last executing test programs: 4m51.396260931s ago: executing program 2 (id=57): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095", @ANYRESDEC=0x0, @ANYBLOB="342610941245a9280388537974df6f7310afaf30def6c5972f6d824b3e8b4f4fbdac85f963ee03e01b056bd79843df78927b5bf57faa0f58a9116ba8fcde9112fc67c54f02ed4fdfcb1e74d73e2418ad8db2daa81d8940b305fcae1b9cf2e61954d7ed9b96dd873c1a4cf17c99aca2be4c83a9cabaa1bb2815714eb38c1e6d58835d98429c15f4551231068fe813c870b1524bae1ea3b53f713226efc8731ee8a5fe890c11b023491fed155a51cd82980a3dad177290ab354328dbe3951183ed2a5177b915a156ad13a6f5385796cffd44e0fb70a398a9e67f6577c6fd3a127f03db1f7a7b189695287193", @ANYRES64=r0, @ANYRES16=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_NAME(0xf, &(0x7f0000000880)='+}[@\x00') r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000480)={0x1d, r3}, 0x10) close(r2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000f0070000000900010073797a300000000080000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d3c00128014000180090001006c617374000000000400028010000180090001006c61737400000000140001800c000100636f756e746572000400028008000340000001"], 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x20050800) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a04, 0x0, @perf_bp={0x0}, 0x1e005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xc) socketpair(0x2, 0x3, 0x1, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_clone(0x2045280, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) getrandom(0x0, 0x0, 0x1) 4m50.967116798s ago: executing program 2 (id=62): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb904, @void, @value}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) socket$l2tp6(0xa, 0x2, 0x73) syz_io_uring_setup(0x7440, &(0x7f00000004c0)={0x0, 0xa6e9, 0x10100, 0x2, 0xfffffffb}, &(0x7f0000000140)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_submit(r4, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x40, 0x0, 0x3, 0x1, 0x0, 0xce}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB='.'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r6, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000000)={'bond_slave_1\x00', {0x2, 0x4e23, @loopback}}) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) init_module(0x0, 0xffec3, 0x0) io_uring_setup(0x1694, &(0x7f0000000080)={0x0, 0xdd7c, 0x1000}) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x20000, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) 4m50.708989592s ago: executing program 2 (id=65): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x1c0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 4m50.621118003s ago: executing program 2 (id=66): r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='system_u:object_r:auth_cach'], 0x27) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0x800, &(0x7f0000000200)=ANY=[@ANYRES8=0x0, @ANYRESOCT=r0, @ANYRESDEC, @ANYRES16=0x0], 0x1, 0x36e, &(0x7f0000000f80)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) utime(&(0x7f0000000000)='./cgroup.cpu/cgroup.procs\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000000050005000200000c12000300686173683a6e65742c706f7274"], 0x4c}}, 0x2) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r8 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r8) ptrace$getregset(0x4204, r8, 0x204, &(0x7f0000000040)={0x0}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) r10 = syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) syz_pidfd_open(r10, 0x0) lstat(&(0x7f0000000700)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000007c0)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xee00}}, './cgroup.cpu/cgroup.procs\x00'}) r13 = getpgid(0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000800)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0, 0x0}, &(0x7f0000000880)=0xc) sendmsg$netlink(r4, &(0x7f0000000980)={&(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x500000}, 0xc, &(0x7f00000001c0), 0x0, &(0x7f00000008c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}], 0xb8, 0x40008000}, 0x24000081) setsockopt$inet6_buf(r6, 0x29, 0x39, &(0x7f0000000cc0)="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", 0x118) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='devlink_trap_report\x00', r3, 0x0, 0x100000001}, 0x16) 4m50.096385272s ago: executing program 1 (id=71): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x319400, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x58}, 0x1, 0x0, 0x0, 0x600}, 0x0) 4m49.601434139s ago: executing program 2 (id=74): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x1c0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 4m49.53385675s ago: executing program 1 (id=76): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0x2}, {&(0x7f00000003c0)=""/163, 0xa3}, &(0x7f0000000340)=[{&(0x7f0000001140)=""/102, 0x66}], 0x1, 0x60, 0xfffffffefffffffe}}], 0x48, 0x8004}, 0x0) r1 = getpid() r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) syz_emit_ethernet(0x33, &(0x7f00000019c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x11, 0x0, @opaque="0000000000000080dd"}}}}}, 0x0) process_vm_readv(r1, 0x0, 0x0, &(0x7f0000008640)=[{0x0}], 0x1, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x8, &(0x7f0000000140)={@private2, 0x0}, &(0x7f0000000380)=0x14) sendto$packet(r0, &(0x7f0000000480)="386df3ba1729830389e1a32752c8e4401e93c529e910135a19e976fa29dff390b3689d8e29cae09fd16e40214cb9834f94ddb4fbbabd3686c4b2a3011db44bbf72b46161c67d3588cd4b628c6a6a3bb9cd3fa5803f1986c576ac572ee6eca01e0cac9e4629b41020952b82f14e5fd4499be6ab002e026474", 0x78, 0x80, &(0x7f0000000500)={0x11, 0xf7, r3, 0x1, 0x6, 0x6, @multicast}, 0x14) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x4004, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x8008, 0x0, 0xfffffffb, 0x2, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r5, &(0x7f0000000080), 0x10) sendmmsg(r5, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x24008094) getsockopt$inet6_tcp_int(r5, 0x6, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c00000019000100040000000000000080200009000400050000000008000300", @ANYRES32=r7, @ANYBLOB="f8ff0100ffffffffab992200780a07bf8aae207b71d5ff0100000000000059af13bd95474af7a2d9e8e669f2c3e795cf4efd57d6eba1523c681bfa235fc36bb017e0df61fe68d9479b3feb2c6c7bdcbae6dc1396e5ad8749feea9fc02e7291d9d4138e2a2f1faa9007cafa1f01dad832178529535a029a043f8a69e848d7bdb92bf6c7137c692c00d3f23f5e232761bd392ac8b96e82f50ed81b857328573836be04f40b5182603fec2164bc26177fce69386aff5fb75e4fd453322ed8ae3b5a1f74c1a990525da5539382680014d656bc891e3630340299e802ddee688828793c94322697a10148c2b27ed924be531bbee462ed4339"], 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x0) process_vm_writev(r4, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) 4m49.290324424s ago: executing program 2 (id=79): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f600"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) process_vm_readv(0x0, &(0x7f0000000140), 0x100000000000028b, 0x0, 0x12, 0x0) 4m49.289567134s ago: executing program 1 (id=80): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0040, &(0x7f0000000100)={[{@barrier}, {@resgid={'resgid', 0x3d, 0xee00}}, {@discard}, {@noload}, {@journal_dev={'journal_dev', 0x3d, 0x4}}, {@nodiscard}]}, 0xfe, 0x472, &(0x7f0000000f80)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000e00)='.\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000680)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000008}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x8004587d, &(0x7f0000000080)={@id={0x2, 0x0, @c}}) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x61, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = memfd_create(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf2000000000000016000200071b48013c030000000000009500000000000000bc26000000000000bf67000000000000150200000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050800000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ftruncate(r4, 0x6) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa, 0x2011, r4, 0x0) 4m49.239354685s ago: executing program 32 (id=79): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f600"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) process_vm_readv(0x0, &(0x7f0000000140), 0x100000000000028b, 0x0, 0x12, 0x0) 4m48.90426607s ago: executing program 1 (id=85): r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='system_u:object_r:auth_cach'], 0x27) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0x800, &(0x7f0000000200)=ANY=[@ANYRES8=0x0, @ANYRESOCT=r0, @ANYRESDEC, @ANYRES16=0x0], 0x1, 0x36e, &(0x7f0000000f80)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) utime(&(0x7f0000000000)='./cgroup.cpu/cgroup.procs\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000000050005000200000c12000300686173683a6e65742c706f7274"], 0x4c}}, 0x2) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r8 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r8) ptrace$getregset(0x4204, r8, 0x204, &(0x7f0000000040)={0x0}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) r10 = syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) syz_pidfd_open(r10, 0x0) lstat(&(0x7f0000000700)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000007c0)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xee00}}, './cgroup.cpu/cgroup.procs\x00'}) r13 = getpgid(0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000800)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0, 0x0}, &(0x7f0000000880)=0xc) sendmsg$netlink(r4, &(0x7f0000000980)={&(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x500000}, 0xc, &(0x7f00000001c0), 0x0, &(0x7f00000008c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}], 0xb8, 0x40008000}, 0x24000081) setsockopt$inet6_buf(r6, 0x29, 0x39, &(0x7f0000000cc0)="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", 0x118) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='devlink_trap_report\x00', r3, 0x0, 0x100000001}, 0x16) 4m48.578775665s ago: executing program 1 (id=87): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x32}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="3800000010000507000000000004000000000000", @ANYRES32=r4, @ANYBLOB="0000000a010000001800120008000100736974000c0002000800030036887f"], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x87, &(0x7f0000000500)={&(0x7f0000000880)=@newlink={0x48, 