last executing test programs: 5m9.109320488s ago: executing program 3 (id=169): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) socket$can_bcm(0x1d, 0x2, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x9135}, 0x18) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r2, &(0x7f0000002980)={&(0x7f0000000180)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000001800)='_', 0x1}], 0x1}, 0x4000000) setsockopt$sock_attach_bpf(r2, 0x84, 0x1e, &(0x7f0000000000), 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={'batadv_slave_1\x00', {0x2, 0x0, @remote}}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x891c, &(0x7f0000000540)={'batadv_slave_1\x00', {0x2, 0x0, @private=0xfffffffe}}) 5m9.00040409s ago: executing program 3 (id=171): r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f000000ff00)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000018c0)="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", 0xffc}, {&(0x7f0000000540)="ec000002", 0x4}], 0x2}}], 0x1, 0x4000800) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x40, 0x1, 0xfd, 0x0, 0x0, 0x5, 0x2001, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40100, 0x2, @perf_config_ext={0xf60, 0x100000001}, 0x9b80, 0x5dd8, 0x3a65, 0x5, 0x0, 0x100c, 0xfffb, 0x0, 0x0, 0x0, 0x2000000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$pppl2tp(0x18, 0x1, 0x1) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x10, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x2, 0x4, 0x0, 0x1, 0x15}, @jmp={0x5, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffe88}], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$caif_seqpacket(0x25, 0x5, 0x3) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000480)="2ad2c722ad3dbcb2b925a048069ed5ef8446fb60f947e0e015388ac210a6dd099aab0be62cc49583d5c30955c4fa4dc7806ed8a74b52597a11defeb21103cd93788180ba15b40612e8383089092dc11d34457e5b207ec396aead3be15439faafd06e09e53f2b20807a158a93ca6dd9279d3f30a816d66987c66436468178d216ce5c6ac456a93dfe744c7d35d3d391c975aabc", 0x93) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x7610, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_SIOCSPGRP(r6, 0x8902, 0x0) syz_io_uring_setup(0x1f87, &(0x7f0000000080)={0x0, 0x0, 0x13580}, 0x0, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x100}, 0x0) select(0x2a, 0x0, 0x0, &(0x7f0000000400)={0xfefdffffffffffff, 0x1, 0x2, 0x300}, &(0x7f0000000440)={0x0, 0x2710}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000300)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@jqfmt_vfsold}, {@minixdf}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000002480)=ANY=[], 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x2) 5m8.933943331s ago: executing program 3 (id=173): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000007c0)=@mangle={'mangle\x00', 0x64, 0x6, 0x740, 0x120, 0x2f8, 0x440, 0x510, 0x2f8, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, 0x0, {[{{@ipv6={@private2, @loopback, [0xff000000, 0xffffffff, 0xffffff00, 0xff000000], [0xff000000, 0xffffff00, 0x0, 0xffffff00], 'vlan1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x0, 0x3, 0x3, 0x14}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x2}}, @inet=@rpfilter={{0x28}, {0x1}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x6, 0x7}}}, {{@ipv6={@remote, @local, [0x0, 0xffffffff], [], 'macvtap0\x00', 'ip6tnl0\x00', {}, {}, 0x11, 0x0, 0x0, 0x4}, 0x0, 0x198, 0x1d8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}, @common=@unspec=@conntrack3={{0xc8}, {{@ipv6=@remote, [], @ipv6=@private1, [0xffffffff, 0xff000000, 0xffffffff], @ipv4=@multicast2, [0x0, 0xffffffff, 0xffffffff, 0xffffffff], @ipv4=@empty, [0x0, 0x0, 0xff000000, 0xff], 0x0, 0x0, 0x42, 0x4e22, 0x4e24, 0x4e20, 0x4e24, 0x0, 0x23ccf3e9fd2b5143}, 0x0, 0x80, 0x0, 0x4e20, 0x4e24, 0x4e23}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_team\x00', 'syzkaller0\x00'}, 0x0, 0x100, 0x148, 0x0, {}, [@common=@unspec=@connmark={{0x30}}, @common=@inet=@socket1={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@empty, @ipv6=@private2, 0x0, 0xfe}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0xc}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x2]}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7a0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000180)) ioctl$SG_IO(r1, 0x2285, &(0x7f00000005c0)={0x53, 0x0, 0x6, 0x6, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000100)="4663885206ea", 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x2e, 0x2e]}}, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 5m8.789097564s ago: executing program 3 (id=176): r0 = syz_io_uring_setup(0x5bf, 0x0, 0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) io_uring_enter(r0, 0x6e2, 0x3900, 0x1, 0x0, 0x0) io_uring_enter(r0, 0xc54, 0xc993, 0x1, 0x0, 0x0) r1 = gettid() timer_create(0x9, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = syz_io_uring_setup(0xd3c, &(0x7f00000003c0)={0x0, 0x576, 0x0, 0x0, 0x220}, &(0x7f0000000700)=0x0, &(0x7f00000002c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r2, 0xce3, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x40100, 0x0) unshare(0x24020c00) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000200)={[{@orlov}, {@nombcache}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@grpquota}, {@barrier}, {@usrjquota}, {@jqfmt_vfsold}, {@minixdf}]}, 0x3, 0x466, &(0x7f0000000340)="$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") listxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x46) io_uring_enter(r2, 0x4ac9, 0x3900, 0x1800000000000000, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000100000000020000000000950000000000000061aaf46ad5a624b14d9d9150cd55628242253fbe31dcbfbd14d007557e3f47b5b88eb33c124f7ce851e5f25ccfc6447f5f305b3b2b1aad366b4b51ae129b1b6cf68ed7616a225922ce5c07e1e755993d6912aebc15d460a830f284a9bbe9172807dc1361185cbc5c5cf50ca022ee8df2420b9624158c90f729933c134526fa5ad5172a6a95af933e92a561c46e98627879a73c4cadbaf8"], &(0x7f0000000240)='GPL\x00', 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5, 0x0, 0x3}, 0x18) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f00000006c0)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0x0, &(0x7f0000000280)="abca1609fd9042d3383306721604d0ad3b9c7d04cb9247b08dbefc33b83133f41c0cbdbaabfd1b0ca62deb6d23070d59f9a1750a7b445fb4fb59ee3a05b8ca2023a57d95b173deda21a10ad2ca5cc4e7389124cc11f2cad92e240c5250177b3e5a8571bb0e1ccba2c7943def9500fcbf14176ed5de2c36e1b4aba015fe81c933a33b8f8772900c208b0cc604412aca6abd3361b58a854bca5a34072205777225db9fb67eef7d7be6ef13c346a70834e6c020c42b3e1aa3cc19f5d5654e8b9e4ade3781242b52a2b8efe92c5c29b158fb7b6fe1c58f", 0xd5, 0x0, &(0x7f0000000180), &(0x7f0000000480)="c874c1901f59d87dbd2055cdafb6da2dded7723323b618bb524cbcbd5c3ca0d7a9a9f99475d755f734e10179e3eb1c6a6003404ee3701abcde47f1de971d9c6e3b9a1bfc1f2698065ad816ec00db477e7232b797b4184fa7267b6bbdb54b62f89e33e5b9bc193e44b916afe7d1be03df024a410b3b8b82346c816be9dda05a361aeeb3fb804c9a233b49cbb08a9ebf29a3c4d8ac05e2cf38960e7b186f5fa48a058b2fb94c84844f5ad3cab59956a4038cec96a44bf2e5e3c7345e728b18ee873aa43bc62eeb10058b6efede62636ce0b0a3b3500252ff56bf33ef55ba5139deb5e71c24") request_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='{^$-\x00', 0xfffffffffffffffe) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r8, r7, 0x25, 0x0, @void}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="080000000400000004000000a4"], 0x48) fsopen(&(0x7f0000000380)='configfs\x00', 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r9 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r9, 0x0) socket$netlink(0x10, 0x3, 0x0) 5m8.163039584s ago: executing program 3 (id=184): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffe}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xbd6f}}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$eJzs3F9IU38Yx/FH50/9GTqJCAqqp7ypiIPbdaAjNKKBUS4sITjmWY2dtrEzVpNwCwJvuuimf9cVRAhCdBEEYhddhRLeddGdd15kV0lEJ+Y0N5tapk7y/brYHvZ8P4fv+bPD9h1s+vjda9GwY4TNlFTXV0l1u+RktkqapVoW5OTI9ZH3+85duHg6EAx2nFXtDHT7/KradGC09+bwobHUjvMvm17XyXjzpekZ/9T47vE909+7r0YcjTgai6fU1L54PGX22Zb233eihuoZ2zIdSyMxx0qW9MN2PJHIqBnrb2xIJC3HUTOW0aiV0VRcU8mMmlfMSEwNw9DGBsHKhtOPAst3Q89nXVdmUu9cty4nruvmX6zfxOmhwubOv+sWnf87lZ4SNlHRTb1exB5Kh9KhwnOhHwhLRGyxpFW88k3y14j7eMSdu1Tyjzf8I8HJo2/fqGqzDNrZ+Xw2HfKU5n3idT2FTEGh7jwV7PBpQWn+P2kozvvFK7vK5/1l87VyuKUob4hXJi9LXGyZGD34Zapr6MFCftCneqIruCT/v/QvHqZnnyt0fgAAAAAAAAAAWAtDfyq7fm/kB9weUNXGJf1CvtzvA0vX51vLrs/XyN6ayu47AAAAAADbhZMZiJq2bSX/ssh/lV+P7fx7xZNbvz94f+fKY1raPBPtH3KJrbBff1B87dkS0ygtZH71abXBnnV+pywWn9ZlO1Xz81t+zMnejy9W3U7tL8dnOWMbf1cCAAAAsBEWP/S3STb8Kp3tOXav0nMCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGC7WcNfjk08LNfSfLHzablWpfcRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgJT8CAAD//wva0Pw=") (async, rerun: 32) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81000) (rerun: 32) renameat2(r3, &(0x7f0000000140)='./file1\x00', r3, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0x0) (async) renameat2(0xffffffffffffff9c, &(0x7f0000001100)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f00000010c0)='./file0\x00', 0x0) 5m5.140633212s ago: executing program 3 (id=229): mprotect(&(0x7f000005d000/0x3000)=nil, 0x3000, 0x1) r0 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000120000"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net\x00') (async) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net\x00') getdents(r3, &(0x7f0000000380)=""/200, 0x1d) (async) getdents(r3, &(0x7f0000000380)=""/200, 0x1d) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000001780)=0x100000, 0x4) 5m5.095459763s ago: executing program 32 (id=229): mprotect(&(0x7f000005d000/0x3000)=nil, 0x3000, 0x1) r0 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000120000"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net\x00') (async) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net\x00') getdents(r3, &(0x7f0000000380)=""/200, 0x1d) (async) getdents(r3, &(0x7f0000000380)=""/200, 0x1d) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000001780)=0x100000, 0x4) 2m52.186611134s ago: executing program 4 (id=2543): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = getpgid(0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$getregset(0x4205, r3, 0x202, &(0x7f0000000080)={0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)=0x0) r5 = gettid() syz_clone3(&(0x7f0000000740)={0x4102000, &(0x7f0000000300), &(0x7f0000000500), &(0x7f0000000580), {0x10}, &(0x7f00000005c0)=""/150, 0x96, &(0x7f0000000c00)=""/4096, &(0x7f0000000700)=[0xffffffffffffffff, r2, r3, r4, r5], 0x5}, 0x58) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_io_uring_setup(0x2c0c, &(0x7f0000000280)={0x0, 0x6701, 0x1000}, 0x0, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79ad, 0x3180, 0x8000, 0xa5}, &(0x7f0000000180), &(0x7f0000000040)) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000190a0102"], 0x14}}, 0x0) 2m51.987783737s ago: executing program 4 (id=2546): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) syz_clone3(&(0x7f0000000400)={0x4000000, &(0x7f0000000080), &(0x7f0000000180), &(0x7f0000000280)=0x0, {0x17}, &(0x7f00000002c0)=""/17, 0x11, &(0x7f0000000300)=""/169, &(0x7f00000003c0)=[r0], 0x1}, 0x58) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='fd/3\x00') r3 = epoll_create1(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000380)='signal_generate\x00'}, 0x18) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r8 = dup(r7) write$P9_RLERRORu(r8, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r8, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe935"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r8]) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000c40)={0x8000203d}) epoll_wait(r3, &(0x7f0000000000)=[{}], 0x1, 0x0) perf_event_open(&(0x7f0000000800)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={0x0, 0x8}, 0x1002c, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x9) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200), 0x60200, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2m51.82899647s ago: executing program 4 (id=2552): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48641, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x8000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno', @ANYRESHEX]) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='setgroups\x00') close_range(r3, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xb, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00'}, 0x10) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0xa}, @ringbuf_query, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000300)='syzkaller\x00', 0x7, 0x72, &(0x7f0000000540)=""/114, 0x41000, 0x15, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0xffffffffffffffff], 0x0, 0x10, 0x2, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00'}, 0x18) r9 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r10 = dup(r9) ioctl$PTP_EXTTS_REQUEST2(r10, 0x43403d05, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1a, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000005000000000000000800000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000186200000f000000000000006c160000180000000100008000000000090000000978c0ff0100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000000000000000000ef54030001000000bf91000000000000b702000002ffef008500000084000000b7000000000000009500000000000000eeec04e1cb57a983c6bc3ed063910289cf0e982a20742c5d6d8f4d71e40461da29ce4546b75a727a0f841f7c5a0aaffc12264a5dd7a4d7f5e9ca06390a4bc5a2dbae67a98d09f03af21261a135cdfd0cedfdb833b632efe329ce1ad669f6"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x59, &(0x7f00000001c0)=""/89, 0x41100, 0x38, '\x00', 0x0, @cgroup_sysctl, r3, 0x8, &(0x7f0000000280)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x8, 0x0, 0xe}, 0x10, 0x0, r5, 0x8, &(0x7f0000000780)=[r6, r7, 0xffffffffffffffff, r8, r10], &(0x7f00000007c0)=[{0x4, 0x5, 0xa, 0x7}, {0x3, 0x5, 0x6, 0xa}, {0x2, 0x5, 0x8, 0x8}, {0x3, 0x1, 0x3, 0x5}, {0x4, 0x5, 0xf, 0xb}, {0x2, 0x2, 0x1, 0x3}, {0x2, 0x2, 0x5, 0x8}, {0x3, 0x7, 0x5, 0x9}], 0x10, 0x8, @void, @value}, 0x94) r11 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r11, 0x0, 0x29, 0x0, 0x18) setsockopt$IP_VS_SO_SET_FLUSH(r11, 0x0, 0x485, 0x0, 0x0) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002304e800000000000000ea850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='netlink_extack\x00', r12}, 0x10) r13 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r13, &(0x7f000000a280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f000000a2c0)=@newtaction={0x14, 0x14, 0x301, 0x70bd2c, 0x0, {0x2}}, 0x14}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000240)={'syzkaller1\x00', @link_local}) 2m51.416787916s ago: executing program 4 (id=2555): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x0, &(0x7f0000000040)}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x80082102, 0x0) (async, rerun: 64) r1 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000240)={[{@grpquota}, {@auto_da_alloc}, {@minixdf}]}, 0x1, 0x50c, &(0x7f0000000ac0)="$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") (rerun: 64) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x3f, 0x2, 0x4, 0xfc, 0x0, 0x8, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000400), 0x1}, 0x102612, 0xfffffffffffffffe, 0x200, 0x7, 0x8, 0x2, 0xb, 0x0, 0xfffffffd, 0x0, 0x6}, 0x0, 0x2, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x12) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x10040, 0x0) (async, rerun: 32) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) (async, rerun: 32) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x108) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00'}, 0x10) (async, rerun: 64) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYRES8=r1], &(0x7f0000000500)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, 0x1b, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (rerun: 64) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000040)={r3}, 0x8) close(r4) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async, rerun: 64) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000a00)={r4, r3, 0x0, r4}, 0x10) read$qrtrtun(r4, &(0x7f0000001000)=""/4096, 0x1000) (async) r5 = socket$inet6(0xa, 0x5, 0x0) (async, rerun: 64) r6 = socket$caif_stream(0x25, 0x1, 0x2) (rerun: 64) setsockopt$CAIFSO_REQ_PARAM(r6, 0x116, 0x80, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x100008}, @in={0x2, 0x4e22, @rand_addr=0x640100fe}], 0x2c) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x250342) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue0\x00'}) (async) r8 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$CAN_RAW_ERR_FILTER(r8, 0x65, 0x2, 0x0, 0x0) (async) r9 = socket(0x2b, 0x80801, 0x1) setsockopt$inet6_tcp_int(r9, 0x6, 0x2c, &(0x7f00000000c0)=0x40004185, 0x4) (async) write$sndseq(r7, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) (async) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r7, 0x4040534e, &(0x7f0000000180)={0x1d7, @time={0x65757900}}) (async) r10 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)="170000007a006bcd9e3fe3dc6e08170007000054250000", 0x17}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 2m50.402308533s ago: executing program 4 (id=2568): r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xaf, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000100)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3, 0x301, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000090}, 0x40) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x74, r3, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private2}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x4008004) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) inotify_init1(0x80000) 2m39.749941002s ago: executing program 4 (id=2702): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x1, 0x101000) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000200)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r6, 0xffffffffffffffff}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000911416cb7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r8}, 0x10) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = dup(r9) fsetxattr$security_selinux(r10, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x20, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4}, &(0x7f0000000400), &(0x7f00000004c0)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r11 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xf7ffffff, {0x0, 0x0, 0x0, r12, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000bc0)=@newtfilter={0x40, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r12, {0x0, 0x6}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}]}}]}, 0x40}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000240)={0x0, 0xffac, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007"], 0x28}}, 0x0) 2m39.749657512s ago: executing program 33 (id=2702): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x1, 0x101000) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000200)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r6, 0xffffffffffffffff}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000911416cb7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r8}, 0x10) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = dup(r9) fsetxattr$security_selinux(r10, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x20, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4}, &(0x7f0000000400), &(0x7f00000004c0)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r11 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xf7ffffff, {0x0, 0x0, 0x0, r12, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000bc0)=@newtfilter={0x40, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r12, {0x0, 0x6}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}]}}]}, 0x40}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000240)={0x0, 0xffac, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007"], 0x28}}, 0x0) 2m29.82212618s ago: executing program 2 (id=2853): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1a, 0x4, 0x7fe4, 0x1, 0x20001, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1ffc, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x46e977c23f20bf49, &(0x7f00000003c0)=@framed={{}, [@ldst={0x0, 0x1, 0x5, 0x6, 0x3, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @cb_func={0x18, 0x1b, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000009c0)='kfree\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x2}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) pread64(r3, &(0x7f0000001840)=""/4096, 0x1000, 0x1) 2m29.762437041s ago: executing program 2 (id=2854): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x5}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x9, 0x2}}, {0x8, 0x1b, [0x0, 0x5]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="0e43aaf119fdb3627b3d9eae0026f7b8d546300327dce2fe5e3ce83cf4c2c62f054ceedd35576a6a2be5ed1829c3d65c055089c2e99aa7e7141a488ba0b99554061fa8d5be4d4afdc10aeb36c8cd3bbff2d4dc61f11daa2faa62c9b4b0ae9f88eeac8aacc6845a2771320e164bf7a2e875a10882cd8e5bbbe90ec835feaf1d9f4b3524d58c40f2c716bc6abfb3130903b8b19fe0cdc5307c8ff28d30b94f2315246c8aa516de48a4de99c96723b33beef65c1979f4c4192115d6d3064a9821d06318d7ee0b5a7c319be314c24aa67c9d450cc3b56566e8b4489523cb66c2ca5d151bf6ea38dd", @ANYRESDEC=0x0, @ANYRES64, @ANYRES64=r0], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000800)="b0fef28adda62f55a0000000000000001abe0a88f67472c3cd975c9884ae01084df2b71b56e2a043b74efe85a30267fae395e8a051934cefd1a1f19f89180ab1fe20a7e4088d8a3f4304feafe592c403cb5d1991683fcbda9a1404998bc92cb289462231", 0x64}, {&(0x7f0000000f00)}], 0x3}, 0x0) recvmsg(r2, 0x0, 0x0) signalfd(r2, &(0x7f0000000100)={[0xffff]}, 0x8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) close(r2) syz_io_uring_setup(0x5c0, &(0x7f0000000540)={0x0, 0x286f, 0x800, 0x8000002, 0x55}, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3000010, &(0x7f0000000000)={[{@errors_remount}, {@nobh}]}, 0x1, 0x513, &(0x7f0000000380)="$eJzs3d9rY1kdAPDvvW1mOzNdk1WRdcF1cVc6i07Sbt3dIqLriz4tqOv7WNu0lCZNadJ1Whbt4H8ggoJPPvki+AcIwzz4B8jAgL6ID6KiiM7og6DOlSQ3TidN2rrTNp3m84HTnHPvzf2ec0NO7o/TewMYWy9FxFsRMRERr0ZEMZ+e5in2uqm93IP77y21UxJZ9s5fk0jyab11tcuTEXE1f9tURHztyxHfTA7Gbe7sri/WatWtvFxp1TcrzZ3d62v1xdXqanVjfn7ujYU3F15fmM1yT9TOUi/zky99/vanv/W7G3++9u12tT73kShEXztOUrfphc626Glvo63TCDYCE3l7CqOuCAAAx9Lex/9gRHyis/9fjInO3lyfiVHUDAAAADgp2Rem499JRAYAAABcWGlETEeSlvOxANORppfycwMfjitprdFsfWqlsb2x3J4XUYpCurJWq87mY4VLUUja5bl8jG2v/FpfeT4inouI7xcvd8rlpUZtecTnPgAAAGBcXO07/v9HMe3kjzbg/wQAAACA86s0tAAAAABcFA75AQAA4OLrP/6/PaJ6AAAAAKfiK2+/3U5Z7/nXy+/ubK833r2+XG2ul+vbS+WlxtZmebXRWO3cs69+1PpqjcbmZ2Jj+2alVW22Ks2d3Rv1xvZG68baY4/ABgAAAM7Qcx+/8+skIvY+e7mTIr8PIMBj/jDqCgAnaWLUFQBGxl28YXwVRl0BYOSSI+YbvAMAAE+/mY8evP7fe/6/cwNwsRnrAwDjx/V/GF8FIwBhrKUR8YFu9plhywy9/v/L40bJsoi7xf1TnF8EAICzNd1JSVrOjwOmI03L5YhnI9JSFJKVtVp1Nj8++FWx8Ey7PNd5Z3LkmGEAAAAAAAAAAAAAAAAAAAAAAAAAoCvLksgAAACACy0i/VPSuZt/xEzxlen+8wOXkn8W44954Ufv/ODmYqu1Ndee/rfOs7wuRUTrh/n014Y+PgwAAAA4acne0Fnd4/T8de5MawUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAGHhw/72lXjrLuH/5YkSUBsWfjKnO61QUIuLK35OY3Pe+JCImTiD+3q2IeH5Q/CQeZllWymvRHz+NiMunHL/U2TTD4189gfgwzu60+5+3Bn3/0nip8zr4+zeZpyc1vP9L88jPd/q5Qf3fswfWVh8Y44V7P6sMjX8r4oXJwf1Pr/9NhsR/+cDa/pVl2cEY3/j67u6w+NmPI2YG/v4kj8WqtOqblebO7vW1+uJqdbW6MT8/98bCmwuvL8xWVtZq1fzvwBjf+9jPHx7W/isD4v/2N93+97D2vzJspX3+c+/m/Q91s4VB8a+9PPD3dyqGxE/z375P5vn2/Jlefq+b3+/Fn9598bD2Lw/Z/kd9/teO2f5Xv/rd3x9zUQDgDDR3dtcXa7Xq1iGZqWMs8zRmfjF1Lqrxf2ay73Q/ufNSn/ebae+tPprSa9U5qNi+THZmsSbinDT5f5mRdksAAMApeLTTP+qaAAAAAAAAAAAAAAAAAAAAwPg6i9uJ9cfcG01TAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAO9d8AAAD//ysA4A0=") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x20000, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) syz_mount_image$ext4(&(0x7f0000000500)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x1848000, &(0x7f0000000980)={[{@minixdf}, {@journal_async_commit}, {@nolazytime}, {}]}, 0x1, 0x792, &(0x7f00000009c0)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) pipe2$watch_queue(&(0x7f00000001c0), 0x80) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x2b8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4048010) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc4042, 0x1d7) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000007, 