 0x100000000}, 0x18) umount2(0x0, 0x4) 1.929462004s ago: executing program 6 (id=33201): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond0\x00'}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) clock_getres(0x3, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02142000110000000040000000000000030005000000000002000000ffffffff0000000000000000080012000000010000000000000000000600000000000027b20e97a6a9ecae000000ee00000000000000000000000000fc020000000000000000000000000000030006000000000002000000e00000010000000000000000010018"], 0x88}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000000000)=0xfffffffffffffffc, 0x12) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001b00)=@newqdisc={0x148, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x118, 0x2, {{0x10000, 0x0, 0x57b2}, [@TCA_NETEM_REORDER={0xc, 0x3, {0xdc, 0x3}}, @TCA_NETEM_LOSS={0xc0, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x14, 0x2, {0x8, 0x4, 0x2, 0x3e}}, @NETEM_LOSS_GE={0x14, 0x2, {0x2, 0x7, 0x2}}, @NETEM_LOSS_GE={0x14, 0x2, {0x2, 0xffffdb68, 0xf, 0x4}}, @NETEM_LOSS_GI={0x18, 0x1, {0x7, 0x1, 0x8, 0x85bc, 0x1ff}}, @NETEM_LOSS_GE={0x14, 0x2, {0x5, 0x8000000, 0x5}}, @NETEM_LOSS_GE={0x14, 0x2, {0x8, 0x5, 0x7, 0x7}}, @NETEM_LOSS_GE={0x14, 0x2, {0x6, 0xf, 0xa9c8, 0x1}}, @NETEM_LOSS_GI={0x18, 0x1, {0x7, 0x0, 0x8, 0x50195274, 0x1}}, @NETEM_LOSS_GE={0x14, 0x2, {0x4, 0x0, 0x59, 0x2}}]}, @TCA_NETEM_LOSS={0x4}, @TCA_NETEM_SLOT={0x2c, 0xc, {0x7, 0x100, 0x40, 0x9, 0x2, 0x94}}]}}}]}, 0x148}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x1c, r8, 0x2586ad4018a3b31b, 0x1, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="4c00000010003df600"/20, @ANYRES32=0x0, @ANYBLOB="000000e8ff07000014000300000000000000000000000000000000001800128008000100707070000c00028008000100", @ANYRESDEC=r10], 0x4c}, 0x1, 0x0, 0x0, 0x20000804}, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000400000006"], 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r12}, 0x10) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) open(&(0x7f0000000240)='./file0\x00', 0x40100, 0x52) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r13}, './file0\x00'}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, r11, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x50) 1.915306015s ago: executing program 5 (id=33202): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x148801, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000380), 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r2, @ANYBLOB="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"], 0x1c8}}, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, 0x0) 1.880139038s ago: executing program 4 (id=33203): pipe(0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB='b *'], 0x47) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000001c0)='devices.deny\x00', 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x47, 0x0) 1.879561688s ago: executing program 6 (id=33204): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1, 0x7, 0x10001, 0x9, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{r0}, &(0x7f0000000940), &(0x7f0000000980)='%pS \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000002780)=ANY=[@ANYBLOB="640000000206010800000000000000000100000a16000300686173683a6e65742c706f72742c6e6574000000050001000700000005000500020000000900020073797a310000000005000400000000001400078008000840000000f108000640"], 0x64}, 0x1, 0x0, 0x0, 0x2006c0c4}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/prev\x00') prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='fd/3\x00') r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) openat$dir(0xffffffffffffff9c, 0x0, 0xea, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0x40182103, &(0x7f0000000240)={r7, 0x2, r6}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000070000", @ANYRES32=r5, @ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r8, 0x0, 0xffffffffffffffff}, 0x18) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket(0x40000000015, 0x5, 0x0) connect$inet(r10, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r10, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r10, 0x0, 0x0, 0x4, 0x0, 0x0) close_range(r9, 0xffffffffffffffff, 0x0) ioctl$KDSKBENT(r4, 0x4b47, &(0x7f0000000000)={0x8, 0x2, 0x8000}) write$sndseq(r4, 0x0, 0x0) r11 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_int(r11, 0x0, 0xf, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000005200110000000002000000"], 0x14}}, 0x0) 1.825301312s ago: executing program 5 (id=33205): r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000480)='./file0\x00', 0x18000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRESOCT=r0, @ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="fe2ecf20a9a17bd2ed7e803f830375c150a1f848f604c2c1f932d2b7163be4b2b9a5bd521d185cfbee555b27608594beba6325923aaf5db74cff01000053db92c6c5fcbba0abd975fc76bea49b00513afc856ed89d3fadeda307ca587354322803b0983cc65725ae7f45fb95e7cdb28c6b886959b7dde2c87c73f6008cf6eed7861f24b7423704b95f3d05b92d3d7ff9d392833ecd02443320b60131a350360fcc1d659e2a03cb469caf0498bacae0735a161345b3d71a55f14ef636b6f832c7a6071fce83904dfd871b6d8e03648dbaa3a039eb5673792cae80335732030f9aeabaf3bb3cc4ca5fe75271d69b2e78beb2b81fc3cf3a18a7ae93a3cdbe6599b99408275e2b4b4477c6fcf4806134e839e13533ec000000000000006a1c000000000000000000000000000000000000000000000000000069c3288311b7414705e975eb3f1b77a120", @ANYRESOCT], 0x8, 0x2f6, &(0x7f0000000880)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040), 0x208e24b) msgsnd(0x0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0x1008, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) quotactl_fd$Q_SYNC(r0, 0xffffffff80000101, 0x0, 0x0) fdatasync(r1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, 0x0, 0x0}, 0x94) chown(&(0x7f0000000040)='./cgroup\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x1) r3 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x420801, 0x98) read$char_usb(r3, 0x0, 0x0) ftruncate(r1, 0x5) 1.825054742s ago: executing program 4 (id=33206): r0 = io_uring_setup(0x2f74, &(0x7f0000000080)={0x0, 0x310, 0x10000, 0xffffffff, 0x279}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000005000000080000000f"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000065bbc80f0896b5594cd5662d060100000090b1b600"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800011aa29d6c5ee41dff00000000bfa200000000000007020000f8ffffffb7030000958500000001000000181100"/68, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x3, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000300)=r3) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) socket$unix(0x1, 0x1, 0x0) io_uring_setup(0x4a5c, &(0x7f0000000000)={0x0, 0x4075, 0x400, 0x2, 0x27a, 0x0, r0}) 1.633324208s ago: executing program 4 (id=33207): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x474283, 0x0, 0x14}, 0x20) 1.61095611s ago: executing program 4 (id=33208): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x5f}, 0x18) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000140)) r3 = socket$netlink(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010027bd7000fbdbdf250f00000005002f000100000005002ae800000000050029000100000008000300", @ANYRES32=r4], 0x54}, 0x1, 0x0, 0x0, 0x24004040}, 0x24008824) close(r1) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r6) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r8) r9 = socket$unix(0x1, 0x1, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x8000000, {0x0, 0x0, 0x0, r11, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x28, 0x2, {{0x100, 0x7, 0x6361, 0x5, 0xfffffffd, 0x6}, [@TCA_NETEM_LATENCY64={0xc, 0xa, 0x7}]}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0x80000, {0x0, 0x0, 0x0, r11, {0x0, 0x11}, {0xffe6, 0xb}, {0xb, 0x4}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0xc, 0x2, [@TCA_FQ_CODEL_CE_THRESHOLD={0x8, 0x7, 0x3}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x2000c061}, 0x4000000) ioctl$SIOCSIFHWADDR(r8, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 1.342591072s ago: executing program 5 (id=33210): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_vs\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000001600), 0xffffffffffffffff) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000340)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="78030000", @ANYRES16=r2, @ANYBLOB="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", @ANYRES32=r4], 0x378}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x33, 0x0, &(0x7f0000000000), &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x97, &(0x7f0000000240)=""/151, 0x41100, 0x0, '\x00', r4, @fallback=0xc, r0, 0x8, &(0x7f0000000300)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r0, 0x0, &(0x7f0000001500)=[r0, r0, r0, r0]}, 0x94) read(r0, &(0x7f0000000040)=""/167, 0xa7) 1.324843132s ago: executing program 5 (id=33211): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x40404) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x6000)=nil, 0x3000) shmdt(r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r5, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) io_getevents(r3, 0x4, 0x0, &(0x7f00000019c0), 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x0) write$char_usb(r2, &(0x7f00000003c0)="1638ed960905d217f5ab342a1a194c82a932b5b3104fa55c1e04cd34f9a9381630d5e6f1063c44f16f29b7b10e354749212d2ffc8db92f85b6c0ad4ccce2a1cfa8b5030bb9cab112cb7c600b5956d39d45b45a441eec6446c2d110799f7d63107554d95f5135225f7eaef8fa2b0b8714aa6d6bf04d6b24461ddba3a3546fcbf50f563c69909416f5c4de", 0x8a) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00800000000008000000000200000000000000", @ANYRES32=0x1, @ANYBLOB="ffffff7f00"/20, @ANYRES32=r6, @ANYRES32, @ANYBLOB="00000000000000000300"/28], 0x50) keyctl$clear(0x3, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='q\xa9', 0x0) r7 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_buf(r7, 0x6, 0x1a, 0x0, &(0x7f0000000040)) io_pgetevents(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 899.370597ms ago: executing program 4 (id=33213): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x40404) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x6000)=nil, 0x3000) shmdt(r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r5, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) io_getevents(r3, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x0) write$char_usb(r2, 0x0, 0x0) r8 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x1, 0x410000) capset(0x0, &(0x7f00000004c0)={0x1ff, 0x1, 0x3, 0x7f, 0x7, 0x2}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00800000000008000000000200000000000000", @ANYRES32=0x1, @ANYBLOB="ffffff7f00"/20, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="00000000000000000300"/28], 0x50) keyctl$clear(0x3, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='q\xa9', 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, &(0x7f0000000040)) io_pgetevents(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 879.811398ms ago: executing program 6 (id=33214): prctl$PR_GET_CHILD_SUBREAPER(0x25) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000940)=ANY=[@ANYBLOB="10100000000001183bbef2cb8a0edc52c49af766924cceae110000001a000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095", @ANYRES8, @ANYRESHEX, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a300000000008000a40ffffffff580000000c0a010100000000000000000a0000060900020073797a30000000000900010073797a31000000012c0003802800008004000180200007800e000100636f6e6e6c696d69740000000c000280080001"], 0xbc}, 0x1, 0x0, 0x0, 0x4000851}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r6 = socket(0xa, 0x1, 0x84) r7 = socket(0xa, 0x1, 0x84) dup3(r6, r7, 0x0) sendmsg$AUDIT_GET_FEATURE(r7, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x3fb, 0x2, 0x70bd2d, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000004}, 0x4080) r8 = timerfd_create(0x7, 0x0) timerfd_settime(r8, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x989680}}, 0x0) readv(r8, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/52, 0x34}], 0x1) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect$cdc_ecm(0x2, 0x53, &(0x7f0000000300)={{0x12, 0x1, 0x110, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x0, 0x0, 0xffffffffffff8001, 0x1, [{{0x9, 0x2, 0x41, 0x1, 0x1, 0x0, 0x50, 0x0, [{{0x9, 0x4, 0x0, 0x5d, 0x12, 0x2, 0x6, 0x0, 0x7, {{0xb, 0x24, 0x6, 0x0, 0x0, "2d00e0e80e16"}, {0x5, 0x24, 0x0, 0x1ff}, {0xd, 0x24, 0xf, 0x1, 0xfffffffd, 0x40}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x400, 0x0, 0x8, 0xfc}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0xd}}}}}]}}]}}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000780)='sys_enter\x00', r11}, 0x18) 692.778354ms ago: executing program 5 (id=33217): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x40404) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x6000)=nil, 0x3000) shmdt(r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r5, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) io_getevents(r3, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x0) write$char_usb(r2, &(0x7f00000003c0)="1638ed960905d217f5ab342a1a194c82a932b5b3104fa55c1e04cd34f9a9381630d5e6f1063c44f16f29b7b10e354749212d2ffc8db92f85b6c0ad4ccce2a1cfa8b5030bb9cab112cb7c600b5956d39d45b45a441eec6446c2d110799f7d63107554d95f5135225f7eaef8fa2b0b8714aa6d6bf04d6b24461ddba3a3546fcbf50f563c69909416f5c4de", 0x8a) syz_open_dev$vcsn(0x0, 0x1, 0x410000) capset(&(0x7f0000000200)={0x19980330, r4}, &(0x7f00000004c0)={0x1ff, 0x1, 0x3, 0x7f, 0x7, 0x2}) keyctl$clear(0x3, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='q\xa9', 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) getsockopt$inet6_tcp_buf(r8, 0x6, 0x1a, 0x0, &(0x7f0000000040)) io_pgetevents(r3, 0x2, 0x2, &(0x7f00000000c0)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) io_pgetevents(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 481.384021ms ago: executing program 8 (id=33220): shmctl$SHM_LOCK(0x0, 0xb) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, 0x0, 0x4000000) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x20340, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a3100000000ac000000030a010300000000000000000100000014000480080002400000000008000140000000050900030073797a30000000000900010073797a310000000008000b4000000003640008800c0001"], 0x92fc}}, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xffff, 0x0, @loopback, 0xa09c}, {0xa, 0x0, 0xfffffffe, @empty}, 0xffffffffffffffff, 0x99d}}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x19, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000300)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="58000000000905000000000000000000020000050900010073797a30000000f0070005400000001c0c00048008000140fffffff7240002001400018008000100ac1414aa08000200e00000020c0002800500010001000000"], 0x58}, 0x1, 0x0, 0x0, 0x24000800}, 0x4040040) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x20, 0x10, &(0x7f0000000380)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="4000000010001fff000000000000000000060000", @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800e0001007769726567756172640000000400028008000a00b8"], 0x40}}, 0x0) 453.487063ms ago: executing program 3 (id=33221): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_vs\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000001600), 0xffffffffffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000340)={'wg0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000014c0)={r0, 0x20, &(0x7f0000000440)={&(0x7f00000004c0)=""/4096, 0x1000, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x33, 0x0, &(0x7f0000000000), &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x97, &(0x7f0000000240)=""/151, 0x41100, 0x0, '\x00', r2, @fallback=0xc, r0, 0x8, &(0x7f0000000300)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, r3, r0, 0x0, &(0x7f0000001500)=[r0, r0, r0, r0]}, 0x94) read(r0, &(0x7f0000000040)=""/167, 0xa7) 439.048354ms ago: executing program 8 (id=33222): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000003c0)=ANY=[@ANYBLOB="34000000d13c77abe1bf7afda7361e76e0e250", @ANYRES16=r5, @ANYBLOB="010000000000fbdbdf25250000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') setreuid(0xee01, 0xee01) openat2(r6, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)={0x40, 0x0, 0x11}, 0x18) r7 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r9}, 0x18) syz_emit_ethernet(0x2a, 0x0, 0x0) r10 = socket$nl_generic(0x11, 0x3, 0x10) sendmsg(r10, &(0x7f0000000640)={&(0x7f00000000c0)=@caif=@dgm={0x25, 0xd}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) getdents(0xffffffffffffffff, 0x0, 0x40) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x58, r7, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffbfff9}}}]}}]}, 0x58}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x24040840) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000080)}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x29, 0x5, 0x5, 0x7fffffff, 0x2, @mcast2, @mcast2, 0x1, 0x1, 0xb, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'erspan0\x00', &(0x7f0000000680)={'tunl0\x00', 0x0, 0x40, 0x700, 0x3, 0x1, {{0xa, 0x4, 0x1, 