0x10, 0x439, 0x70bd2a, 0xffffffea, {0x0, 0x0, 0xe403, r5, 0x3, 0x610c3}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @sit={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @remote}, @IFLA_IPTUN_6RD_RELAY_PREFIX={0x8, 0xc, 0xee}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x10001}]}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x4008040) 4m48.304361889s ago: executing program 1 (id=88): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xa) 4m48.303979799s ago: executing program 33 (id=88): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xa) 4m2.460209728s ago: executing program 0 (id=756): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000010"], 0xe8}, 0x1, 0x0, 0x0, 0x6084}, 0x840) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x144}}, 0x0) 4m2.326335261s ago: executing program 0 (id=760): syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f00000013c0)) r1 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000000), 0x4) arch_prctl$ARCH_SET_GS(0x1001, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="27031c00160014000000002f1eafbcf706e105000000894f000f1102ee1680ca82973d2bd4b8bf4a8291a14b8a34f90186cee84400", 0x35}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_tracing={0x1a, 0x2d, &(0x7f0000001600)=ANY=[@ANYBLOB="181b0000f83b4301528fdaac094cf40536d60115f053aaec9110d647457e48450ecc1d17c5be758897e6ce13d519175a111ddd17f6928b4ea8fc5bffc7e1f9d6fbf1f637023ffb7687f4ec46808732cab019", @ANYRES32, @ANYBLOB="0000000000000000850000003e000000950000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000000850000000600000018000000020000000000000007000000182a0000", @ANYRES32, @ANYBLOB="0000000002000000b7080000000000007b8af8ff00000000b7080000545000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000852000000100000018200000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00'], &(0x7f0000001340)='syzkaller\x00', 0x101, 0x0, &(0x7f0000001380), 0x41100, 0x66, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x1, 0x2, 0x9, 0xffffffff}, 0x10, 0x2b895, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00'}, 0x18) unshare(0x22020600) 4m2.215615693s ago: executing program 0 (id=763): setreuid(0xee00, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0180000000000000000001000000000000000b00000000030014"], 0x28}}, 0x40000) 4m2.178672133s ago: executing program 0 (id=765): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba", 0x3}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x65000, 0x0) mount$bind(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x1805002, 0x0) move_mount(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r4, &(0x7f0000000140)='./file0/file0\x00', 0x271) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x800) 4m2.083479505s ago: executing program 0 (id=768): syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f00000013c0)) r1 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000000), 0x4) arch_prctl$ARCH_SET_GS(0x1001, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="27031c00160014000000002f1eafbcf706e105000000894f000f1102ee1680ca82973d2bd4b8bf4a8291a14b8a34f90186cee84400", 0x35}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_tracing={0x1a, 0x2d, &(0x7f0000001600)=ANY=[@ANYBLOB="181b0000f83b4301528fdaac094cf40536d60115f053aaec9110d647457e48450ecc1d17c5be758897e6ce13d519175a111ddd17f6928b4ea8fc5bffc7e1f9d6fbf1f637023ffb7687f4ec46808732cab019", @ANYRES32, @ANYBLOB="0000000000000000850000003e000000950000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000000850000000600000018000000020000000000000007000000182a0000", @ANYRES32, @ANYBLOB="0000000002000000b7080000000000007b8af8ff00000000b7080000545000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000852000000100000018200000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00'], &(0x7f0000001340)='syzkaller\x00', 0x101, 0x0, &(0x7f0000001380), 0x41100, 0x66, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x1, 0x2, 0x9, 0xffffffff}, 0x10, 0x2b895, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18070000000000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) unshare(0x22020600) 4m1.796384869s ago: executing program 0 (id=772): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0f02000039000511d25a80648c63940d0324fc600b003540280009000200002037153e37eb010280060410000a00", 0x33fe0}], 0x1}, 0x0) 4m1.7512237s ago: executing program 34 (id=772): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0f02000039000511d25a80648c63940d0324fc600b003540280009000200002037153e37eb010280060410000a00", 0x33fe0}], 0x1}, 0x0) 1.91563142s ago: executing program 7 (id=4878): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = mq_open(&(0x7f0000001140)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\xe0\x9d\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xdf\x15\f]\x15\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb', 0x42, 0x1f0, 0x0) munlockall() r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x80402, 0x0) write$cgroup_int(r5, 0x0, 0x2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r0, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r4, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x0, 0xc8, &(0x7f0000000400)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xbe, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000800)={r0, 0xffffffffffffffff}, 0x4) r10 = syz_io_uring_setup(0x38, &(0x7f0000000640)={0x0, 0xadde, 0x10100, 0x0, 0xfffffffe}, &(0x7f0000000a00)=0x0, &(0x7f00000003c0)=0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r14}, 0x10) r15 = semget(0x1, 0x1, 0x42a) semop(r15, &(0x7f0000000980)=[{0x0, 0x6, 0x1800}, {0x0, 0xfe8, 0x1000}], 0x2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r11, r12, &(0x7f0000000600)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r16, 0x0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f00000002c0)=""/177, 0xb1}], 0x1}, 0x0, 0x80002101}) io_uring_enter(r10, 0xd81, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000280), r17) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x12, 0x17, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0xd, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x1b}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x8}, @alu={0x4, 0x0, 0x4, 0x6, 0x2, 0x1}], &(0x7f0000000280)='GPL\x00', 0xf, 0x0, 0x0, 0x41100, 0x10, '\x00', r7, @fallback=0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x5, 0xe, 0x400, 0xd}, 0x10, r8, r3, 0x3, &(0x7f0000000840)=[r0, r0, r0, r2, r0, r0, r9], &(0x7f0000000880)=[{0x3, 0x5, 0x9, 0xb}, {0x2, 0x3, 0xf, 0x5}, {0x5, 0x1, 0xe, 0x7}], 0x10, 0x5a, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='gpio_value\x00', r4, 0x0, 0x4}, 0x18) mq_unlink(&(0x7f0000000000)='eth0\x00') syz_emit_ethernet(0x76, &(0x7f00000002c0)={@broadcast, @random, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "fec000", 0x40, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "18b088", 0x0, 0x2c, 0x0, @empty, @mcast1, [@hopopts={0x3a}], "fafb17c133d11e59"}}}}}}}, 0x0) close(r1) 1.518771316s ago: executing program 5 (id=4883): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x22, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000780)={0x2, 0x3, 0x0, 0x6, 0x7, 0x0, 0x70bd2a, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x2, @loopback}}]}, 0x38}, 0x1, 0x7}, 0x0) 1.448226807s ago: executing program 5 (id=4885): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180200002343ffff0000000000000000850000004100000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4e) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000300)={r1, r2, 0x25, 0x2, @val=@perf_event={0xff}}, 0x18) syz_emit_ethernet(0x46, &(0x7f0000000780)=ANY=[], 0x0) 1.439588968s ago: executing program 5 (id=4887): r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000180)=0x5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_read_part_table(0x634, &(0x7f0000000000)="$eJzs3DFoXVUYB/D/Td+77yWFpjp2SXUWi51NDUj6qHSqdMtSFTRUHOJUseRFs5ghg4OzSxGytHXR0MFBLeIkTqGDWnEVpKjUIr1y3715fU8QRNOh8PtBuN859/vOd07uzZgbHmkz6SbFKOylk+TES3/L2Mh+Qvp1fpKq2947v7N8+kxVVVVR56ykmyc+P3I9Sact6Y+XqapqfTw4lSsfzt14rxh2d27VTb/cOlRPzzbbOJo8dbjsj5aZWCFVNbWx3kH+Hvhvri7eLIrNsh09+ev9peTaL8vnds9uvX/9hXZ6Pfmqebrv1O/FfvZbuXj8QmcU1k/5zcl1f2subeprU497Np2pPQw31wb167a3P3FssPPpq8/+cfxGqpP5uuzM7N8oynFRmQwP5vzz9du/fWlxdW9weXZ8o/vB419koR3cqaocrVs+ltGfzsIBdAYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4GG4unhz/t3NtcF2sro36LWzy+d2z26VSZ5/ZTSeybUTk1WH2uvFXLhdX9ezlvz4SbqTSUX9023Ku0vN3A8L1dOjoLPfvzfbBJcWV/cG9+aS28/cPzZoqpLPTj5otz5eeTfPtdHdqjEabPzTIdsW1XyT9829yfMXnWRtsD3qf/mnotNPspKPi+F4m/VGXu/l5eZ41d2yrf3zwTEAAAAAAAAAAAAAAAAAAADgf1k+feaNO2280k/y89szdVz1mv9yL+aKqfzvesnsqeRKP8VwKcmtF38vvz2y9X376YBhehkmOfzRxvm2pJxaYPyJgCJV+TBPxr/xVwAAAP//mFl59Q==") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x300, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x3ef, 0x0) r5 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000002140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0200}]}) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r8}, 0x10) unshare(0x26000400) r9 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r9, 0x10d, 0xf9, &(0x7f0000000000), &(0x7f0000000240)=0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1b, &(0x7f0000002140)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$SG_IO(r6, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x300, 0x0, 0x0, 0x0}) 1.435995918s ago: executing program 4 (id=4888): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYRES64=r4, @ANYRES32, @ANYRES32=r3, @ANYRES64=0x0, @ANYRES16=r4, @ANYRES16=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) sysinfo(0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f00000000c0)={0x7, 0x5, 0x6}) socket$nl_generic(0x10, 0x3, 0x10) getresuid(&(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000200)) 1.355072149s ago: executing program 4 (id=4889): r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x23, 0x0, &(0x7f0000000080)) socket$netlink(0x10, 0x3, 0x10) unshare(0x8040480) r1 = syz_mount_image$ext4(&(0x7f0000002080)='ext4\x00', &(0x7f0000000400)='./file0\x00', 