0x2172, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='mmap_lock_acquire_returned\x00', r5}, 0x10) munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) 2m29.353866167s ago: executing program 2 (id=2860): r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x5f, 0xffffffffffffffff, {0x29}}, './file0\x00'}) 2m29.224154149s ago: executing program 2 (id=2864): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfeee) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x2}, 0x18) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x800000, &(0x7f0000000700)=ANY=[@ANYRES8=0x0, @ANYRESOCT, @ANYRESOCT, @ANYRES8=r1, @ANYBLOB="b7ad7cd65c46a5be7840094fc88ed3944440d445ac89758d3aa4a6c77ea3e1e50196a99f88ba68f3377383de4de11c07aa5d22d9f4f3c58344d6011b6ea5ee82cf40e4ca5976370cb73c872e576f936791a0ffa5639ac237214be5926acea5405e00f1a144cf7a5240bc1e56ed617e19d6a5a268505f0012b4baf36d3a71eb34c8b67281dbba4b20c3d724ef150deff6f7d908bc72575a1f43b608e0d118", @ANYRES8=r5, @ANYRES8=0x0, @ANYRESDEC=r0, @ANYRES32=r5, @ANYRES8=r4], 0x3, 0x7dc, &(0x7f0000001580)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000900b4205acbe33d9b712f5ebc83f44c000000000000080000009500000000000000"], 0x0, 0x4, 0x0, 0x0, 0x41100, 0x57, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x5, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r3, 0x0, 0x9}, 0x18) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup(r6) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r8, 0x29, 0x13, 0x0, &(0x7f0000000380)) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x4, 0x0, 0x14) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) quotactl_fd$Q_GETQUOTA(0xffffffffffffffff, 0xffffffff80000702, 0x0, &(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000008000000000000005000100070000000900020073797a30000000001400078008001240000000000500150004000000050005000000000005000400000000000d000300686173683a6d6163"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) r10 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r10, 0x13) ptrace(0x4206, r10) ptrace$setopts(0x4202, r10, 0xe96, 0x455b843fbdb64c65) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007"], 0x28}, 0x1, 0x0, 0x0, 0x4884}, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) 2m29.149204861s ago: executing program 2 (id=2867): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x400c84, &(0x7f0000000340), 0x1, 0x786, &(0x7f0000001900)="$eJzs3c9rHGUfAPDvbJKmTfu+yQsvaL0YEDRQmpgaWwWFigcRLBT0bLtstqFmky3ZTWlCQIsIXgQVD4JeevLgj3rz6o+r/hcexFI1LVY8SGQ2s+2m2U03abIbzecDk32emdl8n+/Or2d3hpkA9qzh9E8u4nBEvJtEDGbjk4joq5V6I06uzndreamQDkmsrLz8a1Kb5+byUiEa3pM6mFUejIhv34o4klsft7KwOJ0vlYpzWX2sOnNhrLKwePT8TH6qOFWcPT4+MXHsxJMnjm9frr//sHjo2nsvPPbFyT/ffODqO98lcTIOZdMa89iyZ9dWh2M4+0z60o9wjefvO9juknS7AWxJumn2rG7lcTgGo6dWAgD+zV6PiBUAYI9JHP8BYI+p/w5wc3mpUB+6+4tEZ11/LiL2r+ZfP7+5OqU3O2e3v3YedOBmsubMSBIRQ9sQfzgiPv7q1c/SIbbrPCRAG964HBFnh4bX7/+TddcsbNbjG0zbl70O3zU+je8MNHTG12n/56lm/b/c7f5PNOn/9DfZdrei2fa/ZsSBbQiygeufRDzTcG3brYb8M0M9We0/tT5fX3LufKmY7tv+GxEj0def1sc3iDFy468braY19v9+e/+1T9P46eudOXI/9/avfc9kvpq/n5wbXb8c8VBvs/yT28s/adH/Pd1mjBeffvujVtPS/NN868P6/CO7OmlnrFyJeLTp8r9zRVuy4fWJY7XVYay+UjTx5Y8fDrSK37j80yGNX/8u0Anp8h/YOP+hpPF6zcrmY3x/ZfCbVtPunX/z9X9f8kqtXO9HXMpXq3PjEfuSl9aPP3bnvZfyD2el1fnT/Eceab79b7T+p98Jz7aZf++1Xz7fev47K81/clPLf/OFq7eme1rFb2/5T9RKI9mYdvZ/7Tbwfj47AAAAAAAAAAAAAAAAAAAAAAAAAGhXLiIORZIbvV3O5UZHV5/h/f8YyJXKleqRc+X52cmoPSt7KPpy9VtdDjbcD3U8ux9+vX7srvoTEfG/iPig/0BSv4/iZJdzBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIC6gy2e/5/6qb/brQMAdsz+bjcAAOg4x38A2Hsc/wFg72nv+N+z4+0AADrH938A2Hsc/wEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANhhp0+dSoeVP5aXCml98uLC/HT54tHJYmV6dGa+MFooz10YnSqXp0rF0UJ55l7/r1QuX5iI2flLY9VipTpWWVg8M1Oen62eOT+TnyqeKfZ1JCsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2JzKwuJ0vlQqzilsobCyO5rR/UJPtjrtlvZ0tJDsjmZsc6HLOyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf4i/AwAA//+3ACFj") creat(0x0, 0xd931d3864d39dd70) 2m28.785850796s ago: executing program 2 (id=2872): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48641, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x8000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno', @ANYRESHEX]) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='setgroups\x00') close_range(r3, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xb, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00'}, 0x10) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_idx={0x18, 0xa}, @ringbuf_query, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000300)='syzkaller\x00', 0x7, 0x72, &(0x7f0000000540)=""/114, 0x41000, 0x15, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0xffffffffffffffff], 0x0, 0x10, 0x2, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00'}, 0x18) r9 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r10 = dup(r9) ioctl$PTP_EXTTS_REQUEST2(r10, 0x43403d05, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1a, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000005000000000000000800000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000186200000f000000000000006c160000180000000100008000000000090000000978c0ff0100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000000000000000000ef54030001000000bf91000000000000b702000002ffef008500000084000000b7000000000000009500000000000000eeec04e1cb57a983c6bc3ed063910289cf0e982a20742c5d6d8f4d71e40461da29ce4546b75a727a0f841f7c5a0aaffc12264a5dd7a4d7f5e9ca06390a4bc5a2dbae67a98d09f03af21261a135cdfd0cedfdb833b632efe329ce1ad669f6"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x59, &(0x7f00000001c0)=""/89, 0x41100, 0x38, '\x00', 0x0, @cgroup_sysctl, r3, 0x8, &(0x7f0000000280)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x8, 0x0, 0xe}, 0x10, 0x0, r5, 0x8, &(0x7f0000000780)=[r6, r7, 0xffffffffffffffff, r8, r10], &(0x7f00000007c0)=[{0x4, 0x5, 0xa, 0x7}, {0x3, 0x5, 0x6, 0xa}, {0x2, 0x5, 0x8, 0x8}, {0x3, 0x1, 0x3, 0x5}, {0x4, 0x5, 0xf, 0xb}, {0x2, 0x2, 0x1, 0x3}, {0x2, 0x2, 0x5, 0x8}, {0x3, 0x7, 0x5, 0x9}], 0x10, 0x8, @void, @value}, 0x94) r11 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r11, 0x0, 0x29, 0x0, 0x18) setsockopt$IP_VS_SO_SET_FLUSH(r11, 0x0, 0x485, 0x0, 0x0) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002304e800000000000000ea850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='netlink_extack\x00', r12}, 0x10) r13 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r13, &(0x7f000000a280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f000000a2c0)=@newtaction={0x14, 0x14, 0x301, 0x70bd2c, 0x0, {0x2}}, 0x14}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000240)={'syzkaller1\x00', @link_local}) 2m28.785621566s ago: executing program 34 (id=2872): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48641, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x8000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno', @ANYRESHEX]) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='setgroups\x00') close_range(r3, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xb, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00'}, 0x10) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_idx={0x18, 0xa}, @ringbuf_query, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000300)='syzkaller\x00', 0x7, 0x72, &(0x7f0000000540)=""/114, 0x41000, 0x15, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0xffffffffffffffff], 0x0, 0x10, 0x2, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00'}, 0x18) r9 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r10 = dup(r9) ioctl$PTP_EXTTS_REQUEST2(r10, 0x43403d05, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1a, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000005000000000000000800000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000186200000f000000000000006c160000180000000100008000000000090000000978c0ff0100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000000000000000000ef54030001000000bf91000000000000b702000002ffef008500000084000000b7000000000000009500000000000000eeec04e1cb57a983c6bc3ed063910289cf0e982a20742c5d6d8f4d71e40461da29ce4546b75a727a0f841f7c5a0aaffc12264a5dd7a4d7f5e9ca06390a4bc5a2dbae67a98d09f03af21261a135cdfd0cedfdb833b632efe329ce1ad669f6"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x59, &(0x7f00000001c0)=""/89, 0x41100, 0x38, '\x00', 0x0, @cgroup_sysctl, r3, 0x8, &(0x7f0000000280)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x8, 0x0, 0xe}, 0x10, 0x0, r5, 0x8, &(0x7f0000000780)=[r6, r7, 0xffffffffffffffff, r8, r10], &(0x7f00000007c0)=[{0x4, 0x5, 0xa, 0x7}, {0x3, 0x5, 0x6, 0xa}, {0x2, 0x5, 0x8, 0x8}, {0x3, 0x1, 0x3, 0x5}, {0x4, 0x5, 0xf, 0xb}, {0x2, 0x2, 0x1, 0x3}, {0x2, 0x2, 0x5, 0x8}, {0x3, 0x7, 0x5, 0x9}], 0x10, 0x8, @void, @value}, 0x94) r11 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r11, 0x0, 0x29, 0x0, 0x18) setsockopt$IP_VS_SO_SET_FLUSH(r11, 0x0, 0x485, 0x0, 0x0) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002304e800000000000000ea850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='netlink_extack\x00', r12}, 0x10) r13 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r13, &(0x7f000000a280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f000000a2c0)=@newtaction={0x14, 0x14, 0x301, 0x70bd2c, 0x0, {0x2}}, 0x14}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000240)={'syzkaller1\x00', @link_local}) 2m1.4994102s ago: executing program 1 (id=3274): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) nanosleep(&(0x7f0000000040), 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) pipe2$9p(&(0x7f0000000240), 0x0) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002a20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffd}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r2, 0x0, 0x9}, 0x78) mlockall(0x2) unshare(0x22020600) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') lseek(r3, 0x10001, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000005c0)='kfree\x00', r4, 0x0, 0x6b}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0700000000000000000005000000180001801400020073797a5f74756e0000000000000000000800038004000380080005"], 0x3c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) rt_sigtimedwait(&(0x7f0000000200)={[0x1]}, &(0x7f0000000300), &(0x7f0000000380), 0x8) 2m1.367084822s ago: executing program 1 (id=3277): r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xc00) sendmsg$nl_route_sched(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000003800)=@newtaction={0x88c, 0x30, 0x12f, 0x70bd2c, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0xfffffffd, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x7, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x80000001}}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xb, 0x0, 0x4, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffff35, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffd, 0x0, 0x8000040, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x1]}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x0, 0x5, 0x0, 0x2, 0xb, 0xfffffffb, 0x0, 0x7, 0xfea7, 0x1, 0xffff8000, 0x90, 0x9f9, 0x2, 0xb8, 0xca2, 0x6, 0x3c, 0x7, 0x1, 0xa89c, 0x1, 0xc, 0x492217a0, 0xff, 0x5, 0x3, 0x1ff, 0xe5, 0x2f, 0xe, 0x3, 0xa, 0x3, 0x1, 0x9, 0x11, 0x188, 0x6, 0x3ff, 0x7, 0xd, 0x3, 0xc0000, 0x8, 0x8, 0xffffff40, 0x100, 0x3, 0x5, 0x7, 0xe0b2, 0xfffffffe, 0x8fc, 0x84, 0x9, 0x3, 0x9, 0x80000001, 0x6, 0x0, 0x8, 0x800, 0x9, 0x1, 0x100, 0x401, 0x8, 0x3, 0xb5, 0x10001, 0x4, 0x1, 0x7f, 0xfffffffc, 0x8, 0x2, 0x7f, 0x0, 0x2, 0x4, 0x0, 0x4, 0x8000, 0x0, 0x9, 0x80, 0x7, 0x5, 0x1, 0x0, 0x7, 0xeb22, 0xd, 0x8000, 0xfffffff7, 0x0, 0x4, 0x3ff, 0x400000, 0x10, 0x5, 0x3, 0x10000, 0x5, 0x1, 0x0, 0x2, 0x7, 0x5, 0x6, 0x5, 0x4, 0x2, 0x81, 0x0, 0x10, 0x6, 0x7fff, 0x800, 0xfffffff4, 0x10000, 0x5, 0x8, 0xba, 0x3, 0x89, 0x2, 0x6, 0x100, 0x9, 0xffffa3e0, 0x86b9, 0xff, 0x1, 0x2, 0xf, 0x24b9, 0x3a, 0xe01, 0x1, 0x6430, 0xd, 0x8, 0x0, 0x3, 0x2, 0x3, 0x0, 0x200, 0xfffffeff, 0x9, 0xff, 0xa, 0x6, 0x7, 0x100, 0x1, 0x8001, 0x100, 0xb, 0x8, 0x101, 0x6, 0x2, 0xfffffc00, 0x81, 0x81, 0x200, 0x80000001, 0x1, 0x1, 0x9, 0x7, 0x4, 0xb, 0x80, 0x0, 0x0, 0x0, 0x5, 0x2, 0x65, 0x4, 0xfffffa0c, 0x3, 0x3, 0x4, 0x4, 0x35bc0, 0x9, 0xfffffffa, 0x7, 0x5, 0x3, 0x0, 0x6, 0x8, 0x28, 0x2, 0x5, 0x10001, 0x2, 0xf, 0x0, 0x1, 0x723, 0x0, 0xe, 0x9, 0x4, 0x6, 0x7, 0x1, 0x8, 0x7, 0x3, 0x8, 0x57, 0xfffffffb, 0x2, 0x7f, 0x2, 0x80000001, 0x0, 0x9, 0xf, 0xfffffffe, 0x928, 0x4, 0xfffffffd, 0x5, 0x6042, 0xb87, 0x6, 0x8d8d, 0x6, 0x101, 0x2, 0x64e8, 0x8, 0x82f, 0x2, 0x80a, 0xfff, 0x6, 0x3f7, 0x4, 0x8, 0x8, 0x1, 0x5d, 0x9, 0xd, 0x80]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x88c}}, 0x0) 2m1.226751404s ago: executing program 1 (id=3280): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000400000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000080)={0x0, 0x3000040, 0x8, 0x1b, 0xfe, &(0x7f00000000c0)="387ed7626d850509a2d6c1aa38f15cd00f85c263cb226db671261fff7ce9c555f189afae3530db6dd493f28fd988721b9ae21b3e3b4523ae2594f47d8f62b480c4160b1f90ac9c41fae6ab12ac4c113fef588684ef495689092883b902a41cd75387ef6f7bc7d460d5e665f398ff95596dc94ec97003a3db08e500c2fb07e11aa4031a61c51caf7a65a2b613bda33f3eaeae635d7cd81761e74c38a7695800a15516eb337056e02335f9a7d10aa2eaf7beb7e1f7a1e850ecb3421143c5c4ded0f083a0c524dcf320827266819b6a952db5bc96141b26c54db857edbcbbc81c7af7aadf50bc549974b6401a19cdb130282b955592efa94242065a4c8d695a2cdd9ada350defd58c775b92d348305774d3a256c7520b285d8da0dbf5e20d604413ed2ddf9bcbf881caf811852806175d63892a15234fbcd7a88a2a0aea45d19148f0e7dada7d6d0d77881387fdeaa02863be90b88dfff412bff40c31c6415c54ae3335e54a49d315851feffe30d999c36def4df7df747695ef060000001bbe1b649f42f310859122c0d2c1e558dc6586958a28374f386ecf369274e43003a09b5159ea515eb44521901ef0d00baa91c10a8e44a76aac3468a15bd3d45ad389977467f306f9bcde071b30769795eed2f1580414d168f557cd90040c4bd2a3d6bc509254a12cece59181fcb5bad8c24bd9f8f78d17ab01831325501e80d899e9252f99d3a2666343392fda115048e4f4dd9f45657f8224fc78eb1168fe0527fac33466aadf48f16994d29a47778566e0f3945b2bf36b6eecc7fa18914beb66ac9e519bd3330000000000000009a3237aebbe3bed781e39d5a0fb0cdc60e196f2261305feb596b5b66ab89d2d6333f699b16db68986ab3eee7b199fefb5f79ffb2d1050e46982af1c14a88dd9b647ba812f56a8404755c73e74bb90e64bab9647c70ed5afca1c3d87907d14df8aa9df6f40a80ace2bb8a2aad3b0c66915927db4173181943d88c0c76d5969e2043db5bd77fd60ba0f012139929ccfec965c1f769785a4d23332d71f0875e3146afef5b20cc306d3ecee65944fe9829e0ad0c3f6bb2fdc1bc31152538db50f47dc38ba908a0d808687e478a609fe0daa0000000000000000e7f2e98597e27f3e1dba9c3c16e9fab3bda6ed33cb1c75513e2264b69d4794ded98eff9aa53d22eb77c9d93169c04ab2490bf28106f770e07eb7a9e8fd4e71929f918b98c4cbfcb11a90139264a9ee807c973167f493760278df0cc34be9e8f86f948d9a62e63ad6ca9d174d2465380b1a00ddc42915e4f3a5db640600000095a3d63904c9ecd1c313c08e29b814bd8fed1ab6d2846c73345962895d289ac77152cac2e04c93a5470774975b42091f218dd1e68a15f8226577bf9481ae0555db64a717eb23a811356d00000000ddffffff00"}) (fail_nth: 2) 2m1.213669854s ago: executing program 1 (id=3282): r0 = socket$nl_generic(0x10, 0x3, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x101091, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x5e, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) socketpair(0x18, 0x0, 0x2, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r8, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd29, 0x4, {0x5}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8f}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0xaa8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x26}}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}]}, 0x40}}, 0x20) io_setup(0x2278, &(0x7f0000000180)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r11, 0x1, 0x14, &(0x7f0000000000)={0x0, 0xea60}, 0x10) r12 = eventfd(0x7fffffff) io_submit(r9, 0x2, &(0x7f0000000380)=[&(0x7f00000001c0)={0x0, 0x4, 0x0, 0x0, 0x0, r11, &(0x7f0000000240)="a9", 0x1, 0x0, 0x0, 0x2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x9, r10, 0x0, 0x0, 0x8, 0x0, 0x7, r12}]) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r4) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="04002dbd7000ffdbdf0c01000000140008006c6f000000000000000000000000000008001900e000dd01"], 0x30}, 0x1, 0x0, 0x0, 0x4000041}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0x3, &(0x7f00000006c0)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2m0.26300916s ago: executing program 1 (id=3297): ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, &(0x7f0000000240)={{0x3, 0x100, 0x5, 0xb7a4, 0x1, 0xffff}, 0x341, [0xc, 0x40, 0xcd6, 0x4, 0x6, 0x0, 0x3, 0x7, 0x9, 0x7a18fde9, 0x9, 0xf12, 0x4, 0x3, 0x378, 0x350bae1a, 0x4, 0x0, 0x1, 0xffff06bd, 0x0, 0xd4f, 0x7, 0xf2, 0x10, 0x5, 0x8, 0x10001, 0x401, 0x80000000, 0x2401, 0x3ca5, 0x1, 0x0, 0xff, 0x4, 0x4, 0x3, 0x0, 0x0, 0x40000000, 0x80000000, 0x7fff, 0x7, 0x3, 0xa, 0x0, 0x10000, 0x401, 0x8, 0xffff, 0x91ba, 0x7, 0x9, 0x1, 0xb6, 0x24, 0xcb, 0x5, 0x7f, 0x5, 0x311, 0x66d1, 0xfffffffd, 0xa7d6, 0xb6eb, 0xc74, 0x77, 0x1, 0xff, 0x5cb5, 0xfffffffe, 0x401, 0xedf4, 0x4, 0x1000, 0x6, 0xfffffffe, 0x8001, 0xc1, 0x1, 0x8, 0x1, 0x32, 0x98, 0x7f, 0x2, 0x401, 0x2, 0x2, 0x4680, 0x7, 0xe665, 0x3c6e, 0x3, 0x40, 0x80, 0x4b, 0x8000, 0x2, 0xb, 0x6, 0x4fa4, 0x80000002, 0x1, 0xb, 0x0, 0xfffffffa, 0x3, 0x9, 0xfd, 0x101, 0x4, 0x40, 0xa, 0x1b, 0x1ff, 0x7ff, 0x2, 0x80000000, 0xffff, 0x9, 0x0, 0x6, 0x2, 0x1, 0x3, 0xa0, 0xf, 0x1ff, 0x9, 0x7, 0x6, 0x400, 0x8, 0xff2, 0x6, 0x0, 0x6, 0x0, 0x9, 0x1, 0xf1a, 0x664, 0x4, 0x9, 0x9, 0x2, 0x4, 0xfffffffd, 0x10, 0x0, 0x9, 0x10000, 0x1, 0x9, 0xf7a, 0xc6, 0x1, 0x4, 0x6, 0xffffffff, 0x6, 0x10001, 0x8, 0x68, 0x7, 0x1, 0x5, 0x3, 0x9a3f, 0x400000, 0x0, 0x80000067, 0xffffff7e, 0x7, 0x10000000, 0x10001, 0x7, 0x3, 0x10, 0x10a, 0x2, 0x40, 0x1c, 0x80, 0xb5f8, 0x8bc, 0x3, 0x101, 0x5, 0x63, 0x4, 0x8001, 0x10, 0x1000, 0x288c, 0x1ffe, 0x73ee, 0x1, 0x5, 0x9, 0x7fffffff, 0x73, 0x7, 0x8, 0x6, 0x400, 0x40, 0x0, 0x0, 0x0, 0x546c, 0x981, 0x5aa, 0x7fff, 0x7, 0x4, 0x8, 0x6688, 0x45e3, 0x5, 0x7, 0x1, 0x5, 0x3, 0x0, 0x1, 0x2, 0xffffffff, 0x4, 0xce, 0xf, 0x0, 0x1, 0x667, 0x3, 0x0, 0x9, 0x9, 0x37d, 0x10001, 0xc, 0x1, 0x1, 0x2, 0x6, 0x4, 0x6, 0x1, 0x9, 0x6, 0xfffffffa, 0x2, 0x0, 0x9, 0x5, 0x2, 0x7, 0x3, 0xffffff1b, 0x9, 0x2, 0xd, 0x34ea, 0x10000, 0x0, 0x80000001, 0x8, 0x8000, 0x3a, 0x10, 0x8, 0x9, 0x5, 0x1, 0x6, 0x10001, 0x0, 0x4, 0x10000, 0x4, 0xffff, 0xe, 0x89, 0x2, 0x7, 0x1, 0x73, 0x3, 0x9, 0x4, 0x1, 0x9, 0x0, 0x8, 0x0, 0x2, 0x80000004, 0x29, 0x9, 0x0, 0x4, 0x4, 0x0, 0x1, 0x4, 0x5, 0x4, 0x10001, 0xf, 0x9, 0x100, 0x4, 0x59b, 0x7, 0x8, 0x9, 0x3, 0x2, 0x4, 0xbf, 0x0, 0x8, 0x40, 0xd3, 0x7, 0x1, 0x89aa, 0x8, 0x0, 0xf0ce, 0x4, 0x1, 0x0, 0x2, 0xc6, 0x1000, 0x1, 0x937, 0xa, 0x6, 0x3, 0xffffffff, 0x5, 0x9, 0x5, 0xffffffff, 0xbe, 0x1, 0x7, 0x0, 0xffffffff, 0x0, 0x3d6, 0x0, 0xc, 0x6, 0x7, 0xfffffeff, 0x4, 0x2, 0x7fff, 0x101, 0x7, 0x6, 0x706, 0x2, 0x49, 0x10, 0xfffffff7, 0xfffff772, 0x6, 0x80000000, 0x5, 0x1, 0xa9c, 0x9, 0x9, 0x1, 0x2, 0x5, 0x1000, 0x5, 0x1ff, 0x9, 0x3, 0x3, 0x10001, 0xffff0000, 0xf, 0x1, 0xffffa5ba, 0xffffa9b4, 0x1, 0x4, 0x5, 0x3, 0x4b5f, 0x6, 0xa, 0xffffffff, 0x1, 0x80000000, 0xb, 0x0, 0xc8f, 0x1, 0x7, 0x8, 0x1, 0x10000, 0x57dc, 0x818a, 0x10, 0x8, 0x10, 0xfffffffc, 0xfffff001, 0xa, 0x5, 0x5, 0x4, 0xfff, 0x9, 0x10, 0xfffffffd, 0x4, 0xc2, 0x400, 0x4, 0x2, 0x80000000, 0xd, 0x3, 0x1, 0x0, 0x5, 0xb6, 0x101, 0x401, 0x2, 0x7, 0xc, 0x6623258, 0xf2, 0x741, 0xae6, 0x9, 0xffffa0ae, 0x9, 0x6, 0x2, 0x8, 0x9, 0x1, 0x7f, 0x9a, 0x9, 0xb, 0x800, 0x4, 0x3ff, 0x5, 0x7, 0x7, 0x8, 0xfe, 0x7f, 0x9, 0x4, 0x2, 0x20000000, 0x2, 0x8000, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x8000001, 0x0, 0xfff, 0x101, 0x4, 0x0, 0x96c6, 0xc, 0x5, 0xfff, 0x100, 0xffff, 0x1, 0x401, 0xf0, 0x0, 0xfffff53d, 0x9, 0x2, 0x6, 0x0, 0x6, 0x4b15, 0x10000, 0x1, 0x9, 0x1, 0xd, 0x9, 0x4, 0xfffffe01, 0x1, 0x6, 0x0, 0x3, 0x10001, 0x1, 0x7, 0x1, 0x5, 0x8, 0xffffc487, 0x200, 0x10001, 0x37c, 0x7, 0x6, 0x6, 0x8, 0xfffffe00, 0x1, 0x1, 0x0, 0xe, 0x0, 0x2, 0x4, 0x80000000, 0xb46d, 0x3, 0x1000, 0x1eb4bce6, 0x10, 0x8, 0x1, 0x5, 0x1, 0x5, 0x9, 0x1000, 0x7, 0x62f2f805, 0x9, 0x3, 0xffffffff, 0x9, 0x7f, 0x6, 0x8, 0x40, 0x5, 0x2, 0xa, 0x5, 0x6, 0x80000000, 0x25, 0x8, 0x7, 0x7, 0x1, 0x5, 0x9, 0x6709, 0x80000001, 0x0, 0x80, 0x8, 0x6, 0x0, 0xa95a, 0xff, 0x5, 0x2, 0x2, 0x4, 0x10000, 0x80000001, 0x5, 0x8001, 0x9, 0x0, 0xb7, 0x3, 0xff, 0x9, 0xffff, 0x80, 0xfea5, 0x7fff, 0x7, 0x7, 0x7, 0x7485, 0x9, 0x8, 0x0, 0x5, 0xf, 0x5, 0xe, 0x8, 0x1000, 0x3, 0x7, 0x382d, 0x459, 0xcad, 0x9, 0x0, 0x2, 0x9, 0x6, 0x20000a4, 0xe0, 0xfffffffb, 0x5, 0xffffffff, 0x2, 0x7, 0xa05a, 0x0, 0x0, 0x0, 0x35, 0x8, 0x1, 0x1, 0x30, 0xffffff7e, 0x1, 0x2, 0x9, 0x3, 0x7, 0x8, 0x8, 0x4000, 0x1, 0x4, 0x15294b70, 0x3, 0x3, 0x2, 0x43, 0x3, 0x9, 0x5, 0x80000000, 0x9, 0x0, 0x5, 0x81, 0x1, 0x2, 0x3fd, 0x1df, 0x6, 0x6, 0xfffffffa, 0x1a, 0x9, 0x2, 0x9, 0x1, 0x9, 0x7, 0x2c1, 0x9e95, 0x2, 0xfffffedd, 0x30c8, 0x2, 0x38a0, 0x7b, 0x0, 0x8, 0x9, 0x6, 0x9, 0x9, 0x8, 0x5, 0x8, 0x1ff, 0x7fff, 0x3, 0x2, 0x8, 0x2b, 0x200006, 0x4, 0x7, 0x2, 0xfb4, 0xbf8, 0x7, 0x405, 0x6, 0x4, 0x8001, 0x9, 0x8, 0x3, 0x6ae574d2, 0x6, 0xfffffe00, 0x1000, 0x5, 0x92, 0x3, 0x7fffffff, 0xd7, 0x8001, 0x905, 0x3, 0x6, 0xfffffb31, 0xb, 0x4, 0x7, 0x8, 0x1, 0x6, 0x1, 0xff, 0x100, 0x4, 0x3, 0x6, 0x80000000, 0x0, 0x100a, 0x7fffffff, 0x7fff, 0x2, 0xfffffff8, 0x2, 0x9af, 0x10001, 0x8, 0x4, 0x8, 0x6, 0x7742348d, 0x5, 0x5, 0x1f, 0x40, 0x0, 0x6, 0x7fffffff, 0x7, 0x7, 0x8, 0x17f, 0x6, 0x2, 0x5, 0x6, 0x1, 0xb, 0xe, 0x5, 0x1, 0xfe7, 0xfffffffc, 0x8, 0x7ff, 0x3e9, 0x0, 0x3, 0x2000, 0xd, 0x3, 0x4, 0x3, 0x81, 0x8, 0x14, 0x8, 0x9, 0x6, 0xffff, 0xf28c, 0x7, 0x6, 0x4, 0x7fffffff, 0xffff, 0x7fffffff, 0xc9, 0x2, 0x0, 0x924, 0x6, 0x100, 0x1, 0x5, 0xffff351b, 0x8, 0xfffffffb, 0x7, 0x9, 0x2, 0x5, 0x4, 0x1, 0x4, 0xff, 0xee, 0x2, 0x4, 0x8, 0x9f, 0x7, 0x3, 0x9, 0xc9, 0x1, 0x1, 0x1, 0xfffffff7, 0x0, 0x5, 0x5, 0x6, 0x400, 0x51, 0x7, 0xefb, 0xb8, 0x8, 0x5, 0xfffffff7, 0x7, 0x7, 0x5, 0x6330, 0x0, 0x6, 0xea, 0x0, 0xfff, 0x809, 0x6, 0x0, 0x6, 0xffff, 0xfffffffa, 0x3, 0x0, 0x1, 0x6, 0xfffffc00, 0x5, 0x7, 0x2ec, 0x9, 0x6, 0x3ff, 0x6, 0xfff, 0x0, 0xa7b, 0x62cc, 0xfffffff7, 0x7, 0x40, 0xa, 0x9b, 0x3, 0xe, 0x1, 0x1, 0xc, 0x40, 0x3, 0x4, 0x5, 0x5, 0x7ff, 0x5, 0x8, 0x5, 0x3, 0x9, 0x2, 0x80000001, 0x54, 0x400, 0x1, 0x8, 0xa, 0x9, 0xc0, 0x3, 0x72, 0x80, 0x1000, 0x7, 0x800, 0x6, 0xd19, 0x3, 0x93c, 0x6, 0x0, 0x0, 0xe, 0x5, 0x3, 0xfffffffa, 0xa01, 0xf3, 0xffffff00, 0x8, 0xe, 0x3, 0x3ff, 0x5, 0x2, 0x6, 0xfffffff8, 0xffff, 0xfffffff9, 0x9, 0x5, 0x62, 0x8, 0x1, 0xfffffffb, 0x1af88, 0x2, 0x9, 0x7, 0x0, 0x7, 0x8, 0x10000, 0x40, 0x8, 0x7, 0x2b, 0x6, 0x10, 0x5, 0x200, 0x7fff, 0x6, 0x3, 0x8, 0x10, 0x4, 0x6, 0x633, 0xf05, 0x0, 0x101, 0x200, 0x7, 0x7ff, 0x0, 0x1, 0x1, 0x10000, 0x9, 0x40, 0x9, 0x0, 0x7f, 0x8, 0x6, 0xe, 0x3, 0x80000001, 0x0, 0x8, 0x8, 0x7, 0xdd, 0x8, 0x89, 0x0, 0x100, 0x1, 0x9, 0xe75, 0x400, 0x1, 0x0, 0x200, 0xe9ab, 0xfffffff8, 0x8000, 0x13, 0x2, 0x2, 0x43, 0x3ff, 0x0, 0x7, 0x9, 0x1, 0x6, 0x7, 0xa, 0xf, 0xf39d, 0x71, 0xfff, 0x5, 0x8]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) flock(0xffffffffffffffff, 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000300000000000100000a20000000000a01040000000000000000010080030900010073797a30000000002c000000030a01010000000000000000010000000900010073797a30000000000900030073797a310000000070000000060a010400000000000000000100000008000b400000000048000480440001800b000100657874686472000034000280080001400000000c080003400000000008000440000000220500020007000000080006400000000308000540000000000900010073797a300000000020000000030a010300000000000000000a0000020900030073797a300000000044010000080a01080000000000000000010000073a00074032e97608c07b8f34d704cc507d07a8d4c429672a9b6841e516ce194f03354b3c46a930469ce36ee8391a02352a70d543c633dc17a9d300007900074012119f33dbd27dbba871f33b8206fc0a59dac6df96baf86f3deffa20b8a2b13fa2fbc917a33ad4b9dc903553ff1e7533cd9d1e3f6a3248b10a63552977fab38d9ad7409cbd223b094a0bb6f0884c8839890d122f9b9963668c97749b2304852a8d461ccc39dc307f41ac41688a4f2d64a916dc532d00000008000a40000000000900010073797a30000000000900020073797a31000000002c00058008000140000086dd080001400000002c080001400000001608000140000000736afd014000008100080009"], 0x248}}, 0x0) 1m54.068223868s ago: executing program 1 (id=3390): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) sendto$inet6(r0, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0x2, 0x4e24, 0x0, @local}, 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r3, 0xc0105500, &(0x7f0000000040)={0x0, 0x3, 0x1, 0x3, 0x0, 0x7, 0x0}) (fail_nth: 10) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x1c, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4000004, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x8e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0xe, 0x4}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000400)=[r1, r1, r1, r1], &(0x7f0000000680)=[{0x4, 0x5, 0x10, 0x2}, {0x1, 0x1, 0xe, 0x1}, {0x2, 0x4, 0xb, 0x4}, {0x0, 0x1, 0x1, 0x2}, {0x4, 0x2, 0x9}], 0x10, 0x10001, @void, @value}, 0x94) 1m53.867946971s ago: executing program 35 (id=3390): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) sendto$inet6(r0, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0x2, 0x4e24, 0x0, @local}, 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r3, 0xc0105500, &(0x7f0000000040)={0x0, 0x3, 0x1, 0x3, 0x0, 0x7, 0x0}) (fail_nth: 10) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x1c, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4000004, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x8e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0xe, 0x4}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000400)=[r1, r1, r1, r1], &(0x7f0000000680)=[{0x4, 0x5, 0x10, 0x2}, {0x1, 0x1, 0xe, 0x1}, {0x2, 0x4, 0xb, 0x4}, {0x0, 0x1, 0x1, 0x2}, {0x4, 0x2, 0x9}], 0x10, 0x10001, @void, @value}, 0x94) 2.829662905s ago: executing program 6 (id=5328): socket$kcm(0x10, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$rds(0x15, 0x5, 0x0) bind$rds(r5, 0x0, 0x0) sendmsg$rds(r5, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x4, @local}, 0x10, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r3}, &(0x7f0000001c00), &(0x7f0000001c40)=r4}, 0x20) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bc0000/0x400000)=nil, 0x400000, 0x9) 2.612322708s ago: executing program 8 (id=5331): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x800, 0xffe1, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r2 = syz_clone(0x84000400, &(0x7f0000000540)="41290d91327abf07c056a310c31911e325ba307df2382e6b13a7a12987b16cf461cf64342ce06d284c2e0ed10eaa934e81afb6321ae23a058a5a9dd9863cea1caf66fe8c4d6e20", 0x47, &(0x7f0000000400), &(0x7f00000005c0), &(0x7f0000000800)="4ce2f1da966272bae5f1ba7557059967764c30545f316f8af1e6ce462b032ce070e189377b9a0dd7a49025a40ffbd2779d72a8f57ffd3de75a1c4c1291762efe7df1a34f347a04cc38a7519e84f8a22be2240975ba7f4f7ec9f86964e84fe1913c04f5649f51a39a7d6354bee108ee7bf69c251e2dca141f73c91f88f52c7955567606b1889ee03a3592d3c7e942ad000e00154f5482f615ce4364bc1e140b366f304f1251cddb47425f14a7516e1cfbd54ab6e61255be8e3056763b88d991aed1ce6dd5b908e7242d6fbdd8df") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x6, 0x2, 0xc, 0x80, 0x0, 0x9, 0x22002, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7d5, 0x2, @perf_bp={&(0x7f00000003c0), 0xe}, 0x8, 0x2, 0x39ca, 0xc, 0x5, 0x1000000, 0x1, 0x0, 0x2, 0x0, 0x71eb}, r2, 0xa, r1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r4}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f0000000680)=@newtaction={0x180, 0x30, 0x216822a75a8bdd29, 0xffe4, 0x0, {}, [{0x16c, 0x1, [@m_connmark={0x50, 0x2, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0xd, 0x5, 0x0, 0x3}, 0x8}}]}, {0xfffffdd6}, {0xc}, {0xc}}}, @m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0xd4, 0x3, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0x0, 0x3, {0x2, 0xea3, 0x7}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1d28}}, @TCA_GACT_PARMS={0x18, 0x2, {0xb66, 0xb3, 0x10000000, 0x34e, 0xffff}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7ff, 0xd8, 0x0, 0x9, 0x100000e0}}]}, {0x52, 0x6, "a06b1d1931f3579c6d7c5159238a286074602c3726c701f3c0d5382de62a6e8c4fb714fcd674c66cd306a4f78d3d05530609c9b04b7483bd084d70df8e77e6fbd503917aa0a6c737cef0ed021b60"}, {0xc}, {0x1, 0x8, {0x2, 0x2}}}}]}]}, 0x180}}, 0x0) 2.055815967s ago: executing program 7 (id=5335): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)={0x1c, r3, 0x9c3fa077fa966179, 0x3, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000054) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x80402, 0x0) write$cgroup_int(r4, 0x0, 0x2) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c000000", @ANYRES32=r0, @ANYBLOB="030300000000000000000600000008000300", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x40000004}, 0x2000c0c0) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000740)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="d9c9eb4eb09930317b86450d4728f028826666a50190ed31e95fce342dc0fabeb327bffc1aa33073a034596725ffbfe1bde58e288dc81366efa371a91cfa71b75a181dd325fbc5087819d99a61942136cef2e8b20ab9921ab25e4b2b185db00a4bedcf5d98ba35675d5b533bde7a4edc8ee65cb98637f49fd60e8a0714a8", @ANYRES16=0x0, @ANYBLOB="040026bd7000fcdbdf250f00000005002f000000000008002c00000000000500380001000000050037000000000005002f00000000000800340007000000080032000010000008002c00ff0e0000"], 0x54}}, 0x4010) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x42542, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x1, 0x7ffc0001}]}) r5 = socket$inet6(0xa, 0x80002, 0x88) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030086dd601b8b97004d88c19edace00000000000000002100000002ff02000000000000000000000000000104004e20004d13"], 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa2000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$inet6_udplite(0xa, 0x2, 0x88) ppoll(&(0x7f0000000d40)=[{r5}], 0x25, &(0x7f0000000300)={0x0, 0x3938700}, 0x0, 0x0) 2.022928508s ago: executing program 0 (id=5336): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = open(&(0x7f0000000040)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r2, r2, 0x0, 0x800000009) 1.963888779s ago: executing program 8 (id=5337): syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000000c0), 0x2, 0xbd1, &(0x7f0000002380)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) pidfd_send_signal(0xffffffffffffffff, 0x2, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file1\x00', 0x64842, 0x21) pwritev2(r2, &(0x7f0000000240)=[{&(0x7f00000002c0)="85", 0x1}], 0x1, 0x5, 0x1, 0xf) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r3) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x14, r4, 0x100, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x24000080}, 0x4040) r5 = io_uring_setup(0x6be, &(0x7f0000000240)={0x0, 0x35e8, 0x800, 0x0, 0x275}) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r5, 0x13, &(0x7f0000000380)=[0xd03a, 0x400000], 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r6 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r6, 0x0, 0x0, 0x6, 0x0) mq_timedreceive(r6, &(0x7f0000004600)=""/102381, 0xfffffceb, 0x0, 0x0) 1.960018629s ago: executing program 5 (id=5338): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0)=@chain) add_key$keyring(&(0x7f0000000080), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r2) 1.829955001s ago: executing program 6 (id=5339): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file1\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x35d, &(0x7f0000000f00)="$eJzs3c1rO0UYwPEnaZImKW1yEEVBOtiLXpY2ehaDtCAELG0jtoKwbTcasiYlG6oRse3Jq3j3JHgovVnwUND+A71404sI3noRPNiDurJvyeatLzFpfr/2+4GSycw8u7OZSXk27WYv3/3yo0rJ0kp6Q6JJJRERkSuRrEQlEPEfo245IWGH8srMnz+/uL5ZTHoVaiW/8WpOKTU3/8PHn6X8bmfTcpF9//KP3O8Xz148f/nvxodlS5UtVa01lK62a7829G3TULtlq6IptWoaumWoctUy6l77d/52zNreXlPp1d3Z9F7dsCylV5uqYjRVo6Ya9abSP9DLVaVpmppNC25SPF5b0/NDBu+MeDAYk3o9r0+JSKqnpXg8kQEBAICJ6s7/o05KP0z+vyVzhcLymnI6t/P/k5fOGzPvnM75+f9Zol/+/9ov3rY68n/ndKKd/9e884PSzfn/13KH/L83I3pchs7/s2MYDIYzn+ipinQ8c/L/tP/+dR29d7LoFsj/AQAAAAAAAAAAAAAAAAAAAAB4GlzZdsa27UzwGPy0LyHwn+NBGjT/0yKSdGbfZv4fsvXNLUm6F+45c2x+sV/cL3qPfodzETHF+Mfu5qyN4Moj5cjKj+aBH3+wX5xyW/IlKTvxsiQZybrrKRRv2ytvFZaXlMePb12mlA7H5yQjz4Tjv3dXpxOf64z395+QlxdC8Zpk5KcdqYkpu25ke/+fLyn15tuFrviU209Efrv3SQEAAAAAYMQ01dL3/F3TBrV73zKSL7kfExmyKBn5u//5/WLf8/NY5oXYpI8eAAAAAIDHwWp+WtElatTdgmn2K6RkYNMICrGOmriI9O2c6KqJX7flqdAR3nY8CfHuYPJ/j+ub4FW9S1TwjxTOwFtN/h1VZLjxBMfv1kRiw09T5FDcBXAYborKLcJj3YOfdypU384LA7dz5B9Iqyb42Cgx4HWW1d7tRK9ZCfGeGjsy3AJ47qtv/xrdG+T1U38FfHJz5yPTsA/kNpPSVXB20dsUH/svHgAAAAD3rp30BzVvhJvDNxIJ3yyHv9wDAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBCY/lKv67CpI8RAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeFL8FwAA//8GuPOT") sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000009) 1.767094722s ago: executing program 5 (id=5340): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000001340)=[{0x200000000006, 0x0, 0x0, 0x5}]}) epoll_create(0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x2, 0x0, 0x0, 0xe, 0x5, 0x2}]}, {0x0, [0x0, 0x2e, 0x2e]}}, 0x0, 0x2d, 0x0, 0x1, 0x7, 0x0, @void, @value}, 0x28) rseq(&(0x7f0000000400), 0x20, 0x0, 0x0) pselect6(0x40, &(0x7f0000000540)={0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioperm(0x453, 0x7ff, 0x6) r0 = syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x114df, 0x10, 0xffffffff, 0x320}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_LINKAT={0x27, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/../file0\x00', 0xffffffffffffffff, 0x1000, 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) io_uring_enter(r0, 0x3516, 0xaddf, 0x2, 0x0, 0x1517f) 1.589867795s ago: executing program 8 (id=5341): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x800, 0xffe1, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r2 = syz_clone(0x84000400, &(0x7f0000000540)="41290d91327abf07c056a310c31911e325ba307df2382e6b13a7a12987b16cf461cf64342ce06d284c2e0ed10eaa934e81afb6321ae23a058a5a9dd9863cea1caf66fe8c4d6e20", 0x47, &(0x7f0000000400), &(0x7f00000005c0), &(0x7f0000000800)="4ce2f1da966272bae5f1ba7557059967764c30545f316f8af1e6ce462b032ce070e189377b9a0dd7a49025a40ffbd2779d72a8f57ffd3de75a1c4c1291762efe7df1a34f347a04cc38a7519e84f8a22be2240975ba7f4f7ec9f86964e84fe1913c04f5649f51a39a7d6354bee108ee7bf69c251e2dca141f73c91f88f52c7955567606b1889ee03a3592d3c7e942ad000e00154f5482f615ce4364bc1e140b366f304f1251cddb47425f14a7516e1cfbd54ab6e61255be8e3056763b88d991aed1ce6dd5b908e7242d6fbdd8df") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x6, 0x2, 0xc, 0x80, 0x0, 0x9, 0x22002, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7d5, 0x2, @perf_bp={&(0x7f00000003c0), 0xe}, 0x8, 0x2, 0x39ca, 0xc, 0x5, 0x1000000, 0x1, 0x0, 0x2, 0x0, 0x71eb}, r2, 0xa, r1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r4}, 0x10) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="050000009f6000"/16, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000003"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x8800) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f0000000680)=@newtaction={0x180, 0x30, 0x216822a75a8bdd29, 0xffe4, 0x0, {}, [{0x16c, 0x1, [@m_connmark={0x50, 0x2, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0xd, 0x5, 0x0, 0x3}, 0x8}}]}, {0xfffffdd6}, {0xc}, {0xc}}}, @m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0xd4, 0x3, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0x0, 0x3, {0x2, 0xea3, 0x7}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1d28}}, @TCA_GACT_PARMS={0x18, 0x2, {0xb66, 0xb3, 0x10000000, 0x34e, 0xffff}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7ff, 0xd8, 0x0, 0x9, 0x100000e0}}]}, {0x52, 0x6, "a06b1d1931f3579c6d7c5159238a286074602c3726c701f3c0d5382de62a6e8c4fb714fcd674c66cd306a4f78d3d05530609c9b04b7483bd084d70df8e77e6fbd503917aa0a6c737cef0ed021b60"}, {0xc}, {0x1, 0x8, {0x2, 0x2}}}}]}]}, 0x180}}, 0x0) 1.589428444s ago: executing program 0 (id=5342): socket$inet6_mptcp(0xa, 0x1, 0x106) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$selinux_policy(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r0, 0x0) r1 = socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(r1, 0x0, 0xcf, 0x0, &(0x7f0000000300)) 1.450738337s ago: executing program 6 (id=5343): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000050000000900010073797a300000000054000000030a01030000000100010000050000000900010073797a30000000002800048008000140000000011400040076657468315f766972745f77696669000800024000000000090003"], 0x9c}}, 0x0) 1.433562347s ago: executing program 7 (id=5344): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x80402, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x42542, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x1, 0x7ffc0001}]}) ppoll(&(0x7f0000000d40)=[{}], 0x25, &(0x7f0000000300)={0x0, 0x3938700}, 0x0, 0x0) 1.427851697s ago: executing program 6 (id=5345): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)=r1}, 0x20) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file1\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x35d, &(0x7f0000000f00)="$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") r2 = open(&(0x7f0000000040)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r2, r2, 0x0, 0x800000009) 1.331713709s ago: executing program 0 (id=5346): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x42901, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, 0x0, 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x8001000000000000, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x8, 0x3, 0x240, 0xd0, 0x11, 0x148, 0xd0, 0x0, 0x1a8, 0x2a8, 0x2a8, 0x1a8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x9, 0x2, 0x3]}, {0xffffffffffffffff, [0x11, 0x2000000, 0x2]}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=@base={0x10, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x40400, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, 0x0, 0x0) 1.25458048s ago: executing program 7 (id=5347): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000f200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) read$rfkill(r1, &(0x7f0000000080), 0xffffff1c) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1b, 0x5, 0x7, 0x2, 0x41000, r0, 0x400, '\x00', 0x0, r1, 0x2, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) r2 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[], 0xffa8) shmat(r2, &(0x7f0000ffd000/0x1000)=nil, 0x6000) 1.176826131s ago: executing program 8 (id=5348): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x800, 0xffe1, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r2 = syz_clone(0x84000400, &(0x7f0000000540)="41290d91327abf07c056a310c31911e325ba307df2382e6b13a7a12987b16cf461cf64342ce06d284c2e0ed10eaa934e81afb6321ae23a058a5a9dd9863cea1caf66fe8c4d6e20", 0x47, &(0x7f0000000400), &(0x7f00000005c0), &(0x7f0000000800)="4ce2f1da966272bae5f1ba7557059967764c30545f316f8af1e6ce462b032ce070e189377b9a0dd7a49025a40ffbd2779d72a8f57ffd3de75a1c4c1291762efe7df1a34f347a04cc38a7519e84f8a22be2240975ba7f4f7ec9f86964e84fe1913c04f5649f51a39a7d6354bee108ee7bf69c251e2dca141f73c91f88f52c7955567606b1889ee03a3592d3c7e942ad000e00154f5482f615ce4364bc1e140b366f304f1251cddb47425f14a7516e1cfbd54ab6e61255be8e3056763b88d991aed1ce6dd5b908e7242d6fbdd8df") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x6, 0x2, 0xc, 0x80, 0x0, 0x9, 0x22002, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7d5, 0x2, @perf_bp={&(0x7f00000003c0), 0xe}, 0x8, 0x2, 0x39ca, 0xc, 0x5, 0x1000000, 0x1, 0x0, 0x2, 0x0, 0x71eb}, r2, 0xa, r1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f0000000680)=@newtaction={0x180, 0x30, 0x216822a75a8bdd29, 0xffe4, 0x0, {}, [{0x16c, 0x1, [@m_connmark={0x50, 0x2, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0xd, 0x5, 0x0, 0x3}, 0x8}}]}, {0xfffffdd6}, {0xc}, {0xc}}}, @m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0xd4, 0x3, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0x0, 0x3, {0x2, 0xea3, 0x7}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1d28}}, @TCA_GACT_PARMS={0x18, 0x2, {0xb66, 0xb3, 0x10000000, 0x34e, 0xffff}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7ff, 0xd8, 0x0, 0x9, 0x100000e0}}]}, {0x52, 0x6, "a06b1d1931f3579c6d7c5159238a286074602c3726c701f3c0d5382de62a6e8c4fb714fcd674c66cd306a4f78d3d05530609c9b04b7483bd084d70df8e77e6fbd503917aa0a6c737cef0ed021b60"}, {0xc}, {0x1, 0x8, {0x2, 0x2}}}}]}]}, 0x180}}, 0x0) 1.160513072s ago: executing program 6 (id=5349): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x7, 0x3, 0x10000, 0x20800, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x6, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffff7ffff, 0xffffffffffffffff, 0x8) socket$kcm(0x10, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bc0000/0x400000)=nil, 0x400000, 0x9) 887.199496ms ago: executing program 8 (id=5350): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0)=@chain) add_key$keyring(&(0x7f0000000080), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r2) 694.754889ms ago: executing program 5 (id=5351): ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffd}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) rt_sigtimedwait(&(0x7f0000000200)={[0x1]}, &(0x7f0000000300), &(0x7f0000000380), 0x8) 641.82935ms ago: executing program 5 (id=5352): syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000000c0), 0x2, 0xbd1, &(0x7f0000002380)="$eJzs3M1rHOcZAPBnRquVbKtduZRS91KVUmwoXUsuMrUp1C4uvfRQaK8Fq/LKCK0/kFRcyTqskn8gX+dALoEkJiGH+OxLQnLNJbGvCTkETFCsBEJIFGY/pI2lleR4V6PIvx+8mvedd7TP8+ywO/PC7gbwxBrJ/qQRxyLiYhJRau5PI6JY7w1G1BrHra4sTX65sjSZxNravz5LIomIBytLk63HSprbI83BYES8/9ckfvb05rhzC4szE9VqZbY5Pjl/5frJuYXFP0xfmbhcuVy5Onb6T+Onxk+PnhnvWq1ffXTu9he/+fsnta9f/ebW58+/nMS5GGrOtdfRLSMxsv6ctCtExES3g+Wkr1lPe51JYYd/SnucFAAAHaVt93C/iFL0xcbNWyne/iDX5AAAAICuWOuLWAMAAAAOuMT6HwAAAA641ucAHqwsTbZavp9I2Fv3z0fEcKP+1WZrzBSiVt8ORn9EHH6QRPvXWpPGvz22kYj4+N6ZN7IWPfoe8nZqyxHxy63Of1Kvf7j+Le7N9acRMdqF+CMPjX9M9Z/rQvy86wfgyXTnfONCtvn6l67f/8QW17/CFteuHyLv61/r/m910/3fRv19He7//rnLGDdfefFGp7ms/j/f/tvrrZbFz7aPVdQjuL8c8avCVvUn6/UnHeq/uMsYpW9vVDrN5V3/2ksRx2Pr+luS7X+f6OTUdLUy2vi7ZYzl98Zf6xQ/7/qz83+4Q/2t33/qdP6v7zLGfy5ceHPTznsb3e3rTz8tJv+u94rNPf+fmJ+fHYsoJv/YvP/U9rm0jmk9Rlb/id9u//rfqv7sPaHWfB6ytcByc5uNn3oo5l9u3XyrUz6t9V+e5/9Sh/PfXv+7hc3n/5ldxvjdO8+d6DTXvv7NWha/tRYGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgJY0IoYiScvr/TQtlyOORMTP43BavTY3//upa/+7eimbixiO/nRquloZjYhSY5xk47F6f2N86qHxHyPiaES8UDpUH5cnr1Uv5V08AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA645ExFAkaTki0ohYLaVpuZx3VgAAAEDXDeedAAAAANBz1v8AAABw8Fn/AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0GNHf33nbhIRtbOH6i1TbM7155oZ0Gtp3gkAuenLOwEgN4W8EwBy84hrfLcLcAAlO8wPdpwZ6HouAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOxfx4/duZtERO3soXrLFJtz/blmBvRa2tZPcswD2Ht9200W9i4PYO95icOTyxof2GntP7hxTO37MwM9ywkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA/Weo3pK0HBHF5r5yOeInETEc/cnUdLUyGhE/jYgPS/0D2Xgs55wBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADovrmFxZmJarUym3XSaHbW9/Sg09eM3MMQvekkjbxr+yWfg90ZeHanY/4bjxmiGPui0n3ayfNdCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAvMwtLM5MVKuV2bm8MwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADyNrewODNRrVZme9jJu0YAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPLzXQAAAP//jAsGRw==") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) pidfd_send_signal(0xffffffffffffffff, 0x2, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file1\x00', 0x64842, 0x21) pwritev2(r2, &(0x7f0000000240)=[{&(0x7f00000002c0)="85", 0x1}], 0x1, 0x5, 0x1, 0xf) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r3) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x14, r4, 0x100, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x24000080}, 0x4040) r5 = io_uring_setup(0x6be, &(0x7f0000000240)={0x0, 0x35e8, 0x800, 0x0, 0x275}) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r5, 0x13, &(0x7f0000000380)=[0xd03a, 0x400000], 0x2) r6 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r6, 0x0, 0x0, 0x6, 0x0) mq_timedreceive(r6, &(0x7f0000004600)=""/102381, 0xfffffceb, 0x0, 0x0) 440.875013ms ago: executing program 0 (id=5353): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffe94, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="440000001300290a0000000000000000070000001e8983608a80c593c2690a1fec0e79280610ac7424ff8a03549536d2", @ANYRES32, @ANYBLOB="00000000000000f51c001a805a770f8b08000200080000003e127a51080002", @ANYRES8=0x0, @ANYBLOB="df50db3162ba7b0780a4d05a644258e911c9d172091d379032fb65536f7c66e56af3a974f53192fb07e7df1b7c4b9b61182753eba850"], 0x44}}, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000080)={0x0, 0x3000040, 0x8, 0x1b, 0xfe, &(0x7f00000000c0)="387ed7626d850509a2d6c1aa38f15cd00f85c263cb226db671261fff7ce9c555f189afae3530db6dd493f28fd988721b9ae21b3e3b4523ae2594f47d8f62b480c4160b1f90ac9c41fae6ab12ac4c113fef588684ef495689092883b902a41cd75387ef6f7bc7d460d5e665f398ff95596dc94ec97003a3db08e500c2fb07e11aa4031a61c51caf7a65a2b613bda33f3eaeae635d7cd81761e74c38a7695800a15516eb337056e02335f9a7d10aa2eaf7beb7e1f7a1e850ecb3421143c5c4ded0f083a0c524dcf320827266819b6a952db5bc96141b26c54db857edbcbbc81c7af7aadf50bc549974b6401a19cdb130282b955592efa94242065a4c8d695a2cdd9ada350defd58c775b92d348305774d3a256c7520b285d8da0dbf5e20d604413ed2ddf9bcbf881caf811852806175d63892a15234fbcd7a88a2a0aea45d19148f0e7dada7d6d0d77881387fdeaa02863be90b88dfff412bff40c31c6415c54ae3335e54a49d315851feffe30d999c36def4df7df747695ef060000001bbe1b649f42f310859122c0d2c1e558dc6586958a28374f386ecf369274e43003a09b5159ea515eb44521901ef0d00baa91c10a8e44a76aac3468a15bd3d45ad389977467f306f9bcde071b30769795eed2f1580414d168f557cd90040c4bd2a3d6bc509254a12cece59181fcb5bad8c24bd9f8f78d17ab01831325501e80d899e9252f99d3a2666343392fda115048e4f4dd9f45657f8224fc78eb1168fe0527fac33466aadf48f16994d29a47778566e0f3945b2bf36b6eecc7fa18914beb66ac9e519bd3330000000000000009a3237aebbe3bed781e39d5a0fb0cdc60e196f2261305feb596b5b66ab89d2d6333f699b16db68986ab3eee7b199fefb5f79ffb2d1050e46982af1c14a88dd9b647ba812f56a8404755c73e74bb90e64bab9647c70ed5afca1c3d87907d14df8aa9df6f40a80ace2bb8a2aad3b0c66915927db4173181943d88c0c76d5969e2043db5bd77fd60ba0f012139929ccfec965c1f769785a4d23332d71f0875e3146afef5b20cc306d3ecee65944fe9829e0ad0c3f6bb2fdc1bc31152538db50f47dc38ba908a0d808687e478a609fe0daa0000000000000000e7f2e98597e27f3e1dba9c3c16e9fab3bda6ed33cb1c75513e2264b69d4794ded98eff9aa53d22eb77c9d93169c04ab2490bf28106f770e07eb7a9e8fd4e71929f918b98c4cbfcb11a90139264a9ee807c973167f493760278df0cc34be9e8f86f948d9a62e63ad6ca9d174d2465380b1a00ddc42915e4f3a5db640600000095a3d63904c9ecd1c313c08e29b814bd8fed1ab6d2846c73345962895d289ac77152cac2e04c93a5470774975b42091f218dd1e68a15f8226577bf9481ae0555db64a717eb23a811356d00000000ddffffff00"}) 410.590053ms ago: executing program 7 (id=5354): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)={0x1c, r3, 0x9c3fa077fa966179, 0x3, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000054) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x80402, 0x0) write$cgroup_int(r4, 0x0, 0x2) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c000000", @ANYRES32=r0, @ANYBLOB="030300000000000000000600000008000300", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x40000004}, 0x2000c0c0) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000740)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="d9c9eb4eb09930317b86450d4728f028826666a50190ed31e95fce342dc0fabeb327bffc1aa33073a034596725ffbfe1bde58e288dc81366efa371a91cfa71b75a181dd325fbc5087819d99a61942136cef2e8b20ab9921ab25e4b2b185db00a4bedcf5d98ba35675d5b533bde7a4edc8ee65cb98637f49fd60e8a0714a8", @ANYRES16=0x0, @ANYBLOB="040026bd7000fcdbdf250f00000005002f000000000008002c00000000000500380001000000050037000000000005002f00000000000800340007000000080032000010000008002c00ff0e0000"], 0x54}}, 0x4010) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x42542, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x1, 0x7ffc0001}]}) r5 = socket$inet6(0xa, 0x80002, 0x88) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030086dd601b8b97004d88c19edace00000000000000002100000002ff02000000000000000000000000000104004e20004d13"], 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$inet6_udplite(0xa, 0x2, 0x88) ppoll(&(0x7f0000000d40)=[{r5}], 0x25, &(0x7f0000000300)={0x0, 0x3938700}, 0x0, 0x0) 401.682944ms ago: executing program 8 (id=5355): prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+\x03Y\x91/') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000193c0)={0x11, 0x13, &(0x7f0000019300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000206a932500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0, 0x0, 0x6}, 0x18) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000ec0)) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x40000) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000440)={0x53, 0x0, 0x10, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000380)="441666ce20db", 0x0, 0x10, 0x39, 0x0, 0x0}) r4 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCSCTTY(r4, 0x540e, 0x2) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f0000001000)=0x5) r5 = dup(r2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x120) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000001900)={0x2, {0x2, 0x108, 0x5, 0x100, 0x1}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x13c, 0x0, 0x0) 374.189004ms ago: executing program 0 (id=5356): syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000000c0), 0x2, 0xbd1, &(0x7f0000002380)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) pidfd_send_signal(0xffffffffffffffff, 0x2, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file1\x00', 0x64842, 0x21) pwritev2(r2, &(0x7f0000000240)=[{&(0x7f00000002c0)="85", 0x1}], 0x1, 0x5, 0x1, 0xf) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r3) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x14, r4, 0x100, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x24000080}, 0x4040) r5 = io_uring_setup(0x6be, &(0x7f0000000240)={0x0, 0x35e8, 0x800, 0x0, 0x275}) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r5, 0x13, &(0x7f0000000380)=[0xd03a, 0x400000], 0x2) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, &(0x7f0000000000), &(0x7f0000000540)}, 0x20) r7 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r7, 0x0, 0x0, 0x6, 0x0) mq_timedreceive(r7, &(0x7f0000004600)=""/102381, 0xfffffceb, 0x0, 0x0) 307.075085ms ago: executing program 5 (id=5357): socket$inet6_mptcp(0xa, 0x1, 0x106) r0 = openat$selinux_policy(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r0, 0x0) r1 = socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(r1, 0x0, 0xcf, 0x0, &(0x7f0000000300)) 305.939035ms ago: executing program 0 (id=5358): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x3ad, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x29, 0x10, 0xd, 0x6, 0x8, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7, 0x20, 0x8, 0x9}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000080)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r1, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='kfree\x00', r4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='mm_page_free\x00', r4, 0x0, 0x6}, 0x18) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r5, 0x6, 0x19, &(0x7f00000001c0)=0x1, 0x4) bind$inet(r5, &(0x7f0000000200)={0x2, 0x4e24, @multicast2}, 0x10) sendmmsg$inet(r5, &(0x7f0000004980)=[{{&(0x7f0000000000)={0x2, 0x4e24, @empty}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000240)="6744775eeb43b101515f6b6a20", 0xd}], 0x1}}], 0x1, 0x20008000) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a0079"], 0x44}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000500)='kfree\x00', r2, 0x0, 0x2}, 0x18) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x3, 0x45a, [0x0, 0x200000000800, 0x200000000830, 0x20000000099e], 0x0, &(0x7f0000000080), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x3, 0x31, 0xfbfb, 'bond0\x00', 'veth1_macvtap\x00', 'veth0_macvtap\x00', 'bond_slave_1\x00', @broadcast, [0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0xff], 0x6e, 0xee, 0x13e, [], [@common=@AUDIT={'AUDIT\x00', 0x8}, @common=@log={'log\x00', 0x28, {{0x6, "bfe6b6206f94f9f75c47a467d6c31a28af438d51922ff79c04f3ba74e079", 0x2}}}], @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x0, 0x3, {0x2}}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{0x11, 0xb, 0x1c, 'pim6reg0\x00', 'bond_slave_0\x00', 'veth1_to_bridge\x00', 'veth1_virt_wifi\x00', @local, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], 0xfe, 0x176, 0x1a6, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x5, 0x1}}}, @arp={{'arp\x00', 0x0, 0x38}, {{0x337, 0x892f, 0xa, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, @remote, 0xdf68080098840135, @multicast, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x38}, [0x0, 0xff, 0xff], 0x0, 0x80}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"83547fe373530562d4c07a1a0a4ee27bed5ab2729b0ee18770f84f044194"}}, @common=@AUDIT={'AUDIT\x00', 0x8}], @common=@STANDARD={'\x00', 0x8, {0x2}}}, {0x9, 0x4, 0xa00, 'veth0_to_batadv\x00', 'pim6reg0\x00', 'caif0\x00', 'nr0\x00', @remote, [0xff, 0x0, 0x0, 0x0, 0xff], @broadcast, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], 0x6e, 0x6e, 0xe6, [], [], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x8, 0x45ce, 0x400, 0x0, 0x0, "c938f494cc892ec916199c3c1e6ae43f532dc5419729dd42f25aedb70c2d3e95d31fbde496503f73c5d1870636e12f159b66302af563e68d56e1462997f51930"}}}}]}]}, 0x4d2) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r9}, 0x10) r10 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r10, 0x29, 0x30, 0x0, 0x90) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x5, 0x100000000, &(0x7f0000006680)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a32000/0x1000)=nil, 0x1000, 0x16) getsockopt$inet6_mreq(r10, 0x29, 0x14, &(0x7f0000000280)={@private1}, &(0x7f0000000380)=0x14) syz_clone(0x4a081680, 0x0, 0x0, 0x0, 0x0, 0x0) 248.220316ms ago: executing program 7 (id=5359): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000840)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000080)="00000102", 0xfffff, r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES16=0x0, @ANYRES16=r0, @ANYRESOCT, @ANYRES64, @ANYRES64=r0], 0x48) r2 = syz_open_procfs(0x0, &(0x7f00000007c0)='net/psched\x00') pread64(r2, &(0x7f000001a240)=""/102400, 0x19000, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0xffff}, 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="a000"], 0xa0}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/power/image_size', 0xa3002, 0x90) write$P9_RLERROR(r4, &(0x7f0000000200)=ANY=[], 0xa) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syz_open_dev$evdev(&(0x7f0000000000), 0x4, 0x80400) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') writev(r5, 0x0, 0x0) 234.497166ms ago: executing program 5 (id=5360): socket$kcm(0x10, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x4, @local}, 0x10, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r3}, &(0x7f0000001c00), &(0x7f0000001c40)=r4}, 0x20) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bc0000/0x400000)=nil, 0x400000, 0x9) 834.53µs ago: executing program 6 (id=5361): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000001cc0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8c, @void, @value}, 0x94) r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f0000003580)={&(0x7f0000001fc0)={0xa, 0x2, 0x0, @dev={0xfe, 0x80, '\x00', 0x31}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18}, 0x2000) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000340)={{0x80, 0xfc}, 'port1\x00'}) r2 = gettid() r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r5, 0x9, 0x0) 0s ago: executing program 7 (id=5362): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000001340)=[{0x200000000006, 0x0, 0x0, 0x5}]}) epoll_create(0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x2, 0x0, 0x0, 0xe, 0x5, 0x2}]}, {0x0, [0x0, 0x2e, 0x2e]}}, 0x0, 0x2d, 0x0, 0x1, 0x7, 0x0, @void, @value}, 0x28) rseq(&(0x7f0000000400), 0x20, 0x0, 0x0) pselect6(0x40, &(0x7f0000000540)={0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioperm(0x453, 0x7ff, 0x6) r0 = syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x114df, 0x10, 0xffffffff, 0x320}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_LINKAT={0x27, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/../file0\x00', 0xffffffffffffffff, 0x1000, 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) io_uring_enter(r0, 0x3516, 0xaddf, 0x2, 0x0, 0x1517f) kernel console output (not intermixed with test programs): p6): ext4_do_update_inode:5211: inode #3: comm syz.6.4713: corrupted inode contents [ 308.828672][T19083] EXT4-fs error (device loop6): ext4_dirty_inode:6103: inode #3: comm syz.6.4713: mark_inode_dirty error [ 308.829155][T19083] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #3: comm syz.6.4713: corrupted inode contents [ 308.829292][T19083] EXT4-fs error (device loop6): __ext4_ext_dirty:207: inode #3: comm syz.6.4713: mark_inode_dirty error [ 308.829697][T19083] EXT4-fs error (device loop6): ext4_acquire_dquot:6935: comm syz.6.4713: Failed to acquire dquot type 0 [ 308.830293][T19083] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #16: comm syz.6.4713: corrupted inode contents [ 309.019117][T19093] loop5: detected capacity change from 0 to 1024 [ 309.025123][T19083] EXT4-fs error (device loop6): ext4_dirty_inode:6103: inode #16: comm syz.6.4713: mark_inode_dirty error [ 309.031551][T19093] EXT4-fs: Ignoring removed oldalloc option [ 309.053973][T19083] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #16: comm syz.6.4713: corrupted inode contents [ 309.055733][T19093] EXT4-fs: Ignoring removed orlov option [ 309.070887][T19083] EXT4-fs error (device loop6): __ext4_ext_dirty:207: inode #16: comm syz.6.4713: mark_inode_dirty error [ 309.076953][T19093] EXT4-fs: Ignoring removed oldalloc option [ 309.082657][T19083] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #16: comm syz.6.4713: corrupted inode contents [ 309.087740][T19093] EXT4-fs: Ignoring removed nomblk_io_submit option [ 309.127856][T19097] binfmt_misc: register: failed to install interpreter file ./file2 [ 309.243745][T19083] EXT4-fs error (device loop6) in ext4_orphan_del:305: Corrupt filesystem [ 309.406155][T19109] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4721'. [ 309.406718][T19109] netlink: 12 bytes leftover after parsing attributes in process `syz.7.4721'. [ 309.425870][T19083] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #16: comm syz.6.4713: corrupted inode contents [ 309.426069][T19083] EXT4-fs error (device loop6): ext4_truncate:4255: inode #16: comm syz.6.4713: mark_inode_dirty error [ 309.426174][T19083] EXT4-fs error (device loop6) in ext4_process_orphan:347: Corrupt filesystem [ 309.427058][T19083] EXT4-fs (loop6): 1 truncate cleaned up [ 309.535935][T19116] FAULT_INJECTION: forcing a failure. [ 309.535935][T19116] name failslab, interval 1, probability 0, space 0, times 0 [ 309.549997][T19116] CPU: 1 UID: 0 PID: 19116 Comm: syz.7.4725 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 309.550060][T19116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 309.550073][T19116] Call Trace: [ 309.550080][T19116] [ 309.550090][T19116] dump_stack_lvl+0xf6/0x150 [ 309.550120][T19116] dump_stack+0x15/0x1a [ 309.550167][T19116] should_fail_ex+0x261/0x270 [ 309.550202][T19116] should_failslab+0x8f/0xb0 [ 309.550270][T19116] __kvmalloc_node_noprof+0x12c/0x520 [ 309.550299][T19116] ? xt_alloc_table_info+0x3d/0x80 [ 309.550325][T19116] ? should_fail_ex+0xd7/0x270 [ 309.550357][T19116] xt_alloc_table_info+0x3d/0x80 [ 309.550383][T19116] do_arpt_set_ctl+0x672/0xa30 [ 309.550470][T19116] ? _raw_spin_unlock_bh+0x36/0x40 [ 309.550497][T19116] nf_setsockopt+0x195/0x1b0 [ 309.550527][T19116] ip_setsockopt+0xea/0x100 [ 309.550551][T19116] udp_setsockopt+0x95/0xb0 [ 309.550640][T19116] sock_common_setsockopt+0x64/0x80 [ 309.550666][T19116] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 309.550741][T19116] __sys_setsockopt+0x187/0x200 [ 309.550774][T19116] __x64_sys_setsockopt+0x66/0x80 [ 309.550805][T19116] x64_sys_call+0x2a09/0x2e10 [ 309.550910][T19116] do_syscall_64+0xc9/0x1c0 [ 309.550953][T19116] ? clear_bhb_loop+0x25/0x80 [ 309.550975][T19116] ? clear_bhb_loop+0x25/0x80 [ 309.551002][T19116] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 309.551028][T19116] RIP: 0033:0x7fda2060e169 [ 309.551090][T19116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.551108][T19116] RSP: 002b:00007fda1ec77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 309.551126][T19116] RAX: ffffffffffffffda RBX: 00007fda20835fa0 RCX: 00007fda2060e169 [ 309.551140][T19116] RDX: 0000000000000060 RSI: 0000000000000000 RDI: 0000000000000003 [ 309.551163][T19116] RBP: 00007fda1ec77090 R08: 0000000000000068 R09: 0000000000000000 [ 309.551178][T19116] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 309.551192][T19116] R13: 0000000000000000 R14: 00007fda20835fa0 R15: 00007ffe38d58ff8 [ 309.551216][T19116] [ 309.771199][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 309.780373][T10545] tipc: Node number set to 2886997007 [ 309.807053][T19119] pim6reg: entered allmulticast mode [ 309.826734][T19103] netlink: 12 bytes leftover after parsing attributes in process `syz.8.4720'. [ 309.908314][T19110] program syz.5.4717 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 309.927395][T19126] loop7: detected capacity change from 0 to 128 [ 309.951381][T19126] syz.7.4729: attempt to access beyond end of device [ 309.951381][T19126] loop7: rw=2049, sector=153, nr_sectors = 8 limit=128 [ 309.967566][T19126] syz.7.4729: attempt to access beyond end of device [ 309.967566][T19126] loop7: rw=2049, sector=169, nr_sectors = 8 limit=128 [ 309.982693][T19126] syz.7.4729: attempt to access beyond end of device [ 309.982693][T19126] loop7: rw=2049, sector=185, nr_sectors = 8 limit=128 [ 310.000181][T19126] syz.7.4729: attempt to access beyond end of device [ 310.000181][T19126] loop7: rw=2049, sector=201, nr_sectors = 8 limit=128 [ 310.015948][T19126] syz.7.4729: attempt to access beyond end of device [ 310.015948][T19126] loop7: rw=2049, sector=217, nr_sectors = 8 limit=128 [ 310.037230][T19126] syz.7.4729: attempt to access beyond end of device [ 310.037230][T19126] loop7: rw=2049, sector=233, nr_sectors = 8 limit=128 [ 310.068739][T19126] syz.7.4729: attempt to access beyond end of device [ 310.068739][T19126] loop7: rw=2049, sector=249, nr_sectors = 8 limit=128 [ 310.085429][T19126] syz.7.4729: attempt to access beyond end of device [ 310.085429][T19126] loop7: rw=2049, sector=265, nr_sectors = 8 limit=128 [ 310.102726][T19126] syz.7.4729: attempt to access beyond end of device [ 310.102726][T19126] loop7: rw=2049, sector=281, nr_sectors = 8 limit=128 [ 310.120030][T19126] syz.7.4729: attempt to access beyond end of device [ 310.120030][T19126] loop7: rw=2049, sector=297, nr_sectors = 8 limit=128 [ 310.146612][T19131] FAULT_INJECTION: forcing a failure. [ 310.146612][T19131] name failslab, interval 1, probability 0, space 0, times 0 [ 310.160274][T19131] CPU: 0 UID: 0 PID: 19131 Comm: syz.6.4730 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 310.160371][T19131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 310.160386][T19131] Call Trace: [ 310.160394][T19131] [ 310.160404][T19131] dump_stack_lvl+0xf6/0x150 [ 310.160433][T19131] dump_stack+0x15/0x1a [ 310.160451][T19131] should_fail_ex+0x261/0x270 [ 310.160505][T19131] should_failslab+0x8f/0xb0 [ 310.160538][T19131] kmem_cache_alloc_noprof+0x59/0x340 [ 310.160560][T19131] ? sk_prot_alloc+0x41/0x190 [ 310.160664][T19131] sk_prot_alloc+0x41/0x190 [ 310.160690][T19131] sk_alloc+0x33/0x360 [ 310.160712][T19131] ? inet_create+0x39c/0x750 [ 310.160774][T19131] inet_create+0x3b8/0x750 [ 310.160804][T19131] __sock_create+0x2e9/0x5a0 [ 310.160831][T19131] sock_create_kern+0x38/0x50 [ 310.160924][T19131] start_sync_thread+0x8e3/0x1610 [ 310.161016][T19131] ? __pfx_sync_thread_backup+0x10/0x10 [ 310.161048][T19131] ? should_fail_ex+0xd7/0x270 [ 310.161131][T19131] do_ip_vs_set_ctl+0x313/0x910 [ 310.161188][T19131] ? do_ip_setsockopt+0x1f20/0x22a0 [ 310.161309][T19131] nf_setsockopt+0x195/0x1b0 [ 310.161350][T19131] ip_setsockopt+0xea/0x100 [ 310.161449][T19131] udp_setsockopt+0x95/0xb0 [ 310.161484][T19131] sock_common_setsockopt+0x64/0x80 [ 310.161506][T19131] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 310.161531][T19131] __sys_setsockopt+0x187/0x200 [ 310.161562][T19131] __x64_sys_setsockopt+0x66/0x80 [ 310.161593][T19131] x64_sys_call+0x2a09/0x2e10 [ 310.161628][T19131] do_syscall_64+0xc9/0x1c0 [ 310.161663][T19131] ? clear_bhb_loop+0x25/0x80 [ 310.161684][T19131] ? clear_bhb_loop+0x25/0x80 [ 310.161705][T19131] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 310.161725][T19131] RIP: 0033:0x7f2de4afe169 [ 310.161756][T19131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.161826][T19131] RSP: 002b:00007f2de3167038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 310.161854][T19131] RAX: ffffffffffffffda RBX: 00007f2de4d25fa0 RCX: 00007f2de4afe169 [ 310.161869][T19131] RDX: 000000000000048b RSI: 0000000000000000 RDI: 0000000000000003 [ 310.161882][T19131] RBP: 00007f2de3167090 R08: 0000000000000018 R09: 0000000000000000 [ 310.161974][T19131] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.161990][T19131] R13: 0000000000000000 R14: 00007f2de4d25fa0 R15: 00007ffdf92d76a8 [ 310.162010][T19131] [ 310.162027][T19131] IPVS: Error during creation of socket; terminating [ 310.465707][ T29] kauditd_printk_skb: 258 callbacks suppressed [ 310.465723][ T29] audit: type=1326 audit(275910801.734:17916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.5.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 310.497519][ T29] audit: type=1326 audit(275910801.734:17917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.5.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 310.522903][ T29] audit: type=1326 audit(275910801.734:17918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.5.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 310.546982][ T29] audit: type=1326 audit(275910801.734:17919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.5.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 310.571330][ T29] audit: type=1326 audit(275910801.734:17920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.5.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 310.596302][ T29] audit: type=1326 audit(275910801.734:17921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.5.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 310.621768][ T29] audit: type=1326 audit(275910801.734:17922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.5.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 310.647126][ T29] audit: type=1326 audit(275910801.734:17923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.5.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 310.688770][ T29] audit: type=1326 audit(275910801.774:17924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.5.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 310.712960][ T29] audit: type=1326 audit(275910801.774:17925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.5.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 310.762956][T19146] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 310.796310][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 310.943415][T19161] netlink: 268 bytes leftover after parsing attributes in process `syz.6.4742'. [ 311.038260][T19164] netlink: 'syz.5.4743': attribute type 13 has an invalid length. [ 311.087082][T19161] pim6reg1: entered promiscuous mode [ 311.092449][T19161] pim6reg1: entered allmulticast mode [ 311.248789][T19168] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 311.296955][T19169] FAULT_INJECTION: forcing a failure. [ 311.296955][T19169] name failslab, interval 1, probability 0, space 0, times 0 [ 311.309667][T19169] CPU: 0 UID: 0 PID: 19169 Comm: syz.7.4738 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 311.309698][T19169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 311.309712][T19169] Call Trace: [ 311.309719][T19169] [ 311.309729][T19169] dump_stack_lvl+0xf6/0x150 [ 311.309755][T19169] dump_stack+0x15/0x1a [ 311.309772][T19169] should_fail_ex+0x261/0x270 [ 311.309803][T19169] should_failslab+0x8f/0xb0 [ 311.309836][T19169] kmem_cache_alloc_noprof+0x59/0x340 [ 311.309858][T19169] ? vm_area_dup+0x32/0x260 [ 311.309884][T19169] vm_area_dup+0x32/0x260 [ 311.309907][T19169] __split_vma+0xf9/0x630 [ 311.309936][T19169] vms_gather_munmap_vmas+0x2a5/0x790 [ 311.309979][T19169] do_vmi_align_munmap+0x1a5/0x3c0 [ 311.310027][T19169] do_vmi_munmap+0x1eb/0x230 [ 311.310065][T19169] do_munmap+0x8d/0xc0 [ 311.310102][T19169] __se_sys_mremap+0xba8/0x1200 [ 311.310136][T19169] ? __schedule+0x809/0xb70 [ 311.310157][T19169] ? schedule+0x5f/0xd0 [ 311.310181][T19169] __x64_sys_mremap+0x67/0x80 [ 311.310210][T19169] x64_sys_call+0x29c3/0x2e10 [ 311.310235][T19169] do_syscall_64+0xc9/0x1c0 [ 311.310269][T19169] ? clear_bhb_loop+0x25/0x80 [ 311.310293][T19169] ? clear_bhb_loop+0x25/0x80 [ 311.310316][T19169] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 311.310341][T19169] RIP: 0033:0x7fda2060e169 [ 311.310358][T19169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.310379][T19169] RSP: 002b:00007fda1ec56038 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 311.310397][T19169] RAX: ffffffffffffffda RBX: 00007fda20836080 RCX: 00007fda2060e169 [ 311.310409][T19169] RDX: 0000000000400000 RSI: 0000000000001000 RDI: 0000200000a96000 [ 311.310421][T19169] RBP: 00007fda1ec56090 R08: 0000200000000000 R09: 0000000000000000 [ 311.310432][T19169] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 311.310443][T19169] R13: 0000000000000001 R14: 00007fda20836080 R15: 00007ffe38d58ff8 [ 311.310463][T19169] [ 311.525708][T19168] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 311.747873][T19177] netlink: 'syz.7.4748': attribute type 13 has an invalid length. [ 311.759396][T19168] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 311.800280][T19168] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 311.808672][T19184] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 311.836382][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 311.862306][T19179] loop6: detected capacity change from 0 to 8192 [ 311.963946][T19191] loop7: detected capacity change from 0 to 256 [ 312.083208][T19198] netlink: 4 bytes leftover after parsing attributes in process `syz.8.4756'. [ 312.093823][T19198] netlink: 12 bytes leftover after parsing attributes in process `syz.8.4756'. [ 312.132859][T19179] FAT-fs (loop6): error, corrupted directory (invalid entries) [ 312.142728][T19179] FAT-fs (loop6): Filesystem has been set read-only [ 312.214085][T19205] pim6reg: entered allmulticast mode [ 312.339682][T19216] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 312.420147][T19228] loop6: detected capacity change from 0 to 256 [ 312.481846][T19235] loop8: detected capacity change from 0 to 2048 [ 312.595186][T19260] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 312.608199][T19263] Invalid ELF header magic: != ELF [ 312.689256][T19274] loop8: detected capacity change from 0 to 512 [ 312.696319][T19274] EXT4-fs: Ignoring removed nomblk_io_submit option [ 312.704679][T19274] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 312.718039][T19274] EXT4-fs error (device loop8): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 312.743841][T19274] EXT4-fs (loop8): 1 truncate cleaned up [ 312.751889][T19274] EXT4-fs mount: 16 callbacks suppressed [ 312.751909][T19274] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 312.789086][T19283] loop5: detected capacity change from 0 to 512 [ 312.789200][T15064] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 312.821426][T19287] ip6gre1: entered promiscuous mode [ 312.831822][T19290] Invalid ELF header magic: != ELF [ 312.838391][T19283] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 312.876320][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 312.980710][T19302] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 313.070501][T15026] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 313.092712][T19307] netlink: 44 bytes leftover after parsing attributes in process `syz.0.4805'. [ 313.107171][T19309] loop6: detected capacity change from 0 to 512 [ 313.123941][T19309] EXT4-fs: Ignoring removed nomblk_io_submit option [ 313.141790][T19309] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 313.164985][T19309] EXT4-fs error (device loop6): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 313.214693][T19309] EXT4-fs (loop6): 1 truncate cleaned up [ 313.254043][T19309] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 313.333122][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 313.366936][T19331] Invalid ELF header magic: != ELF [ 313.520670][T19337] SELinux: ebitmap: truncated map [ 313.591950][T19357] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4822'. [ 313.614255][T19337] SELinux: failed to load policy [ 313.645960][T19364] usb usb1: usbfs: interface 0 claimed by hub while 'syz.8.4821' sets config #1 [ 313.663543][T19365] xt_CT: You must specify a L4 protocol and not use inversions on it [ 313.689560][T19365] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=19365 