0x1, 0x28, 0x64, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010101, @local, {[@end, @end, @generic={0x86, 0x10, "6dc4e28a3b398292ade2e3baa3ac"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vxcan0\x00'}) 435.919674ms ago: executing program 3 (id=33223): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newlink={0x24, 0x10, 0x1, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, 0x40810, 0x3}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) (fail_nth: 2) 185.088215ms ago: executing program 3 (id=33224): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) 183.794545ms ago: executing program 3 (id=33225): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f0000000080)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_procfs(0x0, &(0x7f0000004600)='map_files\x00') fchdir(r8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r8, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000740)='%-5lx \x00'}, 0x20) getsockopt$inet_mreqn(r8, 0x0, 0x24, &(0x7f0000000a40)={@loopback, @multicast1, 0x0}, &(0x7f0000000a80)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r8, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2a, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), 0x0, 0x0, 0x8c, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x21, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe91b, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x0, 0x8, 0x6, 0x163, 0xfffffff8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffd}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @generic={0xf, 0x8, 0x0, 0x7, 0x4}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='syzkaller\x00', 0x59c, 0x2f, &(0x7f0000000980)=""/47, 0x41100, 0x42, '\x00', r10, @fallback=0x21, r8, 0x8, &(0x7f0000000ac0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0x4, 0xfffffffa, 0x9}, 0x10, r11, r8, 0x0, &(0x7f0000000e40)=[r8, r8], 0x0, 0x10, 0x5}, 0x94) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendmmsg$unix(r7, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, {{&(0x7f0000000080)=@abs={0x1, 0x30, 0x4e21}, 0x6e, 0x0}}], 0x2, 0x40008004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000x0, 0x1, 0x1, 0x1ff, 0x8, {{0x17, 0x4, 0x1, 0x8, 0x5c, 0x68, 0x0, 0x6, 0x4, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x8, 0x1b, 0x0, 0x3, [0x10]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x23, 0x3, [{0x5, 0xb, "441d91075ce5d577c0"}, {0x0, 0x6, "8e785d41"}, {0x0, 0xc, "5fd27e1515be36c9e8ce"}]}, @rr={0x7, 0x17, 0xe6, [@rand_addr=0x64010102, @remote, @local, @rand_addr=0x64010101, @remote]}]}}}}}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x10, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000003251884de608e76a0000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000e0ff06010000f8ffff01000000e9940f000007040000", @ANYBLOB="a948a62bb260b880f36a316fe6474df46bd52200770ba6b3c5b79bedb8ff4b5a49f449a3d233a5426fe65e844d32a59390e16de6d1129c3516fefcc17642510a65ce00168b9db21149916076e38b59d4821e843610b25149e3741a1aa22dd7713571ed65aea4ac1827bb4c6536b9d84b2d69bd41faa44446d07cf2614b1b84dc337c242b3d53a153825999330335bbc03ff333cddbd056215ad77d", @ANYRES8=r0], &(0x7f0000000000)='GPL\x00', 0x1a, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r3, 0x0, 0xfffffffffffffffd}, 0x18) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000280)={'\x00', 0x7e, 0x1000, 0x5c8, 0x80000003, 0x6}) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000001880)=""/4096, 0x1000) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000040)={'gretap0\x00', 0x0, 0x1, 0x1, 0x1ff, 0x8, {{0x17, 0x4, 0x1, 0x8, 0x5c, 0x68, 0x0, 0x6, 0x4, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x8, 0x1b, 0x0, 0x3, [0x10]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x23, 0x3, [{0x5, 0xb, "441d91075ce5d577c0"}, {0x0, 0x6, "8e785d41"}, {0x0, 0xc, "5fd27e1515be36c9e8ce"}]}, @rr={0x7, 0x17, 0xe6, [@rand_addr=0x64010102, @remote, @local, @rand_addr=0x64010101, @remote]}]}}}}}) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x10, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000003251884de608e76a0000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000e0ff06010000f8ffff01000000e9940f000007040000", @ANYBLOB="a948a62bb260b880f36a316fe6474df46bd52200770ba6b3c5b79bedb8ff4b5a49f449a3d233a5426fe65e844d32a59390e16de6d1129c3516fefcc17642510a65ce00168b9db21149916076e38b59d4821e843610b25149e3741a1aa22dd7713571ed65aea4ac1827bb4c6536b9d84b2d69bd41faa44446d07cf2614b1b84dc337c242b3d53a153825999330335bbc03ff333cddbd056215ad77d", @ANYRES8=r0], &(0x7f0000000000)='GPL\x00', 0x1a, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r3, 0x0, 0xfffffffffffffffd}, 0x18) (async) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) (async) creat(&(0x7f00000000c0)='./file0\x00', 0x0) (async) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000280)={'\x00', 0x7e, 0x1000, 0x5c8, 0x80000003, 0x6}) (async) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) (async) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000001880)=""/4096, 0x1000) (async) 39.918006ms ago: executing program 8 (id=33229): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f00000009c0)=0xc) 18.252828ms ago: executing program 8 (id=33230): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000000400000099000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 8 (id=33231): syz_emit_ethernet(0x66, &(0x7f0000000640)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000210", 0x30, 0x3a, 0x0, @remote, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, '\t\x00', 0x0, 0x11, 0x0, @local, @empty}}}}}}}, 0x0) (async) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) (async) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000580), 0x0) (async) recvmmsg(r0, 0x0, 0x0, 0x1a000, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'wlan0\x00'}) (async) ioctl(r2, 0x8b20, &(0x7f0000000040)) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000001a40)=@newqdisc={0x24, 0x24, 0xd0f, 0x3, 0x3, {0x60, 0x0, 0x0, r4, {0x0, 0x2}, {0xffff, 0xffff}, {0x4}}}, 0x24}, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_DEL(r6, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000e40)={0x3c, r5, 0x6ae3e61d32b8160b, 0x0, 0x0, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0xa8}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x3c}}, 0x0) (async) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000580)={[{@grpquota}, {@noinit_itable}, {@errors_remount}, {@grpjquota_path={'grpjquota', 0x3d, '.'}}, {@stripe}, {@init_itable}]}, 0x1, 0x4c5, &(0x7f0000000f00)="$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") (async) truncate(&(0x7f0000000040)='./file1\x00', 0x1a8) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1e00, 0x21}, 0x94) (async) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14080, 0x10000}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r7}]}, @IFLA_GROUP={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) r9 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r9, 0x8922, &(0x7f0000000180)={'netdevsim0\x00', 0x7fff}) kernel console output (not intermixed with test programs): 17 has an invalid length. [ 2174.475141][T27786] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2174.539571][T27740] vhci_hcd: connection reset by peer [ 2174.561447][T24436] vhci_hcd: stop threads [ 2174.566038][T24436] vhci_hcd: release socket [ 2174.570518][T24436] vhci_hcd: disconnect device [ 2175.053886][ T8147] usb usb8-port2: attempt power cycle [ 2175.559105][T27824] vlan2: entered allmulticast mode [ 2175.840853][T19327] usb 10-1: device descriptor read/8, error -110 [ 2176.045188][T19327] usb 10-1: new SuperSpeed USB device number 10 using vhci_hcd [ 2176.070409][T19327] usb 10-1: enqueue for inactive port 0 [ 2176.076040][T19327] usb 10-1: enqueue for inactive port 0 [ 2176.103494][T19327] usb 10-1: enqueue for inactive port 0 [ 2176.269859][T27834] lo speed is unknown, defaulting to 1000 [ 2176.276639][T27834] lo speed is unknown, defaulting to 1000 [ 2176.350367][T27834] lo speed is unknown, defaulting to 1000 [ 2176.555509][T27833] vlan3: entered allmulticast mode [ 2176.592800][T27863] __nla_validate_parse: 3 callbacks suppressed [ 2176.592819][T27863] netlink: 8 bytes leftover after parsing attributes in process `syz.6.32505'. [ 2176.631046][T27863] netlink: 8 bytes leftover after parsing attributes in process `syz.6.32505'. [ 2176.730813][T27873] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32509'. [ 2176.740841][T27873] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32509'. [ 2177.512262][T19327] usb usb10-port1: attempt power cycle [ 2177.521086][ T8147] usb usb8-port2: unable to enumerate USB device [ 2177.664712][ T29] kauditd_printk_skb: 311 callbacks suppressed [ 2177.664730][ T29] audit: type=1400 audit(2027.111:128700): avc: denied { mounton } for pid=27880 comm="syz.8.32512" path="/" dev="tmpfs" ino=1576 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2177.889594][ T29] audit: type=1400 audit(2027.314:128701): avc: denied { mounton } for pid=27890 comm="syz.4.32514" path="/281/bus" dev="tmpfs" ino=1442 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2177.912306][ T29] audit: type=1400 audit(2027.314:128702): avc: denied { create } for pid=27890 comm="syz.4.32514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2177.977001][ T29] audit: type=1400 audit(2027.323:128703): avc: denied { mounton } for pid=27888 comm="syz.6.32515" path="/syzcgroup/net/syz6/cgroup.procs" dev="cgroup" ino=181 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=file permissive=1 [ 2178.001646][ T29] audit: type=1400 audit(2027.323:128704): avc: denied { open } for pid=27888 comm="syz.6.32515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2178.020919][ T29] audit: type=1400 audit(2027.323:128705): avc: denied { kernel } for pid=27888 comm="syz.6.32515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2178.040200][ T29] audit: type=1400 audit(2027.323:128706): avc: denied { tracepoint } for pid=27888 comm="syz.6.32515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2178.060084][ T29] audit: type=1400 audit(2027.397:128707): avc: denied { create } for pid=27888 comm="syz.6.32515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2178.079946][ T29] audit: type=1400 audit(2027.397:128708): avc: denied { ioctl } for pid=27888 comm="syz.6.32515" path="socket:[385987]" dev="sockfs" ino=385987 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2178.209273][ T29] audit: type=1400 audit(2027.406:128709): avc: denied { read } for pid=27893 comm="syz.4.32516" name="event1" dev="devtmpfs" ino=243 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2178.221626][T27905] netlink: 'syz.6.32521': attribute type 1 has an invalid length. [ 2178.311870][T27905] 8021q: adding VLAN 0 to HW filter on device bond13 [ 2178.353301][T27909] macvlan2: entered promiscuous mode [ 2178.358882][T27909] macvlan2: entered allmulticast mode [ 2178.384931][T27951] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32525'. [ 2178.402248][T27909] bond13: entered promiscuous mode [ 2178.412602][T27951] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32525'. [ 2178.427076][T27909] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2178.454658][T27909] bond13: left promiscuous mode [ 2178.540726][T27954] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(6) [ 2178.547305][T27954] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2178.555562][T27954] vhci_hcd vhci_hcd.0: Device attached [ 2178.751789][T27968] pim6reg1: entered promiscuous mode [ 2178.757361][T27968] pim6reg1: entered allmulticast mode [ 2179.201883][T27984] pim6reg1: entered promiscuous mode [ 2179.207342][T27984] pim6reg1: entered allmulticast mode [ 2179.221414][T27956] vhci_hcd: connection closed [ 2179.253590][T24420] vhci_hcd: stop threads [ 2179.262708][T24420] vhci_hcd: release socket [ 2179.267201][T24420] vhci_hcd: disconnect device [ 2179.634952][T32076] usb 14-1: device descriptor read/8, error -110 [ 2179.732892][T19327] usb usb10-port1: unable to enumerate USB device [ 2179.754103][T32076] usb 14-1: new SuperSpeed USB device number 14 using vhci_hcd [ 2179.781723][T32076] usb 14-1: enqueue for inactive port 0 [ 2179.809781][T32076] usb 14-1: enqueue for inactive port 0 [ 2179.815400][T32076] usb 14-1: enqueue for inactive port 0 [ 2180.078605][T28011] vlan2: entered promiscuous mode [ 2180.083804][T28011] bridge0: entered promiscuous mode [ 2180.545149][ T8147] usb usb8-port2: attempt power cycle [ 2180.631965][T28023] pim6reg1: entered promiscuous mode [ 2180.637309][T28023] pim6reg1: entered allmulticast mode [ 2180.831634][T28036] netlink: 'syz.3.32546': attribute type 13 has an invalid length. [ 2180.839858][T28036] netlink: 'syz.3.32546': attribute type 17 has an invalid length. [ 2180.924125][T28036] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2180.999957][T32076] usb usb14-port1: attempt power cycle [ 2181.214760][T28057] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2181.272759][T28057] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2181.327537][T28057] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2181.381537][T28057] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2181.460576][T24405] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2181.474564][T24405] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2181.483415][T24405] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2181.497283][T24404] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2181.667629][T28092] netlink: 'syz.8.32558': attribute type 10 has an invalid length. [ 2181.675774][T28092] netlink: 40 bytes leftover after parsing attributes in process `syz.8.32558'. [ 2181.699331][T28092] batman_adv: batadv0: Adding interface: macvlan0 [ 2181.706061][T28092] batman_adv: batadv0: The MTU of interface macvlan0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2181.754557][T28092] batman_adv: batadv0: Interface activated: macvlan0 [ 2181.808135][T28098] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32560'. [ 2181.821118][T28098] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32560'. [ 2181.892207][T28100] pim6reg1: entered promiscuous mode [ 2181.897753][T28100] pim6reg1: entered allmulticast mode [ 2182.070584][T28111] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2182.129279][T28111] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2182.172805][T28111] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2182.226891][T28111] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2182.300359][T24405] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2182.313418][T24420] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2182.332554][T22809] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2182.346942][T22809] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2182.403748][T28132] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32566'. [ 2182.416697][T28132] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32566'. [ 2182.593078][T28146] pim6reg1: entered promiscuous mode [ 2182.598432][T28146] pim6reg1: entered allmulticast mode [ 2182.704639][ T8147] usb usb8-port2: unable to enumerate USB device [ 2182.920796][T28155] lo speed is unknown, defaulting to 1000 [ 2182.927443][T28155] lo speed is unknown, defaulting to 1000 [ 2182.999292][T28155] lo speed is unknown, defaulting to 1000 [ 2183.263785][ T29] kauditd_printk_skb: 334 callbacks suppressed [ 2183.263804][ T29] audit: type=1400 audit(2032.270:129044): avc: denied { create } for pid=28180 comm="syz.4.32576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2183.293763][T28181] netlink: 'syz.4.32576': attribute type 13 has an invalid length. [ 2183.301856][T28181] netlink: 'syz.4.32576': attribute type 17 has an invalid length. [ 2183.307763][T32076] usb usb14-port1: unable to enumerate USB device [ 2183.321035][ T29] audit: type=1400 audit(2032.307:129045): avc: denied { setopt } for pid=28180 comm="syz.4.32576" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2183.348741][T28181] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2183.507483][ T29] audit: type=1326 audit(2032.501:129046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28187 comm="syz.4.32579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2183.531098][ T29] audit: type=1326 audit(2032.501:129047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28187 comm="syz.4.32579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2183.577249][ T29] audit: type=1326 audit(2032.501:129048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28187 comm="syz.4.32579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2183.601181][ T29] audit: type=1326 audit(2032.501:129049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28187 comm="syz.4.32579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2183.625284][ T29] audit: type=1326 audit(2032.501:129050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28187 comm="syz.4.32579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2183.648681][ T29] audit: type=1326 audit(2032.501:129051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28187 