0x400, &(0x7f00000020c0), 0x0, 0x548, &(0x7f0000000cc0)="$eJzs3c9vI1cdAPDvTH42TZst9AAVsAsUFrRae+OlUdVLuxcQqiohKg6IwzYkThRixyF2ShMikf4NIIHECf4EDkgckHriwI0jN4RUDkgLRKANEhVGHk+yadbeeDeOTePPR5qdHy953/fsnXnPb+J5AYysaxGxHxGTEfFWRMzlx5N8idfaS+vn7h/sLR0e7C3Ff5vNN/+eZOmtY0d5NfP103me0xHxza9FfDd5OG59Z3d9sVIpb+X7xUZ1s1jf2b25Vl1cLa+WN0qlhfmFWy/ffqnUt7perf7q3lfXXv/Wb3/z6ff/sP/lH7aKNZunnaxHP7WrPnEcp2U8Il6/iGBDMJavJ4dcDp5MGhEfi4jPZef/XIxl/zsBgMus2ZyL5tzJfQDgskuzMbAkLeRjAbORpoVCewzv+ZhJK7V648ZKbXtjuT1WdiUm0qm8r/D97N+JZGWtUp7P0rL0bL90av92RDwXET+ZeirbLyzVKsvD6fIAwMh7+lT7/6+pdvvfgw539QCAj4zpYRcAABg47T8AjB7tPwCMnh7a//xm//6FlwUAGAyf/wFg9Gj/AWD0aP8BYKR84403WkvzMH/+9fLbO9vrtbdvLpfr64Xq9lJhqba1WVit1VazZ/ZUz8qvUqttjkfEO8VGud4o1nd271Zr2xuNu9lzve+WJwZSKwDgUZ67+t4fk4jYf+WpbAlzOcDISIddAGBoxoZdAGBozPYFo6v38fjfX2g5gOHp+DDv6Y6bHx40+NljBPF3RvB/5fonu4//n+4buC8Al4vxfxhdTzb+/2rfywEMXqfxf/18GA3NZnI05/9kPv3/5HESAHApneP7eM0f9asTAgzVWZN5d711/zj3/wEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCSmY2I70WSFvK5wGcjTQuFiGci4kpMJCtrlfKtiHg2rkbExNTK2rBLDACcX/rXJJ//6/rci7OnUyeTf09FPif4D37+5k/fWWw0tuZbx/9xfHzqaPqw0oPfO8e8ggBAn2Xtdylfzz84fv9gb+loGWR57t2JD/KpiJcOD/aypZ0yHuPZejrrS8z8M8n323ORvhARY32Iv/9uRHziuP7JB81mHj/Jxkau5DOfnowfeexn+h1/5uTrfzp++qH4aZbWXrc6Xx8/lW/ah7LBZffenYh4rdP1L41r2brz+T+dXaHO796ddmZH177DE/GPrn9jHeK3zvlrvcb4yu++/tDB5lw77d2IF8Y7xU+O4ydd4r/YY/w/feozP361S1rzFxHXo3P8k7GKjepmsb6ze3OturhaXi1vlEoL8wu3Xr79UqmYjVEXj0aqH/a3V248261srfrPdIk/3bH+k8e/+4Ue6//L/7z1nc8+Iv6XPt/5/X++Y/y2Vpv4xR7jL878uuv03a34y13qf9b7f6PH+O//ZXe5xx8FAAagvrO7vliplLfOtdH6tNmPfLKNyRNHWkXsSwl73PhzDC7WmRsT/XxVB7oxftxX7G/O327lOODqpH2vxbk27g8q1nCvS8DFe3DSD7skAAAAAAAAAAAAAABAN4P46tKw6wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDl9b8AAAD//zGbxOs=") ioctl$EXT4_IOC_MOVE_EXT(r1, 0x8004587d, &(0x7f0000000080)={0x0, r1, 0xffffffffffb, 0xffffffffffffffff, 0x1, 0x7}) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r4, 0x800448d3, &(0x7f0000000340)={@none, 0xfffffff8, 0x38, 0x6, 0x6d3e, 0x1ff, "a12ba55e44812225b0bbe9a9cf2cc48930ead126c87b6ffea8ef9799dadb2005c715f980c6c60ec5de9bfe20191be41de87a7258c2812621814d43a87ae433c6e16c35eae4406ab9a155f94c9f6261431453696d518e761d50eb9fd22bbab79e1c5f7ee912666ff656f25fe748ffc711a302fb183019c471f2aac06850c11db8"}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b0000000000003fa0336376d61b4279ad044800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x15, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100d}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0xa6}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sys_enter\x00', r6}, 0x10) r9 = open(&(0x7f0000000280)='.\x00', 0x109080, 0x0) fcntl$notify(r9, 0x402, 0x8000003d) r10 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r10, 0x402, 0x8000003d) close_range(r9, r10, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x0, &(0x7f00000008c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@norecovery}, {@orlov}, {@abort}, {@nombcache}, {@usrjquota}]}, 0x64, 0x50f, &(0x7f0000000f80)="$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") 1.25606274s ago: executing program 5 (id=4890): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f0000000800)=""/163}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xbb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r5}, 0x10) listen(r4, 0x3) listen(r2, 0x80080400) r6 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) 1.25516759s ago: executing program 4 (id=4891): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3477, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7535}}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x9, 0x8, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) recvmmsg(r2, &(0x7f0000005340)=[{{&(0x7f0000000080)=@qipcrtr, 0x80, &(0x7f0000000540)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000000200)=""/45, 0x2d}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000000240)=""/237, 0xed}, {&(0x7f0000000900)=""/251, 0xfb}, {&(0x7f0000000a00)=""/214, 0xd6}, {&(0x7f0000000440)=""/36, 0x24}], 0x7, &(0x7f0000001c00)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000000680)=@x25, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000000780)=""/111, 0x6f}, {&(0x7f0000000b00)=""/159, 0x9f}, {&(0x7f0000002c00)=""/255, 0xff}, {&(0x7f0000002d00)=""/187, 0xbb}, {&(0x7f0000000480)=""/2, 0x2}], 0x5, &(0x7f00000005c0)=""/43, 0x2b}, 0x3ff}, {{&(0x7f0000002e40)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000002f80)=[{&(0x7f0000002ec0)=""/185, 0xb9}, {&(0x7f0000000700)=""/48, 0x30}, {&(0x7f0000000800)=""/1, 0x1}], 0x3, &(0x7f0000002fc0)=""/135, 0x87}, 0x9}, {{&(0x7f0000003080)=@pppoe, 0x80, &(0x7f0000004580)=[{&(0x7f0000003100)=""/4096, 0x1000}, {&(0x7f0000004100)=""/108, 0x6c}, {&(0x7f0000004180)=""/43, 0x2b}, {&(0x7f00000041c0)=""/153, 0x99}, {&(0x7f0000004280)=""/191, 0xbf}, {&(0x7f0000004340)=""/154, 0x9a}, {&(0x7f0000004400)=""/210, 0xd2}, {&(0x7f0000004500)=""/2, 0x2}, {&(0x7f0000004540)=""/2, 0x2}], 0x9, &(0x7f0000004640)=""/74, 0x4a}, 0x92dc}, {{&(0x7f00000046c0)=@isdn, 0x80, &(0x7f0000004a80)=[{&(0x7f0000004740)=""/247, 0xf7}, {&(0x7f0000004840)=""/164, 0xa4}, {&(0x7f0000004900)=""/93, 0x5d}, {&(0x7f0000004980)=""/128, 0x80}, {&(0x7f0000004a00)=""/95, 0x5f}], 0x5, &(0x7f0000004b00)=""/70, 0x46}, 0x7}, {{&(0x7f0000004b80)=@ieee802154={0x24, @long}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000004c00)=""/228, 0xe4}, {&(0x7f0000004d00)=""/118, 0x76}, {&(0x7f0000004d80)=""/252, 0xfc}, {&(0x7f0000004e80)=""/248, 0xf8}, {&(0x7f0000004f80)=""/106, 0x6a}, {&(0x7f0000005000)=""/139, 0x8b}, {&(0x7f00000050c0)=""/80, 0x50}, {&(0x7f0000005140)=""/3, 0x3}, {&(0x7f0000005180)=""/62, 0x3e}], 0x9, &(0x7f0000005280)=""/158, 0x9e}, 0x1}], 0x6, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x7, &(0x7f0000000740)=@framed={{}, [@jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0x2, 0xffffffffffffffff}, @generic={0x5, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x7}, @jmp={0x5, 0x0, 0x449a349b67b8a9da, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 1.25430325s ago: executing program 4 (id=4892): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x2, &(0x7f0000006680)) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f6873720000000058000000160a0101000b000000000000010000000900020073797a32000000000900010073797a30000000002c000380180003801400010076657468305f746f5f687372000000000800024000440000080001"], 0xf8}, 0x1, 0x0, 0x0, 0xc000}, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$mouse(&(0x7f0000000080), 0x9, 0x80002) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route_sched_retired(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000009c0)=@delchain={0x1628, 0x65, 0x1, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r5, {0xb, 0xc}, {0x2, 0x8}, {0x6, 0xfff2}}, [@f_rsvp6={{0xa}, {0xcdc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x7, 0xfff2}}, @TCA_RSVP_POLICE={0xc40, 0x5, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x11d, 0x264fd178, 0x4, 0x8, 0xfffffc00, 0x1, 0x8, 0xe, 0x9, 0x8, 0x2, 0x0, 0x4, 0x2, 0x6, 0x1, 0x8282, 0xffff, 0x7ff, 0x1, 0x3ff, 0x9, 0x7fffffff, 0xfffffc01, 0x1, 0x7, 0x2, 0x2000000, 0x400, 0xffff, 0x7, 0x4, 0x1, 0x1, 0x10000, 0xe9ff, 0x2, 0x65, 0x10001, 0x9, 0x4, 0x7, 0xb, 0x9, 0x1, 0x9, 0x7, 0x7, 0x1, 0x7, 0x100, 0xbd0, 0x3, 0x4, 0xc02, 0x3, 0x9, 0xff, 0x7, 0x7, 0x9, 0x2, 0x200, 0x7ff, 0xd, 0x9, 0x3, 0x1, 0x4, 0x1000, 0x8, 0x0, 0x8, 0x3, 0xdce, 0x7, 0x1, 0x4, 0x8, 0x1ff, 0x2, 0x7, 0xd172, 0x4, 0xa, 0x8, 0x6, 0xdce, 0x100, 0x80000001, 0x6, 0x3, 0x8, 0xc, 0xfffffff0, 0x0, 0x12000, 0xa, 0x38, 0x5, 0x1, 0x200, 0x3, 0x3ffe, 0x4, 0x4, 0xf39, 0x8, 0x8001, 0x5, 0x0, 0x0, 0x0, 0x9, 0x2, 0x8001, 0x4, 0xe6, 0x4, 0x0, 0xdac, 0x7, 0x9, 0xfffffffc, 0x0, 0x1af, 0x80000000, 0x4, 0x5, 0x3, 0x4, 0xe, 0x40, 0x8, 0x1000, 0x4, 0x6, 0x7fffffff, 0x7, 0x7, 0xfffffffb, 0x34f67f13, 0x4, 0xc3, 0x0, 0xb8, 0x0, 0x2, 0xd, 0x7f, 0x11ee, 0x400, 0x0, 0x8, 0x200, 0x31f, 0x0, 0x45c, 0x9, 0x8, 0x1, 0x0, 0xec2, 0x800, 0x8, 0xc, 0xfff, 0x3, 0x80000001, 0x1c000, 0xeb, 0x7, 0x6, 0x4, 0x6, 0x7, 0x1, 0x7ff, 0x200, 0x72b6, 0xff, 0x8, 0x7fffffff, 0x8, 0x0, 0xfff, 0x2, 0xc49a, 0x7, 0x81, 0xf2, 0x9, 0x68a, 0x8, 0xd, 0x7fffffff, 0x1, 0xfffffff8, 0x4000, 0x7, 0x8, 0xffffff01, 0x2, 0x10000, 0x292133ba, 0x101, 0x5, 0x6, 0x9, 0xffffff51, 0xfffffffe, 0x7, 0x3, 0x9, 0x77e, 0x6, 0x400000, 0x1, 0x1, 0x99a, 0x2, 0x8, 0x123, 0x2, 0x0, 0x8, 0x7, 0xd, 0x4, 0x4, 0x8, 0x3, 0xa, 0x92, 0x543d, 0xf, 0x988, 0x1, 0x0, 0x80000001, 0x407, 0x9, 0x9, 0x5, 0x1, 0x10bd, 0x8, 0x7, 0x4, 0x1000, 0xffffffff, 0x6, 0x40, 0x3, 0x4]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x5}, @TCA_POLICE_RESULT={0x8, 0x5, 0x1}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x1, 0x1, 0x6, 0x5, 0x8, 0xfffff81c, 0x4, 0xdd1, 0xab, 0x0, 0x3ff, 0x100, 0x0, 0x200, 0x2, 0x1, 0x6512, 0x7, 0x0, 0x7ff, 0x280, 0x25, 0x1, 0x7fff, 0x7, 0x6, 0x22, 0x7, 0x9, 0x5, 0x4, 0x5, 0x5, 0x0, 0x8, 0x8001, 0x2, 0xfffffffa, 0x623, 0x8, 0x7, 0x5, 0x0, 0x0, 0x80, 0xfffffff7, 0x8, 0x7, 0x7, 0x8, 0x0, 0x2, 0x9, 0x304ad332, 0x9, 0x7fffffff, 0xffff8000, 0xff, 0x6, 0x5, 0x200, 0x10001, 0x7, 0x9d2f, 0x4, 0x8000, 0x81, 0x0, 0x7, 0xfffffffd, 0x1, 0x8, 0x6, 0x3e, 0x1, 0x8, 0x9, 0xa4, 0x3279, 0xe, 0x3, 0x7, 0x4, 0x3, 0xfffffff7, 0xf50, 0x1, 0x2400000, 0xffff5966, 0x1, 0x5, 0x3fb, 0x4, 0x7ff, 0xf, 0x42ca, 0x8, 0xfffff801, 0x37de51f8, 0x29, 0x2f5, 0x81, 0xc45, 0x6, 0x10001, 0xe26, 0x0, 0x80, 0x10001, 0x0, 0x6, 0x3, 0x4, 0x3, 0x8, 0x0, 0xfff, 0x650a, 0x7, 0x8, 0xffff, 0x101, 0x2, 0xa, 0x1, 0x401, 0x7, 0x8000, 0x3, 0x9, 0x0, 0x4, 0x6, 0x5, 0x3, 0x3ff, 0xd, 0x7f, 0xff, 0x40, 0xffffffff, 0x0, 0x52f8, 0x3, 0x2, 0x8, 0x7f, 0x0, 0x6132, 0x2, 0x0, 0x6, 0x0, 0x6, 0x7, 0x10000, 0xcf1c, 0x6, 0x81, 0x81, 0x6, 0xfe, 0xf6d3, 0x5, 0x74d, 0x80, 0x200, 0xc, 0x9, 0x24fcb22c, 0x10, 0x10000, 0x101, 0x5dae, 0x0, 0x9, 0xad, 0x1, 0x5, 0xffff8000, 0x6, 0xd, 0x6, 0xbea9, 0x6, 0x4, 0x9, 0x0, 0x9, 0xc6, 0x100, 0x955, 0x3, 0x9, 0x101, 0x8001, 0x0, 0x7f, 0x9, 0x2, 0x7fff, 0x3, 0x0, 0x6, 0xfffffffc, 0x0, 0x673, 0x3, 0x7f, 0x562e, 0x1, 0x3ff, 0x2, 0x0, 0x1, 0x4, 0x9, 0xfffffffe, 0x0, 0x2, 0x6, 0xffffffff, 0x1, 0x7, 0x9, 0xb735, 0x0, 0x43a, 0x7, 0x7, 0x7, 0x7, 0x0, 0x8, 0x400, 0x77f, 0x8, 0x80, 0x3, 0xffffffff, 0xa, 0x0, 0x1, 0x0, 0x20, 0x2, 0x9, 0x1, 0x8e8, 0x6de, 0x9, 