comm=syz.6.4822 [ 313.702233][T19365] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19365 comm=syz.6.4822 [ 313.786039][T19357] loop6: detected capacity change from 0 to 512 [ 313.829743][T19383] loop5: detected capacity change from 0 to 256 [ 313.838294][T19357] EXT4-fs (loop6): 1 orphan inode deleted [ 313.844550][T19357] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 313.857214][ T5721] EXT4-fs error (device loop6): ext4_release_dquot:6971: comm kworker/u8:9: Failed to release dquot type 1 [ 313.888152][T19364] syzkaller1: entered promiscuous mode [ 313.893792][T19364] syzkaller1: entered allmulticast mode [ 313.917029][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 314.028531][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 314.112181][T19397] loop6: detected capacity change from 0 to 256 [ 314.142754][T19401] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 314.202224][T19404] atomic_op ffff8881179ded28 conn xmit_atomic 0000000000000000 [ 314.354241][T19399] SELinux: ebitmap: truncated map [ 314.414591][T19399] SELinux: failed to load policy [ 314.529062][T19425] atomic_op ffff8881179ded28 conn xmit_atomic 0000000000000000 [ 314.548780][T19428] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 314.647763][T19438] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4848'. [ 314.647942][T19435] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 314.716964][T19441] xt_CT: You must specify a L4 protocol and not use inversions on it [ 314.755204][T19441] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=19441 comm=syz.0.4848 [ 314.767898][T19441] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19441 comm=syz.0.4848 [ 314.874220][T19440] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 314.924155][T19451] netlink: 732 bytes leftover after parsing attributes in process `syz.7.4861'. [ 314.933321][T19451] netlink: 732 bytes leftover after parsing attributes in process `syz.7.4861'. [ 314.956424][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 315.074423][T19460] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 315.127134][T19460] SELinux: failed to load policy [ 315.161771][T19467] atomic_op ffff8881179ded28 conn xmit_atomic 0000000000000000 [ 315.250933][T19472] team0: Device gre1 is of different type [ 315.300799][T19481] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 315.311795][T19478] netlink: 'syz.8.4871': attribute type 13 has an invalid length. [ 315.408675][T19489] loop8: detected capacity change from 0 to 512 [ 315.416646][T19489] EXT4-fs (loop8): can't mount with journal_checksum, fs mounted w/o journal [ 315.518662][ T29] kauditd_printk_skb: 413 callbacks suppressed [ 315.518682][ T29] audit: type=1326 audit(275910806.774:18338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19490 comm="syz.5.4876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 315.549068][ T29] audit: type=1326 audit(275910806.774:18339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19490 comm="syz.5.4876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 315.572919][ T29] audit: type=1326 audit(275910806.774:18340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19490 comm="syz.5.4876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 315.597119][ T29] audit: type=1326 audit(275910806.774:18341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19490 comm="syz.5.4876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 315.621411][ T29] audit: type=1326 audit(275910806.774:18342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19490 comm="syz.5.4876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 315.645799][ T29] audit: type=1326 audit(275910806.774:18343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19490 comm="syz.5.4876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 315.671161][ T29] audit: type=1326 audit(275910806.774:18344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19490 comm="syz.5.4876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 315.696722][ T29] audit: type=1326 audit(275910806.774:18345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19490 comm="syz.5.4876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 315.720395][ T29] audit: type=1326 audit(275910806.774:18346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19490 comm="syz.5.4876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=92 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 315.744092][ T29] audit: type=1400 audit(275910806.774:18347): avc: denied { setattr } for pid=19490 comm="syz.5.4876" name="file0" dev="tmpfs" ino=1560 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 315.758189][T19508] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 315.993178][T19520] loop6: detected capacity change from 0 to 512 [ 316.006307][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 316.012248][T19520] EXT4-fs: Ignoring removed nomblk_io_submit option [ 316.022218][T19520] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 316.036573][T19520] EXT4-fs error (device loop6): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 316.054331][T19520] EXT4-fs (loop6): 1 truncate cleaned up [ 316.060841][T19520] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 316.090012][T19521] Invalid ELF header magic: != ELF [ 316.117764][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 316.148870][T19528] FAULT_INJECTION: forcing a failure. [ 316.148870][T19528] name failslab, interval 1, probability 0, space 0, times 0 [ 316.162040][T19528] CPU: 0 UID: 0 PID: 19528 Comm: gtp Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 316.162079][T19528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 316.162164][T19528] Call Trace: [ 316.162174][T19528] [ 316.162185][T19528] dump_stack_lvl+0xf6/0x150 [ 316.162258][T19528] dump_stack+0x15/0x1a [ 316.162279][T19528] should_fail_ex+0x261/0x270 [ 316.162380][T19528] should_failslab+0x8f/0xb0 [ 316.162419][T19528] kmem_cache_alloc_noprof+0x59/0x340 [ 316.162451][T19528] ? audit_log_start+0x37f/0x6e0 [ 316.162478][T19528] audit_log_start+0x37f/0x6e0 [ 316.162501][T19528] ? kstrtouint+0x7b/0xc0 [ 316.162525][T19528] audit_seccomp+0x4b/0x130 [ 316.162595][T19528] __seccomp_filter+0x694/0x10e0 [ 316.162633][T19528] ? vfs_write+0x669/0x950 [ 316.162690][T19528] __secure_computing+0x7e/0x160 [ 316.162722][T19528] syscall_trace_enter+0xcf/0x1f0 [ 316.162757][T19528] do_syscall_64+0xaa/0x1c0 [ 316.162863][T19528] ? clear_bhb_loop+0x25/0x80 [ 316.162885][T19528] ? clear_bhb_loop+0x25/0x80 [ 316.162958][T19528] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 316.162984][T19528] RIP: 0033:0x7f109a59e169 [ 316.163002][T19528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 316.163024][T19528] RSP: 002b:00007f1098c07038 EFLAGS: 00000246 ORIG_RAX: 000000000000009a [ 316.163063][T19528] RAX: ffffffffffffffda RBX: 00007f109a7c5fa0 RCX: 00007f109a59e169 [ 316.163138][T19528] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000001 [ 316.163150][T19528] RBP: 00007f1098c07090 R08: 0000000000000000 R09: 0000000000000000 [ 316.163164][T19528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 316.163178][T19528] R13: 0000000000000000 R14: 00007f109a7c5fa0 R15: 00007ffcef2887c8 [ 316.163201][T19528] [ 316.367531][T19530] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4884'. [ 316.451800][T19538] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 316.515852][T19543] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4894'. [ 316.575007][T19551] Invalid ELF header magic: != ELF [ 316.937596][T19564] netlink: 36 bytes leftover after parsing attributes in process `syz.0.4903'. [ 317.037044][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 317.200303][T19580] Invalid ELF header magic: != ELF [ 317.228053][T19577] bond1: entered promiscuous mode [ 317.230805][T19583] FAULT_INJECTION: forcing a failure. [ 317.230805][T19583] name failslab, interval 1, probability 0, space 0, times 0 [ 317.233139][T19577] bond1: entered allmulticast mode [ 317.245768][T19583] CPU: 1 UID: 0 PID: 19583 Comm: syz.0.4912 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 317.245883][T19583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 317.245900][T19583] Call Trace: [ 317.245908][T19583] [ 317.245919][T19583] dump_stack_lvl+0xf6/0x150 [ 317.245950][T19583] dump_stack+0x15/0x1a [ 317.245972][T19583] should_fail_ex+0x261/0x270 [ 317.246007][T19583] should_failslab+0x8f/0xb0 [ 317.246049][T19583] __kmalloc_noprof+0xad/0x410 [ 317.246148][T19583] ? security_prepare_creds+0x53/0x120 [ 317.246193][T19583] security_prepare_creds+0x53/0x120 [ 317.246223][T19583] prepare_creds+0x368/0x4e0 [ 317.246264][T19583] copy_creds+0x90/0x3f0 [ 317.246300][T19583] copy_process+0x63f/0x1f60 [ 317.246334][T19583] ? __rcu_read_unlock+0x4e/0x70 [ 317.246426][T19583] kernel_clone+0x168/0x5d0 [ 317.246464][T19583] __x64_sys_clone+0xe9/0x120 [ 317.246508][T19583] x64_sys_call+0x2dc9/0x2e10 [ 317.246536][T19583] do_syscall_64+0xc9/0x1c0 [ 317.246711][T19583] ? clear_bhb_loop+0x25/0x80 [ 317.246739][T19583] ? clear_bhb_loop+0x25/0x80 [ 317.246767][T19583] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 317.246861][T19583] RIP: 0033:0x7f109a59e169 [ 317.246881][T19583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.246904][T19583] RSP: 002b:00007f1098c06fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 317.246927][T19583] RAX: ffffffffffffffda RBX: 00007f109a7c5fa0 RCX: 00007f109a59e169 [ 317.246986][T19583] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 317.247067][T19583] RBP: 00007f1098c07090 R08: 0000000000000000 R09: 0000000000000000 [ 317.247082][T19583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 317.247169][T19583] R13: 0000000000000000 R14: 00007f109a7c5fa0 R15: 00007ffcef2887c8 [ 317.247194][T19583] [ 317.340693][T19586] loop7: detected capacity change from 0 to 512 [ 317.343278][T19577] 8021q: adding VLAN 0 to HW filter on device bond1 [ 317.379447][T19586] EXT4-fs: Ignoring removed nomblk_io_submit option [ 317.478743][T19577] bond1 (unregistering): Released all slaves [ 317.485586][T19586] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 317.515937][T19586] EXT4-fs error (device loop7): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 317.517064][T19594] FAULT_INJECTION: forcing a failure. [ 317.517064][T19594] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 317.534593][T19586] EXT4-fs (loop7): 1 truncate cleaned up [ 317.543840][T19594] CPU: 0 UID: 0 PID: 19594 Comm: syz.5.4916 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 317.543938][T19594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 317.543953][T19594] Call Trace: [ 317.543960][T19594] [ 317.543970][T19594] dump_stack_lvl+0xf6/0x150 [ 317.543999][T19594] dump_stack+0x15/0x1a [ 317.544018][T19594] should_fail_ex+0x261/0x270 [ 317.544054][T19594] should_fail_alloc_page+0xfd/0x110 [ 317.544095][T19594] __alloc_frozen_pages_noprof+0x11d/0x360 [ 317.544132][T19594] alloc_pages_mpol+0xb6/0x260 [ 317.544188][T19594] alloc_pages_noprof+0xe8/0x130 [ 317.544215][T19594] __pud_alloc+0x4d/0x450 [ 317.544237][T19594] handle_mm_fault+0x1741/0x2e80 [ 317.544325][T19594] ? mt_find+0x735/0x8a0 [ 317.544426][T19594] ? check_vma_flags+0x266/0x350 [ 317.544455][T19594] __get_user_pages+0xf4e/0x2340 [ 317.544514][T19594] get_user_pages_remote+0x1f4/0x800 [ 317.544636][T19594] get_arg_page+0x9b/0x1e0 [ 317.544673][T19594] copy_string_kernel+0x128/0x2f0 [ 317.544710][T19594] do_execveat_common+0x615/0x7e0 [ 317.544764][T19594] __x64_sys_execve+0x5c/0x70 [ 317.544801][T19594] x64_sys_call+0x1362/0x2e10 [ 317.544841][T19594] do_syscall_64+0xc9/0x1c0 [ 317.544921][T19594] ? clear_bhb_loop+0x25/0x80 [ 317.544948][T19594] ? clear_bhb_loop+0x25/0x80 [ 317.544976][T19594] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 317.545003][T19594] RIP: 0033:0x7fd65f17e169 [ 317.545022][T19594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.545045][T19594] RSP: 002b:00007fd65d7e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 317.545116][T19594] RAX: ffffffffffffffda RBX: 00007fd65f3a5fa0 RCX: 00007fd65f17e169 [ 317.545133][T19594] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 317.545149][T19594] RBP: 00007fd65d7e7090 R08: 0000000000000000 R09: 0000000000000000 [ 317.545164][T19594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 317.545248][T19594] R13: 0000000000000000 R14: 00007fd65f3a5fa0 R15: 00007ffff2bf9438 [ 317.545300][T19594] [ 317.767789][T19586] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 317.817282][T12762] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 317.867444][T19606] tipc: New replicast peer: 255.255.255.255 [ 317.873637][T19606] tipc: Enabled bearer , priority 10 [ 317.925977][T19616] Invalid ELF header magic: != ELF [ 317.968297][T19621] netlink: 36 bytes leftover after parsing attributes in process `syz.6.4929'. [ 318.023275][T19628] loop6: detected capacity change from 0 to 512 [ 318.032312][T19612] SELinux: ebitmap: truncated map [ 318.041142][T19628] EXT4-fs: Ignoring removed nomblk_io_submit option [ 318.048839][T19612] SELinux: failed to load policy [ 318.076308][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 318.078912][T19628] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 318.105451][T19628] EXT4-fs error (device loop6): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 318.113718][T19632] bond1: entered promiscuous mode [ 318.121209][T19628] EXT4-fs (loop6): 1 truncate cleaned up [ 318.124857][T19632] bond1: entered allmulticast mode [ 318.135726][T19628] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 318.148623][T19632] 8021q: adding VLAN 0 to HW filter on device bond1 [ 318.158343][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 318.169941][T19632] bond1 (unregistering): Released all slaves [ 318.258653][T19649] xt_hashlimit: size too large, truncated to 1048576 [ 318.332948][T19654] atomic_op ffff88815f027d28 conn xmit_atomic 0000000000000000 [ 318.354243][T19652] Invalid ELF header magic: != ELF [ 318.393343][T19658] FAULT_INJECTION: forcing a failure. [ 318.393343][T19658] name failslab, interval 1, probability 0, space 0, times 0 [ 318.406193][T19658] CPU: 0 UID: 0 PID: 19658 Comm: syz.0.4941 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 318.406264][T19658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 318.406281][T19658] Call Trace: [ 318.406288][T19658] [ 318.406298][T19658] dump_stack_lvl+0xf6/0x150 [ 318.406325][T19658] dump_stack+0x15/0x1a [ 318.406342][T19658] should_fail_ex+0x261/0x270 [ 318.406376][T19658] should_failslab+0x8f/0xb0 [ 318.406536][T19658] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 318.406567][T19658] ? should_failslab+0x8f/0xb0 [ 318.406604][T19658] ? p9_client_create+0x20e/0xbb0 [ 318.406696][T19658] kstrdup+0x3d/0xd0 [ 318.406720][T19658] p9_client_create+0x20e/0xbb0 [ 318.406747][T19658] ? __kmalloc_node_track_caller_noprof+0x1ed/0x410 [ 318.406830][T19658] v9fs_session_init+0xfb/0xdb0 [ 318.406856][T19658] ? obj_cgroup_charge+0xc9/0x170 [ 318.406882][T19658] ? should_fail_ex+0xd7/0x270 [ 318.406961][T19658] ? should_failslab+0x8f/0xb0 [ 318.406998][T19658] ? __kmalloc_cache_noprof+0x18d/0x320 [ 318.407096][T19658] ? v9fs_mount+0x56/0x580 [ 318.407130][T19658] v9fs_mount+0x6c/0x580 [ 318.407216][T19658] ? __pfx_v9fs_mount+0x10/0x10 [ 318.407248][T19658] legacy_get_tree+0x77/0xd0 [ 318.407280][T19658] vfs_get_tree+0x56/0x1e0 [ 318.407367][T19658] do_new_mount+0x246/0x6b0 [ 318.407410][T19658] path_mount+0x49b/0xb30 [ 318.407450][T19658] __se_sys_mount+0x28f/0x2e0 [ 318.407541][T19658] __x64_sys_mount+0x67/0x80 [ 318.407574][T19658] x64_sys_call+0xd11/0x2e10 [ 318.407595][T19658] do_syscall_64+0xc9/0x1c0 [ 318.407643][T19658] ? clear_bhb_loop+0x25/0x80 [ 318.407665][T19658] ? clear_bhb_loop+0x25/0x80 [ 318.407734][T19658] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 318.407801][T19658] RIP: 0033:0x7f109a59e169 [ 318.407844][T19658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.407862][T19658] RSP: 002b:00007f1098c07038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 318.407881][T19658] RAX: ffffffffffffffda RBX: 00007f109a7c5fa0 RCX: 00007f109a59e169 [ 318.407893][T19658] RDX: 0000200000000040 RSI: 0000200000000080 RDI: 0000000000000000 [ 318.407948][T19658] RBP: 00007f1098c07090 R08: 0000200000000400 R09: 0000000000000000 [ 318.407959][T19658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 318.408049][T19658] R13: 0000000000000000 R14: 00007f109a7c5fa0 R15: 00007ffcef2887c8 [ 318.408069][T19658] [ 318.679504][T19649] netlink: 'syz.7.4938': attribute type 32 has an invalid length. [ 318.704275][T19649] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4938'. [ 318.721527][T19649] (unnamed net_device) (uninitialized): option coupled_control: invalid value (27) [ 318.734507][T19660] SELinux: ebitmap: truncated map [ 318.743343][T19660] SELinux: failed to load policy [ 318.777263][T19665] loop6: detected capacity change from 0 to 512 [ 318.784967][T19665] EXT4-fs: Ignoring removed nomblk_io_submit option [ 318.805180][T19665] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 318.820852][T19665] EXT4-fs error (device loop6): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 318.835919][T19665] EXT4-fs (loop6): 1 truncate cleaned up [ 318.875300][T19680] bond1: entered promiscuous mode [ 318.880549][T19680] bond1: entered allmulticast mode [ 318.887932][T19665] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 318.901623][T19680] 8021q: adding VLAN 0 to HW filter on device bond1 [ 318.912002][T19680] bond1 (unregistering): Released all slaves [ 318.950350][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 319.019653][T19691] Invalid ELF header magic: != ELF [ 319.026618][T19693] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 319.116990][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 319.119601][T19708] FAULT_INJECTION: forcing a failure. [ 319.119601][T19708] name failslab, interval 1, probability 0, space 0, times 0 [ 319.136564][T19708] CPU: 0 UID: 0 PID: 19708 Comm: syz.6.4951 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 319.136602][T19708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 319.136615][T19708] Call Trace: [ 319.136622][T19708] [ 319.136681][T19708] dump_stack_lvl+0xf6/0x150 [ 319.136709][T19708] dump_stack+0x15/0x1a [ 319.136727][T19708] should_fail_ex+0x261/0x270 [ 319.136827][T19708] should_failslab+0x8f/0xb0 [ 319.136859][T19708] __kmalloc_noprof+0xad/0x410 [ 319.136880][T19708] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 319.136915][T19708] ? nlmon_xmit+0x51/0x60 [ 319.136978][T19708] genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 319.137013][T19708] ? radix_tree_lookup+0xfc/0x150 [ 319.137040][T19708] genl_rcv_msg+0x486/0x6f0 [ 319.137149][T19708] ? __pfx_ctrl_getfamily+0x10/0x10 [ 319.137248][T19708] ? __dev_queue_xmit+0xb76/0x20b0 [ 319.137279][T19708] ? ref_tracker_free+0x3b8/0x420 [ 319.137303][T19708] ? __dev_queue_xmit+0x18b/0x20b0 [ 319.137377][T19708] netlink_rcv_skb+0x12f/0x230 [ 319.137400][T19708] ? __pfx_genl_rcv_msg+0x10/0x10 [ 319.137496][T19708] genl_rcv+0x28/0x40 [ 319.137524][T19708] netlink_unicast+0x605/0x6c0 [ 319.137650][T19708] netlink_sendmsg+0x609/0x720 [ 319.137680][T19708] ? __pfx_netlink_sendmsg+0x10/0x10 [ 319.137705][T19708] __sock_sendmsg+0x140/0x180 [ 319.137724][T19708] __sys_sendto+0x1aa/0x230 [ 319.137797][T19708] __x64_sys_sendto+0x78/0x90 [ 319.137822][T19708] x64_sys_call+0x2bcb/0x2e10 [ 319.137844][T19708] do_syscall_64+0xc9/0x1c0 [ 319.137947][T19708] ? clear_bhb_loop+0x25/0x80 [ 319.137968][T19708] ? clear_bhb_loop+0x25/0x80 [ 319.137990][T19708] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 319.138011][T19708] RIP: 0033:0x7f2de4affffc [ 319.138025][T19708] Code: 2a 5f 02 00 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 70 5f 02 00 48 8b [ 319.138107][T19708] RSP: 002b:00007f2de3144ec0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 319.138125][T19708] RAX: ffffffffffffffda RBX: 00007f2de3144fc0 RCX: 00007f2de4affffc [ 319.138137][T19708] RDX: 0000000000000024 RSI: 00007f2de3145010 RDI: 000000000000000a [ 319.138149][T19708] RBP: 0000000000000000 R08: 00007f2de3144f14 R09: 000000000000000c [ 319.138161][T19708] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000000000a [ 319.138172][T19708] R13: 00007f2de3144f68 R14: 00007f2de3145010 R15: 0000000000000000 [ 319.138192][T19708] [ 319.438598][T19714] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 319.471604][T19716] SELinux: policydb magic number 0x6c65732f does not match expected magic number 0xf97cff8c [ 319.481993][T19716] SELinux: failed to load policy [ 319.575171][T19724] Invalid ELF header magic: != ELF [ 320.154620][T19737] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 320.166315][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 320.312408][T19756] netlink: 'syz.0.4979': attribute type 2 has an invalid length. [ 320.320388][T19756] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4979'. [ 320.462712][T19767] FAULT_INJECTION: forcing a failure. [ 320.462712][T19767] name failslab, interval 1, probability 0, space 0, times 0 [ 320.475594][T19767] CPU: 0 UID: 0 PID: 19767 Comm: syz.0.4983 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 320.475628][T19767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 320.475643][T19767] Call Trace: [ 320.475651][T19767] [ 320.475660][T19767] dump_stack_lvl+0xf6/0x150 [ 320.475763][T19767] dump_stack+0x15/0x1a [ 320.475784][T19767] should_fail_ex+0x261/0x270 [ 320.475816][T19767] should_failslab+0x8f/0xb0 [ 320.475853][T19767] __kvmalloc_node_noprof+0x12c/0x520 [ 320.475881][T19767] ? nf_hook_entries_grow+0x1c0/0x4a0 [ 320.475920][T19767] ? pcpu_block_update+0x23a/0x3b0 [ 320.475963][T19767] nf_hook_entries_grow+0x1c0/0x4a0 [ 320.476064][T19767] __nf_register_net_hook+0x16b/0x490 [ 320.476090][T19767] ? pcpu_chunk_relocate+0x182/0x290 [ 320.476156][T19767] nf_register_net_hook+0x88/0x130 [ 320.476182][T19767] nf_register_net_hooks+0x41/0x140 [ 320.476209][T19767] nf_defrag_ipv4_enable+0x6c/0xc0 [ 320.476250][T19767] tproxy_tg4_check+0x2d/0x100 [ 320.476280][T19767] xt_check_target+0x27e/0x4b0 [ 320.476307][T19767] ? strcmp+0x21/0x50 [ 320.476385][T19767] ? xt_find_target+0x1ce/0x200 [ 320.476473][T19767] translate_table+0xc6d/0xfe0 [ 320.476526][T19767] do_ipt_set_ctl+0x7ac/0x8a0 [ 320.476543][T19767] ? _raw_spin_unlock_bh+0x36/0x40 [ 320.476565][T19767] ? tcp_release_cb+0x108/0x390 [ 320.476691][T19767] nf_setsockopt+0x195/0x1b0 [ 320.476725][T19767] ip_setsockopt+0xea/0x100 [ 320.476795][T19767] tcp_setsockopt+0x93/0xb0 [ 320.476822][T19767] sock_common_setsockopt+0x64/0x80 [ 320.476847][T19767] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 320.476872][T19767] __sys_setsockopt+0x187/0x200 [ 320.476905][T19767] __x64_sys_setsockopt+0x66/0x80 [ 320.476990][T19767] x64_sys_call+0x2a09/0x2e10 [ 320.477076][T19767] do_syscall_64+0xc9/0x1c0 [ 320.477111][T19767] ? clear_bhb_loop+0x25/0x80 [ 320.477137][T19767] ? clear_bhb_loop+0x25/0x80 [ 320.477163][T19767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 320.477244][T19767] RIP: 0033:0x7f109a59e169 [ 320.477263][T19767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.477298][T19767] RSP: 002b:00007f1098c07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 320.477320][T19767] RAX: ffffffffffffffda RBX: 00007f109a7c5fa0 RCX: 00007f109a59e169 [ 320.477335][T19767] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000006 [ 320.477349][T19767] RBP: 00007f1098c07090 R08: 0000000000000570 R09: 0000000000000000 [ 320.477364][T19767] R10: 0000200000000900 R11: 0000000000000246 R12: 0000000000000001 [ 320.477378][T19767] R13: 0000000000000000 R14: 00007f109a7c5fa0 R15: 00007ffcef2887c8 [ 320.477403][T19767] [ 320.478651][T19753] SELinux: policydb magic number 0x6c65732f does not match expected magic number 0xf97cff8c [ 320.582937][T19777] loop8: detected capacity change from 0 to 164 [ 320.595189][T19778] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 320.603989][T19777] bio_check_eod: 3 callbacks suppressed [ 320.604007][T19777] syz.8.4987: attempt to access beyond end of device [ 320.604007][T19777] loop8: rw=524288, sector=263328, nr_sectors = 4 limit=164 [ 320.821130][T19753] SELinux: failed to load policy [ 320.827360][ T29] kauditd_printk_skb: 575 callbacks suppressed [ 320.827407][ T29] audit: type=1326 audit(275910812.084:18921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19774 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 320.831709][T19777] syz.8.4987: attempt to access beyond end of device [ 320.831709][T19777] loop8: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 320.833730][ T29] audit: type=1326 audit(275910812.094:18922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19774 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 320.894177][ T29] audit: type=1326 audit(275910812.094:18923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19774 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 320.923074][ T29] audit: type=1326 audit(275910812.144:18924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19774 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 320.946599][ T29] audit: type=1326 audit(275910812.144:18925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19774 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 320.971455][ T29] audit: type=1326 audit(275910812.144:18926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19774 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 320.995248][ T29] audit: type=1326 audit(275910812.144:18927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19774 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f109a59cc1f code=0x7ffc0000 [ 321.018982][ T29] audit: type=1326 audit(275910812.144:18928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19774 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 321.042621][ T29] audit: type=1326 audit(275910812.144:18929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19774 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 321.066915][ T29] audit: type=1326 audit(275910812.144:18930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19774 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 321.139179][T19791] loop5: detected capacity change from 0 to 512 [ 321.148796][T19793] loop8: detected capacity change from 0 to 512 [ 321.149148][T19791] EXT4-fs: Ignoring removed nomblk_io_submit option [ 321.162415][T19791] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 321.187650][T19793] EXT4-fs: Ignoring removed nomblk_io_submit option [ 321.195308][T19793] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 321.206310][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 321.244869][T19791] EXT4-fs error (device loop5): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 321.260048][T19791] EXT4-fs (loop5): 1 truncate cleaned up [ 321.266883][T19791] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 321.279899][T19793] EXT4-fs error (device loop8): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 321.301152][T19793] EXT4-fs (loop8): 1 truncate cleaned up [ 321.308346][T19793] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 321.339378][T19811] loop6: detected capacity change from 0 to 128 [ 321.354767][T19816] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 321.364851][T15026] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 321.365368][T15064] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 321.408986][T19821] loop5: detected capacity change from 0 to 128 [ 321.416207][T19811] syz.6.4998: attempt to access beyond end of device [ 321.416207][T19811] loop6: rw=0, sector=121, nr_sectors = 920 limit=128 [ 321.434457][T19811] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 321.451375][T19824] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5006'. [ 321.467780][T19825] bond1: entered promiscuous mode [ 321.472870][T19825] bond1: entered allmulticast mode [ 321.479240][T19821] syz.5.5003: attempt to access beyond end of device [ 321.479240][T19821] loop5: rw=0, sector=97, nr_sectors = 128 limit=128 [ 321.487449][T19825] 8021q: adding VLAN 0 to HW filter on device bond1 [ 321.508369][T19825] bond1 (unregistering): Released all slaves [ 321.555764][T19832] bond1: entered promiscuous mode [ 321.561109][T19832] bond1: entered allmulticast mode [ 321.591720][T19832] 8021q: adding VLAN 0 to HW filter on device bond1 [ 321.602801][ T37] kworker/u8:2: attempt to access beyond end of device [ 321.602801][ T37] loop5: rw=1, sector=225, nr_sectors = 816 limit=128 [ 321.631277][T19832] bond1 (unregistering): Released all slaves [ 321.695412][T19839] syzkaller0: entered promiscuous mode [ 321.701003][T19839] syzkaller0: entered allmulticast mode [ 321.711816][T19842] loop5: detected capacity change from 0 to 256 [ 321.866979][T19853] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 321.902775][T19858] netlink: 4 bytes leftover after parsing attributes in process `syz.8.5020'. [ 322.224222][T19863] netlink: 830 bytes leftover after parsing attributes in process `syz.5.5021'. [ 322.237025][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 322.253791][T19865] FAULT_INJECTION: forcing a failure. [ 322.253791][T19865] name failslab, interval 1, probability 0, space 0, times 0 [ 322.266931][T19865] CPU: 0 UID: 0 PID: 19865 Comm: syz.8.5020 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 322.267019][T19865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 322.267032][T19865] Call Trace: [ 322.267039][T19865] [ 322.267047][T19865] dump_stack_lvl+0xf6/0x150 [ 322.267071][T19865] dump_stack+0x15/0x1a [ 322.267139][T19865] should_fail_ex+0x261/0x270 [ 322.267173][T19865] should_failslab+0x8f/0xb0 [ 322.267217][T19865] __kmalloc_noprof+0xad/0x410 [ 322.267238][T19865] ? nft_obj_init+0x3d/0x210 [ 322.267311][T19865] nft_obj_init+0x3d/0x210 [ 322.267356][T19865] nf_tables_updobj+0x11f/0x1c0 [ 322.267410][T19865] nf_tables_newobj+0xc96/0xcd0 [ 322.267465][T19865] nfnetlink_rcv+0xb6e/0x1610 [ 322.267494][T19865] ? __kfree_skb+0x102/0x150 [ 322.267563][T19865] netlink_unicast+0x605/0x6c0 [ 322.267637][T19865] netlink_sendmsg+0x609/0x720 [ 322.267672][T19865] ? __pfx_netlink_sendmsg+0x10/0x10 [ 322.267755][T19865] __sock_sendmsg+0x140/0x180 [ 322.267848][T19865] ____sys_sendmsg+0x350/0x4e0 [ 322.267924][T19865] __sys_sendmsg+0x1a0/0x240 [ 322.267971][T19865] __x64_sys_sendmsg+0x46/0x50 [ 322.268017][T19865] x64_sys_call+0x26f3/0x2e10 [ 322.268077][T19865] do_syscall_64+0xc9/0x1c0 [ 322.268111][T19865] ? clear_bhb_loop+0x25/0x80 [ 322.268168][T19865] ? clear_bhb_loop+0x25/0x80 [ 322.268267][T19865] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 322.268288][T19865] RIP: 0033:0x7f04b460e169 [ 322.268314][T19865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.268341][T19865] RSP: 002b:00007f04b2c56038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 322.268364][T19865] RAX: ffffffffffffffda RBX: 00007f04b4836080 RCX: 00007f04b460e169 [ 322.268379][T19865] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000006 [ 322.268391][T19865] RBP: 00007f04b2c56090 R08: 0000000000000000 R09: 0000000000000000 [ 322.268404][T19865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.268419][T19865] R13: 0000000000000001 R14: 00007f04b4836080 R15: 00007ffc4c21beb8 [ 322.268445][T19865] [ 322.557258][T19867] veth1_macvtap: left promiscuous mode [ 322.668768][T19874] loop6: detected capacity change from 0 to 128 [ 322.724378][T19880] loop8: detected capacity change from 0 to 256 [ 322.751226][T19884] bond1: entered promiscuous mode [ 322.756431][T19884] bond1: entered allmulticast mode [ 322.762447][T19884] 8021q: adding VLAN 0 to HW filter on device bond1 [ 322.774458][T19884] bond1 (unregistering): Released all slaves [ 322.815718][T19892] loop6: detected capacity change from 0 to 256 [ 322.975777][T19902] loop5: detected capacity change from 0 to 512 [ 322.982710][T19902] EXT4-fs: inline encryption not supported [ 323.057521][T19902] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 323.066298][T19902] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 323.075864][T19902] EXT4-fs (loop5): blocks per group (39) and clusters per group (32768) inconsistent [ 323.133604][T19904] loop6: detected capacity change from 0 to 512 [ 323.156465][T19903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=19903 comm=syz.8.5036 [ 323.178826][T19904] EXT4-fs: Ignoring removed nomblk_io_submit option [ 323.186045][T19904] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 323.247597][T19907] loop8: detected capacity change from 0 to 1764 [ 323.254380][T19907] iso9660: Unknown parameter 'Nå÷-ˆÝûÐö¥Ññ(þË‘”âjDúÂsFÅÀà£' [ 323.276335][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 323.340924][T19904] EXT4-fs error (device loop6): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 323.399331][T19904] EXT4-fs (loop6): 1 truncate cleaned up [ 323.442716][T19904] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 323.644178][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 323.973861][T19925] loop5: detected capacity change from 0 to 8192 [ 323.983252][T19926] FAULT_INJECTION: forcing a failure. [ 323.983252][T19926] name failslab, interval 1, probability 0, space 0, times 0 [ 323.996073][T19926] CPU: 0 UID: 0 PID: 19926 Comm: syz.6.5040 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 323.996101][T19926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 323.996114][T19926] Call Trace: [ 323.996123][T19926] [ 323.996133][T19926] dump_stack_lvl+0xf6/0x150 [ 323.996162][T19926] dump_stack+0x15/0x1a [ 323.996179][T19926] should_fail_ex+0x261/0x270 [ 323.996212][T19926] should_failslab+0x8f/0xb0 [ 323.996251][T19926] kmem_cache_alloc_noprof+0x59/0x340 [ 323.996277][T19926] ? mas_alloc_nodes+0x1f4/0x4a0 [ 323.996315][T19926] mas_alloc_nodes+0x1f4/0x4a0 [ 323.996355][T19926] mas_preallocate+0x48d/0x6b0 [ 323.996394][T19926] mmap_region+0x983/0x1490 [ 323.996449][T19926] do_mmap+0x9ef/0xc80 [ 323.996489][T19926] vm_mmap_pgoff+0x16d/0x2d0 [ 323.996526][T19926] ksys_mmap_pgoff+0x2e2/0x340 [ 323.996563][T19926] x64_sys_call+0x1945/0x2e10 [ 323.996589][T19926] do_syscall_64+0xc9/0x1c0 [ 323.996622][T19926] ? clear_bhb_loop+0x25/0x80 [ 323.996649][T19926] ? clear_bhb_loop+0x25/0x80 [ 323.996674][T19926] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 323.996698][T19926] RIP: 0033:0x7f2de4afe169 [ 323.996716][T19926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.996735][T19926] RSP: 002b:00007f2de3167038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 323.996754][T19926] RAX: ffffffffffffffda RBX: 00007f2de4d25fa0 RCX: 00007f2de4afe169 [ 323.996767][T19926] RDX: 0000000000000000 RSI: 0000000001400000 RDI: 0000200000000000 [ 323.996782][T19926] RBP: 00007f2de3167090 R08: ffffffffffffffff R09: 0000000000000000 [ 323.996796][T19926] R10: 00000000000c3072 R11: 0000000000000246 R12: 0000000000000002 [ 323.996811][T19926] R13: 0000000000000000 R14: 00007f2de4d25fa0 R15: 00007ffdf92d76a8 [ 323.996835][T19926] [ 324.316322][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 324.651409][T19930] loop8: detected capacity change from 0 to 256 [ 324.771523][T19939] loop5: detected capacity change from 0 to 128 [ 324.927733][T19947] Invalid ELF header magic: != ELF [ 324.938642][T19939] syz.5.5048: attempt to access beyond end of device [ 324.938642][T19939] loop5: rw=0, sector=97, nr_sectors = 128 limit=128 [ 325.366295][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 325.844430][ T8408] kworker/u8:58: attempt to access beyond end of device [ 325.844430][ T8408] loop5: rw=1, sector=225, nr_sectors = 816 limit=128 [ 326.052915][T19963] netlink: 24 bytes leftover after parsing attributes in process `syz.5.5058'. [ 326.054649][T19975] loop8: detected capacity change from 0 to 256 [ 326.069214][ T29] kauditd_printk_skb: 323 callbacks suppressed [ 326.069229][ T29] audit: type=1400 audit(275910817.344:19254): avc: denied { recv } for pid=19958 comm="syz.7.5057" saddr=10.128.0.163 src=35860 daddr=10.128.0.52 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 326.131787][T19977] loop6: detected capacity change from 0 to 512 [ 326.132454][T19977] EXT4-fs: inline encryption not supported [ 326.142294][T19977] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 326.142312][T19977] EXT4-fs (loop6): feature flags set on rev 0 fs, running e2fsck is recommended [ 326.142388][T19977] EXT4-fs (loop6): blocks per group (39) and clusters per group (32768) inconsistent [ 326.252054][T19983] FAULT_INJECTION: forcing a failure. [ 326.252054][T19983] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.265205][T19983] CPU: 0 UID: 0 PID: 19983 Comm: syz.8.5063 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 326.265293][T19983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 326.265308][T19983] Call Trace: [ 326.265316][T19983] [ 326.265324][T19983] dump_stack_lvl+0xf6/0x150 [ 326.265348][T19983] dump_stack+0x15/0x1a [ 326.265364][T19983] should_fail_ex+0x261/0x270 [ 326.265463][T19983] should_fail+0xb/0x10 [ 326.265565][T19983] should_fail_usercopy+0x1a/0x20 [ 326.265662][T19983] strncpy_from_user+0x25/0x230 [ 326.265691][T19983] ? getname_flags+0x81/0x3b0 [ 326.265718][T19983] getname_flags+0xb0/0x3b0 [ 326.265794][T19983] user_path_at+0x26/0x140 [ 326.265823][T19983] __se_sys_mount+0x25e/0x2e0 [ 326.265861][T19983] __x64_sys_mount+0x67/0x80 [ 326.265957][T19983] x64_sys_call+0xd11/0x2e10 [ 326.265987][T19983] do_syscall_64+0xc9/0x1c0 [ 326.266049][T19983] ? clear_bhb_loop+0x25/0x80 [ 326.266071][T19983] ? clear_bhb_loop+0x25/0x80 [ 326.266097][T19983] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.266123][T19983] RIP: 0033:0x7f04b460e169 [ 326.266138][T19983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.266236][T19983] RSP: 002b:00007f04b2c77038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 326.266259][T19983] RAX: ffffffffffffffda RBX: 00007f04b4835fa0 RCX: 00007f04b460e169 [ 326.266274][T19983] RDX: 0000200000000180 RSI: 0000200000000140 RDI: 0000200000000100 [ 326.266341][T19983] RBP: 00007f04b2c77090 R08: 00002000000003c0 R09: 0000000000000000 [ 326.266354][T19983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.266368][T19983] R13: 0000000000000000 R14: 00007f04b4835fa0 R15: 00007ffc4c21beb8 [ 326.266393][T19983] [ 326.426350][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 326.491682][T19987] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 326.616050][ T29] audit: type=1326 audit(275910817.884:19255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19986 comm="syz.0.5065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 326.639915][ T29] audit: type=1326 audit(275910817.884:19256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19986 comm="syz.0.5065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 327.049378][ T29] audit: type=1326 audit(275910817.944:19257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19986 comm="syz.0.5065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 327.073780][ T29] audit: type=1326 audit(275910817.944:19258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19986 comm="syz.0.5065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 327.097537][ T29] audit: type=1326 audit(275910817.944:19259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19986 comm="syz.0.5065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 327.121191][ T29] audit: type=1326 audit(275910817.944:19260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19986 comm="syz.0.5065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 327.145159][ T29] audit: type=1326 audit(275910817.944:19261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19986 comm="syz.0.5065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 327.168716][ T29] audit: type=1326 audit(275910817.944:19262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19986 comm="syz.0.5065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 327.192252][ T29] audit: type=1326 audit(275910817.954:19263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19986 comm="syz.0.5065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f109a59cc1f code=0x7ffc0000 [ 327.361284][T19998] loop6: detected capacity change from 0 to 8192 [ 327.436309][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 327.836601][ T2576] unregister_netdevice: waiting for batadv0 to become free. Usage count = 3 [ 327.903495][T20006] syzkaller0: entered promiscuous mode [ 327.909214][T20006] syzkaller0: entered allmulticast mode [ 328.476295][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 328.901835][T20027] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 328.963761][T20035] SELinux: Context system_u:object_r:net_conf_t:s0 is not valid (left unmapped). [ 329.082069][T20043] loop6: detected capacity change from 0 to 1024 [ 329.089024][T20043] EXT4-fs: Ignoring removed orlov option [ 329.101179][T20045] loop5: detected capacity change from 0 to 512 [ 329.149879][T20043] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 329.167967][T20045] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 329.186256][T20050] loop8: detected capacity change from 0 to 512 [ 329.193346][T20050] EXT4-fs: Ignoring removed nomblk_io_submit option [ 329.203775][T20050] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 329.214457][T20045] EXT4-fs error (device loop5): ext4_do_update_inode:5211: inode #2: comm syz.5.5087: corrupted inode contents [ 329.232877][T20052] SELinux: ebitmap: truncated map [ 329.256656][T20045] EXT4-fs error (device loop5): ext4_dirty_inode:6103: inode #2: comm syz.5.5087: mark_inode_dirty error [ 329.257147][T20052] SELinux: failed to load policy [ 329.273549][T20045] EXT4-fs error (device loop5): ext4_do_update_inode:5211: inode #2: comm syz.5.5087: corrupted inode contents [ 329.280671][T20051] SELinux: policydb magic number 0xf97c0001 does not match expected magic number 0xf97cff8c [ 329.288255][T20050] EXT4-fs error (device loop8): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 329.324689][T20051] SELinux: failed to load policy [ 329.472210][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 329.516350][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 329.524577][T20045] EXT4-fs error (device loop5): __ext4_ext_dirty:207: inode #2: comm syz.5.5087: mark_inode_dirty error [ 329.536091][T20050] EXT4-fs (loop8): 1 truncate cleaned up [ 329.542956][T20050] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 329.592728][T15026] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 329.619960][T20066] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 329.658537][T20066] SELinux: failed to load policy [ 329.672290][T15064] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 329.860974][T20071] netlink: 24 bytes leftover after parsing attributes in process `syz.0.5097'. [ 329.912077][T20074] FAULT_INJECTION: forcing a failure. [ 329.912077][T20074] name failslab, interval 1, probability 0, space 0, times 0 [ 329.925097][T20074] CPU: 1 UID: 0 PID: 20074 Comm: syz.0.5098 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 329.925197][T20074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 329.925213][T20074] Call Trace: [ 329.925222][T20074] [ 329.925232][T20074] dump_stack_lvl+0xf6/0x150 [ 329.925300][T20074] dump_stack+0x15/0x1a [ 329.925321][T20074] should_fail_ex+0x261/0x270 [ 329.925355][T20074] should_failslab+0x8f/0xb0 [ 329.925388][T20074] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 329.925416][T20074] ? sidtab_sid2str_get+0xb8/0x140 [ 329.925501][T20074] ? vsnprintf+0x84d/0x8a0 [ 329.925526][T20074] kmemdup_noprof+0x2b/0x70 [ 329.925555][T20074] sidtab_sid2str_get+0xb8/0x140 [ 329.925584][T20074] security_sid_to_context_core+0x1eb/0x2f0 [ 329.925614][T20074] security_sid_to_context+0x27/0x30 [ 329.925683][T20074] selinux_lsmprop_to_secctx+0x6c/0xf0 [ 329.925713][T20074] security_lsmprop_to_secctx+0x40/0x80 [ 329.925807][T20074] audit_log_task_context+0x7a/0x180 [ 329.925834][T20074] audit_log_task+0xfb/0x250 [ 329.925896][T20074] audit_seccomp+0x68/0x130 [ 329.925920][T20074] __seccomp_filter+0x694/0x10e0 [ 329.926007][T20074] __secure_computing+0x7e/0x160 [ 329.926043][T20074] syscall_trace_enter+0xcf/0x1f0 [ 329.926093][T20074] ? fpregs_assert_state_consistent+0x83/0xa0 [ 329.926134][T20074] do_syscall_64+0xaa/0x1c0 [ 329.926170][T20074] ? clear_bhb_loop+0x25/0x80 [ 329.926242][T20074] ? clear_bhb_loop+0x25/0x80 [ 329.926269][T20074] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 329.926293][T20074] RIP: 0033:0x7f109a59cb7c [ 329.926310][T20074] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 329.926332][T20074] RSP: 002b:00007f1098c07030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 329.926366][T20074] RAX: ffffffffffffffda RBX: 00007f109a7c5fa0 RCX: 00007f109a59cb7c [ 329.926380][T20074] RDX: 000000000000000f RSI: 00007f1098c070a0 RDI: 0000000000000007 [ 329.926493][T20074] RBP: 00007f1098c07090 R08: 0000000000000000 R09: 0000000000000000 [ 329.926561][T20074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 329.926574][T20074] R13: 0000000000000000 R14: 00007f109a7c5fa0 R15: 00007ffcef2887c8 [ 329.926651][T20074] [ 330.190421][T20082] FAULT_INJECTION: forcing a failure. [ 330.190421][T20082] name failslab, interval 1, probability 0, space 0, times 0 [ 330.203146][T20082] CPU: 1 UID: 0 PID: 20082 Comm: syz.5.5100 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 330.203179][T20082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 330.203193][T20082] Call Trace: [ 330.203201][T20082] [ 330.203211][T20082] dump_stack_lvl+0xf6/0x150 [ 330.203238][T20082] dump_stack+0x15/0x1a [ 330.203256][T20082] should_fail_ex+0x261/0x270 [ 330.203326][T20082] should_failslab+0x8f/0xb0 [ 330.203360][T20082] __kmalloc_cache_noprof+0x55/0x320 [ 330.203383][T20082] ? audit_log_d_path+0x8e/0x150 [ 330.203474][T20082] audit_log_d_path+0x8e/0x150 [ 330.203502][T20082] audit_log_d_path_exe+0x42/0x70 [ 330.203575][T20082] audit_log_task+0x1f1/0x250 [ 330.203603][T20082] audit_seccomp+0x68/0x130 [ 330.203627][T20082] __seccomp_filter+0x694/0x10e0 [ 330.203663][T20082] ? vfs_write+0x669/0x950 [ 330.203764][T20082] ? putname+0xe1/0x100 [ 330.203786][T20082] __secure_computing+0x7e/0x160 [ 330.203826][T20082] syscall_trace_enter+0xcf/0x1f0 [ 330.203851][T20082] ? fpregs_assert_state_consistent+0x83/0xa0 [ 330.203880][T20082] do_syscall_64+0xaa/0x1c0 [ 330.203905][T20082] ? clear_bhb_loop+0x25/0x80 [ 330.203924][T20082] ? clear_bhb_loop+0x25/0x80 [ 330.203996][T20082] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 330.204014][T20082] RIP: 0033:0x7fd65f17e169 [ 330.204028][T20082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 330.204042][T20082] RSP: 002b:00007fd65d7e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000111 [ 330.204059][T20082] RAX: ffffffffffffffda RBX: 00007fd65f3a5fa0 RCX: 00007fd65f17e169 [ 330.204069][T20082] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 00002000000002c0 [ 330.204080][T20082] RBP: 00007fd65d7e7090 R08: 0000000000000000 R09: 0000000000000000 [ 330.204133][T20082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.204143][T20082] R13: 0000000000000000 R14: 00007fd65f3a5fa0 R15: 00007ffff2bf9438 [ 330.204161][T20082] [ 330.423181][T20088] netlink: 'syz.8.5099': attribute type 10 has an invalid length. [ 330.431336][T20088] netlink: 40 bytes leftover after parsing attributes in process `syz.8.5099'. [ 330.441305][T20088] dummy0: entered promiscuous mode [ 330.451206][T20088] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 330.467213][T20086] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 330.566295][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 330.602680][T20115] loop5: detected capacity change from 0 to 128 [ 330.661748][T20115] syz.5.5109: attempt to access beyond end of device [ 330.661748][T20115] loop5: rw=0, sector=97, nr_sectors = 128 limit=128 [ 330.724414][ T5985] kworker/u8:17: attempt to access beyond end of device [ 330.724414][ T5985] loop5: rw=1, sector=225, nr_sectors = 816 limit=128 [ 330.872654][T20154] SELinux: Context system_u:object_r:init_var_run_t:s0 is not valid (left unmapped). [ 330.902209][T20157] FAULT_INJECTION: forcing a failure. [ 330.902209][T20157] name failslab, interval 1, probability 0, space 0, times 0 [ 330.914969][T20157] CPU: 0 UID: 0 PID: 20157 Comm: syz.5.5123 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 330.915000][T20157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 330.915063][T20157] Call Trace: [ 330.915150][T20157] [ 