comm="syz.4.32579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2183.672120][ T29] audit: type=1326 audit(2032.501:129052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28187 comm="syz.4.32579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2183.695520][ T29] audit: type=1326 audit(2032.501:129053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28187 comm="syz.4.32579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2183.728089][T28190] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32581'. [ 2183.738248][T28190] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32581'. [ 2183.984366][T28205] netlink: 28 bytes leftover after parsing attributes in process `syz.4.32586'. [ 2183.995703][T28205] netlink: 84 bytes leftover after parsing attributes in process `syz.4.32586'. [ 2184.311731][T28221] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2184.371523][T28221] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2184.414965][T28221] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2184.469157][T28221] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2184.712067][T28233] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2184.761401][T28233] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2184.827184][T28233] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2184.891297][T28233] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2184.959266][T24420] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2184.967783][T24420] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2184.985583][T24405] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2184.999703][T24436] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2185.120983][T28259] netlink: 28 bytes leftover after parsing attributes in process `syz.4.32597'. [ 2185.133705][T28259] netlink: 84 bytes leftover after parsing attributes in process `syz.4.32597'. [ 2185.179255][T28264] tipc: Enabled bearer , priority 0 [ 2185.187625][T28264] syzkaller0: entered promiscuous mode [ 2185.193238][T28264] syzkaller0: entered allmulticast mode [ 2185.205326][T28264] tipc: Resetting bearer [ 2185.212774][T28263] tipc: Resetting bearer [ 2185.219613][ T8147] usb usb8-port2: attempt power cycle [ 2185.233038][T28263] tipc: Disabling bearer [ 2186.275044][T28279] vlan3: entered allmulticast mode [ 2186.280333][T28279] batadv0: entered allmulticast mode [ 2186.479479][T24420] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2186.499609][T24420] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2186.509626][T24420] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2186.518216][T24420] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2187.457982][T28312] tipc: Enabled bearer , priority 0 [ 2187.469048][T28312] syzkaller0: entered promiscuous mode [ 2187.474654][T28312] syzkaller0: entered allmulticast mode [ 2187.505021][T28312] tipc: Resetting bearer [ 2187.532070][T28311] tipc: Resetting bearer [ 2187.563368][T28311] tipc: Disabling bearer [ 2187.726804][T28322] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32614'. [ 2187.736828][T28322] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32614'. [ 2187.749690][ T8147] usb usb8-port2: unable to enumerate USB device [ 2187.787259][T28324] tipc: Enabled bearer , priority 0 [ 2187.810507][T28324] syzkaller0: entered promiscuous mode [ 2187.816081][T28324] syzkaller0: entered allmulticast mode [ 2187.837653][T28324] tipc: Resetting bearer [ 2187.859952][T28328] vlan3: entered allmulticast mode [ 2187.867179][T28323] tipc: Resetting bearer [ 2187.891035][T28323] tipc: Disabling bearer [ 2187.920497][T28334] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2188.006827][T28341] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32621'. [ 2188.034548][T28341] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32621'. [ 2188.056861][T28347] netlink: 28 bytes leftover after parsing attributes in process `syz.8.32622'. [ 2188.068741][T28347] netlink: 84 bytes leftover after parsing attributes in process `syz.8.32622'. [ 2188.088042][T28334] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2188.153118][T28334] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2188.234838][T28334] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2188.350770][T25470] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2188.407387][T25470] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2188.455433][T25470] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2188.463696][T25470] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2188.536405][T28386] pim6reg1: entered promiscuous mode [ 2188.541998][T28386] pim6reg1: entered allmulticast mode [ 2189.198631][ T29] kauditd_printk_skb: 292 callbacks suppressed [ 2189.198674][ T29] audit: type=1326 audit(2037.753:129346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28391 comm="syz.3.32629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2189.228243][ T29] audit: type=1326 audit(2037.753:129347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28391 comm="syz.3.32629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2189.252190][ T29] audit: type=1326 audit(2037.753:129348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28391 comm="syz.3.32629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=99 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2189.275616][ T29] audit: type=1326 audit(2037.753:129349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28391 comm="syz.3.32629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2189.298990][ T29] audit: type=1326 audit(2037.753:129350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28391 comm="syz.3.32629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2189.322681][ T29] audit: type=1326 audit(2037.753:129351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28391 comm="syz.3.32629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2189.346054][ T29] audit: type=1326 audit(2037.753:129352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28391 comm="syz.3.32629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2189.369328][ T29] audit: type=1326 audit(2037.753:129353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28391 comm="syz.3.32629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2189.392645][ T29] audit: type=1326 audit(2037.753:129354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28391 comm="syz.3.32629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2189.392681][ T29] audit: type=1326 audit(2037.753:129355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28391 comm="syz.3.32629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2189.543709][T28401] tipc: Enabled bearer , priority 0 [ 2189.552454][T28401] syzkaller0: entered promiscuous mode [ 2189.558011][T28401] syzkaller0: entered allmulticast mode [ 2189.570282][T28401] tipc: Resetting bearer [ 2189.580008][T28400] tipc: Resetting bearer [ 2189.588938][T28400] tipc: Disabling bearer [ 2189.651904][T28408] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32633'. [ 2189.668095][T28408] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32633'. [ 2189.776129][ T6646] usb usb8-port2: attempt power cycle [ 2189.959125][T28414] tipc: Enabled bearer , priority 0 [ 2189.967192][T28414] syzkaller0: entered promiscuous mode [ 2189.973009][T28414] syzkaller0: entered allmulticast mode [ 2189.985369][T28414] tipc: Resetting bearer [ 2190.002575][T28413] tipc: Resetting bearer [ 2190.011455][T28413] tipc: Disabling bearer [ 2190.083606][T28425] netlink: 'syz.3.32637': attribute type 1 has an invalid length. [ 2190.115720][T28425] 8021q: adding VLAN 0 to HW filter on device bond4 [ 2190.250886][T28466] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32640'. [ 2190.261087][T28466] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32640'. [ 2190.461054][T28469] lo speed is unknown, defaulting to 1000 [ 2190.468242][T28469] lo speed is unknown, defaulting to 1000 [ 2190.542246][T28469] lo speed is unknown, defaulting to 1000 [ 2191.586137][T28517] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32651'. [ 2191.647405][T28517] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32651'. [ 2191.849017][T28524] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2191.908998][T28524] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2191.999296][T28524] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2192.246778][T28524] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2192.414805][T25470] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2192.499640][T25470] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2192.514575][T25470] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2192.524942][T25470] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2193.274465][ T6646] usb usb8-port2: unable to enumerate USB device [ 2193.350407][T28585] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2193.381523][T28578] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2193.423104][T28585] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2193.483282][T28585] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2193.566689][T28601] __nla_validate_parse: 2 callbacks suppressed [ 2193.566702][T28601] netlink: 12 bytes leftover after parsing attributes in process `syz.5.32672'. [ 2193.592666][T28585] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2193.653242][T25470] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2193.667819][T24404] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2193.687246][T24404] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2193.695534][T24404] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2194.453417][T28629] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32679'. [ 2194.466069][T28629] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32679'. [ 2194.592930][T28635] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32681'. [ 2194.603332][T28635] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32681'. [ 2194.622877][ T29] kauditd_printk_skb: 357 callbacks suppressed [ 2194.622903][ T29] audit: type=1400 audit(2042.765:129713): avc: denied { create } for pid=28630 comm="syz.4.32680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2194.703289][ T29] audit: type=1400 audit(2042.839:129714): avc: denied { create } for pid=28643 comm="syz.3.32682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2194.724503][ T29] audit: type=1400 audit(2042.839:129715): avc: denied { bind } for pid=28643 comm="syz.3.32682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2194.743823][ T29] audit: type=1400 audit(2042.839:129716): avc: denied { name_bind } for pid=28643 comm="syz.3.32682" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 2194.765437][ T29] audit: type=1400 audit(2042.839:129717): avc: denied { node_bind } for pid=28643 comm="syz.3.32682" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 2194.787144][ T29] audit: type=1400 audit(2042.839:129718): avc: denied { write } for pid=28643 comm="syz.3.32682" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2194.808931][ T29] audit: type=1400 audit(2042.839:129719): avc: denied { connect } for pid=28643 comm="syz.3.32682" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2194.830424][ T29] audit: type=1400 audit(2042.839:129720): avc: denied { name_connect } for pid=28643 comm="syz.3.32682" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 2194.852754][ T29] audit: type=1400 audit(2042.839:129721): avc: denied { create } for pid=28643 comm="syz.3.32682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2194.863418][T28647] tipc: Enabled bearer , priority 0 [ 2194.872268][ T29] audit: type=1400 audit(2042.839:129722): avc: denied { create } for pid=28643 comm="syz.3.32682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2194.882251][T28647] syzkaller0: entered promiscuous mode [ 2194.904335][T28647] syzkaller0: entered allmulticast mode [ 2194.954606][T28647] tipc: Resetting bearer [ 2194.970310][T28646] tipc: Resetting bearer [ 2194.981040][T28646] tipc: Disabling bearer [ 2195.262213][T28659] pim6reg1: entered promiscuous mode [ 2195.267598][T28659] pim6reg1: entered allmulticast mode [ 2195.741398][T28672] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2196.804869][T28674] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2197.052483][T28672] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2197.087774][T28680] lo speed is unknown, defaulting to 1000 [ 2197.094085][T28680] lo speed is unknown, defaulting to 1000 [ 2197.129797][T28680] lo speed is unknown, defaulting to 1000 [ 2197.232711][T28715] netlink: 'syz.6.32693': attribute type 1 has an invalid length. [ 2197.242450][T28674] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2197.282241][T28715] 8021q: adding VLAN 0 to HW filter on device bond14 [ 2197.294454][T28672] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2197.308403][T28755] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2197.318295][T28755] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2197.332200][T28674] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2197.351430][T28672] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2197.368250][T28753] tipc: Enabled bearer , priority 0 [ 2197.382149][T28753] syzkaller0: entered promiscuous mode [ 2197.387687][T28753] syzkaller0: entered allmulticast mode [ 2197.399296][T28753] tipc: Resetting bearer [ 2197.408249][T28674] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2197.421242][T28720] tipc: Resetting bearer [ 2197.430202][T28720] tipc: Disabling bearer [ 2197.456529][T24420] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2197.486228][T24420] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2197.524643][T24420] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2197.560299][T24420] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2197.568791][T24420] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2197.588213][T24420] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2197.597187][T24420] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2197.616989][T24420] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2197.945656][T28805] lo speed is unknown, defaulting to 1000 [ 2197.952348][T28805] lo speed is unknown, defaulting to 1000 [ 2198.026171][T28805] lo speed is unknown, defaulting to 1000 [ 2198.717248][T28834] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32701'. [ 2198.726811][T28833] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32700'. [ 2198.754573][T28834] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32701'. [ 2198.778406][T28833] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32700'. [ 2198.906359][T28841] pim6reg1: entered promiscuous mode [ 2198.911970][T28841] pim6reg1: entered allmulticast mode [ 2199.405901][T28853] lo speed is unknown, defaulting to 1000 [ 2199.412860][T28853] lo speed is unknown, defaulting to 1000 [ 2199.488258][T28853] lo speed is unknown, defaulting to 1000 [ 2200.092396][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 2200.092414][ T29] audit: type=1326 audit(2047.814:129809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28892 comm="syz.6.32711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1fff62ebe9 code=0x7ffc0000 [ 2200.094408][T28893] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32711'. [ 2200.098650][ T29] audit: type=1326 audit(2047.814:129810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28892 comm="syz.6.32711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1fff62ebe9 code=0x7ffc0000 [ 2200.154532][ T29] audit: type=1326 audit(2047.814:129811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28892 comm="syz.6.32711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1fff62ebe9 code=0x7ffc0000 [ 2200.178470][ T29] audit: type=1326 audit(2047.814:129812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28892 comm="syz.6.32711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1fff62ebe9 code=0x7ffc0000 [ 2200.201817][ T29] audit: type=1326 audit(2047.814:129813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28892 comm="syz.6.32711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1fff62ebe9 code=0x7ffc0000 [ 2200.225108][ T29] audit: type=1326 audit(2047.814:129814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28892 comm="syz.6.32711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1fff62ebe9 code=0x7ffc0000 [ 2200.248873][T28896] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32711'. [ 2200.302151][ T29] audit: type=1400 audit(2047.897:129815): avc: denied { create } for pid=28894 comm="syz.8.32712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2200.302188][ T29] audit: type=1400 audit(2047.897:129816): avc: denied { ioctl } for pid=28894 comm="syz.8.32712" path="socket:[389256]" dev="sockfs" ino=389256 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2200.302223][ T29] audit: type=1400 audit(2047.906:129817): avc: denied { ioctl } for pid=28894 comm="syz.8.32712" path="socket:[389255]" dev="sockfs" ino=389255 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2200.302298][ T29] audit: type=1326 audit(2047.952:129818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28892 comm="syz.6.32711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1fff62ebe9 code=0x7ffc0000 [ 2200.504651][T28909] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2200.568770][T28909] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2200.651760][T28916] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2200.664997][T28909] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2200.828777][T28909] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2201.155590][T28933] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32717'. [ 2201.187360][T28933] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32717'. [ 2201.641279][T28942] syzkaller0: entered promiscuous mode [ 2201.646826][T28942] syzkaller0: entered allmulticast mode [ 2201.863800][T28950] lo speed is unknown, defaulting to 1000 [ 2201.870245][T28950] lo speed is unknown, defaulting to 1000 [ 2201.942536][T28950] lo speed is unknown, defaulting to 1000 [ 2202.543121][T28979] netlink: 4 bytes leftover after parsing attributes in process `syz.3.32724'. [ 2202.561584][T28979] netlink: 4 bytes leftover after parsing attributes in process `syz.3.32724'. [ 2202.723174][T28984] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(6) [ 2202.729742][T28984] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2202.737966][T28984] vhci_hcd vhci_hcd.0: Device attached [ 2203.058241][T16584] usb 14-1: SetAddress Request (18) to port 0 [ 2203.064742][T16584] usb 14-1: new SuperSpeed USB device number 18 using vhci_hcd [ 2203.383277][T28985] vhci_hcd: connection reset by peer [ 2203.393174][T24403] vhci_hcd: stop threads [ 2203.397787][T24403] vhci_hcd: release socket [ 2203.402283][T24403] vhci_hcd: disconnect device [ 2203.472676][T25470] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2203.532879][T25470] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2203.541272][T25470] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2203.557026][T25470] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2203.562254][T28998] netlink: 4 bytes leftover after parsing attributes in process `syz.3.32726'. [ 2203.619418][T29002] netlink: 4 bytes leftover after parsing attributes in process `syz.3.32726'. [ 2203.715996][T29007] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32730'. [ 2203.728397][T29007] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32730'. [ 2204.030512][T29023] netlink: 'syz.6.32735': attribute type 1 has an invalid length. [ 2204.665136][T29035] syzkaller0: entered promiscuous mode [ 2204.670669][T29035] syzkaller0: entered allmulticast mode [ 2204.695527][T29041] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2204.859575][T29041] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2204.953775][T29041] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2205.075535][T29041] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2205.114674][T29067] netlink: 'syz.5.32747': attribute type 1 has an invalid length. [ 2205.151581][T24436] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2205.232367][T24436] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2205.263531][T24436] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2205.306182][T24436] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2205.574720][T29088] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(6) [ 2205.581364][T29088] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2205.590058][T29088] vhci_hcd vhci_hcd.0: Device attached [ 2205.602870][ T29] kauditd_printk_skb: 190 callbacks suppressed [ 2205.602904][ T29] audit: type=1400 audit(2052.899:130009): avc: denied { prog_run } for pid=29091 comm="syz.4.32752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2205.748233][ T29] audit: type=1400 audit(2052.955:130010): avc: denied { module_request } for pid=29068 comm="syz.6.32748" kmod="netdev-netdevsim0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2205.770761][ T29] audit: type=1400 audit(2053.001:130011): avc: denied { read } for pid=29068 comm="syz.6.32748" name="qrtr-tun" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2205.793598][ T29] audit: type=1400 audit(2053.001:130012): avc: denied { open } for pid=29068 comm="syz.6.32748" path="/dev/qrtr-tun" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2205.816996][ T29] audit: type=1400 audit(2053.001:130013): avc: denied { create } for pid=29068 comm="syz.6.32748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 2205.837152][ T29] audit: type=1400 audit(2053.001:130014): avc: denied { allowed } for pid=29068 comm="syz.6.32748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2205.856466][ T29] audit: type=1400 audit(2053.001:130015): avc: denied { create } for pid=29068 comm="syz.6.32748" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2205.877642][ T29] audit: type=1400 audit(2053.019:130016): avc: denied { map } for pid=29068 comm="syz.6.32748" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=391065 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2205.901888][ T29] audit: type=1400 audit(2053.019:130017): avc: denied { read write } for pid=29068 comm="syz.6.32748" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=391065 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2206.057682][ T29] audit: type=1400 audit(2053.213:130018): avc: denied { sys_module } for pid=29068 comm="syz.6.32748" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2206.078963][T29089] vhci_hcd: connection closed [ 2206.079185][T24441] vhci_hcd: stop threads [ 2206.088243][T24441] vhci_hcd: release socket [ 2206.092784][T24441] vhci_hcd: disconnect device [ 2206.505945][T29108] syzkaller0: entered promiscuous mode [ 2206.511545][T29108] syzkaller0: entered allmulticast mode [ 2206.772442][T29124] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2206.806207][T29129] __nla_validate_parse: 1 callbacks suppressed [ 2206.806273][T29129] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32761'. [ 2206.824461][T29129] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32761'. [ 2206.850506][T29128] tipc: Enabled bearer , priority 0 [ 2206.860168][T29124] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2206.895359][T29128] syzkaller0: entered promiscuous mode [ 2206.900913][T29128] syzkaller0: entered allmulticast mode [ 2206.931779][T29137] tipc: Resetting bearer [ 2206.963118][T29124] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2206.993266][T29127] tipc: Resetting bearer [ 2207.005129][T29127] tipc: Disabling bearer [ 2207.037061][T29124] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2207.714564][T29160] syzkaller0: entered promiscuous mode [ 2207.720204][T29160] syzkaller0: entered allmulticast mode [ 2207.795151][T24436] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2207.838945][T24441] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2207.869635][T24441] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2207.871769][T29179] netlink: 28 bytes leftover after parsing attributes in process `syz.4.32769'. [ 2207.894846][T29179] netlink: 28 bytes leftover after parsing attributes in process `syz.4.32769'. [ 2207.904908][T24436] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2208.193826][T29200] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32776'. [ 2208.208879][T29200] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32776'. [ 2208.291440][T29198] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2208.500977][T29216] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(6) [ 2208.507642][T29216] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2208.516093][T29216] vhci_hcd vhci_hcd.0: Device attached [ 2208.583782][T16584] usb 14-1: device descriptor read/8, error -110 [ 2208.702775][T16584] usb 14-1: new SuperSpeed USB device number 18 using vhci_hcd [ 2208.724588][T16584] usb 14-1: enqueue for inactive port 0 [ 2208.743130][T16584] usb 14-1: enqueue for inactive port 0 [ 2208.764350][T16584] usb 14-1: enqueue for inactive port 0 [ 2208.881962][T21798] usb 18-1: SetAddress Request (6) to port 0 [ 2208.888132][T21798] usb 18-1: new SuperSpeed USB device number 6 using vhci_hcd [ 2209.107906][T29217] vhci_hcd: connection reset by peer [ 2209.124472][T24436] vhci_hcd: stop threads [ 2209.128893][T24436] vhci_hcd: release socket [ 2209.133358][T24436] vhci_hcd: disconnect device [ 2209.868224][T29240] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32786'. [ 2209.904966][T29240] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32786'. [ 2210.136889][T29246] syzkaller0: entered promiscuous mode [ 2210.142506][T29246] syzkaller0: entered allmulticast mode [ 2210.250542][T29258] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32792'. [ 2210.285014][T16584] usb usb14-port1: attempt power cycle [ 2210.618558][T29273] syzkaller0: entered promiscuous mode [ 2210.624328][T29273] syzkaller0: entered allmulticast mode [ 2210.865857][T29280] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32798'. [ 2211.235793][ T29] kauditd_printk_skb: 304 callbacks suppressed [ 2211.235812][ T29] audit: type=1400 audit(2058.096:130323): avc: denied { read write } for pid=29282 comm="syz.8.32799" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2211.266218][ T29] audit: type=1400 audit(2058.096:130324): avc: denied { open } for pid=29282 comm="syz.8.32799" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2211.301495][ T29] audit: type=1400 audit(2058.151:130325): avc: denied { create } for pid=29284 comm="syz.3.32800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2211.321678][ T29] audit: type=1400 audit(2058.151:130326): avc: denied { setopt } for pid=29284 comm="syz.3.32800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2211.417317][ T29] audit: type=1400 audit(2058.179:130327): avc: denied { mount } for pid=29286 comm="syz.8.32801" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2211.440172][ T29] audit: type=1400 audit(2058.207:130328): avc: denied { ioctl } for pid=29284 comm="syz.3.32800" path="socket:[389915]" dev="sockfs" ino=389915 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2211.465236][ T29] audit: type=1400 audit(2058.216:130329): avc: denied { create } for pid=29284 comm="syz.3.32800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2211.484752][ T29] audit: type=1400 audit(2058.216:130330): avc: denied { write } for pid=29284 comm="syz.3.32800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2211.504065][ T29] audit: type=1400 audit(2058.216:130331): avc: denied { connect } for pid=29284 comm="syz.3.32800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2211.523659][ T29] audit: type=1400 audit(2058.216:130332): avc: denied { name_connect } for pid=29284 comm="syz.3.32800" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 2211.574584][T29302] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(6) [ 2211.581148][T29302] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2211.589378][T29302] vhci_hcd vhci_hcd.0: Device attached [ 2211.823255][T29320] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2212.059514][T29347] netlink: 'syz.6.32819': attribute type 1 has an invalid length. [ 2212.107468][T29347] 8021q: adding VLAN 0 to HW filter on device bond15 [ 2212.133453][T29347] macvlan2: entered promiscuous mode [ 2212.138964][T29347] macvlan2: entered allmulticast mode [ 2212.147517][T29347] bond15: entered promiscuous mode [ 2212.155392][T29347] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2212.181463][T29347] bond15: left promiscuous mode [ 2212.250741][T29303] vhci_hcd: connection closed [ 2212.251016][T25470] vhci_hcd: stop threads [ 2212.260143][T25470] vhci_hcd: release socket [ 2212.264593][T25470] vhci_hcd: disconnect device [ 2212.300104][T16584] usb usb14-port1: unable to enumerate USB device [ 2212.311042][T29393] tipc: Enabled bearer , priority 0 [ 2212.326244][T29393] syzkaller0: entered promiscuous mode [ 2212.331780][T29393] syzkaller0: entered allmulticast mode [ 2212.350105][T29393] tipc: Resetting bearer [ 2212.365057][T29392] tipc: Resetting bearer [ 2212.384572][T29392] tipc: Disabling bearer [ 2212.446050][T29398] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2212.475691][T29407] __nla_validate_parse: 4 callbacks suppressed [ 2212.475709][T29407] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32823'. [ 2212.510039][T29407] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32823'. [ 2212.621284][T29417] netlink: 8 bytes leftover after parsing attributes in process `syz.6.32828'. [ 2212.677658][T29419] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2212.725190][T29419] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2212.829827][T29419] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2213.017864][T29419] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2213.158833][T22809] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2213.196770][T29434] tipc: Enabled bearer , priority 0 [ 2213.250108][T22809] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2213.264563][T29434] syzkaller0: entered promiscuous mode [ 2213.270120][T29434] syzkaller0: entered allmulticast mode [ 2213.363583][T22809] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2213.374541][T29434] tipc: Resetting bearer [ 2213.381847][T22809] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2213.391260][T29433] tipc: Resetting bearer [ 2213.400213][T29433] tipc: Disabling bearer [ 2213.578393][T29453] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2214.039595][T29477] lo speed is unknown, defaulting to 1000 [ 2214.047518][T29477] lo speed is unknown, defaulting to 1000 [ 2214.154460][T29477] lo speed is unknown, defaulting to 1000 [ 2214.329747][T29480] netlink: 830 bytes leftover after parsing attributes in process `syz.8.32841'. [ 2214.400453][T21798] usb 18-1: device descriptor read/8, error -110 [ 2214.748946][T21798] usb 18-1: new SuperSpeed USB device number 6 using vhci_hcd [ 2214.760169][T29502] netlink: 830 bytes leftover after parsing attributes in process `syz.3.32840'. [ 2214.783117][T21798] usb 18-1: enqueue for inactive port 0 [ 2214.788839][T21798] usb 18-1: enqueue for inactive port 0 [ 2214.817957][T21798] usb 18-1: enqueue for inactive port 0 [ 2215.081212][T29523] tipc: Enabled bearer , priority 0 [ 2215.092603][T29523] syzkaller0: entered promiscuous mode [ 2215.098181][T29523] syzkaller0: entered allmulticast mode [ 2215.251037][T29536] tipc: Resetting bearer [ 2215.284338][T29522] tipc: Resetting bearer [ 2215.297534][T29522] tipc: Disabling bearer [ 2215.344310][T29518] Falling back ldisc for ttyS3. [ 2215.525407][T29544] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2215.554124][T29555] netlink: 'syz.6.32852': attribute type 1 has an invalid length. [ 2215.611759][T29561] netlink: 28 bytes leftover after parsing attributes in process `syz.6.32852'. [ 2215.666857][T29555] 8021q: adding VLAN 0 to HW filter on device bond16 [ 2215.741266][T29595] macvlan2: entered promiscuous mode [ 2215.746710][T29595] macvlan2: entered allmulticast mode [ 2215.879096][T29595] bond16: entered promiscuous mode [ 2215.904776][T29595] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2215.941685][T29595] bond16: left promiscuous mode [ 2216.092587][T21798] usb usb18-port1: attempt power cycle [ 2216.116125][T29608] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32857'. [ 2216.131779][T29608] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32857'. [ 2216.131764][T29612] syzkaller0: entered promiscuous mode [ 2216.131804][T29612] syzkaller0: entered allmulticast mode [ 2216.190872][T29606] tipc: Enabled bearer , priority 0 [ 2216.230042][T29602] tipc: Resetting bearer [ 2216.245592][T29601] tipc: Resetting bearer [ 2216.255139][T29601] tipc: Disabling bearer [ 2216.395665][T29637] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32862'. [ 2216.415918][T29637] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32862'. [ 2216.429698][T29640] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2216.495529][T29640] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2216.523070][T29647] tipc: Enabled bearer , priority 0 [ 2216.545048][T29647] syzkaller0: entered promiscuous mode [ 2216.550711][T29647] syzkaller0: entered allmulticast mode [ 2216.576795][T29640] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2216.606318][T29647] tipc: Resetting bearer [ 2216.613896][T29646] tipc: Resetting bearer [ 2216.622899][T29646] tipc: Disabling bearer [ 2216.650368][T29640] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2216.805918][ T29] kauditd_printk_skb: 171 callbacks suppressed [ 2216.805966][ T29] audit: type=1400 audit(2063.228:130504): avc: denied { setopt } for pid=29660 comm="syz.4.32866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2216.832015][ T29] audit: type=1400 audit(2063.228:130505): avc: denied { connect } for pid=29660 comm="syz.4.32866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2216.851481][ T29] audit: type=1400 audit(2063.228:130506): avc: denied { read } for pid=29660 