0x4, 0x3, 0x0, 0x7fffffff]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8000}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_RATE={0x404, 0x2, [0x38, 0xfff, 0x4, 0x10001, 0x5, 0x0, 0x8, 0x10001, 0x6, 0x0, 0xf1, 0x8, 0x3, 0x2, 0x2000000, 0x8, 0x6, 0x7f, 0x60b028d1, 0xd, 0x10, 0x3, 0x2, 0x10, 0x35, 0x62fd, 0x2, 0x2, 0x1, 0x400, 0xfffffff1, 0xe9c1, 0xf40f, 0x3, 0x8000, 0x8, 0x8, 0x4, 0xe2c, 0xffff, 0x4, 0x4, 0x81, 0x81, 0x100, 0x8, 0x81e, 0x8, 0x6, 0x1, 0x7e0b55cb, 0x6, 0x7, 0x5, 0x2, 0x7, 0x7, 0x5, 0xfffffffc, 0x3, 0xcc5e, 0x6, 0x7, 0x52, 0xc, 0x8, 0xff, 0x0, 0x800, 0x2, 0x1, 0x401, 0x8, 0x8, 0xff, 0x50000, 0x8001, 0xffff, 0x7, 0x7, 0x9c0e, 0x6, 0x2, 0x4, 0xf, 0x2, 0xc, 0x8, 0x0, 0xffff, 0x1, 0x482, 0xfffffc00, 0x7f, 0x81, 0x5, 0x8000, 0x4, 0xd, 0x9, 0xffffffff, 0x6, 0x5, 0x4, 0x401, 0x1, 0x4, 0x6, 0x5d82, 0x1, 0x8000, 0xf3, 0x0, 0x9, 0x2, 0x3, 0xd, 0xf, 0x3, 0x7, 0xffff, 0x10001, 0x1, 0x7, 0x754d, 0x5, 0x2, 0xd659, 0x4, 0xf52, 0x800, 0x9, 0x2, 0x6, 0xc60e, 0x40, 0x0, 0x7f, 0x8, 0xffff, 0x23f, 0x4, 0x2, 0x5, 0x3ff, 0x5, 0x1, 0x4, 0x9, 0xffff, 0x4, 0x3, 0x1000, 0x81, 0x2, 0x6, 0xf9, 0xfffffffd, 0x0, 0x1, 0x10000, 0x1e2, 0x2, 0x6, 0x9, 0x8, 0x2b, 0x6, 0x800, 0x6fef, 0x5, 0x5, 0xfffffffd, 0x2, 0x9, 0x1, 0x5, 0x1b, 0x0, 0x7, 0x3, 0x8, 0xffffffc1, 0x4, 0xc1a, 0xdd6, 0xff, 0x80000000, 0x8000, 0x8, 0x3, 0x800, 0x6, 0x1, 0x6b, 0x4b7, 0x4, 0xfffffffd, 0x6, 0x4, 0x200, 0x80, 0x8000, 0x4, 0x8, 0x2, 0xf, 0x8, 0x6, 0x1, 0x3, 0x9, 0x4, 0x48539098, 0x4, 0x8, 0x9, 0x3, 0xbe, 0x3800000, 0xb, 0xd, 0x3, 0x7fffffff, 0x5, 0x1, 0x1, 0x2, 0x2, 0xffffffff, 0x8, 0x5, 0xd27, 0xffff300b, 0x4ee, 0x8, 0x8, 0x3, 0x6b, 0x101, 0x8, 0xd2, 0x3, 0x3800000, 0x3, 0x1, 0x8c5, 0x4d0, 0x1, 0x5, 0xd50b7d8a, 0x81, 0xfffffffd, 0xfffffffb, 0x5, 0x7]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x200}]}, @TCA_RSVP_SRC={0x14, 0x3, @mcast1}, @TCA_RSVP_PINFO={0x20, 0x4, {{0xea10, 0x3, 0x1000}, {0x7c, 0x3, 0x1}, 0x67, 0xf9}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xe, 0xfff1}}, @TCA_RSVP_POLICE={0x18, 0x5, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x1}, @TCA_POLICE_RATE64={0xc}]}, @TCA_RSVP_DST={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @TCA_RSVP_SRC={0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x30}}, @TCA_RSVP_DST={0x14, 0x2, @loopback}]}}, @f_rsvp={{0x9}, {0x74, 0x2, [@TCA_RSVP_SRC={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x18}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x45, 0x5, 0x5}, {0x7, 0x4, 0x8}, 0x67, 0xb, 0xd8}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x6, 0x1, 0x3}, {0x100, 0x4, 0x8}, 0x21, 0xf4, 0xc}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x2, 0xffffffff, 0xe}, {0xfffffff5, 0xff, 0x1000}, 0x32, 0x39, 0x2}}, @TCA_RSVP_DST={0x8, 0x2, @empty}]}}, @f_rsvp6={{0xa}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x34}}]}}, @f_tcindex={{0xc}, {0x86c, 0x2, [@TCA_TCINDEX_CLASSID={0x8, 0x5, {0xfff1, 0xfff8}}, @TCA_TCINDEX_POLICE={0x848, 0x6, [@TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0xffffffffffffffff, 0xffffff9c, 0x3, 0x7f, {0xe8, 0x1, 0x3bc, 0x800, 0x6, 0x565e7652}, {0x80, 0x1, 0x400, 0xcd13, 0xfff7, 0x8001}, 0x2cec, 0x8, 0x3}}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x9, 0x9, 0xacb, 0x5, 0xd7a, 0xcf8a, 0x0, 0x6, 0x8, 0x101, 0x0, 0x4, 0x4, 0x7, 0xe, 0xfe, 0x7, 0x244, 0x3, 0x8001, 0x3, 0x3, 0x80000001, 0x2, 0xfff, 0x4408, 0x8219, 0x1, 0x6, 0x4, 0x9, 0xc0, 0x86, 0x4, 0x4, 0x6, 0xed, 0x7, 0x6, 0x6df, 0x7, 0xee19, 0x401, 0x2, 0x0, 0x7fff, 0x5, 0x80, 0x3, 0xe, 0x7a3d, 0x7, 0x3, 0x0, 0x5, 0x8, 0x7, 0x2, 0x6, 0x4, 0x81, 0x7fffffff, 0xe, 0xe, 0xffff7fff, 0x4, 0xfffffff7, 0x8, 0x1, 0x5, 0x6, 0x3ff, 0x8, 0x3, 0x2, 0x0, 0x5, 0x5, 0x0, 0xd309, 0xfffffffb, 0x4, 0x1, 0x7, 0x3, 0x5, 0x1, 0x401, 0x200, 0x8, 0x5, 0x3, 0x1, 0xffffffff, 0xb, 0x4, 0x8, 0x2, 0xffffffff, 0x1, 0x53ea, 0xfffffff7, 0xfffffffc, 0x4, 0x8, 0x6, 0x0, 0xfffffffa, 0x9, 0x3, 0x7ff, 0x0, 0x6, 0x3e7c, 0x7fff, 0x1, 0xc, 0x80000001, 0xfffffffd, 0x6, 0x8, 0x5, 0x1, 0x4, 0x1000, 0x101, 0x6, 0x7, 0x3, 0x1, 0xa, 0xe, 0x2, 0x400, 0x2, 0x9, 0x10, 0x0, 0x4, 0x9, 0x1, 0x7, 0x1ff, 0x2, 0x5, 0x0, 0x3, 0x3, 0x9, 0x10000, 0x6, 0x6, 0x0, 0x8000, 0xe, 0x3, 0x9, 0xa75, 0x81, 0x6bec, 0xffffffff, 0x1, 0x40, 0xd, 0x2, 0x7, 0x8, 0x0, 0x5d, 0xf45, 0x4b, 0x6, 0x4, 0x3, 0x4, 0x0, 0x7, 0x0, 0x40, 0x1, 0x10001, 0xd, 0x2, 0x3, 0x38af, 0x9, 0xfffffffb, 0xaad, 0x1, 0x9, 0x81, 0x0, 0x3, 0x402, 0x1, 0x9, 0x7, 0x1, 0x32, 0x7, 0x7e1, 0x9, 0xfffffffb, 0x9c69, 0x5, 0x3, 0x4833, 0x7fffffff, 0xf477, 0x4, 0xf2, 0xd1a, 0xfffffff3, 0x3ff, 0x8, 0xffff036b, 0x7, 0x6ea9, 0x3, 0x80000000, 0x6, 0x7, 0x6, 0x8, 0x9, 0x3, 0xc2, 0x1, 0x2, 0x8, 0x3, 0xd, 0x5, 0x4, 0x10000, 0x81, 0x5, 0x3, 0x3, 0x6, 0x400, 0x5, 0x10, 0x1, 0x9f, 0x7, 0x1, 0x3, 0x2, 0x9, 0x2, 0x2, 0xd061713, 0x5, 0x3]}, @TCA_POLICE_RATE={0x404, 0x2, [0xd477, 0x6, 0x7, 0x3, 0xcbda, 0x9, 0x0, 0x6, 0x9, 0xa260, 0x5, 0x7, 0x80000001, 0x8, 0x1000, 0x20, 0x4, 0x6, 0x7, 0xfffffff8, 0x3, 0x5, 0xfffffffc, 0x101, 0x10, 0x200, 0x8000, 0x5, 0x6, 0x9, 0x3, 0x1ff, 0x6, 0x6, 0xf4, 0x2, 0xa, 0x7fffffff, 0x2, 0x42, 0x8, 0x3, 0x80, 0x1, 0x40, 0x6, 0x40, 0x4, 0x6, 0x0, 0x8000, 0xfffffe00, 0x1, 0xfffffffc, 0x3, 0x3a30, 0x1, 0x2, 0x3, 0x0, 0x6c1, 0x2, 0x1, 0x7, 0x6, 0x4c4, 0x2, 0x9, 0x1, 0x80000001, 0x3ef, 0xfffeffff, 0x5, 0x523a, 0x1, 0x9, 0x0, 0x30000, 0x5, 0x8, 0xfffffff9, 0x8, 0x5, 0x2, 0x0, 0x7, 0x0, 0x9, 0x6, 0x8, 0x4, 0x82e, 0xfffffffc, 0x6, 0x2, 0x8, 0x6, 0x8, 0xc, 0x9, 0x7, 0x7, 0x8000, 0xfffff21a, 0xfffffff9, 0x7, 0x1, 0x68ec, 0x8, 0xac686f8, 0x7, 0x6, 0x7fffffff, 0x7, 0x21, 0x2000000, 0x17, 0x5, 0x1, 0x0, 0xdd1e, 0x7fffffff, 0x401, 0x1, 0x8, 0x100000, 0x4, 0x100, 0xa0, 0x4, 0x9, 0xe, 0x1, 0x400, 0x6c, 0x5af, 0x4, 0x8, 0x100, 0x3ff, 0x9, 0x0, 0x1, 0xfffffffa, 0xff, 0x4, 0xba6, 0x0, 0x9, 0x6, 0x0, 0x0, 0x6, 0x9, 0x9a, 0x0, 0x7, 0x800, 0xffffffd5, 0x400, 0x3ff, 0x5da78, 0xd8be, 0x1, 0x7, 0x101, 0xb37, 0x100, 0x8, 0x6, 0x9a, 0x2, 0x100, 0x9, 0xd, 0x7f, 0x200, 0x10001, 0x6, 0x7, 0x70, 0x1, 0x839, 0x1, 0x8, 0x9, 0x10, 0x81ed, 0x81, 0xfffffffc, 0x4, 0x95, 0x6, 0x5, 0xf13, 0x2, 0xd82, 0x5, 0x5, 0x40, 0x7, 0xcbd, 0x1ff, 0xd2, 0x1, 0x8000, 0x2, 0x7fff, 0x8, 0x1000, 0x8, 0xfd3a, 0x6, 0x6, 0x24c, 0x0, 0x4, 0x6, 0xfffffffa, 0x7f, 0x8000, 0x3, 0x3, 0x5, 0x7e, 0x3, 0x6, 0x8, 0x1, 0x4, 0x4, 0x10000, 0x3ff, 0x7fffffff, 0x25, 0x460dc727, 0xb, 0xb3, 0x7, 0x9ea3, 0x8, 0xffff, 0x1, 0xfff, 0x10001, 0xc31, 0x3, 0x1, 0x5, 0x5, 0x1fac, 0xc, 0x2, 0xad10, 0xfffffff6]}]}, @TCA_TCINDEX_MASK={0x6, 0x2, 0x67}, @TCA_TCINDEX_HASH={0x8, 0x1, 0x46c9}, @TCA_TCINDEX_FALL_THROUGH={0x8}]}}]}, 0x1628}, 0x1, 0x0, 0x0, 0x8000001}, 0x40) write$cgroup_subtree(r4, &(0x7f00000004c0)={[{0x2b, 'rlimit'}, {0x2d, 'io'}]}, 0xc) sendmsg$TIPC_NL_KEY_SET(r4, &(0x7f0000000dc0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000c00)={0x190, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff4872}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x52}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x27d3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbcf0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4422}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x968}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7f}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x40}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_MEDIA={0x7c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x97}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_BEARER={0x68, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x8, @remote, 0x8}}}}]}]}, 0x190}}, 0x40004) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101804bc9555e1affd5020000000900010001797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737975320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x480d5}, 0x0) 1.2380986s ago: executing program 4 (id=4894): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200), 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000240)={[{@noload}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@auto_da_alloc}, {@block_validity}, {@quota}]}, 0x3, 0x440, &(0x7f0000000e40)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r3}, 0x10) chmod(&(0x7f0000000240)='./file0\x00', 0x11) lsm_set_self_attr(0x2, &(0x7f0000000000)={0x67, 0x0, 0x32, 0x12, "21eb6193ed8e1b667e02cf03693960623b90"}, 0x32, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000e80), 0x111, 0x6}}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000006) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000d00, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = socket(0x400000000010, 0x3, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r9, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000600)=@newtfilter={0x38, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r9, {0xb, 0x6}, {}, {0x7}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_FLAGS={0x8, 0xb, 0x2}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x0) 1.166648862s ago: executing program 4 (id=4896): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb904, @void, @value}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r4 = syz_io_uring_setup(0x7440, &(0x7f00000004c0)={0x0, 0xa6e9, 0x10100, 0x2, 0xfffffffb}, &(0x7f0000000140)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_submit(r5, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x40, 0x0, 0x3, 0x1, 0x0, 0xce}) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r7, &(0x7f00000001c0)=ANY=[@ANYBLOB='.'