330.915159][T20157] dump_stack_lvl+0xf6/0x150 [ 330.915185][T20157] dump_stack+0x15/0x1a [ 330.915211][T20157] should_fail_ex+0x261/0x270 [ 330.915244][T20157] should_failslab+0x8f/0xb0 [ 330.915277][T20157] __kmalloc_cache_noprof+0x55/0x320 [ 330.915302][T20157] ? flow_change+0x1d0/0xcf0 [ 330.915329][T20157] flow_change+0x1d0/0xcf0 [ 330.915352][T20157] ? __rcu_read_unlock+0x4e/0x70 [ 330.915445][T20157] ? should_fail_ex+0xd7/0x270 [ 330.915485][T20157] tc_new_tfilter+0xe8d/0x1110 [ 330.915536][T20157] ? __pfx_tc_new_tfilter+0x10/0x10 [ 330.915567][T20157] rtnetlink_rcv_msg+0x65a/0x740 [ 330.915628][T20157] ? should_fail_ex+0xd7/0x270 [ 330.915657][T20157] ? ref_tracker_free+0x3b8/0x420 [ 330.915688][T20157] netlink_rcv_skb+0x12f/0x230 [ 330.915717][T20157] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 330.915774][T20157] rtnetlink_rcv+0x1c/0x30 [ 330.915803][T20157] netlink_unicast+0x605/0x6c0 [ 330.915833][T20157] netlink_sendmsg+0x609/0x720 [ 330.915870][T20157] ? __pfx_netlink_sendmsg+0x10/0x10 [ 330.915900][T20157] __sock_sendmsg+0x140/0x180 [ 330.915990][T20157] ____sys_sendmsg+0x350/0x4e0 [ 330.916083][T20157] __sys_sendmsg+0x1a0/0x240 [ 330.916204][T20157] __x64_sys_sendmsg+0x46/0x50 [ 330.916239][T20157] x64_sys_call+0x26f3/0x2e10 [ 330.916266][T20157] do_syscall_64+0xc9/0x1c0 [ 330.916303][T20157] ? clear_bhb_loop+0x25/0x80 [ 330.916366][T20157] ? clear_bhb_loop+0x25/0x80 [ 330.916391][T20157] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 330.916417][T20157] RIP: 0033:0x7fd65f17e169 [ 330.916434][T20157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 330.916515][T20157] RSP: 002b:00007fd65d7e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 330.916589][T20157] RAX: ffffffffffffffda RBX: 00007fd65f3a5fa0 RCX: 00007fd65f17e169 [ 330.916675][T20157] RDX: 00000000200400d4 RSI: 0000200000006040 RDI: 0000000000000004 [ 330.916690][T20157] RBP: 00007fd65d7e7090 R08: 0000000000000000 R09: 0000000000000000 [ 330.916703][T20157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.916715][T20157] R13: 0000000000000000 R14: 00007fd65f3a5fa0 R15: 00007ffff2bf9438 [ 330.916752][T20157] [ 331.168891][T20159] FAULT_INJECTION: forcing a failure. [ 331.168891][T20159] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.182235][T20159] CPU: 1 UID: 0 PID: 20159 Comm: syz.6.5127 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 331.182266][T20159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 331.182334][T20159] Call Trace: [ 331.182343][T20159] [ 331.182353][T20159] dump_stack_lvl+0xf6/0x150 [ 331.182420][T20159] dump_stack+0x15/0x1a [ 331.182440][T20159] should_fail_ex+0x261/0x270 [ 331.182522][T20159] should_fail+0xb/0x10 [ 331.182550][T20159] should_fail_usercopy+0x1a/0x20 [ 331.182585][T20159] _copy_to_user+0x20/0xa0 [ 331.182625][T20159] simple_read_from_buffer+0xb2/0x130 [ 331.182713][T20159] proc_fail_nth_read+0x103/0x140 [ 331.182830][T20159] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 331.182854][T20159] vfs_read+0x1b2/0x710 [ 331.182965][T20159] ? __rcu_read_unlock+0x4e/0x70 [ 331.183004][T20159] ? __fget_files+0x186/0x1c0 [ 331.183031][T20159] ksys_read+0xeb/0x1b0 [ 331.183066][T20159] __x64_sys_read+0x42/0x50 [ 331.183099][T20159] x64_sys_call+0x2a3b/0x2e10 [ 331.183195][T20159] do_syscall_64+0xc9/0x1c0 [ 331.183299][T20159] ? clear_bhb_loop+0x25/0x80 [ 331.183325][T20159] ? clear_bhb_loop+0x25/0x80 [ 331.183350][T20159] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 331.183408][T20159] RIP: 0033:0x7f2de4afcb7c [ 331.183426][T20159] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 331.183527][T20159] RSP: 002b:00007f2de3167030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 331.183550][T20159] RAX: ffffffffffffffda RBX: 00007f2de4d25fa0 RCX: 00007f2de4afcb7c [ 331.183565][T20159] RDX: 000000000000000f RSI: 00007f2de31670a0 RDI: 0000000000000006 [ 331.183580][T20159] RBP: 00007f2de3167090 R08: 0000000000000000 R09: 0000000000000000 [ 331.183595][T20159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 331.183687][T20159] R13: 0000000000000000 R14: 00007f2de4d25fa0 R15: 00007ffdf92d76a8 [ 331.183711][T20159] [ 331.596319][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 331.664193][T20179] loop6: detected capacity change from 0 to 2048 [ 331.720570][T20179] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 332.015618][T20193] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 332.029185][T20195] loop8: detected capacity change from 0 to 512 [ 332.043322][T20195] EXT4-fs (loop8): feature flags set on rev 0 fs, running e2fsck is recommended [ 332.055647][ T29] kauditd_printk_skb: 358 callbacks suppressed [ 332.055666][ T29] audit: type=1326 audit(275910823.314:19621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20192 comm="syz.5.5140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 332.087393][ T29] audit: type=1326 audit(275910823.314:19622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20192 comm="syz.5.5140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 332.111335][ T29] audit: type=1326 audit(275910823.314:19623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20192 comm="syz.5.5140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=271 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 332.136108][ T29] audit: type=1400 audit(275910823.354:19624): avc: denied { ioctl } for pid=20196 comm="syz.0.5142" path="socket:[62681]" dev="sockfs" ino=62681 ioctlcmd=0x9423 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 332.161995][ T29] audit: type=1326 audit(275910823.394:19625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20192 comm="syz.5.5140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 332.164723][T20195] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 332.185599][ T29] audit: type=1326 audit(275910823.394:19626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20192 comm="syz.5.5140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 332.244785][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 332.273603][T20204] SELinux: Context system_u:object_r:man_t:s0 is not valid (left unmapped). [ 332.285185][ T29] audit: type=1400 audit(275910823.564:19627): avc: denied { relabelto } for pid=20202 comm="syz.0.5143" name="508" dev="tmpfs" ino=2671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 332.311815][ T29] audit: type=1400 audit(275910823.564:19628): avc: denied { associate } for pid=20202 comm="syz.0.5143" name="508" dev="tmpfs" ino=2671 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:man_t:s0" [ 332.341319][ T29] audit: type=1400 audit(275910823.594:19629): avc: denied { write } for pid=12168 comm="syz-executor" name="508" dev="tmpfs" ino=2671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 332.367776][ T29] audit: type=1400 audit(275910823.594:19630): avc: denied { remove_name } for pid=12168 comm="syz-executor" name="binderfs" dev="tmpfs" ino=2675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 332.372312][T15064] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 332.404053][T20211] loop6: detected capacity change from 0 to 512 [ 332.421863][T20213] FAULT_INJECTION: forcing a failure. [ 332.421863][T20213] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 332.435338][T20213] CPU: 0 UID: 0 PID: 20213 Comm: syz.7.5150 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 332.435371][T20213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 332.435385][T20213] Call Trace: [ 332.435394][T20213] [ 332.435402][T20213] dump_stack_lvl+0xf6/0x150 [ 332.435426][T20213] dump_stack+0x15/0x1a [ 332.435442][T20213] should_fail_ex+0x261/0x270 [ 332.435470][T20213] should_fail_alloc_page+0xfd/0x110 [ 332.435502][T20213] __alloc_frozen_pages_noprof+0x11d/0x360 [ 332.435535][T20213] alloc_pages_mpol+0xb6/0x260 [ 332.435560][T20213] alloc_pages_noprof+0xe8/0x130 [ 332.435583][T20213] __pmd_alloc+0x4d/0x440 [ 332.435603][T20213] copy_page_range+0x374c/0x3a20 [ 332.435630][T20213] ? kmem_cache_alloc_bulk_noprof+0x263/0x4a0 [ 332.435737][T20213] ? mod_objcg_state+0x3f9/0x530 [ 332.435777][T20213] ? mas_wr_store_type+0x6da/0xb50 [ 332.435813][T20213] ? mas_store+0x546/0x740 [ 332.435845][T20213] copy_mm+0xabc/0x1360 [ 332.435881][T20213] copy_process+0xcfc/0x1f60 [ 332.435914][T20213] kernel_clone+0x168/0x5d0 [ 332.435944][T20213] __x64_sys_clone+0xe9/0x120 [ 332.435981][T20213] x64_sys_call+0x2dc9/0x2e10 [ 332.436119][T20213] do_syscall_64+0xc9/0x1c0 [ 332.436151][T20213] ? clear_bhb_loop+0x25/0x80 [ 332.436174][T20213] ? clear_bhb_loop+0x25/0x80 [ 332.436195][T20213] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 332.436215][T20213] RIP: 0033:0x7fda2060e169 [ 332.436237][T20213] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 332.436264][T20213] RSP: 002b:00007fda1ec76fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 332.436308][T20213] RAX: ffffffffffffffda RBX: 00007fda20835fa0 RCX: 00007fda2060e169 [ 332.436320][T20213] RDX: 0000000000000000 RSI: fffffffffffffe60 RDI: 0000000006063000 [ 332.436332][T20213] RBP: 00007fda1ec77090 R08: 0000000000000000 R09: 0000000000000000 [ 332.436343][T20213] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 332.436355][T20213] R13: 0000000000000000 R14: 00007fda20835fa0 R15: 00007ffe38d58ff8 [ 332.436380][T20213] [ 332.647138][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 332.698988][T20211] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #3: comm syz.6.5145: corrupted inode contents [ 332.726014][T20211] EXT4-fs error (device loop6): ext4_dirty_inode:6103: inode #3: comm syz.6.5145: mark_inode_dirty error [ 332.767295][T20224] loop8: detected capacity change from 0 to 4096 [ 332.858421][T20231] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 332.868206][T20211] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #3: comm syz.6.5145: corrupted inode contents [ 332.893071][T20224] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 332.905958][T20211] EXT4-fs error (device loop6): __ext4_ext_dirty:207: inode #3: comm syz.6.5145: mark_inode_dirty error [ 332.928126][T20211] EXT4-fs error (device loop6): ext4_acquire_dquot:6935: comm syz.6.5145: Failed to acquire dquot type 0 [ 333.130534][T20211] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #16: comm syz.6.5145: corrupted inode contents [ 333.159518][T20211] EXT4-fs error (device loop6): ext4_dirty_inode:6103: inode #16: comm syz.6.5145: mark_inode_dirty error [ 333.243465][T20211] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #16: comm syz.6.5145: corrupted inode contents [ 333.365745][T20211] EXT4-fs error (device loop6): __ext4_ext_dirty:207: inode #16: comm syz.6.5145: mark_inode_dirty error [ 333.366421][T15064] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 333.392611][T20211] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #16: comm syz.6.5145: corrupted inode contents [ 333.417278][T20211] EXT4-fs error (device loop6) in ext4_orphan_del:305: Corrupt filesystem [ 333.432511][T20211] EXT4-fs error (device loop6): ext4_do_update_inode:5211: inode #16: comm syz.6.5145: corrupted inode contents [ 333.447379][T20241] openvswitch: netlink: Message has 6 unknown bytes. [ 333.457471][T20241] xt_hashlimit: max too large, truncated to 1048576 [ 333.465207][T20241] Cannot find set identified by id 0 to match [ 333.465900][T20211] EXT4-fs error (device loop6): ext4_truncate:4255: inode #16: comm syz.6.5145: mark_inode_dirty error [ 333.499819][T20211] EXT4-fs error (device loop6) in ext4_process_orphan:347: Corrupt filesystem [ 333.514896][T20211] EXT4-fs (loop6): 1 truncate cleaned up [ 333.527935][T20247] loop7: detected capacity change from 0 to 164 [ 333.534895][T20245] loop8: detected capacity change from 0 to 512 [ 333.541638][T20211] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 333.555010][T20245] EXT4-fs: Ignoring removed nomblk_io_submit option [ 333.562502][T20245] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 333.576303][T20247] Unable to read rock-ridge attributes [ 333.686363][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 333.714535][T20211] EXT4-fs error (device loop6): ext4_xattr_block_get:593: inode #15: comm syz.6.5145: corrupted xattr block 19: invalid ea_ino [ 333.731263][T20245] EXT4-fs error (device loop8): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 333.764916][T20245] EXT4-fs (loop8): 1 truncate cleaned up [ 333.775291][T20211] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop6 ino=15 [ 333.790178][T20245] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 333.815760][T20211] EXT4-fs error (device loop6): ext4_xattr_block_get:593: inode #15: comm syz.6.5145: corrupted xattr block 19: invalid ea_ino [ 333.831579][T20250] EXT4-fs error (device loop6): ext4_xattr_block_get:593: inode #15: comm syz.6.5145: corrupted xattr block 19: invalid ea_ino [ 333.847326][T20250] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop6 ino=15 [ 333.864137][T20266] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 333.869807][T20256] tipc: New replicast peer: 0.0.255.255 [ 333.879761][T20256] tipc: Enabled bearer , priority 10 [ 333.885631][T20211] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop6 ino=15 [ 333.898272][T15064] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 333.901964][T20211] EXT4-fs error (device loop6): ext4_xattr_block_get:593: inode #15: comm syz.6.5145: corrupted xattr block 19: invalid ea_ino [ 333.928569][T20250] EXT4-fs error (device loop6): ext4_xattr_block_get:593: inode #15: comm syz.6.5145: corrupted xattr block 19: invalid ea_ino [ 333.936606][T20211] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop6 ino=15 [ 333.957009][T20211] EXT4-fs error (device loop6): ext4_acquire_dquot:6935: comm syz.6.5145: Failed to acquire dquot type 1 [ 333.992026][T20250] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop6 ino=15 [ 334.116715][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 334.136377][ T3412] EXT4-fs error (device loop6): ext4_release_dquot:6971: comm kworker/u8:7: Failed to release dquot type 0 [ 334.275652][T20287] FAULT_INJECTION: forcing a failure. [ 334.275652][T20287] name failslab, interval 1, probability 0, space 0, times 0 [ 334.288570][T20287] CPU: 0 UID: 0 PID: 20287 Comm: syz.8.5169 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 334.288603][T20287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 334.288619][T20287] Call Trace: [ 334.288627][T20287] [ 334.288637][T20287] dump_stack_lvl+0xf6/0x150 [ 334.288663][T20287] dump_stack+0x15/0x1a [ 334.288709][T20287] should_fail_ex+0x261/0x270 [ 334.288743][T20287] should_failslab+0x8f/0xb0 [ 334.288782][T20287] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 334.288807][T20287] ? __alloc_skb+0x10d/0x320 [ 334.288854][T20287] __alloc_skb+0x10d/0x320 [ 334.288955][T20287] netlink_alloc_large_skb+0xad/0xe0 [ 334.289061][T20287] netlink_sendmsg+0x3da/0x720 [ 334.289107][T20287] ? __pfx_netlink_sendmsg+0x10/0x10 [ 334.289138][T20287] __sock_sendmsg+0x140/0x180 [ 334.289157][T20287] ____sys_sendmsg+0x350/0x4e0 [ 334.289262][T20287] __sys_sendmsg+0x1a0/0x240 [ 334.289312][T20287] __x64_sys_sendmsg+0x46/0x50 [ 334.289339][T20287] x64_sys_call+0x26f3/0x2e10 [ 334.289423][T20287] do_syscall_64+0xc9/0x1c0 [ 334.289459][T20287] ? clear_bhb_loop+0x25/0x80 [ 334.289480][T20287] ? clear_bhb_loop+0x25/0x80 [ 334.289574][T20287] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 334.289600][T20287] RIP: 0033:0x7f04b460e169 [ 334.289679][T20287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 334.289701][T20287] RSP: 002b:00007f04b2c77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 334.289741][T20287] RAX: ffffffffffffffda RBX: 00007f04b4835fa0 RCX: 00007f04b460e169 [ 334.289753][T20287] RDX: 0000000000000000 RSI: 0000200000007940 RDI: 0000000000000005 [ 334.289765][T20287] RBP: 00007f04b2c77090 R08: 0000000000000000 R09: 0000000000000000 [ 334.289777][T20287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 334.289856][T20287] R13: 0000000000000000 R14: 00007f04b4835fa0 R15: 00007ffc4c21beb8 [ 334.289881][T20287] [ 334.293616][T20283] SELinux: policydb magic number 0x6c65732f does not match expected magic number 0xf97cff8c [ 334.478709][ T3412] EXT4-fs error (device loop6): ext4_release_dquot:6971: comm kworker/u8:7: Failed to release dquot type 1 [ 334.590445][T20283] SELinux: failed to load policy [ 334.626389][T20295] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 334.726319][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 334.940419][T20306] bond0: entered promiscuous mode [ 334.945669][T20306] dummy0: entered promiscuous mode [ 335.031978][T20306] batadv0: entered promiscuous mode [ 335.136101][T20306] debugfs: Directory 'hsr1' with parent 'hsr' already present! [ 335.166601][T20306] Cannot create hsr debugfs directory [ 335.179537][T20306] 8021q: adding VLAN 0 to HW filter on device hsr1 [ 335.190415][T20306] bond0: left promiscuous mode [ 335.195393][T20306] dummy0: left promiscuous mode [ 335.208770][T20306] batadv0: left promiscuous mode [ 335.434528][T20323] loop7: detected capacity change from 0 to 512 [ 335.551611][T20323] EXT4-fs: Ignoring removed nomblk_io_submit option [ 335.645384][T20323] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 335.737432][T20323] EXT4-fs error (device loop7): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 335.756299][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 335.765491][T20323] EXT4-fs (loop7): 1 truncate cleaned up [ 335.775038][T20323] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 335.839800][T12762] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 336.058926][T20356] Invalid ELF header magic: != ELF [ 336.699938][T20373] netlink: 28 bytes leftover after parsing attributes in process `syz.7.5189'. [ 336.708994][T20373] netlink: 108 bytes leftover after parsing attributes in process `syz.7.5189'. [ 336.730359][T20373] netlink: 28 bytes leftover after parsing attributes in process `syz.7.5189'. [ 336.767141][T20373] netlink: 108 bytes leftover after parsing attributes in process `syz.7.5189'. [ 336.776284][T20373] netlink: 84 bytes leftover after parsing attributes in process `syz.7.5189'. [ 336.796297][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 337.058830][T20415] loop5: detected capacity change from 0 to 1024 [ 337.132280][T20415] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 337.160652][T20413] loop7: detected capacity change from 0 to 128 [ 337.322894][T20422] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5197'. [ 337.556945][ T29] kauditd_printk_skb: 83 callbacks suppressed [ 337.556963][ T29] audit: type=1326 audit(275910828.834:19708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20425 comm="syz.8.5198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04b460e169 code=0x7ffc0000 [ 337.656309][ T29] audit: type=1326 audit(275910828.884:19709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20425 comm="syz.8.5198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04b460e169 code=0x7ffc0000 [ 337.681146][ T29] audit: type=1326 audit(275910828.884:19710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20425 comm="syz.8.5198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f04b460e169 code=0x7ffc0000 [ 337.704711][ T29] audit: type=1326 audit(275910828.884:19711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20425 comm="syz.8.5198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04b460e169 code=0x7ffc0000 [ 337.729195][ T29] audit: type=1326 audit(275910828.884:19712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20425 comm="syz.8.5198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04b460e169 code=0x7ffc0000 [ 337.753093][ T29] audit: type=1326 audit(275910828.884:19713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20425 comm="syz.8.5198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=172 compat=0 ip=0x7f04b460e169 code=0x7ffc0000 [ 337.777745][ T29] audit: type=1326 audit(275910828.884:19714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20425 comm="syz.8.5198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04b460e169 code=0x7ffc0000 [ 337.801417][ T29] audit: type=1326 audit(275910828.884:19715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20425 comm="syz.8.5198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04b460e169 code=0x7ffc0000 [ 337.814380][T20413] syz.7.5196: attempt to access beyond end of device [ 337.814380][T20413] loop7: rw=0, sector=97, nr_sectors = 128 limit=128 [ 337.846641][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 337.933343][T20437] SELinux: ebitmap: truncated map [ 337.949467][T20437] SELinux: failed to load policy [ 338.415117][T20460] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5207'. [ 338.424289][T20460] netlink: 108 bytes leftover after parsing attributes in process `syz.8.5207'. [ 338.440987][ T9299] kworker/u8:69: attempt to access beyond end of device [ 338.440987][ T9299] loop7: rw=1, sector=225, nr_sectors = 816 limit=128 [ 338.576212][T20460] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5207'. [ 338.604538][T20460] netlink: 108 bytes leftover after parsing attributes in process `syz.8.5207'. [ 338.876357][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 339.281416][T20496] FAULT_INJECTION: forcing a failure. [ 339.281416][T20496] name failslab, interval 1, probability 0, space 0, times 0 [ 339.294708][T20496] CPU: 1 UID: 0 PID: 20496 Comm: syz.0.5219 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 339.294743][T20496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 339.294819][T20496] Call Trace: [ 339.294828][T20496] [ 339.294837][T20496] dump_stack_lvl+0xf6/0x150 [ 339.294865][T20496] dump_stack+0x15/0x1a [ 339.294881][T20496] should_fail_ex+0x261/0x270 [ 339.294912][T20496] should_failslab+0x8f/0xb0 [ 339.295022][T20496] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 339.295053][T20496] ? sidtab_sid2str_get+0xb8/0x140 [ 339.295151][T20496] ? vsnprintf+0x84d/0x8a0 [ 339.295173][T20496] kmemdup_noprof+0x2b/0x70 [ 339.295200][T20496] sidtab_sid2str_get+0xb8/0x140 [ 339.295281][T20496] security_sid_to_context_core+0x1eb/0x2f0 [ 339.295311][T20496] security_sid_to_context+0x27/0x30 [ 339.295345][T20496] selinux_lsmprop_to_secctx+0x6c/0xf0 [ 339.295376][T20496] security_lsmprop_to_secctx+0x40/0x80 [ 339.295417][T20496] audit_log_task_context+0x7a/0x180 [ 339.295444][T20496] audit_log_task+0xfb/0x250 [ 339.295466][T20496] audit_seccomp+0x68/0x130 [ 339.295485][T20496] __seccomp_filter+0x694/0x10e0 [ 339.295535][T20496] ? avc_has_perm_noaudit+0x1cc/0x210 [ 339.295566][T20496] ? kimage_free+0x55/0x700 [ 339.295588][T20496] ? avc_has_perm+0xd6/0x150 [ 339.295618][T20496] __secure_computing+0x7e/0x160 [ 339.295664][T20496] syscall_trace_enter+0xcf/0x1f0 [ 339.295693][T20496] ? fpregs_assert_state_consistent+0x83/0xa0 [ 339.295736][T20496] do_syscall_64+0xaa/0x1c0 [ 339.295851][T20496] ? clear_bhb_loop+0x25/0x80 [ 339.295877][T20496] ? clear_bhb_loop+0x25/0x80 [ 339.295904][T20496] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 339.295927][T20496] RIP: 0033:0x7f109a59cb7c [ 339.295942][T20496] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 339.296008][T20496] RSP: 002b:00007f1098c07030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 339.296029][T20496] RAX: ffffffffffffffda RBX: 00007f109a7c5fa0 RCX: 00007f109a59cb7c [ 339.296051][T20496] RDX: 000000000000000f RSI: 00007f1098c070a0 RDI: 000000000000000a [ 339.296063][T20496] RBP: 00007f1098c07090 R08: 0000000000000000 R09: 0000000000000000 [ 339.296074][T20496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 339.296086][T20496] R13: 0000000000000000 R14: 00007f109a7c5fa0 R15: 00007ffcef2887c8 [ 339.296135][T20496] [ 339.296145][T20496] audit: error in audit_log_task_context [ 339.357730][ T29] audit: type=1326 audit(275910830.554:19716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20491 comm="syz.0.5219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 339.607106][T20506] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 339.640387][T20507] FAULT_INJECTION: forcing a failure. [ 339.640387][T20507] name failslab, interval 1, probability 0, space 0, times 0 [ 339.653227][T20507] CPU: 0 UID: 0 PID: 20507 Comm: syz.6.5223 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 