comm="syz.4.32866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2217.033438][ T29] audit: type=1326 audit(2063.431:130507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29658 comm="syz.3.32865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2217.057445][ T29] audit: type=1326 audit(2063.431:130508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29658 comm="syz.3.32865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2217.080832][ T29] audit: type=1326 audit(2063.431:130509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29658 comm="syz.3.32865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=99 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2217.104058][ T29] audit: type=1326 audit(2063.431:130510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29658 comm="syz.3.32865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2217.127570][ T29] audit: type=1326 audit(2063.431:130511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29658 comm="syz.3.32865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2217.151270][ T29] audit: type=1326 audit(2063.431:130512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29658 comm="syz.3.32865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2217.174703][ T29] audit: type=1326 audit(2063.431:130513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29658 comm="syz.3.32865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe914feebe9 code=0x7ffc0000 [ 2217.752040][T29672] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2217.883376][T29672] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2217.947470][T29679] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32869'. [ 2217.962883][T29679] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32869'. [ 2217.997030][T29672] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2218.065932][T29672] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2218.073950][T29695] netlink: 8 bytes leftover after parsing attributes in process `syz.4.32872'. [ 2218.234092][T24436] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2218.248176][T24436] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2218.256559][T24436] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2218.280020][T24441] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2218.297720][T29708] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2218.313365][T21798] usb usb18-port1: unable to enumerate USB device [ 2218.382641][T29726] netlink: 4 bytes leftover after parsing attributes in process `syz.3.32879'. [ 2218.403975][T29726] netlink: 4 bytes leftover after parsing attributes in process `syz.3.32879'. [ 2219.081501][T24404] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2219.094325][T29733] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29733 comm=syz.5.32881 [ 2219.097072][T24404] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2219.124170][T24404] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2219.132606][T24404] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2219.190371][T29750] netlink: 830 bytes leftover after parsing attributes in process `syz.5.32881'. [ 2219.366574][T29751] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(6) [ 2219.369999][T29757] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32884'. [ 2219.373147][T29751] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2219.386093][T29757] netlink: 4 bytes leftover after parsing attributes in process `syz.4.32884'. [ 2219.390394][T29751] vhci_hcd vhci_hcd.0: Device attached [ 2219.721184][T21797] usb 14-1: SetAddress Request (22) to port 0 [ 2219.727453][T21797] usb 14-1: new SuperSpeed USB device number 22 using vhci_hcd [ 2219.872905][T29768] netlink: 'syz.8.32887': attribute type 13 has an invalid length. [ 2219.880928][T29768] netlink: 28 bytes leftover after parsing attributes in process `syz.8.32887'. [ 2220.043404][T29754] vhci_hcd: connection reset by peer [ 2220.049240][T24404] vhci_hcd: stop threads [ 2220.053554][T24404] vhci_hcd: release socket [ 2220.058086][T24404] vhci_hcd: disconnect device [ 2220.077983][T29776] netlink: 4 bytes leftover after parsing attributes in process `syz.5.32891'. [ 2221.155278][T29797] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2221.810759][T29831] pim6reg1: entered promiscuous mode [ 2221.816282][T29831] pim6reg1: entered allmulticast mode [ 2222.200124][T29853] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2222.279768][ T29] kauditd_printk_skb: 421 callbacks suppressed [ 2222.279786][ T29] audit: type=1400 audit(2068.295:130935): avc: denied { getopt } for pid=29861 comm="syz.8.32912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2222.334545][ T29] audit: type=1400 audit(2068.341:130936): avc: denied { bind } for pid=29866 comm="syz.3.32914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2222.730617][T29873] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29873 comm=syz.4.32916 [ 2223.108665][ T29] audit: type=1326 audit(2069.052:130937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29876 comm="syz.5.32917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22c088ebe9 code=0x7ffc0000 [ 2223.138067][ T29] audit: type=1326 audit(2069.070:130938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29876 comm="syz.5.32917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22c088ebe9 code=0x7ffc0000 [ 2223.161626][ T29] audit: type=1326 audit(2069.070:130939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29876 comm="syz.5.32917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f22c088ebe9 code=0x7ffc0000 [ 2223.184951][ T29] audit: type=1326 audit(2069.070:130940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29876 comm="syz.5.32917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22c088ebe9 code=0x7ffc0000 [ 2223.208382][ T29] audit: type=1326 audit(2069.070:130941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29876 comm="syz.5.32917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22c088ebe9 code=0x7ffc0000 [ 2223.231930][ T29] audit: type=1326 audit(2069.070:130942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29876 comm="syz.5.32917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f22c088ebe9 code=0x7ffc0000 [ 2223.255363][ T29] audit: type=1326 audit(2069.089:130943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29876 comm="syz.5.32917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22c088ebe9 code=0x7ffc0000 [ 2223.278683][ T29] audit: type=1326 audit(2069.089:130944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29876 comm="syz.5.32917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22c088ebe9 code=0x7ffc0000 [ 2223.429588][T29883] Falling back ldisc for ttyS3. [ 2223.592063][T29900] netlink: 'syz.4.32923': attribute type 1 has an invalid length. [ 2223.609820][T29900] 8021q: adding VLAN 0 to HW filter on device bond9 [ 2223.630130][T29900] __nla_validate_parse: 13 callbacks suppressed [ 2223.630153][T29900] netlink: 28 bytes leftover after parsing attributes in process `syz.4.32923'. [ 2223.653101][T29900] macvlan2: entered promiscuous mode [ 2223.658620][T29900] macvlan2: entered allmulticast mode [ 2223.680835][T29900] bond9: entered promiscuous mode [ 2223.695907][T29900] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2223.715979][T29900] bond9: left promiscuous mode [ 2223.827622][T29939] Falling back ldisc for ttyS3. [ 2224.086059][T29964] netlink: 'syz.4.32931': attribute type 1 has an invalid length. [ 2224.109315][T29964] 8021q: adding VLAN 0 to HW filter on device bond10 [ 2224.119435][T29999] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32932'. [ 2224.133972][T29964] netlink: 28 bytes leftover after parsing attributes in process `syz.4.32931'. [ 2224.149576][T29964] macvlan2: entered promiscuous mode [ 2224.155072][T29964] macvlan2: entered allmulticast mode [ 2224.167522][T29964] bond10: entered promiscuous mode [ 2224.173027][T29999] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32932'. [ 2224.173126][T29964] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2224.198162][T29964] bond10: left promiscuous mode [ 2224.219444][T30003] netlink: 830 bytes leftover after parsing attributes in process `syz.5.32933'. [ 2224.294796][T30011] netlink: 'syz.5.32935': attribute type 1 has an invalid length. [ 2224.322601][T30011] 8021q: adding VLAN 0 to HW filter on device bond10 [ 2224.343739][T30011] netlink: 28 bytes leftover after parsing attributes in process `syz.5.32935'. [ 2224.425540][T30050] netlink: 4 bytes leftover after parsing attributes in process `syz.3.32938'. [ 2224.436473][T30050] netlink: 4 bytes leftover after parsing attributes in process `syz.3.32938'. [ 2224.660940][T30061] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 2224.667502][T30061] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2224.675784][T30061] vhci_hcd vhci_hcd.0: Device attached [ 2224.736540][T30063] vhci_hcd: connection closed [ 2224.736753][T25470] vhci_hcd: stop threads [ 2224.745828][T25470] vhci_hcd: release socket [ 2224.750353][T25470] vhci_hcd: disconnect device [ 2224.928119][T30078] tipc: Enabled bearer , priority 0 [ 2224.936810][T30078] syzkaller0: entered promiscuous mode [ 2224.942326][T30078] syzkaller0: entered allmulticast mode [ 2224.953568][T30077] tipc: Resetting bearer [ 2224.963835][T30077] tipc: Disabling bearer [ 2224.975639][T30083] netlink: 830 bytes leftover after parsing attributes in process `syz.6.32947'. [ 2225.116338][T30087] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2225.226017][T21797] usb 14-1: device descriptor read/8, error -110 [ 2225.344719][T21797] usb 14-1: new SuperSpeed USB device number 22 using vhci_hcd [ 2225.366221][T21797] usb 14-1: enqueue for inactive port 0 [ 2225.371976][T21797] usb 14-1: enqueue for inactive port 0 [ 2225.387984][T21797] usb 14-1: enqueue for inactive port 0 [ 2225.532907][T30102] Falling back ldisc for ttyS3. [ 2225.626112][T30104] Falling back ldisc for ttyS3. [ 2226.150461][T30132] syzkaller0: entered promiscuous mode [ 2226.156100][T30132] syzkaller0: entered allmulticast mode [ 2226.314012][T30146] lo speed is unknown, defaulting to 1000 [ 2226.320676][T30146] lo speed is unknown, defaulting to 1000 [ 2226.399469][T30146] lo speed is unknown, defaulting to 1000 [ 2226.725857][T30192] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32968'. [ 2226.774582][T30180] Falling back ldisc for ttyS3. [ 2226.796955][T21797] usb usb14-port1: attempt power cycle [ 2226.912831][T30206] pim6reg1: entered promiscuous mode [ 2226.918242][T30206] pim6reg1: entered allmulticast mode [ 2227.068501][T30226] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2227.188428][T30198] lo speed is unknown, defaulting to 1000 [ 2227.194740][T30198] lo speed is unknown, defaulting to 1000 [ 2227.255999][T30198] lo speed is unknown, defaulting to 1000 [ 2227.751450][T30198] chnl_net:caif_netlink_parms(): no params data found [ 2227.789071][T30356] netlink: 'syz.3.32977': attribute type 1 has an invalid length. [ 2227.840326][T30356] 8021q: adding VLAN 0 to HW filter on device bond5 [ 2227.895888][ T29] kauditd_printk_skb: 548 callbacks suppressed [ 2227.895970][ T29] audit: type=1400 audit(2073.473:131493): avc: denied { read write } for pid=30343 comm="syz.3.32977" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2227.962937][T30356] macvlan2: entered promiscuous mode [ 2227.968551][T30356] macvlan2: entered allmulticast mode [ 2227.977712][T30356] bond5: entered promiscuous mode [ 2227.983143][T30356] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2227.987942][ T29] audit: type=1400 audit(2073.473:131494): avc: denied { open } for pid=30343 comm="syz.3.32977" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2228.016536][T30356] bond5: left promiscuous mode [ 2228.073153][T30198] bridge0: port 1(bridge_slave_0) entered blocking state [ 2228.080362][T30198] bridge0: port 1(bridge_slave_0) entered disabled state [ 2228.119351][ T29] audit: type=1326 audit(2073.676:131495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30437 comm="syz.8.32978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc38fbbebe9 code=0x7ffc0000 [ 2228.143117][ T29] audit: type=1326 audit(2073.676:131496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30437 comm="syz.8.32978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc38fbbebe9 code=0x7ffc0000 [ 2228.166429][ T29] audit: type=1326 audit(2073.685:131497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30437 comm="syz.8.32978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc38fbbebe9 code=0x7ffc0000 [ 2228.190191][ T29] audit: type=1326 audit(2073.685:131498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30437 comm="syz.8.32978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc38fbbebe9 code=0x7ffc0000 [ 2228.213552][ T29] audit: type=1326 audit(2073.685:131499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30437 comm="syz.8.32978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc38fbbebe9 code=0x7ffc0000 [ 2228.230122][T30198] bridge_slave_0: entered allmulticast mode [ 2228.266933][T30198] bridge_slave_0: entered promiscuous mode [ 2228.290108][T30198] bridge0: port 2(bridge_slave_1) entered blocking state [ 2228.297328][T30198] bridge0: port 2(bridge_slave_1) entered disabled state [ 2228.320961][T30198] bridge_slave_1: entered allmulticast mode [ 2228.329534][T30198] bridge_slave_1: entered promiscuous mode [ 2228.345388][ T29] audit: type=1326 audit(2073.750:131500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30437 comm="syz.8.32978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fc38fbbebe9 code=0x7ffc0000 [ 2228.368709][ T29] audit: type=1326 audit(2073.750:131501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30437 comm="syz.8.32978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc38fbbebe9 code=0x7ffc0000 [ 2228.392183][ T29] audit: type=1326 audit(2073.750:131502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30437 comm="syz.8.32978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc38fbbebe9 code=0x7ffc0000 [ 2228.483221][T30461] syz_tun: entered allmulticast mode [ 2228.576345][T30198] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2228.607709][T30198] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2228.624713][T30481] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2228.799532][T30198] team0: Port device team_slave_0 added [ 2228.823600][T30198] team0: Port device team_slave_1 added [ 2228.908109][T21797] usb usb14-port1: unable to enumerate USB device [ 2229.248297][T30198] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2229.255575][T30198] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2229.281730][T30198] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2229.376927][T30198] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2229.384018][T30198] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2229.410257][T30198] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2229.444471][T30549] pim6reg1: entered promiscuous mode [ 2229.449888][T30549] pim6reg1: entered allmulticast mode [ 2229.472605][T30198] hsr_slave_0: entered promiscuous mode [ 2229.480659][T30198] hsr_slave_1: entered promiscuous mode [ 2229.487819][T30198] debugfs: 'hsr0' already exists in 'hsr' [ 2229.493722][T30198] Cannot create hsr debugfs directory [ 2229.527121][T30587] __nla_validate_parse: 8 callbacks suppressed [ 2229.527165][T30587] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32991'. [ 2229.546179][T30587] netlink: 4 bytes leftover after parsing attributes in process `syz.6.32991'. [ 2229.638835][T30615] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32993'. [ 2229.715585][T30615] netlink: 4 bytes leftover after parsing attributes in process `syz.8.32993'. [ 2229.845441][T30643] netlink: 830 bytes leftover after parsing attributes in process `syz.4.32995'. [ 2230.105260][T30651] lo speed is unknown, defaulting to 1000 [ 2230.111927][T30651] lo speed is unknown, defaulting to 1000 [ 2230.181365][T30651] lo speed is unknown, defaulting to 1000 [ 2230.331445][T30198] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2230.395632][T30198] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2230.432525][T30681] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2230.597673][T30198] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2230.618405][T30697] netlink: 'syz.6.32999': attribute type 1 has an invalid length. [ 2230.662128][T30697] 8021q: adding VLAN 0 to HW filter on device bond17 [ 2230.726632][T30731] macvlan2: entered promiscuous mode [ 2230.732049][T30731] macvlan2: entered allmulticast mode [ 2230.754268][T30731] bond17: entered promiscuous mode [ 2230.760645][T30731] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2230.766692][T30738] netlink: 4 bytes leftover after parsing attributes in process `syz.3.33001'. [ 2230.777753][T30731] bond17: left promiscuous mode [ 2230.784555][T30738] netlink: 4 bytes leftover after parsing attributes in process `syz.3.33001'. [ 2230.806386][T30198] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2230.821201][T30736] netlink: 830 bytes