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r7, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000000)={'bond_slave_1\x00', {0x2, 0x4e23, @loopback}}) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r4, 0x2d3e, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) init_module(0x0, 0xffec3, 0x0) io_uring_setup(0x1694, &(0x7f0000000080)={0x0, 0xdd7c, 0x1000}) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x20000, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) 1.035756784s ago: executing program 7 (id=4900): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180200002343ffff0000000000000000850000004100000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4e) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000300)={r1, r2, 0x25, 0x2, @val=@perf_event={0xff}}, 0x18) syz_emit_ethernet(0x46, &(0x7f0000000780)=ANY=[], 0x0) 728.486348ms ago: executing program 7 (id=4904): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) execve(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, 0x0, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) 518.047972ms ago: executing program 7 (id=4910): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x6, r0}, 0x38) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x80000000000}, 0x18) (async) r3 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) (async, rerun: 64) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) (async, rerun: 64) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000280)=0xf, 0x4) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r3) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX=r2], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000005c0)='kfree_skb\x00', r7}, 0x18) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000980)='kfree_skb\x00', r8}, 0x18) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) (async) connect$pppl2tp(r4, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x2, @multicast2}, 0x2, 0x0, 0x4}}, 0x2e) (async) r10 = socket$nl_generic(0x10, 0x3, 0x10) (async) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="0100000000000000000006000000140008"], 0x28}}, 0x8000) (async) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') (async) acct(&(0x7f00000001c0)='./file0\x00') r12 = socket$pppl2tp(0x18, 0x1, 0x1) (async) r13 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r12, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r13, {0x2, 0x0, @dev}, 0x2}}, 0x2e) (async) socket$nl_generic(0x10, 0x3, 0x10) 449.219273ms ago: executing program 7 (id=4913): r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x70, &(0x7f0000000300)=ANY=[@ANYRES16=r0], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, @void, @value}, 0x94) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_int(r4, 0x29, 0x19, 0x0, 0x5a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r3, 0x0, 0x20000000}, 0x18) timerfd_create(0x0, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r5, 0x4b4b, 0x10000000000004) clock_adjtime(0xffffffd3, &(0x7f0000000800)={0x5b, 0x4, 0xfffffffffffffffe, 0x7, 0x3, 0xb, 0x1, 0xfffffffffffffffc, 0x1, 0x0, 0x7fffffff, 0x0, 0x8, 0x8, 0x0, 0xcc0, 0x5a8f, 0x40000000001, 0x94d6, 0x5, 0x10002, 0x7, 0x0, 0xfffffffffffffffa, 0x800, 0x2000000000000}) statx(0xffffffffffffffff, 0x0, 0x1000, 0x0, &(0x7f0000000500)) 447.986913ms ago: executing program 5 (id=4915): unshare(0x44040200) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000001c2713a3cb9f2053cfe504cb0d30b048b3b4cd601a884966e5bedee0e2806b9b1ee4f3232745257ad38c9881d6f8bc161367ef66d34eaed5df89407eb145af471fa16cc685a5128dd72f9720354b758b533ee1", @ANYRES32, @ANYBLOB='\x00\x00\x00', @ANYRES32=0x0], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, @perf_config_ext={0xf60, 0xffffffff}, 0x1100, 0x5dd8, 0x3a65, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d0, 0x0, 0x940c, 0x3002, 0x0, 0x2c0, 0x328, 0x3d8, 0x3d8, 0x328, 0x3d8, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @private1, [0xffffff00, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xffffffff, 0xff000000, 0xff], 'geneve0\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x11, 0x81, 0x6, 0x1d}, 0x0, 0x1d0, 0x1f0, 0x0, {}, [@common=@srh={{0x30}, {0x2b, 0x2, 0x5, 0x4, 0x6, 0x401, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz0\x00', 0x4}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x2, 0xfffffffc, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 424.375853ms ago: executing program 7 (id=4916): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000570000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7fffffff, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r4) syz_usb_connect(0x0, 0x36, &(0x7f0000000280)=ANY=[@ANYRES16=r2, @ANYRES64=r1], 0x0) ioctl$EVIOCGBITSW(r4, 0x40095505, 0x0) 336.207734ms ago: executing program 6 (id=4918): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x2, &(0x7f0000006680)) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f6873720000000058000000160a0101000b000000000000010000000900020073797a32000000000900010073797a30000000002c000380180003801400010076657468305f746f5f687372000000000800024000440000080001"], 0xf8}, 0x1, 0x0, 0x0, 0xc000}, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$mouse(&(0x7f0000000080), 0x9, 0x80002) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route_sched_retired(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000009c0)=@delchain={0x1628, 0x65, 0x1, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r5, {0xb, 0xc}, {0x2, 0x8}, {0x6, 0xfff2}}, [@f_rsvp6={{0xa}, {0xcdc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x7, 0xfff2}}, @TCA_RSVP_POLICE={0xc40, 0x5, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x11d, 0x264fd178, 0x4, 0x8, 0xfffffc00, 0x1, 0x8, 0xe, 0x9, 0x8, 0x2, 0x0, 0x4, 0x2, 0x6, 0x1, 0x8282, 0xffff, 0x7ff, 0x1, 0x3ff, 0x9, 0x7fffffff, 0xfffffc01, 0x1, 0x7, 0x2, 0x2000000, 0x400, 0xffff, 0x7, 0x4, 0x1, 0x1, 0x10000, 0xe9ff, 0x2, 0x65, 0x10001, 0x9, 0x4, 0x7, 0xb, 0x9, 0x1, 0x9, 0x7, 0x7, 0x1, 0x7, 0x100, 0xbd0, 0x3, 0x4, 0xc02, 0x3, 0x9, 0xff, 0x7, 0x7, 0x9, 0x2, 0x200, 0x7ff, 0xd, 0x9, 0x3, 0x1, 0x4, 0x1000, 0x8, 0x0, 0x8, 0x3, 0xdce, 0x7, 0x1, 0x4, 0x8, 0x1ff, 0x2, 0x7, 0xd172, 0x4, 0xa, 0x8, 0x6, 0xdce, 0x100, 0x80000001, 0x6, 0x3, 0x8, 0xc, 0xfffffff0, 0x0, 0x12000, 0xa, 0x38, 0x5, 0x1, 0x200, 0x3, 0x3ffe, 0x4, 0x4, 0xf39, 0x8, 0x8001, 0x5, 0x0, 0x0, 0x0, 0x9, 0x2, 0x8001, 0x4, 0xe6, 0x4, 0x0, 0xdac, 0x7, 0x9, 0xfffffffc, 0x0, 0x1af, 0x80000000, 0x4, 0x5, 0x3, 0x4, 0xe, 0x40, 0x8, 0x1000, 0x4, 0x6, 0x7fffffff, 0x7, 0x7, 0xfffffffb, 0x34f67f13, 0x4, 0xc3, 0x0, 0xb8, 0x0, 0x2, 0xd, 0x7f, 0x11ee, 0x400, 0x0, 0x8, 0x200, 0x31f, 0x0, 0x45c, 0x9, 0x8, 0x1, 0x0, 0xec2, 0x800, 0x8, 0xc, 0xfff, 0x3, 0x80000001, 0x1c000, 0xeb, 0x7, 0x6, 0x4, 0x6, 0x7, 0x1, 0x7ff, 0x200, 0x72b6, 0xff, 0x8, 0x7fffffff, 0x8, 0x0, 0xfff, 0x2, 0xc49a, 0x7, 0x81, 0xf2, 0x9, 0x68a, 0x8, 0xd, 0x7fffffff, 0x1, 0xfffffff8, 0x4000, 0x7, 0x8, 0xffffff01, 0x2, 0x10000, 0x292133ba, 0x101, 0x5, 0x6, 0x9, 0xffffff51, 0xfffffffe, 0x7, 0x3, 0x9, 0x77e, 0x6, 0x400000, 0x1, 0x1, 0x99a, 0x2, 0x8, 0x123, 0x2, 0x0, 0x8, 0x7, 0xd, 0x4, 0x4, 0x8, 0x3, 0xa, 0x92, 0x543d, 0xf, 0x988, 0x1, 0x0, 0x80000001, 0x407, 0x9, 0x9, 0x5, 0x1, 0x10bd, 0x8, 0x7, 0x4, 0x1000, 0xffffffff, 0x6, 0x40, 0x3, 0x4]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x5}, @TCA_POLICE_RESULT={0x8, 0x5, 0x1}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x1, 0x1, 0x6, 0x5, 0x8, 0xfffff81c, 0x4, 0xdd1, 0xab, 0x0, 0x3ff, 0x100, 0x0, 0x200, 0x2, 0x1, 0x6512, 0x7, 0x0, 0x7ff, 0x280, 0x25, 0x1, 0x7fff, 0x7, 0x6, 0x22, 0x7, 0x9, 0x5, 0x4, 0x5, 0x5, 0x0, 0x8, 0x8001, 0x2, 0xfffffffa, 0x623, 0x8, 0x7, 0x5, 0x0, 0x0, 0x80, 0xfffffff7, 0x8, 0x7, 0x7, 0x8, 0x0, 0x2, 0x9, 0x304ad332, 0x9, 0x7fffffff, 0xffff8000, 0xff, 0x6, 0x5, 0x200, 0x10001, 0x7, 0x9d2f, 0x4, 0x8000, 0x81, 0x0, 0x7, 0xfffffffd, 0x1, 0x8, 0x6, 0x3e, 0x1, 0x8, 0x9, 0xa4, 0x3279, 0xe, 0x3, 0x7, 0x4, 0x3, 0xfffffff7, 0xf50, 0x1, 0x2400000, 0xffff5966, 0x1, 0x5, 0x3fb, 0x4, 0x7ff, 0xf, 0x42ca, 0x8, 0xfffff801, 0x37de51f8, 0x29, 0x2f5, 0x81, 0xc45, 0x6, 0x10001, 0xe26, 0x0, 0x80, 0x10001, 0x0, 0x6, 0x3, 0x4, 0x3, 0x8, 0x0, 0xfff, 0x650a, 0x7, 0x8, 0xffff, 0x101, 0x2, 0xa, 0x1, 0x401, 0x7, 0x8000, 0x3, 0x9, 0x0, 0x4, 0x6, 0x5, 0x3, 0x3ff, 0xd, 0x7f, 0xff, 0x40, 0xffffffff, 0x0, 0x52f8, 0x3, 0x2, 0x8, 0x7f, 0x0, 0x6132, 0x2, 0x0, 0x6, 0x0, 0x6, 0x7, 0x10000, 0xcf1c, 0x6, 0x81, 0x81, 0x6, 0xfe, 0xf6d3, 0x5, 0x74d, 0x80, 0x200, 0xc, 0x9, 0x24fcb22c, 0x10, 0x10000, 0x101, 0x5dae, 0x0, 0x9, 0xad, 0x1, 0x5, 0xffff8000, 0x6, 0xd, 0x6, 0xbea9, 0x6, 0x4, 0x9, 0x0, 0x9, 0xc6, 0x100, 0x955, 0x3, 0x9, 0x101, 0x8001, 0x0, 0x7f, 0x9, 0x2, 0x7fff, 0x3, 0x0, 0x6, 0xfffffffc, 0x0, 0x673, 0x3, 0x7f, 0x562e, 0x1, 0x3ff, 0x2, 0x0, 0x1, 0x4, 0x9, 0xfffffffe, 0x0, 0x2, 0x6, 0xffffffff, 0x1, 0x7, 0x9, 0xb735, 0x0, 0x43a, 0x7, 0x7, 0x7, 0x7, 0x0, 0x8, 0x400, 0x77f, 0x8, 0x80, 0x3, 0xffffffff, 0xa, 0x0, 0x1, 0x0, 0x20, 0x2, 0x9, 0x1, 0x8e8, 0x6de, 0x9, 0x4, 0x3, 0x0, 0x7fffffff]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8000}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_RATE={0x404, 0x2, [0x38, 0xfff, 0x4, 0x10001, 0x5, 0x0, 0x8, 0x10001, 0x6, 0x0, 0xf1, 0x8, 0x3, 0x2, 0x2000000, 0x8, 0x6, 0x7f, 0x60b028d1, 0xd, 0x10, 0x3, 0x2, 0x10, 0x35, 0x62fd, 0x2, 0x2, 0x1, 0x400, 0xfffffff1, 0xe9c1, 0xf40f, 0x3, 0x8000, 0x8, 0x8, 0x4, 0xe2c, 0xffff, 0x4, 0x4, 0x81, 0x81, 0x100, 0x8, 0x81e, 0x8, 0x6, 0x1, 0x7e0b55cb, 0x6, 0x7, 0x5, 0x2, 0x7, 0x7, 0x5, 0xfffffffc, 0x3, 0xcc5e, 0x6, 0x7, 0x52, 0xc, 0x8, 0xff, 0x0, 0x800, 0x2, 0x1, 0x401, 0x8, 0x8, 0xff, 0x50000, 0x8001, 0xffff, 0x7, 0x7, 0x9c0e, 0x6, 0x2, 0x4, 0xf, 0x2, 0xc, 0x8, 0x0, 0xffff, 0x1, 0x482, 0xfffffc00, 0x7f, 0x81, 0x5, 0x8000, 0x4, 0xd, 0x9, 0xffffffff, 0x6, 0x5, 0x4, 0x401, 0x1, 0x4, 0x6, 0x5d82, 0x1, 0x8000, 0xf3, 0x0, 0x9, 0x2, 0x3, 0xd, 0xf, 0x3, 0x7, 0xffff, 0x10001, 0x1, 0x7, 0x754d, 0x5, 0x2, 0xd659, 0x4, 0xf52, 0x800, 0x9, 0x2, 0x6, 0xc60e, 0x40, 0x0, 0x7f, 0x8, 0xffff, 0x23f, 0x4, 0x2, 0x5, 0x3ff, 0x5, 0x1, 0x4, 0x9, 0xffff, 0x4, 0x3, 0x1000, 0x81, 0x2, 0x6, 0xf9, 0xfffffffd, 0x0, 0x1, 0x10000, 0x1e2, 0x2, 0x6, 0x9, 0x8, 0x2b, 0x6, 0x800, 0x6fef, 0x5, 0x5, 0xfffffffd, 0x2, 0x9, 0x1, 0x5, 0x1b, 0x0, 0x7, 0x3, 0x8, 0xffffffc1, 0x4, 0xc1a, 0xdd6, 0xff, 0x80000000, 0x8000, 0x8, 0x3, 0x800, 0x6, 0x1, 0x6b, 0x4b7, 0x4, 0xfffffffd, 0x6, 0x4, 0x200, 0x80, 0x8000, 0x4, 0x8, 0x2, 0xf, 0x8, 0x6, 0x1, 0x3, 0x9, 0x4, 0x48539098, 0x4, 0x8, 0x9, 0x3, 0xbe, 0x3800000, 0xb, 0xd, 0x3, 0x7fffffff, 0x5, 0x1, 0x1, 0x2, 0x2, 0xffffffff, 0x8, 0x5, 0xd27, 0xffff300b, 0x4ee, 0x8, 0x8, 0x3, 0x6b, 0x101, 0x8, 0xd2, 0x3, 0x3800000, 0x3, 0x1, 0x8c5, 0x4d0, 0x1, 0x5, 0xd50b7d8a, 0x81, 0xfffffffd, 0xfffffffb, 0x5, 0x7]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x200}]}, @TCA_RSVP_SRC={0x14, 0x3, @mcast1}, @TCA_RSVP_PINFO={0x20, 0x4, {{0xea10, 0x3, 0x1000}, {0x7c, 0x3, 0x1}, 0x67, 0xf9}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xe, 0xfff1}}, @TCA_RSVP_POLICE={0x18, 