339.653280][T20507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 339.653303][T20507] Call Trace: [ 339.653309][T20507] [ 339.653316][T20507] dump_stack_lvl+0xf6/0x150 [ 339.653342][T20507] dump_stack+0x15/0x1a [ 339.653361][T20507] should_fail_ex+0x261/0x270 [ 339.653394][T20507] should_failslab+0x8f/0xb0 [ 339.653457][T20507] __kmalloc_cache_noprof+0x55/0x320 [ 339.653480][T20507] ? v9fs_mount+0x56/0x580 [ 339.653515][T20507] v9fs_mount+0x56/0x580 [ 339.653547][T20507] ? __pfx_v9fs_mount+0x10/0x10 [ 339.653583][T20507] legacy_get_tree+0x77/0xd0 [ 339.653625][T20507] vfs_get_tree+0x56/0x1e0 [ 339.653674][T20507] do_new_mount+0x246/0x6b0 [ 339.653716][T20507] path_mount+0x49b/0xb30 [ 339.653932][T20507] __se_sys_mount+0x28f/0x2e0 [ 339.654083][T20507] __x64_sys_mount+0x67/0x80 [ 339.654180][T20507] x64_sys_call+0xd11/0x2e10 [ 339.654204][T20507] do_syscall_64+0xc9/0x1c0 [ 339.654239][T20507] ? clear_bhb_loop+0x25/0x80 [ 339.654281][T20507] ? clear_bhb_loop+0x25/0x80 [ 339.654316][T20507] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 339.654341][T20507] RIP: 0033:0x7f2de4afe169 [ 339.654359][T20507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 339.654452][T20507] RSP: 002b:00007f2de3167038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 339.654474][T20507] RAX: ffffffffffffffda RBX: 00007f2de4d25fa0 RCX: 00007f2de4afe169 [ 339.654487][T20507] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 339.654499][T20507] RBP: 00007f2de3167090 R08: 0000200000000500 R09: 0000000000000000 [ 339.654526][T20507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 339.654537][T20507] R13: 0000000000000000 R14: 00007f2de4d25fa0 R15: 00007ffdf92d76a8 [ 339.654561][T20507] [ 339.916331][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 340.153650][T20530] Invalid ELF header magic: != ELF [ 340.956305][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 341.028063][T20528] 9pnet: Could not find request transport: fd· [ 341.105161][T20532] loop6: detected capacity change from 0 to 8192 [ 341.127575][T20534] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 341.285402][T20532] loop6: p1 p2 [ 341.315661][T20532] loop6: p2 start 65535 is beyond EOD, truncated [ 341.499769][T20546] bond1: entered promiscuous mode [ 341.504877][T20546] bond1: entered allmulticast mode [ 341.514612][T20546] 8021q: adding VLAN 0 to HW filter on device bond1 [ 341.543413][T20546] bond1 (unregistering): Released all slaves [ 341.889196][T20559] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 341.939729][T20569] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 341.953478][T20569] SELinux: failed to load policy [ 341.976353][T20571] __nla_validate_parse: 1 callbacks suppressed [ 341.976371][T20571] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 341.996296][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 342.057631][T20571] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 342.071758][T20564] SELinux: ebitmap: truncated map [ 342.092042][T20564] SELinux: failed to load policy [ 342.115754][T20575] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 342.324380][T20581] bond1: entered promiscuous mode [ 342.329608][T20581] bond1: entered allmulticast mode [ 342.338335][T20581] 8021q: adding VLAN 0 to HW filter on device bond1 [ 342.362951][T20581] bond1 (unregistering): Released all slaves [ 342.552832][T20597] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 342.608529][T20604] Invalid ELF header magic: != ELF [ 342.652912][ T29] kauditd_printk_skb: 123 callbacks suppressed [ 342.653010][ T29] audit: type=1326 audit(275913411.923:19840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20593 comm="syz.7.5254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 342.812305][ T29] audit: type=1326 audit(275913411.963:19841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20593 comm="syz.7.5254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=271 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 342.836243][ T29] audit: type=1326 audit(275913412.023:19842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20593 comm="syz.7.5254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 342.860100][ T29] audit: type=1326 audit(275913412.023:19843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20593 comm="syz.7.5254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 342.884790][T20588] netlink: 'syz.8.5252': attribute type 5 has an invalid length. [ 343.000038][ T29] audit: type=1326 audit(275913412.263:19844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20607 comm="syz.7.5258" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 343.024329][ T29] audit: type=1326 audit(275913412.263:19845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20607 comm="syz.7.5258" exe="/root/syz-executor" sig=0 arch=c000003e syscall=208 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 343.048009][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 343.055893][ T29] audit: type=1326 audit(275913412.263:19846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20607 comm="syz.7.5258" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 343.281671][T20614] FAULT_INJECTION: forcing a failure. [ 343.281671][T20614] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 343.294973][T20614] CPU: 0 UID: 0 PID: 20614 Comm: syz.0.5260 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 343.295008][T20614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 343.295024][T20614] Call Trace: [ 343.295033][T20614] [ 343.295043][T20614] dump_stack_lvl+0xf6/0x150 [ 343.295068][T20614] dump_stack+0x15/0x1a [ 343.295124][T20614] should_fail_ex+0x261/0x270 [ 343.295157][T20614] should_fail+0xb/0x10 [ 343.295182][T20614] should_fail_usercopy+0x1a/0x20 [ 343.295302][T20614] _copy_from_user+0x1c/0xa0 [ 343.295344][T20614] input_event_from_user+0x128/0x1f0 [ 343.295368][T20614] ? input_inject_event+0xeb/0x110 [ 343.295476][T20614] evdev_write+0x29f/0x440 [ 343.295504][T20614] ? __pfx_evdev_write+0x10/0x10 [ 343.295533][T20614] vfs_write+0x295/0x950 [ 343.295618][T20614] ? putname+0xe1/0x100 [ 343.295653][T20614] ? __fget_files+0x186/0x1c0 [ 343.295681][T20614] ksys_write+0xeb/0x1b0 [ 343.295716][T20614] __x64_sys_write+0x42/0x50 [ 343.295751][T20614] x64_sys_call+0x2a45/0x2e10 [ 343.295778][T20614] do_syscall_64+0xc9/0x1c0 [ 343.295863][T20614] ? clear_bhb_loop+0x25/0x80 [ 343.295883][T20614] ? clear_bhb_loop+0x25/0x80 [ 343.295948][T20614] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 343.295973][T20614] RIP: 0033:0x7f109a59e169 [ 343.295990][T20614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 343.296054][T20614] RSP: 002b:00007f1098c07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 343.296072][T20614] RAX: ffffffffffffffda RBX: 00007f109a7c5fa0 RCX: 00007f109a59e169 [ 343.296084][T20614] RDX: 0000000000002250 RSI: 0000200000000040 RDI: 0000000000000004 [ 343.296102][T20614] RBP: 00007f1098c07090 R08: 0000000000000000 R09: 0000000000000000 [ 343.296117][T20614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 343.296133][T20614] R13: 0000000000000000 R14: 00007f109a7c5fa0 R15: 00007ffcef2887c8 [ 343.296156][T20614] [ 343.569354][T20619] loop7: detected capacity change from 0 to 2048 [ 343.593447][ T29] audit: type=1400 audit(275913412.863:19847): avc: denied { setattr } for pid=20620 comm="syz.8.5263" name="bus" dev="tmpfs" ino=1860 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 343.630849][T20619] Alternate GPT is invalid, using primary GPT. [ 343.637290][T20619] loop7: p1 p2 p3 [ 343.705873][T20629] netlink: 48 bytes leftover after parsing attributes in process `syz.6.5267'. [ 343.728991][T20629] loop6: detected capacity change from 0 to 512 [ 343.737881][T20629] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 343.758033][T20631] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 343.770535][ T29] audit: type=1326 audit(275913413.023:19848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20632 comm="syz.0.5269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 343.794828][ T29] audit: type=1326 audit(275913413.023:19849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20632 comm="syz.0.5269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f109a59e169 code=0x7ffc0000 [ 343.820408][T20629] EXT4-fs error (device loop6): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 343.835339][T20629] EXT4-fs (loop6): Remounting filesystem read-only [ 343.858277][T20629] EXT4-fs (loop6): 1 truncate cleaned up [ 343.864358][T20629] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 343.939089][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 343.980412][T20653] loop5: detected capacity change from 0 to 128 [ 343.996880][T20650] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5275'. [ 344.005929][T20650] netlink: 108 bytes leftover after parsing attributes in process `syz.8.5275'. [ 344.019268][T20650] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5275'. [ 344.051260][T20650] netlink: 108 bytes leftover after parsing attributes in process `syz.8.5275'. [ 344.060602][T20650] netlink: 84 bytes leftover after parsing attributes in process `syz.8.5275'. [ 344.076754][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 344.421156][T20671] bond1: entered promiscuous mode [ 344.426358][T20671] bond1: entered allmulticast mode [ 344.506779][T20671] 8021q: adding VLAN 0 to HW filter on device bond1 [ 344.585172][T20681] SELinux: policydb magic number 0x6c65732f does not match expected magic number 0xf97cff8c [ 344.667420][T20681] SELinux: failed to load policy [ 344.673870][T20671] bond1 (unregistering): Released all slaves [ 344.687678][T20680] loop8: detected capacity change from 0 to 4096 [ 344.704527][T20679] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 344.720230][T20680] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 344.968866][T20686] sg_write: data in/out 122/14 bytes for SCSI command 0x0-- guessing data in; [ 344.968866][T20686] program syz.7.5285 not setting count and/or reply_len properly [ 345.037141][T20692] loop6: detected capacity change from 0 to 128 [ 345.115887][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 345.348694][T20692] loop6: detected capacity change from 0 to 512 [ 345.428474][T15064] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 345.829804][T20721] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 346.155735][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 346.175547][T20730] FAULT_INJECTION: forcing a failure. [ 346.175547][T20730] name failslab, interval 1, probability 0, space 0, times 0 [ 346.188464][T20730] CPU: 0 UID: 0 PID: 20730 Comm: syz.8.5301 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 346.188521][T20730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 346.188534][T20730] Call Trace: [ 346.188616][T20730] [ 346.188627][T20730] dump_stack_lvl+0xf6/0x150 [ 346.188656][T20730] dump_stack+0x15/0x1a [ 346.188676][T20730] should_fail_ex+0x261/0x270 [ 346.188707][T20730] should_failslab+0x8f/0xb0 [ 346.188737][T20730] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 346.188778][T20730] ? __alloc_skb+0x10d/0x320 [ 346.188808][T20730] __alloc_skb+0x10d/0x320 [ 346.188844][T20730] netlink_alloc_large_skb+0xad/0xe0 [ 346.188878][T20730] netlink_sendmsg+0x3da/0x720 [ 346.188907][T20730] ? __pfx_netlink_sendmsg+0x10/0x10 [ 346.188982][T20730] __sock_sendmsg+0x140/0x180 [ 346.189001][T20730] ____sys_sendmsg+0x350/0x4e0 [ 346.189041][T20730] __sys_sendmsg+0x1a0/0x240 [ 346.189095][T20730] __x64_sys_sendmsg+0x46/0x50 [ 346.189142][T20730] x64_sys_call+0x26f3/0x2e10 [ 346.189163][T20730] do_syscall_64+0xc9/0x1c0 [ 346.189199][T20730] ? clear_bhb_loop+0x25/0x80 [ 346.189261][T20730] ? clear_bhb_loop+0x25/0x80 [ 346.189286][T20730] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 346.189357][T20730] RIP: 0033:0x7f04b460e169 [ 346.189377][T20730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.189396][T20730] RSP: 002b:00007f04b2c77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.189415][T20730] RAX: ffffffffffffffda RBX: 00007f04b4835fa0 RCX: 00007f04b460e169 [ 346.189427][T20730] RDX: 0000000000000000 RSI: 0000200000001080 RDI: 0000000000000003 [ 346.189438][T20730] RBP: 00007f04b2c77090 R08: 0000000000000000 R09: 0000000000000000 [ 346.189449][T20730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.189529][T20730] R13: 0000000000000000 R14: 00007f04b4835fa0 R15: 00007ffc4c21beb8 [ 346.189554][T20730] [ 346.481975][T20726] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 346.534806][T20738] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 346.546670][T20726] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 346.560923][T20744] tipc: Started in network mode [ 346.565995][T20744] tipc: Node identity ac14140f, cluster identity 4711 [ 346.590029][T20738] SELinux: failed to load policy [ 346.595267][T20744] tipc: New replicast peer: 0.0.255.255 [ 346.601297][T20744] tipc: Enabled bearer , priority 10 [ 346.870211][T20750] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 346.881575][T20750] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 346.946594][T20756] SELinux: ebitmap: truncated map [ 346.965633][T20756] SELinux: failed to load policy [ 347.076646][T20771] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 347.204109][T20775] loop6: detected capacity change from 0 to 128 [ 347.205511][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 347.266838][T20777] loop7: detected capacity change from 0 to 4096 [ 347.281016][T20779] loop6: detected capacity change from 0 to 1024 [ 347.299832][T20777] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 347.313727][T20779] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 347.397629][T12762] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 347.419443][T11983] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 347.433486][T20790] xt_CT: You must specify a L4 protocol and not use inversions on it [ 347.476439][T20794] loop5: detected capacity change from 0 to 512 [ 347.483071][T20794] EXT4-fs: Ignoring removed nomblk_io_submit option [ 347.493133][T20794] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 347.641564][T20794] EXT4-fs error (device loop5): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 347.666074][T20794] EXT4-fs (loop5): 1 truncate cleaned up [ 347.715623][T10555] tipc: Node number set to 2886997007 [ 347.735990][T20808] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5331'. [ 347.745039][T20808] netlink: 108 bytes leftover after parsing attributes in process `syz.8.5331'. [ 347.755619][T20794] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 347.786533][T20806] FAULT_INJECTION: forcing a failure. [ 347.786533][T20806] name failslab, interval 1, probability 0, space 0, times 0 [ 347.799443][T20806] CPU: 0 UID: 0 PID: 20806 Comm: syz.7.5332 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 347.799477][T20806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 347.799492][T20806] Call Trace: [ 347.799501][T20806] [ 347.799511][T20806] dump_stack_lvl+0xf6/0x150 [ 347.799548][T20806] dump_stack+0x15/0x1a [ 347.799566][T20806] should_fail_ex+0x261/0x270 [ 347.799600][T20806] should_failslab+0x8f/0xb0 [ 347.799710][T20806] __kmalloc_noprof+0xad/0x410 [ 347.799741][T20806] ? sel_write_create+0x19e/0x4f0 [ 347.799779][T20806] sel_write_create+0x19e/0x4f0 [ 347.799857][T20806] selinux_transaction_write+0xba/0x100 [ 347.799889][T20806] ? __pfx_selinux_transaction_write+0x10/0x10 [ 347.799926][T20806] vfs_write+0x295/0x950 [ 347.799955][T20806] ? __fget_files+0x186/0x1c0 [ 347.799981][T20806] ksys_write+0xeb/0x1b0 [ 347.800068][T20806] __x64_sys_write+0x42/0x50 [ 347.800098][T20806] x64_sys_call+0x2a45/0x2e10 [ 347.800122][T20806] do_syscall_64+0xc9/0x1c0 [ 347.800152][T20806] ? clear_bhb_loop+0x25/0x80 [ 347.800173][T20806] ? clear_bhb_loop+0x25/0x80 [ 347.800264][T20806] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 347.800290][T20806] RIP: 0033:0x7fda2060e169 [ 347.800305][T20806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 347.800354][T20806] RSP: 002b:00007fda1ec77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 347.800373][T20806] RAX: ffffffffffffffda RBX: 00007fda20835fa0 RCX: 00007fda2060e169 [ 347.800385][T20806] RDX: 000000000000006f RSI: 0000200000000100 RDI: 0000000000000004 [ 347.800399][T20806] RBP: 00007fda1ec77090 R08: 0000000000000000 R09: 0000000000000000 [ 347.800414][T20806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.800428][T20806] R13: 0000000000000000 R14: 00007fda20835fa0 R15: 00007ffe38d58ff8 [ 347.800454][T20806] [ 348.044538][T20808] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5331'. [ 348.077293][T15026] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 348.101894][T20808] netlink: 108 bytes leftover after parsing attributes in process `syz.8.5331'. [ 348.111863][T20808] netlink: 84 bytes leftover after parsing attributes in process `syz.8.5331'. [ 348.127214][T20810] loop7: detected capacity change from 0 to 128 [ 348.155165][T20810] syz.7.5334: attempt to access beyond end of device [ 348.155165][T20810] loop7: rw=0, sector=97, nr_sectors = 128 limit=128 [ 348.194272][ T8408] kworker/u8:58: attempt to access beyond end of device [ 348.194272][ T8408] loop7: rw=1, sector=225, nr_sectors = 816 limit=128 [ 348.232712][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 348.232766][ T29] audit: type=1326 audit(275913417.504:19893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20811 comm="syz.5.5333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 348.245297][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 348.294553][ T29] audit: type=1326 audit(275913417.544:19894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20811 comm="syz.5.5333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 348.318282][ T29] audit: type=1326 audit(275913417.544:19895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20811 comm="syz.5.5333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=208 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 348.342116][ T29] audit: type=1326 audit(275913417.544:19896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20811 comm="syz.5.5333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x7ffc0000 [ 348.502781][T20817] loop8: detected capacity change from 0 to 4096 [ 348.567011][T20817] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 348.571116][ T29] audit: type=1326 audit(275913417.844:19897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20822 comm="syz.5.5340" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd65f17e169 code=0x0 [ 348.585974][T20820] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 348.634096][T15064] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 348.646799][T20826] loop6: detected capacity change from 0 to 128 [ 348.695095][ T29] audit: type=1326 audit(275913417.964:19898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20819 comm="syz.7.5335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 348.719403][ T29] audit: type=1326 audit(275913417.964:19899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20819 comm="syz.7.5335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 348.836009][T20830] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5341'. [ 348.841802][T20836] loop6: detected capacity change from 0 to 128 [ 348.845058][T20830] netlink: 108 bytes leftover after parsing attributes in process `syz.8.5341'. [ 348.870849][ T29] audit: type=1326 audit(275913417.964:19900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20819 comm="syz.7.5335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 348.895113][ T29] audit: type=1326 audit(275913417.974:19901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20819 comm="syz.7.5335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 348.919459][ T29] audit: type=1326 audit(275913417.974:19902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20819 comm="syz.7.5335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda2060e169 code=0x7ffc0000 [ 348.943257][T20830] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5341'. [ 348.956693][T20830] netlink: 108 bytes leftover after parsing attributes in process `syz.8.5341'. [ 348.966393][T20830] netlink: 84 bytes leftover after parsing attributes in process `syz.8.5341'. [ 348.980175][T20842] xt_CT: You must specify a L4 protocol and not use inversions on it [ 349.030985][T20836] syz.6.5345: attempt to access beyond end of device [ 349.030985][T20836] loop6: rw=0, sector=97, nr_sectors = 128 limit=128 [ 349.099001][ T3412] kworker/u8:7: attempt to access beyond end of device [ 349.099001][ T3412] loop6: rw=1, sector=225, nr_sectors = 816 limit=128 [ 349.273519][T20847] SELinux: ebitmap: truncated map [ 349.278649][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 349.365129][T20847] SELinux: failed to load policy [ 349.806475][T20862] loop5: detected capacity change from 0 to 4096 [ 349.844856][T20862] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 349.864160][T20867] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 349.910274][T15026] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 350.089268][T20876] bond1: entered promiscuous mode [ 350.094420][T20876] bond1: entered allmulticast mode [ 350.165480][T20876] 8021q: adding VLAN 0 to HW filter on device bond1 [ 350.232542][ T8408] ================================================================== [ 350.232704][T20876] bond1 (unregistering): Released all slaves [ 350.240680][ T8408] BUG: KCSAN: data-race in batadv_hard_if_event / batadv_mcast_mla_update [ 350.240724][ T8408] [ 350.240731][ T8408] write to 0xffff8881091b3210 of 1 bytes by task 20876 on cpu 0: [ 350.240749][ T8408] batadv_hard_if_event+0x838/0xf50 [ 350.240788][ T8408] raw_notifier_call_chain+0x6f/0x1d0 [ 350.240824][ T8408] call_netdevice_notifiers_info+0xae/0x100 [ 350.281955][ T8408] unregister_netdevice_many_notify+0xd12/0x1600 [ 350.288317][ T8408] unregister_netdevice_many+0x19/0x20 [ 350.293801][ T8408] rtnl_newlink_create+0x54c/0x640 [ 350.298921][ T8408] rtnl_newlink+0xf38/0x12d0 [ 350.303568][ T8408] rtnetlink_rcv_msg+0x65a/0x740 [ 350.308551][ T8408] netlink_rcv_skb+0x12f/0x230 [ 350.313349][ T8408] rtnetlink_rcv+0x1c/0x30 [ 350.317889][ T8408] netlink_unicast+0x605/0x6c0 [ 350.322670][ T8408] netlink_sendmsg+0x609/0x720 [ 350.327456][ T8408] __sock_sendmsg+0x140/0x180 [ 350.332141][ T8408] ____sys_sendmsg+0x350/0x4e0 [ 350.336920][ T8408] __sys_sendmsg+0x1a0/0x240 [ 350.341533][ T8408] __x64_sys_sendmsg+0x46/0x50 [ 350.346322][ T8408] x64_sys_call+0x26f3/0x2e10 [ 350.351023][ T8408] do_syscall_64+0xc9/0x1c0 [ 350.355565][ T8408] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 350.361476][ T8408] [ 350.363809][ T8408] read to 0xffff8881091b3210 of 1 bytes by task 8408 on cpu 1: [ 350.371359][ T8408] batadv_mcast_mla_update+0x21d/0x1710 [ 350.376929][ T8408] process_scheduled_works+0x4de/0xa20 [ 350.382433][ T8408] worker_thread+0x52c/0x710 [ 350.387034][ T8408] kthread+0x4b7/0x540 [ 350.391125][ T8408] ret_from_fork+0x4b/0x60 [ 350.395552][ T8408] ret_from_fork_asm+0x1a/0x30 [ 350.400343][ T8408] [ 350.402670][ T8408] value changed: 0x00 -> 0x01 [ 350.407345][ T8408] [ 350.409677][ T8408] Reported by Kernel Concurrency Sanitizer on: [ 350.415831][ T8408] CPU: 1 UID: 0 PID: 8408 Comm: kworker/u8:58 Not tainted 6.15.0-rc2-syzkaller-00042-g1a1d569a75f3 #0 PREEMPT(voluntary) [ 350.428515][ T8408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 350.438623][ T8408] Workqueue: bat_events batadv_mcast_mla_update [ 350.444907][ T8408] ================================================================== [ 350.454032][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 351.519020][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 352.564621][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 353.598012][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 354.634236][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 355.678508][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 356.713890][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 357.757894][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 358.793511][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 359.837630][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available