leftover after parsing attributes in process `syz.8.33000'. [ 2230.942788][T30753] pim6reg1: entered promiscuous mode [ 2230.948242][T30753] pim6reg1: entered allmulticast mode [ 2231.004476][T30758] syzkaller0: entered promiscuous mode [ 2231.010166][T30758] syzkaller0: entered allmulticast mode [ 2231.018373][T30198] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 2231.038161][T30198] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 2231.056319][T30198] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 2231.078641][T30198] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 2231.170549][T30198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2231.191877][T30783] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2231.228442][T30198] 8021q: adding VLAN 0 to HW filter on device team0 [ 2231.252771][T22809] bridge0: port 1(bridge_slave_0) entered blocking state [ 2231.259982][T22809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2231.294801][T22809] bridge0: port 2(bridge_slave_1) entered blocking state [ 2231.301986][T22809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2231.336157][T30783] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2231.360854][T30790] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2231.423579][T30783] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2231.439136][T30799] netlink: 4 bytes leftover after parsing attributes in process `syz.6.33009'. [ 2231.450237][T30799] netlink: 4 bytes leftover after parsing attributes in process `syz.6.33009'. [ 2231.558565][T30783] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2231.603375][T30198] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2231.683810][T24403] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2231.701785][T24403] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2231.715952][T24403] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2231.724359][T24403] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2231.775338][T30827] pim6reg1: entered promiscuous mode [ 2231.781138][T30827] pim6reg1: entered allmulticast mode [ 2231.893916][T30198] veth0_vlan: entered promiscuous mode [ 2231.938434][T30198] veth1_vlan: entered promiscuous mode [ 2231.955018][T30845] tipc: Enabled bearer , priority 0 [ 2231.966185][T30845] syzkaller0: entered promiscuous mode [ 2231.971739][T30845] syzkaller0: entered allmulticast mode [ 2231.988310][T30844] tipc: Resetting bearer [ 2231.998114][T30844] tipc: Disabling bearer [ 2232.016088][T30198] veth0_macvtap: entered promiscuous mode [ 2232.026751][T30198] veth1_macvtap: entered promiscuous mode [ 2232.051681][T30198] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2232.084066][T30198] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2232.102563][T24405] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2232.121653][T24436] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2232.131881][T30851] pim6reg1: entered promiscuous mode [ 2232.137914][T30851] pim6reg1: entered allmulticast mode [ 2232.161195][T24436] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2232.187369][T24436] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2233.375522][ T29] kauditd_printk_skb: 496 callbacks suppressed [ 2233.375541][ T29] audit: type=1400 audit(2078.531:131999): avc: denied { create } for pid=30902 comm="syz.3.33030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2233.512491][ T29] audit: type=1400 audit(2078.596:132000): avc: denied { open } for pid=30902 comm="syz.3.33030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2233.531764][ T29] audit: type=1400 audit(2078.596:132001): avc: denied { kernel } for pid=30902 comm="syz.3.33030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2233.551231][ T29] audit: type=1400 audit(2078.596:132002): avc: denied { map_read map_write } for pid=30902 comm="syz.3.33030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2233.571484][ T29] audit: type=1400 audit(2078.605:132003): avc: denied { read } for pid=30902 comm="syz.3.33030" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2233.595598][ T29] audit: type=1400 audit(2078.605:132004): avc: denied { open } for pid=30902 comm="syz.3.33030" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2233.620355][ T29] audit: type=1400 audit(2078.605:132005): avc: denied { ioctl } for pid=30902 comm="syz.3.33030" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2233.671675][ T29] audit: type=1400 audit(2078.808:132006): avc: denied { mounton } for pid=30902 comm="syz.3.33030" path="/proc/574/map_files" dev="proc" ino=394922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2233.671887][T30903] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2233.672255][ T29] audit: type=1400 audit(2078.808:132007): avc: denied { connect } for pid=30902 comm="syz.3.33030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2233.672524][ T29] audit: type=1400 audit(2078.808:132008): avc: denied { bind } for pid=30902 comm="syz.3.33030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2234.225609][T30920] syzkaller0: entered promiscuous mode [ 2234.231185][T30920] syzkaller0: entered allmulticast mode [ 2235.570748][T30953] __nla_validate_parse: 8 callbacks suppressed [ 2235.570772][T30953] netlink: 28 bytes leftover after parsing attributes in process `syz.4.33042'. [ 2235.816825][T30953] netlink: 84 bytes leftover after parsing attributes in process `syz.4.33042'. [ 2235.960934][T30957] lo speed is unknown, defaulting to 1000 [ 2235.968129][T30957] lo speed is unknown, defaulting to 1000 [ 2236.044930][T30957] lo speed is unknown, defaulting to 1000 [ 2236.943642][T31001] lo speed is unknown, defaulting to 1000 [ 2236.950683][T31001] lo speed is unknown, defaulting to 1000 [ 2237.022376][T31001] lo speed is unknown, defaulting to 1000 [ 2238.493540][T31060] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(5) [ 2238.500389][T31060] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2238.508880][T31060] vhci_hcd vhci_hcd.0: Device attached [ 2238.772730][T31064] syzkaller0: entered promiscuous mode [ 2238.778287][T31064] syzkaller0: entered allmulticast mode [ 2238.861498][ T29] kauditd_printk_skb: 107 callbacks suppressed [ 2238.861515][ T29] audit: type=1326 audit(2083.598:132116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31076 comm="syz.4.33062" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2238.899273][T31077] netlink: 4 bytes leftover after parsing attributes in process `syz.4.33062'. [ 2238.920274][ T8147] usb 8-1: SetAddress Request (17) to port 0 [ 2238.955031][ T8147] usb 8-1: new SuperSpeed USB device number 17 using vhci_hcd [ 2238.988300][T31077] netlink: 4 bytes leftover after parsing attributes in process `syz.4.33062'. [ 2239.071543][T31062] vhci_hcd: connection reset by peer [ 2239.077480][T24441] vhci_hcd: stop threads [ 2239.081805][T24441] vhci_hcd: release socket [ 2239.086323][T24441] vhci_hcd: disconnect device [ 2239.094264][ T29] audit: type=1326 audit(2083.626:132117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31076 comm="syz.4.33062" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2239.117717][ T29] audit: type=1326 audit(2083.626:132118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31076 comm="syz.4.33062" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2239.140939][ T29] audit: type=1326 audit(2083.626:132119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31076 comm="syz.4.33062" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2239.165145][ T29] audit: type=1326 audit(2083.626:132120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31076 comm="syz.4.33062" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2239.188642][ T29] audit: type=1326 audit(2083.626:132121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31076 comm="syz.4.33062" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2239.212444][ T29] audit: type=1326 audit(2083.626:132122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31076 comm="syz.4.33062" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2239.235721][ T29] audit: type=1326 audit(2083.626:132123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31076 comm="syz.4.33062" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2239.259079][ T29] audit: type=1326 audit(2083.635:132124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31076 comm="syz.4.33062" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2239.282309][ T29] audit: type=1326 audit(2083.718:132125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31076 comm="syz.4.33062" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2239.362347][T31084] netlink: 16 bytes leftover after parsing attributes in process `syz.6.33063'. [ 2239.482591][T31086] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2240.070465][T31102] netlink: 4 bytes leftover after parsing attributes in process `syz.6.33069'. [ 2240.091744][T31102] netlink: 4 bytes leftover after parsing attributes in process `syz.6.33069'. [ 2240.276939][T31106] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(6) [ 2240.283599][T31106] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2240.291786][T31106] vhci_hcd vhci_hcd.0: Device attached [ 2241.065078][T31121] lo speed is unknown, defaulting to 1000 [ 2241.071444][T31121] lo speed is unknown, defaulting to 1000 [ 2241.113001][T31121] lo speed is unknown, defaulting to 1000 [ 2241.270572][T16584] usb 12-1: SetAddress Request (6) to port 0 [ 2241.276727][T16584] usb 12-1: new SuperSpeed USB device number 6 using vhci_hcd [ 2241.296605][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.4.33074'. [ 2241.308794][T31107] vhci_hcd: connection closed [ 2241.318395][T24405] vhci_hcd: stop threads [ 2241.327983][T24405] vhci_hcd: release socket [ 2241.332419][T24405] vhci_hcd: disconnect device [ 2241.337411][T16584] usb 12-1: enqueue for inactive port 0 [ 2241.343250][T16584] usb 12-1: enqueue for inactive port 0 [ 2241.372939][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.4.33074'. [ 2241.416264][T16584] usb 12-1: enqueue for inactive port 0 [ 2241.482993][T31152] tipc: Enabled bearer , priority 0 [ 2241.519602][T31152] syzkaller0: entered promiscuous mode [ 2241.525135][T31152] syzkaller0: entered allmulticast mode [ 2241.546330][T16584] usb 12-1: new SuperSpeed USB device number 6 using vhci_hcd [ 2241.580455][T31152] tipc: Resetting bearer [ 2241.605784][T31151] tipc: Resetting bearer [ 2241.656664][T31151] tipc: Disabling bearer [ 2241.665157][T16584] usb 12-1: enqueue for inactive port 0 [ 2241.673539][T16584] usb 12-1: enqueue for inactive port 0 [ 2241.679246][T16584] usb 12-1: enqueue for inactive port 0 [ 2241.766931][T31168] netlink: 'syz.8.33079': attribute type 1 has an invalid length. [ 2242.007130][T31168] 8021q: adding VLAN 0 to HW filter on device bond4 [ 2242.156774][T31169] lo speed is unknown, defaulting to 1000 [ 2242.163249][T31169] lo speed is unknown, defaulting to 1000 [ 2242.238140][T31169] lo speed is unknown, defaulting to 1000 [ 2242.317541][T31172] macvlan2: entered promiscuous mode [ 2242.323046][T31172] macvlan2: entered allmulticast mode [ 2242.343066][T31172] bond4: entered promiscuous mode [ 2242.355962][T31172] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2242.377789][T31172] bond4: left promiscuous mode [ 2242.621872][T31239] syzkaller0: entered promiscuous mode [ 2242.627586][T31239] syzkaller0: entered allmulticast mode [ 2243.647192][T31263] pim6reg1: entered promiscuous mode [ 2243.652554][T31263] pim6reg1: entered allmulticast mode [ 2243.762928][T16584] usb usb12-port1: attempt power cycle [ 2243.805918][T31273] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(6) [ 2243.812491][T31273] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2243.820728][T31273] vhci_hcd vhci_hcd.0: Device attached [ 2243.872234][T31277] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2243.914572][T31280] netlink: 830 bytes leftover after parsing attributes in process `syz.4.33090'. [ 2243.979140][T31277] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2244.024834][T31274] vhci_hcd: connection closed [ 2244.025074][T24404] vhci_hcd: stop threads [ 2244.034264][T24404] vhci_hcd: release socket [ 2244.038795][T24404] vhci_hcd: disconnect device [ 2244.104578][T31277] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2244.169145][T31277] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2244.194712][T31298] netlink: 4 bytes leftover after parsing attributes in process `syz.6.33096'. [ 2244.197595][T31302] netlink: 4 bytes leftover after parsing attributes in process `syz.4.33095'. [ 2244.229412][T31298] netlink: 4 bytes leftover after parsing attributes in process `syz.6.33096'. [ 2244.243728][T24404] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2244.260371][T24404] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2244.271673][T31302] netlink: 4 bytes leftover after parsing attributes in process `syz.4.33095'. [ 2244.282812][ T29] kauditd_printk_skb: 212 callbacks suppressed [ 2244.282828][ T29] audit: type=1326 audit(2088.601:132338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31297 comm="syz.6.33096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7f1fff62ebe9 code=0x7ffc0000 [ 2244.297113][T24404] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2244.313014][ T29] audit: type=1326 audit(2088.601:132339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31297 comm="syz.6.33096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1fff62ebe9 code=0x7ffc0000 [ 2244.313052][ T29] audit: type=1326 audit(2088.601:132340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31297 comm="syz.6.33096" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1fff62ebe9 code=0x7ffc0000 [ 2244.369200][T24404] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2244.378924][ T29] audit: type=1326 audit(2088.601:132341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.4.33095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2244.403301][ T29] audit: type=1326 audit(2088.601:132342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.4.33095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=22 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2244.428121][ T29] audit: type=1326 audit(2088.601:132343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.4.33095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2244.451659][ T29] audit: type=1326 audit(2088.601:132344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.4.33095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2244.475378][ T29] audit: type=1326 audit(2088.601:132345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.4.33095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2244.498760][ T29] audit: type=1326 audit(2088.601:132346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.4.33095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2244.522159][ T29] audit: type=1326 audit(2088.601:132347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.4.33095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1efd29ebe9 code=0x7ffc0000 [ 2244.549561][ T8147] usb 8-1: device descriptor read/8, error -110 [ 2244.571011][T31316] netlink: 4 bytes leftover after parsing attributes in process `syz.5.33097'. [ 2244.581685][T31316] netlink: 4 bytes leftover after parsing attributes in process `syz.5.33097'. [ 2244.672441][ T8147] usb 8-1: new SuperSpeed USB device number 17 using vhci_hcd [ 2244.694271][ T8147] usb 8-1: enqueue for inactive port 0 [ 2244.699881][ T8147] usb 8-1: enqueue for inactive port 0 [ 2244.717687][ T8147] usb 8-1: enqueue for inactive port 0 [ 2245.888660][T31338] lo speed is unknown, defaulting to 1000 [ 2245.895558][T31338] lo speed is unknown, defaulting to 1000 [ 2245.967455][T31338] lo speed is unknown, defaulting to 1000 [ 2246.339832][T31366] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2246.430784][T31366] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2246.492879][T16584] usb usb12-port1: unable to enumerate USB device [ 2246.499686][ T8147] usb usb8-port1: attempt power cycle [ 2246.538159][T31366] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2246.552725][T31382] netlink: 4 bytes leftover after parsing attributes in process `syz.4.33112'. [ 2246.614031][T31366] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2246.677169][T24404] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2246.691851][T24404] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2246.708991][T24404] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2246.732440][T31400] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(6) [ 2246.739183][T31400] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2246.747470][T31400] vhci_hcd vhci_hcd.0: Device attached [ 2246.754186][T24404] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2246.929989][T31409] syzkaller0: entered promiscuous mode [ 2246.935612][T31409] syzkaller0: entered allmulticast mode [ 2247.056879][T19940] usb 14-1: SetAddress Request (26) to port 0 [ 2247.063676][T19940] usb 14-1: new SuperSpeed USB device number 26 using vhci_hcd [ 2247.337584][T31402] vhci_hcd: connection reset by peer [ 2247.348743][T22809] vhci_hcd: stop threads [ 2247.353031][T22809] vhci_hcd: release socket [ 2247.357477][T22809] vhci_hcd: disconnect device [ 2247.516477][T31421] 9pnet: Could not find request transport: jdma [ 2247.606949][T31428] FAULT_INJECTION: forcing a failure. [ 2247.606949][T31428] name failslab, interval 1, probability 0, space 0, times 0 [ 2247.619851][T31428] CPU: 1 UID: 0 PID: 31428 Comm: syz.4.33119 Not tainted syzkaller #0 PREEMPT(voluntary) [ 2247.619886][T31428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2247.619902][T31428] Call Trace: [ 2247.619911][T31428] [ 2247.619921][T31428] __dump_stack+0x1d/0x30 [ 2247.619948][T31428] dump_stack_lvl+0xe8/0x140 [ 2247.619975][T31428] dump_stack+0x15/0x1b [ 2247.619998][T31428] should_fail_ex+0x265/0x280 [ 2247.620020][T31428] should_failslab+0x8c/0xb0 [ 2247.620117][T31428] kmem_cache_alloc_noprof+0x50/0x310 [ 2247.620197][T31428] ? audit_log_start+0x365/0x6c0 [ 2247.620313][T31428] audit_log_start+0x365/0x6c0 [ 2247.620357][T31428] audit_seccomp+0x48/0x100 [ 2247.620468][T31428] ? __seccomp_filter+0x68c/0x10d0 [ 2247.620497][T31428] __seccomp_filter+0x69d/0x10d0 [ 2247.620521][T31428] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 2247.620561][T31428] ? vfs_write+0x7e8/0x960 [ 2247.620597][T31428] __secure_computing+0x82/0x150 [ 2247.620618][T31428] syscall_trace_enter+0xcf/0x1e0 [ 2247.620648][T31428] do_syscall_64+0xac/0x200 [ 2247.620752][T31428] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 2247.620792][T31428] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2247.620818][T31428] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2247.620912][T31428] RIP: 0033:0x7f1efd29ebe9 [ 2247.620929][T31428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2247.620946][T31428] RSP: 002b:00007f1efbd07038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 2247.620965][T31428] RAX: ffffffffffffffda RBX: 00007f1efd4c5fa0 RCX: 00007f1efd29ebe9 [ 2247.620977][T31428] RDX: 0000000000000000 RSI: 0000200000002400 RDI: 0000000000000002 [ 2247.621003][T31428] RBP: 00007f1efbd07090 R08: 0000000000000000 R09: 0000000000000000 [ 2247.621039][T31428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2247.621055][T31428] R13: 00007f1efd4c6038 R14: 00007f1efd4c5fa0 R15: 00007fff317869d8 [ 2247.621082][T31428] [ 2247.978636][T31434] lo speed is unknown, defaulting to 1000 [ 2247.985655][T31434] lo speed is unknown, defaulting to 1000 [ 2248.058265][T31434] lo speed is unknown, defaulting to 1000 [ 2248.420424][T31460] __nla_validate_parse: 1 callbacks suppressed [ 2248.420442][T31460] netlink: 8 bytes leftover after parsing attributes in process `syz.5.33120'. [ 2248.461173][T31459] pim6reg1: entered promiscuous mode [ 2248.466560][T31459] pim6reg1: entered allmulticast mode [ 2248.632337][T31476] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2248.885664][T31482] lo speed is unknown, defaulting to 1000 [ 2248.893663][T31482] lo speed is unknown, defaulting to 1000 [ 2248.987966][T31482] lo speed is unknown, defaulting to 1000 [ 2249.068293][ T8147] usb usb8-port1: unable to enumerate USB device [ 2249.128904][T31476] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2249.156859][T31484] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2249.238084][T31476] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2249.340843][T31476] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2249.413430][T22809] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2249.437831][T22809] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2249.453782][T22809] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2249.496295][T31533] netlink: 4 bytes leftover after parsing attributes in process `syz.3.33130'. [ 2249.506477][T22809] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2249.561191][T31533] netlink: 4 bytes leftover after parsing attributes in process `syz.3.33130'. [ 2249.657737][T31540] FAULT_INJECTION: forcing a failure. [ 2249.657737][T31540] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2249.671891][T31540] CPU: 0 UID: 0 PID: 31540 Comm: syz.4.33133 Not tainted syzkaller #0 PREEMPT(voluntary) [ 2249.671928][T31540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2249.671945][T31540] Call Trace: [ 2249.671952][T31540] [ 2249.671962][T31540] __dump_stack+0x1d/0x30 [ 2249.671983][T31540] dump_stack_lvl+0xe8/0x140 [ 2249.672029][T31540] dump_stack+0x15/0x1b [ 2249.672046][T31540] should_fail_ex+0x265/0x280 [ 2249.672068][T31540] should_fail+0xb/0x20 [ 2249.672105][T31540] should_fail_usercopy+0x1a/0x20 [ 2249.672127][T31540] _copy_from_user+0x1c/0xb0 [ 2249.672234][T31540] ___sys_sendmsg+0xc1/0x1d0 [ 2249.672362][T31540] __x64_sys_sendmsg+0xd4/0x160 [ 2249.672399][T31540] x64_sys_call+0x191e/0x2ff0 [ 2249.672551][T31540] do_syscall_64+0xd2/0x200 [ 2249.672586][T31540] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 2249.672611][T31540] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2249.672727][T31540] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2249.672756][T31540] RIP: 0033:0x7f1efd29ebe9 [ 2249.672774][T31540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2249.672797][T31540] RSP: 002b:00007f1efbd07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2249.672820][T31540] RAX: ffffffffffffffda RBX: 00007f1efd4c5fa0 RCX: 00007f1efd29ebe9 [ 2249.672879][T31540] RDX: 0000000000000000 RSI: 0000200000000480 RDI: 0000000000000004 [ 2249.672895][T31540] RBP: 00007f1efbd07090 R08: 0000000000000000 R09: 0000000000000000 [ 2249.672976][T31540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2249.672992][T31540] R13: 00007f1efd4c6038 R14: 00007f1efd4c5fa0 R15: 00007fff317869d8 [ 2249.673019][T31540] [ 2249.888762][ T29] kauditd_printk_skb: 274 callbacks suppressed [ 2249.888776][ T29] audit: type=1326 audit(2093.779:132620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31545 comm="syz.5.33134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f40f33bebe9 code=0x7ffc0000 [ 2249.922805][T31549] netlink: 4 bytes leftover after parsing attributes in process `syz.5.33134'. [ 2249.951057][T31549] netlink: 4 bytes leftover after parsing attributes in process `syz.5.33134'. [ 2249.962051][ T29] audit: type=1326 audit(2093.807:132621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31545 comm="syz.5.33134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f40f33bebe9 code=0x7ffc0000 [ 2249.985583][ T29] audit: type=1326 audit(2093.807:132622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31545 comm="syz.5.33134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f40f33bebe9 code=0x7ffc0000 [ 2250.008893][ T29] audit: type=1326 audit(2093.807:132623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31545 comm="syz.5.33134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f40f33bebe9 code=0x7ffc0000 [ 2250.032212][ T29] audit: type=1326 audit(2093.807:132624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31545 comm="syz.5.33134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f40f33bebe9 code=0x7ffc0000 [ 2250.055506][ T29] audit: type=1326 audit(2093.807:132625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31545 comm="syz.5.33134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f40f33bebe9 code=0x7ffc0000 [ 2250.079562][ T29] audit: type=1326 audit(2093.807:132626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31545 comm="syz.5.33134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f40f33bebe9 code=0x7ffc0000 [ 2250.103208][ T29] audit: type=1326 audit(2093.807:132627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31545 comm="syz.5.33134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f40f33bebe9 code=0x7ffc0000 [ 2250.126562][ T29] audit: type=1326 audit(2093.825:132628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31545 comm="syz.5.33134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f40f33bebe9 code=0x7ffc0000 [ 2250.149926][ T29] audit: type=1326 audit(2093.834:132629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31545 comm="syz.5.33134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=30 compat=0 ip=0x7f40f33bebe9 code=0x7ffc0000 [ 2250.205884][T31553] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(6) [ 2250.212499][T31553] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2250.221008][T31553] vhci_hcd vhci_hcd.0: Device attached [ 2250.384413][T31557] lo speed is unknown, defaulting to 1000 [ 2250.391130][T31557] lo speed is unknown, defaulting to 1000 [ 2250.464640][T31557] lo speed is unknown, defaulting to 1000 [ 2250.760983][T31554] vhci_hcd: connection closed [ 2250.761456][T25470] vhci_hcd: stop threads [ 2250.770529][T25470] vhci_hcd: release socket [ 2250.775090][T25470] vhci_hcd: disconnect device [ 2251.012907][T31591] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2251.456704][ T8147] usb usb8-port2: attempt power cycle [ 2251.640895][T31616] netlink: 4 bytes leftover after parsing attributes in process `syz.3.33145'. [ 2251.664639][T31616] netlink: 4 bytes leftover after parsing attributes in process `syz.3.33145'. [ 2251.876411][T31622] netlink: 180 bytes leftover after parsing attributes in process `syz.5.33147'. [ 2251.887350][T31622] netlink: 180 bytes leftover after parsing attributes in process `syz.5.33147'. [ 2251.918767][T31624] netlink: 100 bytes leftover after parsing attributes in process `syz.6.33148'. [ 2252.065709][T31637] FAULT_INJECTION: forcing a failure. [ 2252.065709][T31637] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2252.078932][T31637] CPU: 1 UID: 0 PID: 31637 Comm: syz.4.33153 Not tainted syzkaller #0 PREEMPT(voluntary) [ 2252.079025][T31637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2252.079120][T31637] Call Trace: [ 2252.079128][T31637] [ 2252.079138][T31637] __dump_stack+0x1d/0x30 [ 2252.079165][T31637] dump_stack_lvl+0xe8/0x140 [ 2252.079190][T31637] dump_stack+0x15/0x1b [ 2252.079270][T31637] should_fail_ex+0x265/0x280 [ 2252.079292][T31637] should_fail+0xb/0x20 [ 2252.079339][T31637] should_fail_usercopy+0x1a/0x20 [ 2252.079366][T31637] strncpy_from_user+0x25/0x230 [ 2252.079394][T31637] ? kmem_cache_alloc_noprof+0x186/0x310 [ 2252.079466][T31637] ? getname_flags+0x80/0x3b0 [ 2252.079504][T31637] getname_flags+0xae/0x3b0 [ 2252.079540][T31637] user_path_at+0x28/0x130 [ 2252.079632][T31637] do_faccessat+0x380/0x800 [ 2252.079654][T31637] ? __bpf_trace_sys_enter+0x10/0x30 [ 2252.079688][T31637] __x64_sys_faccessat+0x41/0x50 [ 2252.079742][T31637] x64_sys_call+0x950/0x2ff0 [ 2252.079762][T31637] do_syscall_64+0xd2/0x200 [ 2252.079793][T31637] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 2252.079851][T31637] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2252.079884][T31637] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2252.079938][T31637] RIP: 0033:0x7f1efd29ebe9 [ 2252.079953][T31637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2252.080094][T31637] RSP: 002b:00007f1efbd07038 EFLAGS: 00000246 ORIG_RAX: 000000000000010d [ 2252.080113][T31637] RAX: ffffffffffffffda RBX: 00007f1efd4c5fa0 RCX: 00007f1efd29ebe9 [ 2252.080129][T31637] RDX: 0000000000000007 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 2252.080145][T31637] RBP: 00007f1efbd07090 R08: 0000000000000000 R09: 0000000000000000 [ 2252.080160][T31637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2252.080176][T31637] R13: 00007f1efd4c6038 R14: 00007f1efd4c5fa0 R15: 00007fff317869d8 [ 2252.080242][T31637] [ 2252.799258][T19940] usb 14-1: device descriptor read/8, error -110 [ 2252.928137][T19940] usb 14-1: new SuperSpeed USB device number 26 using vhci_hcd [ 2252.948565][T31659] FAULT_INJECTION: forcing a failure. [ 2252.948565][T31659] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2252.962470][T31659] CPU: 0 UID: 0 PID: 31659 Comm: syz.4.33159 Not tainted syzkaller #0 PREEMPT(voluntary) [ 2252.962502][T31659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2252.962595][T31659] Call Trace: [ 2252.962603][T31659] [ 2252.962612][T31659] __dump_stack+0x1d/0x30 [ 2252.962634][T31659] dump_stack_lvl+0xe8/0x140 [ 2252.962658][T31659] dump_stack+0x15/0x1b [ 2252.962739][T31659] should_fail_ex+0x265/0x280 [ 2252.962767][T31659] should_fail+0xb/0x20 [ 2252.962790][T31659] should_fail_usercopy+0x1a/0x20 [ 2252.962813][T31659] _copy_from_user+0x1c/0xb0 [ 2252.962850][T31659] memdup_user+0x5e/0xd0 [ 2252.962894][T31659] strndup_user+0x68/0xb0 [ 2252.962927][T31659] __se_sys_fsconfig+0x3d8/0x770 [ 2252.962967][T31659] __x64_sys_fsconfig+0x67/0x80 [ 2252.963001][T31659] x64_sys_call+0x1f83/0x2ff0 [ 2252.963085][T31659] do_syscall_64+0xd2/0x200 [ 2252.963144][T31659] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 2252.963173][T31659] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2252.963224][T31659] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2252.963252][T31659] RIP: 0033:0x7f1efd29ebe9 [ 2252.963272][T31659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2252.963297][T31659] RSP: 002b:00007f1efbd07038 EFLAGS: 00000246 ORIG_RAX: 00000000000001af [ 2252.963321][T31659] RAX: ffffffffffffffda RBX: 00007f1efd4c5fa0 RCX: 00007f1efd29ebe9 [ 2252.963333][T31659] RDX: 00002000000000c0 RSI: 0000000000000001 RDI: 0000000000000003 [ 2252.963345][T31659] RBP: 00007f1efbd07090 R08: 0000000000000000 R09: 0000000000000000 [ 2252.963357][T31659] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 2252.963369][T31659] R13: 00007f1efd4c6038 R14: 00007f1efd4c5fa0 R15: 00007fff317869d8 [ 2252.963473][T31659] [ 2253.159035][T19940] usb 14-1: enqueue for inactive port 0 [ 2253.164694][T19940] usb 14-1: enqueue for inactive port 0 [ 2253.170699][T19940] usb 14-1: enqueue for inactive port 0 [ 2253.316904][T31667] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(6) [ 2253.323464][T31667] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 2253.331741][T31667] vhci_hcd vhci_hcd.0: Device attached [ 2253.426920][T31673] FAULT_INJECTION: forcing a failure. [ 2253.426920][T31673] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.439724][T31673] CPU: 0 UID: 0 PID: 31673 Comm: syz.4.33161 Not tainted syzkaller #0 PREEMPT(voluntary) [ 2253.439823][T31673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2253.439835][T31673] Call Trace: [ 2253.439842][T31673] [ 2253.439850][T31673] __dump_stack+0x1d/0x30 [ 2253.439873][T31673] dump_stack_lvl+0xe8/0x140 [ 2253.439906][T31673] dump_stack+0x15/0x1b [ 2253.439927][T31673] should_fail_ex+0x265/0x280 [ 2253.439954][T31673] should_failslab+0x8c/0xb0 [ 2253.439979][T31673] kmem_cache_alloc_node_noprof+0x57/0x320 [ 2253.440115][T31673] ? __alloc_skb+0x101/0x320 [ 2253.440135][T31673] __alloc_skb+0x101/0x320 [ 2253.440160][T31673] netlink_alloc_large_skb+0xba/0xf0 [ 2253.440277][T31673] netlink_sendmsg+0x3cf/0x6b0 [ 2253.440303][T31673] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2253.440330][T31673] __sock_sendmsg+0x145/0x180 [ 2253.440367][T31673] ____sys_sendmsg+0x31e/0x4e0 [ 2253.440395][T31673] ___sys_sendmsg+0x17b/0x1d0 [ 2253.440432][T31673] __x64_sys_sendmsg+0xd4/0x160 [ 2253.440501][T31673] x64_sys_call+0x191e/0x2ff0 [ 2253.440534][T31673] do_syscall_64+0xd2/0x200 [ 2253.440616][T31673] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 2253.440643][T31673] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2253.440674][T31673] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2253.440734][T31673] RIP: 0033:0x7f1efd29ebe9 [ 2253.440749][T31673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2253.440771][T31673] RSP: 002b:00007f1efbd07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2253.440794][T31673] RAX: ffffffffffffffda RBX: 00007f1efd4c5fa0 RCX: 00007f1efd29ebe9 [ 2253.440808][T31673] RDX: 0000000000000840 RSI: 0000200000000280 RDI: 0000000000000003 [ 2253.440823][T31673] RBP: 00007f1efbd07090 R08: 0000000000000000 R09: 0000000000000000 [ 2253.440878][T31673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2253.440890][T31673] R13: 00007f1efd4c6038 R14: 00007f1efd4c5fa0 R15: 00007fff317869d8 [ 2253.440910][T31673] [ 2253.448153][T19940] usb 14-1: SetAddress Request (27) to port 0 [ 2253.795013][T31668] vhci_hcd: connection closed [ 2253.795303][T24405] vhci_hcd: stop threads [ 2253.804424][T24405] vhci_hcd: release socket [ 2253.809174][T24405] vhci_hcd: disconnect device [ 2253.839529][T31684] __nla_validate_parse: 4 callbacks suppressed [ 2253.839548][T31684] netlink: 24 bytes leftover after parsing attributes in process `syz.3.33165'. [ 2253.893941][T31690] netlink: 28 bytes leftover after parsing attributes in process `syz.3.33166'. [ 2253.962470][ T6646] IPVS: starting estimator thread 0... [ 2253.990260][ T8147] usb usb8-port2: unable to enumerate USB device [ 2254.063748][T19940] usb 14-1: new SuperSpeed USB device number 27 using vhci_hcd [ 2254.105111][T19940] usb 14-1: enqueue for inactive port 0 [ 2254.135336][T19940] usb 14-1: enqueue for inactive port 0 [ 2254.159694][T19940] usb 14-1: enqueue for inactive port 0 [ 2254.165609][T31696] IPVS: using max 2112 ests per chain, 105600 per kthread [ 2254.282390][T19940] usb 14-1: new SuperSpeed USB