0x5, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x1}, @TCA_POLICE_RATE64={0xc}]}, @TCA_RSVP_DST={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @TCA_RSVP_SRC={0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x30}}, @TCA_RSVP_DST={0x14, 0x2, @loopback}]}}, @f_rsvp={{0x9}, {0x74, 0x2, [@TCA_RSVP_SRC={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x18}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x45, 0x5, 0x5}, {0x7, 0x4, 0x8}, 0x67, 0xb, 0xd8}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x6, 0x1, 0x3}, {0x100, 0x4, 0x8}, 0x21, 0xf4, 0xc}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x2, 0xffffffff, 0xe}, {0xfffffff5, 0xff, 0x1000}, 0x32, 0x39, 0x2}}, @TCA_RSVP_DST={0x8, 0x2, @empty}]}}, @f_rsvp6={{0xa}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x34}}]}}, @f_tcindex={{0xc}, {0x86c, 0x2, [@TCA_TCINDEX_CLASSID={0x8, 0x5, {0xfff1, 0xfff8}}, @TCA_TCINDEX_POLICE={0x848, 0x6, [@TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0xffffffffffffffff, 0xffffff9c, 0x3, 0x7f, {0xe8, 0x1, 0x3bc, 0x800, 0x6, 0x565e7652}, {0x80, 0x1, 0x400, 0xcd13, 0xfff7, 0x8001}, 0x2cec, 0x8, 0x3}}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x9, 0x9, 0xacb, 0x5, 0xd7a, 0xcf8a, 0x0, 0x6, 0x8, 0x101, 0x0, 0x4, 0x4, 0x7, 0xe, 0xfe, 0x7, 0x244, 0x3, 0x8001, 0x3, 0x3, 0x80000001, 0x2, 0xfff, 0x4408, 0x8219, 0x1, 0x6, 0x4, 0x9, 0xc0, 0x86, 0x4, 0x4, 0x6, 0xed, 0x7, 0x6, 0x6df, 0x7, 0xee19, 0x401, 0x2, 0x0, 0x7fff, 0x5, 0x80, 0x3, 0xe, 0x7a3d, 0x7, 0x3, 0x0, 0x5, 0x8, 0x7, 0x2, 0x6, 0x4, 0x81, 0x7fffffff, 0xe, 0xe, 0xffff7fff, 0x4, 0xfffffff7, 0x8, 0x1, 0x5, 0x6, 0x3ff, 0x8, 0x3, 0x2, 0x0, 0x5, 0x5, 0x0, 0xd309, 0xfffffffb, 0x4, 0x1, 0x7, 0x3, 0x5, 0x1, 0x401, 0x200, 0x8, 0x5, 0x3, 0x1, 0xffffffff, 0xb, 0x4, 0x8, 0x2, 0xffffffff, 0x1, 0x53ea, 0xfffffff7, 0xfffffffc, 0x4, 0x8, 0x6, 0x0, 0xfffffffa, 0x9, 0x3, 0x7ff, 0x0, 0x6, 0x3e7c, 0x7fff, 0x1, 0xc, 0x80000001, 0xfffffffd, 0x6, 0x8, 0x5, 0x1, 0x4, 0x1000, 0x101, 0x6, 0x7, 0x3, 0x1, 0xa, 0xe, 0x2, 0x400, 0x2, 0x9, 0x10, 0x0, 0x4, 0x9, 0x1, 0x7, 0x1ff, 0x2, 0x5, 0x0, 0x3, 0x3, 0x9, 0x10000, 0x6, 0x6, 0x0, 0x8000, 0xe, 0x3, 0x9, 0xa75, 0x81, 0x6bec, 0xffffffff, 0x1, 0x40, 0xd, 0x2, 0x7, 0x8, 0x0, 0x5d, 0xf45, 0x4b, 0x6, 0x4, 0x3, 0x4, 0x0, 0x7, 0x0, 0x40, 0x1, 0x10001, 0xd, 0x2, 0x3, 0x38af, 0x9, 0xfffffffb, 0xaad, 0x1, 0x9, 0x81, 0x0, 0x3, 0x402, 0x1, 0x9, 0x7, 0x1, 0x32, 0x7, 0x7e1, 0x9, 0xfffffffb, 0x9c69, 0x5, 0x3, 0x4833, 0x7fffffff, 0xf477, 0x4, 0xf2, 0xd1a, 0xfffffff3, 0x3ff, 0x8, 0xffff036b, 0x7, 0x6ea9, 0x3, 0x80000000, 0x6, 0x7, 0x6, 0x8, 0x9, 0x3, 0xc2, 0x1, 0x2, 0x8, 0x3, 0xd, 0x5, 0x4, 0x10000, 0x81, 0x5, 0x3, 0x3, 0x6, 0x400, 0x5, 0x10, 0x1, 0x9f, 0x7, 0x1, 0x3, 0x2, 0x9, 0x2, 0x2, 0xd061713, 0x5, 0x3]}, @TCA_POLICE_RATE={0x404, 0x2, [0xd477, 0x6, 0x7, 0x3, 0xcbda, 0x9, 0x0, 0x6, 0x9, 0xa260, 0x5, 0x7, 0x80000001, 0x8, 0x1000, 0x20, 0x4, 0x6, 0x7, 0xfffffff8, 0x3, 0x5, 0xfffffffc, 0x101, 0x10, 0x200, 0x8000, 0x5, 0x6, 0x9, 0x3, 0x1ff, 0x6, 0x6, 0xf4, 0x2, 0xa, 0x7fffffff, 0x2, 0x42, 0x8, 0x3, 0x80, 0x1, 0x40, 0x6, 0x40, 0x4, 0x6, 0x0, 0x8000, 0xfffffe00, 0x1, 0xfffffffc, 0x3, 0x3a30, 0x1, 0x2, 0x3, 0x0, 0x6c1, 0x2, 0x1, 0x7, 0x6, 0x4c4, 0x2, 0x9, 0x1, 0x80000001, 0x3ef, 0xfffeffff, 0x5, 0x523a, 0x1, 0x9, 0x0, 0x30000, 0x5, 0x8, 0xfffffff9, 0x8, 0x5, 0x2, 0x0, 0x7, 0x0, 0x9, 0x6, 0x8, 0x4, 0x82e, 0xfffffffc, 0x6, 0x2, 0x8, 0x6, 0x8, 0xc, 0x9, 0x7, 0x7, 0x8000, 0xfffff21a, 0xfffffff9, 0x7, 0x1, 0x68ec, 0x8, 0xac686f8, 0x7, 0x6, 0x7fffffff, 0x7, 0x21, 0x2000000, 0x17, 0x5, 0x1, 0x0, 0xdd1e, 0x7fffffff, 0x401, 0x1, 0x8, 0x100000, 0x4, 0x100, 0xa0, 0x4, 0x9, 0xe, 0x1, 0x400, 0x6c, 0x5af, 0x4, 0x8, 0x100, 0x3ff, 0x9, 0x0, 0x1, 0xfffffffa, 0xff, 0x4, 0xba6, 0x0, 0x9, 0x6, 0x0, 0x0, 0x6, 0x9, 0x9a, 0x0, 0x7, 0x800, 0xffffffd5, 0x400, 0x3ff, 0x5da78, 0xd8be, 0x1, 0x7, 0x101, 0xb37, 0x100, 0x8, 0x6, 0x9a, 0x2, 0x100, 0x9, 0xd, 0x7f, 0x200, 0x10001, 0x6, 0x7, 0x70, 0x1, 0x839, 0x1, 0x8, 0x9, 0x10, 0x81ed, 0x81, 0xfffffffc, 0x4, 0x95, 0x6, 0x5, 0xf13, 0x2, 0xd82, 0x5, 0x5, 0x40, 0x7, 0xcbd, 0x1ff, 0xd2, 0x1, 0x8000, 0x2, 0x7fff, 0x8, 0x1000, 0x8, 0xfd3a, 0x6, 0x6, 0x24c, 0x0, 0x4, 0x6, 0xfffffffa, 0x7f, 0x8000, 0x3, 0x3, 0x5, 0x7e, 0x3, 0x6, 0x8, 0x1, 0x4, 0x4, 0x10000, 0x3ff, 0x7fffffff, 0x25, 0x460dc727, 0xb, 0xb3, 0x7, 0x9ea3, 0x8, 0xffff, 0x1, 0xfff, 0x10001, 0xc31, 0x3, 0x1, 0x5, 0x5, 0x1fac, 0xc, 0x2, 0xad10, 0xfffffff6]}]}, @TCA_TCINDEX_MASK={0x6, 0x2, 0x67}, @TCA_TCINDEX_HASH={0x8, 0x1, 0x46c9}, @TCA_TCINDEX_FALL_THROUGH={0x8}]}}]}, 0x1628}, 0x1, 0x0, 0x0, 0x8000001}, 0x40) write$cgroup_subtree(r4, &(0x7f00000004c0)={[{0x2b, 'rlimit'}, {0x2d, 'io'}]}, 0xc) sendmsg$TIPC_NL_KEY_SET(r4, &(0x7f0000000dc0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000c00)={0x190, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff4872}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x52}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x27d3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbcf0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4422}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x968}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7f}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x40}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_MEDIA={0x7c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x97}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_BEARER={0x68, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x8, @remote, 0x8}}}}]}]}, 0x190}}, 0x40004) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101804bc9555e1affd5020000000900010001797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737975320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x480d5}, 0x0) 335.941645ms ago: executing program 3 (id=4919): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7d0, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local, [@srh]}}}}}}}, 0x0) 328.786835ms ago: executing program 6 (id=4920): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) execve(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, 0x0, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) 300.978045ms ago: executing program 3 (id=4921): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='comm\x00') read$msr(r1, &(0x7f0000000040)=""/59, 0xffb5) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r4, 0x0, 0x3}) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 183.132587ms ago: executing program 3 (id=4922): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r0, 0x0, 0x3}) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 153.827637ms ago: executing program 3 (id=4923): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r6}, 0x10) sendmsg$IPCTNL_MSG_EXP_GET(r3, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f00000001c0)={0x2c, 0x1, 0x2, 0x801, 0x0, 0x0, {0x3, 0x0, 0x1}, [@CTA_EXPECT_HELP_NAME={0xe, 0x6, 'irc-20000\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xbe2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x880}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 153.319407ms ago: executing program 6 (id=4924): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7d0, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local, [@srh]}}}}}}}, 0x0) 152.941777ms ago: executing program 5 (id=4925): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f0000000800)=""/163}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xbb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r5}, 0x10) listen(r4, 0x3) listen(r2, 0x80080400) r6 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) 138.658448ms ago: executing program 6 (id=4926): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYRES64=r3, @ANYRES32, @ANYRES32=r2, @ANYRES64=0x0, @ANYRES16=r3, @ANYRES16=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) sysinfo(0x0) getresuid(&(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000200)) 112.302358ms ago: executing program 6 (id=4927): r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0500000004000000032000000c00000f00"], 0x50) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x0) move_pages(0x0, 0x2064, &(0x7f0000000040)=[&(0x7f0000ff9000/0x2000)=nil], &(0x7f0000001180), &(0x7f0000000000), 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000005e00010200"/20, @ANYRES32=0x0], 0x1c}}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280)={0x0, r0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa2000000000000070a0000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) unshare(0x2040400) r5 = fsopen(&(0x7f0000000440)='cgroup2\x00', 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb98}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r8, 0x84, 0x81, &(0x7f00000002c0)="1ae96d0103010000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r8, 0x84, 0x17, &(0x7f0000000740)=ANY=[], 0xffc9) close_range(r7, 0xffffffffffffffff, 0x0) 59.891569ms ago: executing program 3 (id=4928): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0040, &(0x7f0000000100)={[{@barrier}, {@resgid={'resgid', 0x3d, 0xee00}}, {@discard}, {@noload}, {@journal_dev={'journal_dev', 0x3d, 0x4}}, {@nodiscard}]}, 0xfe, 0x472, &(0x7f0000000f80)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x61780, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) mount$bind(0x0, 0x0, 0x0, 0x61, 0x0) 59.370799ms ago: executing program 6 (id=4929): r0 = socket(0x2a, 0x2, 0x5) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="1b", 0x1}], 0x1}}], 0x1, 0x20000885) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000008000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) unshare(0x24020400) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r2, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r3, 0x10d, 0xe, &(0x7f00001c9fff)="02", 0x1) 0s ago: executing program 3 (id=4930): socket$rds(0x15, 0x5, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="2d0000000000000000000000000000009500570000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="2d0000000000000000000000000000009500570000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) (async) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) mbind(&(0x7f00001da000/0x4000)=nil, 0x4000, 0x3, 0x0, 0x8001, 0x2) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) (async) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) mincore(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) socket$netlink(0x10, 0x3, 0x2) (async) r1 = socket$netlink(0x10, 0x3, 0x2) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x5e51960ee9d81b8f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000780)="5500000018007fa2809302060000ff41fd01020400000a00120002002800000019002d006fffffff0022de1330d544060000000000000033e3facb09d05b8300000000f2ff0000010000002c1bb392f5393b27a2c45e5f3f5cd71d31e3c434ac26c0e30f2921f1adaebc171a07061585605ebaa938c069b23c05ad2b53b1bb2fe5ac432efeeb0cad27105695ed1dba132f8426a25988e1c264e4d03ef8766d60869d229bb45a55930d89ca83be55698ff52143b3902f88c745a0c1de92d567ead9ce8ffc0760a57be82f856317f729d26f3cb948a878077404e25d9739c39ccc20321b85aaa3c83b695e14e4eae84d0cd4bfbcd2000000000000000000000000000000000000001670", 0x109}, {&(0x7f0000000680)="94785f7cc2035d3da6ea347310a5bddad2caf8c2ac302c8bd332a0fcf2b6c8e90cf676fd224b2eef9a47deccfd71023f08a4a2da189498e84795388e39c646167c233be1f82146abc6a9b27dae7be205ab88931e50ebf28f9ac474661d1bb5aaa84f3fde34d8a3d1", 0x68}, {&(0x7f00000004c0)="a78398b7a84be7bcc74fbea45382cc7b7b5229cc355a853182d9367ff942de341ed6d687b1305da03d548e00699d8299ee33005e936dba5f0049951b9cbc620387cadaff05c510f3629e52cedb2c1fd8908639fc01ee9a75fba8ffc6d2891c285dd1416d84", 0x65}], 0x3, 0x0, 0x0, 0x7a000000}, 0x4000884) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) sendmsg$OSF_MSG_REMOVE(r5, &(0x7f00000001c0)={0x0, 0xfffffdef, &(0x7f00000002c0)={0x0, 0xffffffffffffffc4}, 0x1, 0x0, 0x0, 0x38ad89f3400e3f25}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) kernel console output (not intermixed with test programs): oot/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 283.473270][ T29] audit: type=1326 audit(1744130056.293:119789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15018 comm="syz.7.4016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 283.531019][ T29] audit: type=1326 audit(1744130056.353:119790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15018 comm="syz.7.4016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 283.531058][ T29] audit: type=1326 audit(1744130056.353:119791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15018 comm="syz.7.4016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 283.747613][T15034] batadv0 speed is unknown, defaulting to 1000 [ 283.832021][ T29] audit: type=1326 audit(1744130056.653:119792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15038 comm="syz.5.4025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 283.832070][ T29] audit: type=1326 audit(1744130056.653:119793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15038 comm="syz.5.4025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 283.832104][ T29] audit: type=1326 audit(1744130056.653:119794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15038 comm="syz.5.4025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 283.832137][ T29] audit: type=1326 audit(1744130056.653:119795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15038 comm="syz.5.4025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 283.832240][ T29] audit: type=1326 audit(1744130056.653:119796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15038 comm="syz.5.4025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 283.832298][ T29] audit: type=1326 audit(1744130056.653:119797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15038 comm="syz.5.4025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 283.955059][T15028] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 283.955211][T15028] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 284.047980][T15044] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4027'. [ 284.048013][T15044] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4027'. [ 284.070365][T15052] netlink: 'syz.3.4030': attribute type 1 has an invalid length. [ 284.098623][T15052] netlink: 224 bytes leftover after parsing attributes in process `syz.3.4030'. [ 284.119213][T15052] Invalid ELF header magic: != ELF [ 284.342207][T15066] batadv0 speed is unknown, defaulting to 1000 [ 284.523359][T15083] siw: device registration error -23 [ 284.566228][T15091] siw: device registration error -23 [ 284.726480][T15109] batadv0 speed is unknown, defaulting to 1000 [ 284.801600][T15117] siw: device registration error -23 [ 284.908261][T15124] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 284.917021][T15124] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 284.943902][T15111] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 284.954739][T15111] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 285.040803][T15139] pim6reg1: entered promiscuous mode [ 285.046187][T15139] pim6reg1: entered allmulticast mode [ 285.058233][T15139] bridge0: entered promiscuous mode [ 285.065255][T15139] bridge0: port 3(macsec1) entered blocking state [ 285.071783][T15139] bridge0: port 3(macsec1) entered disabled state [ 285.081343][T15139] macsec1: entered allmulticast mode [ 285.086714][T15139] bridge0: entered allmulticast mode [ 285.092601][T15139] macsec1: left allmulticast mode [ 285.097748][T15139] bridge0: left allmulticast mode [ 285.123461][T15139] bridge0: left promiscuous mode [ 285.212269][T15147] batadv0 speed is unknown, defaulting to 1000 [ 285.268930][T15154] siw: device registration error -23 [ 285.406636][T15174] FAULT_INJECTION: forcing a failure. [ 285.406636][T15174] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.419885][T15174] CPU: 1 UID: 0 PID: 15174 Comm: syz.4.4075 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 285.419970][T15174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 285.420037][T15174] Call Trace: [ 285.420044][T15174] [ 285.420053][T15174] dump_stack_lvl+0xf6/0x150 [ 285.420098][T15174] dump_stack+0x15/0x1a [ 285.420120][T15174] should_fail_ex+0x261/0x270 [ 285.420152][T15174] should_fail+0xb/0x10 [ 285.420259][T15174] should_fail_usercopy+0x1a/0x20 [ 285.420323][T15174] strncpy_from_user+0x25/0x230 [ 285.420345][T15174] ? getname_flags+0x81/0x3b0 [ 285.420366][T15174] getname_flags+0xb0/0x3b0 [ 285.420388][T15174] path_listxattrat+0x81/0x2c0 [ 285.420416][T15174] ? ksys_write+0x180/0x1b0 [ 285.420597][T15174] __x64_sys_listxattr+0x4a/0x60 [ 285.420624][T15174] x64_sys_call+0xc3f/0x2e10 [ 285.420650][T15174] do_syscall_64+0xc9/0x1c0 [ 285.420683][T15174] ? clear_bhb_loop+0x25/0x80 [ 285.420710][T15174] ? clear_bhb_loop+0x25/0x80 [ 285.420775][T15174] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 285.420802][T15174] RIP: 0033:0x7fed7ef9d169 [ 285.420827][T15174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 285.420847][T15174] RSP: 002b:00007fed7d607038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c2 [ 285.420865][T15174] RAX: ffffffffffffffda RBX: 00007fed7f1b5fa0 RCX: 00007fed7ef9d169 [ 285.420877][T15174] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 285.420889][T15174] RBP: 00007fed7d607090 R08: 0000000000000000 R09: 0000000000000000 [ 285.420955][T15174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.420986][T15174] R13: 0000000000000001 R14: 00007fed7f1b5fa0 R15: 00007ffdd6e47ba8 [ 285.421009][T15174] [ 285.722891][T15186] netlink: 272 bytes leftover after parsing attributes in process `syz.6.4080'. [ 285.803008][T15193] siw: device registration error -23 [ 285.821295][T15184] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 285.824890][ T3380] IPVS: starting estimator thread 0... [ 285.850456][T15197] netlink: 'syz.6.4084': attribute type 5 has an invalid length. [ 285.864609][T15199] FAULT_INJECTION: forcing a failure. [ 285.864609][T15199] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.864670][T15199] CPU: 1 UID: 0 PID: 15199 Comm: syz.3.4085 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 285.864696][T15199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 285.864710][T15199] Call Trace: [ 285.864716][T15199] [ 285.864724][T15199] dump_stack_lvl+0xf6/0x150 [ 285.864759][T15199] dump_stack+0x15/0x1a [ 285.864777][T15199] should_fail_ex+0x261/0x270 [ 285.864806][T15199] should_fail+0xb/0x10 [ 285.864827][T15199] should_fail_usercopy+0x1a/0x20 [ 285.864903][T15199] strncpy_from_user+0x25/0x230 [ 285.864958][T15199] ? getname_flags+0x81/0x3b0 [ 285.864981][T15199] getname_flags+0xb0/0x3b0 [ 285.865003][T15199] __x64_sys_unlinkat+0x75/0xb0 [ 285.865042][T15199] x64_sys_call+0x237a/0x2e10 [ 285.865090][T15199] do_syscall_64+0xc9/0x1c0 [ 285.865137][T15199] ? clear_bhb_loop+0x25/0x80 [ 285.865163][T15199] ? clear_bhb_loop+0x25/0x80 [ 285.865264][T15199] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 285.865288][T15199] RIP: 0033:0x7fa2fedcd169 [ 285.865302][T15199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 285.865330][T15199] RSP: 002b:00007fa2fd437038 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 285.865346][T15199] RAX: ffffffffffffffda RBX: 00007fa2fefe5fa0 RCX: 00007fa2fedcd169 [ 285.865429][T15199] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 285.865440][T15199] RBP: 00007fa2fd437090 R08: 0000000000000000 R09: 0000000000000000 [ 285.865450][T15199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.865476][T15199] R13: 0000000000000000 R14: 00007fa2fefe5fa0 R15: 00007fffdf888808 [ 285.865497][T15199] [ 285.924435][T15196] IPVS: using max 2016 ests per chain, 100800 per kthread [ 285.947279][T15208] FAULT_INJECTION: forcing a failure. [ 285.947279][T15208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.947309][T15208] CPU: 1 UID: 0 PID: 15208 Comm: syz.7.4089 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 285.947339][T15208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 285.947354][T15208] Call Trace: [ 285.947362][T15208] [ 285.947370][T15208] dump_stack_lvl+0xf6/0x150 [ 285.947404][T15208] dump_stack+0x15/0x1a [ 285.947425][T15208] should_fail_ex+0x261/0x270 [ 285.947457][T15208] should_fail+0xb/0x10 [ 285.947496][T15208] should_fail_usercopy+0x1a/0x20 [ 285.947530][T15208] _copy_to_user+0x20/0xa0 [ 285.947569][T15208] simple_read_from_buffer+0xb2/0x130 [ 285.947607][T15208] proc_fail_nth_read+0x103/0x140 [ 285.947738][T15208] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 