device number 27 using vhci_hcd [ 2254.304229][T19940] usb 14-1: enqueue for inactive port 0 [ 2254.309915][T19940] usb 14-1: enqueue for inactive port 0 [ 2254.324018][T19940] usb 14-1: enqueue for inactive port 0 [ 2254.445022][T19940] usb usb14-port1: attempt power cycle [ 2254.894391][T31760] lo speed is unknown, defaulting to 1000 [ 2254.901535][T31760] lo speed is unknown, defaulting to 1000 [ 2254.971182][T31760] lo speed is unknown, defaulting to 1000 [ 2255.584646][ T29] kauditd_printk_skb: 353 callbacks suppressed [ 2255.584661][ T29] audit: type=1400 audit(2099.031:132983): avc: denied { read } for pid=31825 comm="syz.3.33177" dev="nsfs" ino=4026611529 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2255.612227][ T29] audit: type=1400 audit(2099.031:132984): avc: denied { open } for pid=31825 comm="syz.3.33177" path="net:[4026611529]" dev="nsfs" ino=4026611529 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2255.636021][ T29] audit: type=1400 audit(2099.031:132985): avc: denied { create } for pid=31825 comm="syz.3.33177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2255.662316][T31826] sd 0:0:1:0: device reset [ 2255.677935][ T29] audit: type=1400 audit(2099.031:132986): avc: denied { write } for pid=31822 comm="syz.4.33176" path="socket:[397639]" dev="sockfs" ino=397639 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2255.702685][ T29] audit: type=1400 audit(2099.105:132987): avc: denied { setopt } for pid=31825 comm="syz.3.33177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2255.722602][ T29] audit: type=1400 audit(2099.105:132988): avc: denied { read } for pid=31825 comm="syz.3.33177" name="sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 2255.746508][ T29] audit: type=1400 audit(2099.105:132989): avc: denied { open } for pid=31825 comm="syz.3.33177" path="/dev/sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 2255.770410][ T29] audit: type=1400 audit(2099.105:132990): avc: denied { ioctl } for pid=31825 comm="syz.3.33177" path="/dev/sg0" dev="devtmpfs" ino=137 ioctlcmd=0x2284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 2255.795941][ T29] audit: type=1400 audit(2099.105:132991): avc: denied { create } for pid=31825 comm="syz.3.33177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2255.821933][T31832] netlink: 84 bytes leftover after parsing attributes in process `syz.8.33179'. [ 2255.861300][ T29] audit: type=1400 audit(2099.289:132992): avc: denied { create } for pid=31836 comm="syz.3.33180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2255.870784][T31839] FAULT_INJECTION: forcing a failure. [ 2255.870784][T31839] name failslab, interval 1, probability 0, space 0, times 0 [ 2255.893962][T31839] CPU: 1 UID: 0 PID: 31839 Comm: syz.8.33181 Not tainted syzkaller #0 PREEMPT(voluntary) [ 2255.893997][T31839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2255.894013][T31839] Call Trace: [ 2255.894021][T31839] [ 2255.894030][T31839] __dump_stack+0x1d/0x30 [ 2255.894135][T31839] dump_stack_lvl+0xe8/0x140 [ 2255.894158][T31839] dump_stack+0x15/0x1b [ 2255.894180][T31839] should_fail_ex+0x265/0x280 [ 2255.894208][T31839] should_failslab+0x8c/0xb0 [ 2255.894239][T31839] kmem_cache_alloc_node_noprof+0x57/0x320 [ 2255.894286][T31839] ? __alloc_skb+0x101/0x320 [ 2255.894312][T31839] __alloc_skb+0x101/0x320 [ 2255.894334][T31839] netlink_alloc_large_skb+0xba/0xf0 [ 2255.894373][T31839] netlink_sendmsg+0x3cf/0x6b0 [ 2255.894406][T31839] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2255.894537][T31839] __sock_sendmsg+0x145/0x180 [ 2255.894642][T31839] ____sys_sendmsg+0x31e/0x4e0 [ 2255.894674][T31839] ___sys_sendmsg+0x17b/0x1d0 [ 2255.894727][T31839] __x64_sys_sendmsg+0xd4/0x160 [ 2255.894790][T31839] x64_sys_call+0x191e/0x2ff0 [ 2255.894877][T31839] do_syscall_64+0xd2/0x200 [ 2255.894983][T31839] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 2255.895012][T31839] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2255.895044][T31839] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2255.895066][T31839] RIP: 0033:0x7fc38fbbebe9 [ 2255.895085][T31839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2255.895121][T31839] RSP: 002b:00007fc38e627038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2255.895141][T31839] RAX: ffffffffffffffda RBX: 00007fc38fde5fa0 RCX: 00007fc38fbbebe9 [ 2255.895154][T31839] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 2255.895166][T31839] RBP: 00007fc38e627090 R08: 0000000000000000 R09: 0000000000000000 [ 2255.895178][T31839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2255.895192][T31839] R13: 00007fc38fde6038 R14: 00007fc38fde5fa0 R15: 00007ffd25d7e4c8 [ 2255.895274][T31839] [ 2256.146070][T31841] lo speed is unknown, defaulting to 1000 [ 2256.152481][T31841] lo speed is unknown, defaulting to 1000 [ 2256.172431][T31840] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2256.192205][T31841] lo speed is unknown, defaulting to 1000 [ 2256.335911][T31872] netlink: 4 bytes leftover after parsing attributes in process `syz.5.33184'. [ 2256.362369][T31872] netlink: 4 bytes leftover after parsing attributes in process `syz.5.33184'. [ 2256.383356][T31870] netlink: 830 bytes leftover after parsing attributes in process `syz.3.33183'. [ 2256.560559][T31874] syzkaller0: entered promiscuous mode [ 2256.566250][T31874] syzkaller0: entered allmulticast mode [ 2257.196743][T31893] lo speed is unknown, defaulting to 1000 [ 2257.203740][T31893] lo speed is unknown, defaulting to 1000 [ 2257.279045][T31893] lo speed is unknown, defaulting to 1000 [ 2257.447061][T31921] FAULT_INJECTION: forcing a failure. [ 2257.447061][T31921] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2257.460272][T31921] CPU: 1 UID: 0 PID: 31921 Comm: syz.6.33190 Not tainted syzkaller #0 PREEMPT(voluntary) [ 2257.460306][T31921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2257.460322][T31921] Call Trace: [ 2257.460331][T31921] [ 2257.460341][T31921] __dump_stack+0x1d/0x30 [ 2257.460433][T31921] dump_stack_lvl+0xe8/0x140 [ 2257.460517][T31921] dump_stack+0x15/0x1b [ 2257.460533][T31921] should_fail_ex+0x265/0x280 [ 2257.460560][T31921] should_fail+0xb/0x20 [ 2257.460623][T31921] should_fail_usercopy+0x1a/0x20 [ 2257.460658][T31921] _copy_from_iter+0xd2/0xe80 [ 2257.460695][T31921] ? alloc_pages_mpol+0x201/0x250 [ 2257.460740][T31921] copy_page_from_iter+0x178/0x2a0 [ 2257.460842][T31921] tun_get_user+0x679/0x2680 [ 2257.460891][T31921] ? ref_tracker_alloc+0x1f2/0x2f0 [ 2257.460948][T31921] tun_chr_write_iter+0x15e/0x210 [ 2257.460982][T31921] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 2257.461020][T31921] vfs_write+0x52a/0x960 [ 2257.461057][T31921] ksys_write+0xda/0x1a0 [ 2257.461123][T31921] __x64_sys_write+0x40/0x50 [ 2257.461158][T31921] x64_sys_call+0x27fe/0x2ff0 [ 2257.461185][T31921] do_syscall_64+0xd2/0x200 [ 2257.461221][T31921] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 2257.461264][T31921] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2257.461289][T31921] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2257.461310][T31921] RIP: 0033:0x7f1fff62d69f [ 2257.461374][T31921] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 2257.461457][T31921] RSP: 002b:00007f1ffe097000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2257.461481][T31921] RAX: ffffffffffffffda RBX: 00007f1fff855fa0 RCX: 00007f1fff62d69f [ 2257.461493][T31921] RDX: 000000000000004e RSI: 0000200000000340 RDI: 00000000000000c8 [ 2257.461505][T31921] RBP: 00007f1ffe097090 R08: 0000000000000000 R09: 0000000000000000 [ 2257.461581][T31921] R10: 000000000000004e R11: 0000000000000293 R12: 0000000000000001 [ 2257.461597][T31921] R13: 00007f1fff856038 R14: 00007f1fff855fa0 R15: 00007fff84c9b878 [ 2257.461623][T31921] [ 2257.770579][T19940] usb usb14-port1: unable to enumerate USB device [ 2257.807075][T31936] netlink: 4 bytes leftover after parsing attributes in process `syz.3.33196'. [ 2257.815092][T31932] FAULT_INJECTION: forcing a failure. [ 2257.815092][T31932] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.818057][T31936] netlink: 4 bytes leftover after parsing attributes in process `syz.3.33196'. [ 2257.828904][T31932] CPU: 0 UID: 0 PID: 31932 Comm: syz.8.33195 Not tainted syzkaller #0 PREEMPT(voluntary) [ 2257.828941][T31932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2257.828961][T31932] Call Trace: [ 2257.828968][T31932] [ 2257.829034][T31932] __dump_stack+0x1d/0x30 [ 2257.829064][T31932] dump_stack_lvl+0xe8/0x140 [ 2257.829091][T31932] dump_stack+0x15/0x1b [ 2257.829114][T31932] should_fail_ex+0x265/0x280 [ 2257.829143][T31932] should_failslab+0x8c/0xb0 [ 2257.829240][T31932] kmem_cache_alloc_node_noprof+0x57/0x320 [ 2257.829281][T31932] ? __alloc_skb+0x101/0x320 [ 2257.829309][T31932] __alloc_skb+0x101/0x320 [ 2257.829409][T31932] ? audit_log_start+0x365/0x6c0 [ 2257.829467][T31932] audit_log_start+0x380/0x6c0 [ 2257.829514][T31932] audit_seccomp+0x48/0x100 [ 2257.829549][T31932] ? __seccomp_filter+0x68c/0x10d0 [ 2257.829579][T31932] __seccomp_filter+0x69d/0x10d0 [ 2257.829615][T31932] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 2257.829654][T31932] ? vfs_write+0x7e8/0x960 [ 2257.829683][T31932] ? __rcu_read_unlock+0x4f/0x70 [ 2257.829755][T31932] ? __fget_files+0x184/0x1c0 [ 2257.829843][T31932] __secure_computing+0x82/0x150 [ 2257.829874][T31932] syscall_trace_enter+0xcf/0x1e0 [ 2257.829907][T31932] do_syscall_64+0xac/0x200 [ 2257.829946][T31932] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 2257.829985][T31932] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2257.830021][T31932] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2257.830051][T31932] RIP: 0033:0x7fc38fbbebe9 [ 2257.830072][T31932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2257.830097][T31932] RSP: 002b:00007fc38e627038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 2257.830138][T31932] RAX: ffffffffffffffda RBX: 00007fc38fde5fa0 RCX: 00007fc38fbbebe9 [ 2257.830156][T31932] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000 [ 2257.830173][T31932] RBP: 00007fc38e627090 R08: 0000000000000000 R09: 0000000000000000 [ 2257.830189][T31932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2257.830206][T31932] R13: 00007fc38fde6038 R14: 00007fc38fde5fa0 R15: 00007ffd25d7e4c8 [ 2257.830237][T31932] [ 2257.951848][T31930] pim6reg1: entered promiscuous mode [ 2258.008054][T31947] netlink: 28 bytes leftover after parsing attributes in process `syz.8.33199'. [ 2258.012694][T31930] pim6reg1: entered allmulticast mode [ 2258.037475][T31934] pim6reg1: entered promiscuous mode [ 2258.081718][T31934] pim6reg1: entered allmulticast mode [ 2258.188305][T31953] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2258.262655][T31953] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2258.369290][T31974] syzkaller0: entered promiscuous mode [ 2258.374863][T31974] syzkaller0: entered allmulticast mode [ 2258.385339][T31953] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2258.452639][T31953] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2258.546526][T31801] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2258.571080][T31801] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2258.602232][T31993] netlink: 32 bytes leftover after parsing attributes in process `syz.4.33208'. [ 2258.612633][T31993] tipc: Enabled bearer , priority 0 [ 2258.619794][T31801] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2258.630622][T31993] syzkaller0: entered promiscuous mode [ 2258.636134][T31993] syzkaller0: entered allmulticast mode [ 2258.657639][T31801] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2258.675286][T31993] tipc: Resetting bearer [ 2258.684301][T31989] tipc: Resetting bearer [ 2258.693809][T31989] tipc: Disabling bearer [ 2258.976462][T32011] lo speed is unknown, defaulting to 1000 [ 2258.983427][T32011] lo speed is unknown, defaulting to 1000 [ 2259.055996][T32011] lo speed is unknown, defaulting to 1000 [ 2259.350640][T32019] __nla_validate_parse: 2 callbacks suppressed [ 2259.350660][T32019] netlink: 4 bytes leftover after parsing attributes in process `syz.4.33213'. [ 2259.369540][T32019] netlink: 4 bytes leftover after parsing attributes in process `syz.4.33213'. [ 2259.380738][T32018] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2259.390714][T32018] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2259.449649][T32053] netlink: 4 bytes leftover after parsing attributes in process `syz.5.33217'. [ 2259.510430][T32053] netlink: 4 bytes leftover after parsing attributes in process `syz.5.33217'. [ 2259.548950][T32058] syzkaller0: entered promiscuous mode [ 2259.554997][T32058] syzkaller0: entered allmulticast mode [ 2259.656673][T32067] netlink: 84 bytes leftover after parsing attributes in process `syz.8.33220'. [ 2259.701447][T32080] FAULT_INJECTION: forcing a failure. [ 2259.701447][T32080] name failslab, interval 1, probability 0, space 0, times 0 [ 2259.714254][T32080] CPU: 1 UID: 0 PID: 32080 Comm: syz.3.33223 Not tainted syzkaller #0 PREEMPT(voluntary) [ 2259.714359][T32080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2259.714377][T32080] Call Trace: [ 2259.714385][T32080] [ 2259.714395][T32080] __dump_stack+0x1d/0x30 [ 2259.714474][T32080] dump_stack_lvl+0xe8/0x140 [ 2259.714493][T32080] dump_stack+0x15/0x1b [ 2259.714513][T32080] should_fail_ex+0x265/0x280 [ 2259.714541][T32080] should_failslab+0x8c/0xb0 [ 2259.714609][T32080] kmem_cache_alloc_node_noprof+0x57/0x320 [ 2259.714642][T32080] ? __alloc_skb+0x101/0x320 [ 2259.714661][T32080] __alloc_skb+0x101/0x320 [ 2259.714750][T32080] netlink_alloc_large_skb+0xba/0xf0 [ 2259.714794][T32080] netlink_sendmsg+0x3cf/0x6b0 [ 2259.714823][T32080] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2259.714866][T32080] __sock_sendmsg+0x145/0x180 [ 2259.714965][T32080] ____sys_sendmsg+0x31e/0x4e0 [ 2259.715001][T32080] ___sys_sendmsg+0x17b/0x1d0 [ 2259.715050][T32080] __x64_sys_sendmsg+0xd4/0x160 [ 2259.715160][T32080] x64_sys_call+0x191e/0x2ff0 [ 2259.715187][T32080] do_syscall_64+0xd2/0x200 [ 2259.715290][T32080] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 2259.715381][T32080] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2259.715448][T32080] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2259.715472][T32080] RIP: 0033:0x7fe914feebe9 [ 2259.715487][T32080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2259.715504][T32080] RSP: 002b:00007fe913a4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2259.715522][T32080] RAX: ffffffffffffffda RBX: 00007fe915215fa0 RCX: 00007fe914feebe9 [ 2259.715602][T32080] RDX: 0000000004000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 2259.715617][T32080] RBP: 00007fe913a4f090 R08: 0000000000000000 R09: 0000000000000000 [ 2259.715630][T32080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2259.715643][T32080] R13: 00007fe915216038 R14: 00007fe915215fa0 R15: 00007ffc5579dbe8 [ 2259.715664][T32080] [ 2260.004289][T32095] netlink: 830 bytes leftover after parsing attributes in process `syz.8.33226'. [ 2260.025303][T32089] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 2260.082234][T32100] block device autoloading is deprecated and will be removed. [ 2260.134043][T32107] ================================================================== [ 2260.142192][T32107] BUG: KCSAN: data-race in call_rcu / mas_state_walk [ 2260.149003][T32107] [ 2260.151340][T32107] write to 0xffff888139d5a008 of 8 bytes by task 32099 on cpu 0: [ 2260.159077][T32107] call_rcu+0x51/0x3f0 [ 2260.163291][T32107] mas_wmb_replace+0xc6a/0x14a0 [ 2260.168174][T32107] mas_wr_store_entry+0x1773/0x2b50 [ 2260.173390][T32107] mas_store_prealloc+0x74d/0x9e0 [ 2260.178442][T32107] vma_iter_store_new+0x1c5/0x200 [ 2260.183480][T32107] vma_complete+0x125/0x580 [ 2260.187997][T32107] __split_vma+0x5d9/0x650 [ 2260.192429][T32107] vma_modify+0x3f2/0xc80 [ 2260.196770][T32107] vma_modify_flags+0x101/0x130 [ 2260.201655][T32107] mprotect_fixup+0x2cc/0x570 [ 2260.206344][T32107] do_mprotect_pkey+0x6d6/0x980 [ 2260.211217][T32107] __x64_sys_mprotect+0x48/0x60 [ 2260.216084][T32107] x64_sys_call+0x274e/0x2ff0 [ 2260.220779][T32107] do_syscall_64+0xd2/0x200 [ 2260.225415][T32107] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2260.231330][T32107] [ 2260.233684][T32107] read to 0xffff888139d5a008 of 8 bytes by task 32107 on cpu 1: [ 2260.241353][T32107] mas_state_walk+0x3e9/0x650 [ 2260.246053][T32107] mas_walk+0x60/0x150 [ 2260.250130][T32107] lock_vma_under_rcu+0x8d/0x160 [ 2260.255083][T32107] do_user_addr_fault+0x233/0x1090 [ 2260.260228][T32107] exc_page_fault+0x62/0xa0 [ 2260.264741][T32107] asm_exc_page_fault+0x26/0x30 [ 2260.269647][T32107] [ 2260.271975][T32107] value changed: 0x0000555593141fff -> 0xffff8881047b0908 [ 2260.279167][T32107] [ 2260.281496][T32107] Reported by Kernel Concurrency Sanitizer on: [ 2260.287656][T32107] CPU: 1 UID: 0 PID: 32107 Comm: syz.3.33228 Not tainted syzkaller #0 PREEMPT(voluntary) [ 2260.297817][T32107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2260.307897][T32107] ==================================================================