285.947776][T15208] vfs_read+0x1b2/0x710 [ 285.947819][T15208] ? __rcu_read_unlock+0x4e/0x70 [ 285.947853][T15208] ? __fget_files+0x186/0x1c0 [ 285.947878][T15208] ksys_read+0xeb/0x1b0 [ 285.947911][T15208] __x64_sys_read+0x42/0x50 [ 285.948009][T15208] x64_sys_call+0x2a3b/0x2e10 [ 285.948036][T15208] do_syscall_64+0xc9/0x1c0 [ 285.948076][T15208] ? clear_bhb_loop+0x25/0x80 [ 285.948161][T15208] ? clear_bhb_loop+0x25/0x80 [ 285.948185][T15208] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 285.948205][T15208] RIP: 0033:0x7f579632bb7c [ 285.948219][T15208] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 285.948237][T15208] RSP: 002b:00007f579498f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 285.948257][T15208] RAX: ffffffffffffffda RBX: 00007f5796545fa0 RCX: 00007f579632bb7c [ 285.948303][T15208] RDX: 000000000000000f RSI: 00007f579498f0a0 RDI: 0000000000000006 [ 285.948317][T15208] RBP: 00007f579498f090 R08: 0000000000000000 R09: 0000000000000000 [ 285.948331][T15208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.948345][T15208] R13: 0000000000000000 R14: 00007f5796545fa0 R15: 00007fff49332bf8 [ 285.948419][T15208] [ 286.309182][T15235] siw: device registration error -23 [ 286.489841][T15242] batadv0 speed is unknown, defaulting to 1000 [ 286.605316][T15258] FAULT_INJECTION: forcing a failure. [ 286.605316][T15258] name failslab, interval 1, probability 0, space 0, times 0 [ 286.605344][T15258] CPU: 0 UID: 0 PID: 15258 Comm: syz.5.4110 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 286.605414][T15258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 286.605427][T15258] Call Trace: [ 286.605433][T15258] [ 286.605440][T15258] dump_stack_lvl+0xf6/0x150 [ 286.605532][T15258] dump_stack+0x15/0x1a [ 286.605550][T15258] should_fail_ex+0x261/0x270 [ 286.605578][T15258] should_failslab+0x8f/0xb0 [ 286.605610][T15258] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 286.605634][T15258] ? __alloc_skb+0x10d/0x320 [ 286.605732][T15258] __alloc_skb+0x10d/0x320 [ 286.605765][T15258] netlink_alloc_large_skb+0xad/0xe0 [ 286.605787][T15258] netlink_sendmsg+0x3da/0x720 [ 286.605933][T15258] ? __pfx_netlink_sendmsg+0x10/0x10 [ 286.605960][T15258] __sock_sendmsg+0x140/0x180 [ 286.605999][T15258] ____sys_sendmsg+0x350/0x4e0 [ 286.606116][T15258] __sys_sendmsg+0x1a0/0x240 [ 286.606187][T15258] __x64_sys_sendmsg+0x46/0x50 [ 286.606235][T15258] x64_sys_call+0x26f3/0x2e10 [ 286.606318][T15258] do_syscall_64+0xc9/0x1c0 [ 286.606345][T15258] ? clear_bhb_loop+0x25/0x80 [ 286.606366][T15258] ? clear_bhb_loop+0x25/0x80 [ 286.606386][T15258] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 286.606458][T15258] RIP: 0033:0x7fa0a413d169 [ 286.606472][T15258] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.606490][T15258] RSP: 002b:00007fa0a27a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 286.606566][T15258] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413d169 [ 286.606579][T15258] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000006 [ 286.606670][T15258] RBP: 00007fa0a27a7090 R08: 0000000000000000 R09: 0000000000000000 [ 286.606682][T15258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.606694][T15258] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 286.606713][T15258] [ 286.652025][T15262] netlink: 'syz.5.4111': attribute type 1 has an invalid length. [ 286.950793][T15262] netlink: 224 bytes leftover after parsing attributes in process `syz.5.4111'. [ 286.960885][T15268] Invalid ELF header magic: != ELF [ 287.344055][T15287] xt_hashlimit: size too large, truncated to 1048576 [ 287.759655][T15303] FAULT_INJECTION: forcing a failure. [ 287.759655][T15303] name failslab, interval 1, probability 0, space 0, times 0 [ 287.772335][T15303] CPU: 1 UID: 0 PID: 15303 Comm: syz.5.4128 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 287.772361][T15303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 287.772373][T15303] Call Trace: [ 287.772433][T15303] [ 287.772441][T15303] dump_stack_lvl+0xf6/0x150 [ 287.772464][T15303] dump_stack+0x15/0x1a [ 287.772482][T15303] should_fail_ex+0x261/0x270 [ 287.772517][T15303] should_failslab+0x8f/0xb0 [ 287.772556][T15303] kmem_cache_alloc_noprof+0x59/0x340 [ 287.772627][T15303] ? getname_flags+0x81/0x3b0 [ 287.772654][T15303] getname_flags+0x81/0x3b0 [ 287.772679][T15303] __x64_sys_rmdir+0x21/0x40 [ 287.772747][T15303] x64_sys_call+0x29a5/0x2e10 [ 287.772783][T15303] do_syscall_64+0xc9/0x1c0 [ 287.772819][T15303] ? clear_bhb_loop+0x25/0x80 [ 287.772847][T15303] ? clear_bhb_loop+0x25/0x80 [ 287.772874][T15303] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 287.772978][T15303] RIP: 0033:0x7fa0a413d169 [ 287.772996][T15303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 287.773018][T15303] RSP: 002b:00007fa0a27a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 287.773041][T15303] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413d169 [ 287.773056][T15303] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000000c0 [ 287.773071][T15303] RBP: 00007fa0a27a7090 R08: 0000000000000000 R09: 0000000000000000 [ 287.773086][T15303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.773101][T15303] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 287.773129][T15303] [ 287.923243][T15309] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4130'. [ 287.949605][T15313] xt_hashlimit: size too large, truncated to 1048576 [ 288.274776][T15332] netlink: 'syz.6.4135': attribute type 1 has an invalid length. [ 288.274791][T15332] netlink: 224 bytes leftover after parsing attributes in process `syz.6.4135'. [ 288.275801][T15332] Invalid ELF header magic: != ELF [ 288.361636][T15334] siw: device registration error -23 [ 288.542343][ T29] kauditd_printk_skb: 224 callbacks suppressed [ 288.542360][ T29] audit: type=1326 audit(1744130061.363:120022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15341 comm="syz.7.4141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 288.568300][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x1 [ 288.579716][ T29] audit: type=1326 audit(1744130061.403:120023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15341 comm="syz.7.4141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=31 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 288.580324][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.603649][ T29] audit: type=1326 audit(1744130061.403:120024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15341 comm="syz.7.4141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 288.611383][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.635072][ T29] audit: type=1326 audit(1744130061.403:120025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15341 comm="syz.7.4141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 288.635173][ T29] audit: type=1326 audit(1744130061.403:120026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15341 comm="syz.7.4141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 288.642827][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.642850][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.666471][ T29] audit: type=1326 audit(1744130061.403:120027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15341 comm="syz.7.4141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 288.666503][ T29] audit: type=1326 audit(1744130061.403:120028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15341 comm="syz.7.4141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 288.698221][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.705735][ T29] audit: type=1326 audit(1744130061.403:120029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15341 comm="syz.7.4141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 288.705769][ T29] audit: type=1326 audit(1744130061.403:120030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15341 comm="syz.7.4141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 288.705801][ T29] audit: type=1326 audit(1744130061.403:120031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15341 comm="syz.7.4141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 288.729565][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.839843][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.847669][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x2 [ 288.855530][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.863365][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.864037][T15353] FAULT_INJECTION: forcing a failure. [ 288.864037][T15353] name failslab, interval 1, probability 0, space 0, times 0 [ 288.871251][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.871279][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.871305][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.871329][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.871398][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.871422][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.871456][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.871480][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.871502][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.871527][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.871554][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 288.884279][T15353] CPU: 1 UID: 0 PID: 15353 Comm: syz.5.4146 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 288.884327][T15353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 288.884382][T15353] Call Trace: [ 288.884390][T15353] [ 288.884398][T15353] dump_stack_lvl+0xf6/0x150 [ 288.884426][T15353] dump_stack+0x15/0x1a [ 288.884446][T15353] should_fail_ex+0x261/0x270 [ 288.884478][T15353] should_failslab+0x8f/0xb0 [ 288.884537][T15353] kmem_cache_alloc_noprof+0x59/0x340 [ 288.884569][T15353] ? audit_log_start+0x37f/0x6e0 [ 288.884597][T15353] audit_log_start+0x37f/0x6e0 [ 288.884648][T15353] audit_seccomp+0x4b/0x130 [ 288.884740][T15353] __seccomp_filter+0x694/0x10e0 [ 288.884779][T15353] ? poll_select_finish+0x3e5/0x430 [ 288.884878][T15353] __secure_computing+0x7e/0x160 [ 288.884914][T15353] syscall_trace_enter+0xcf/0x1f0 [ 288.884953][T15353] do_syscall_64+0xaa/0x1c0 [ 288.884989][T15353] ? clear_bhb_loop+0x25/0x80 [ 288.885097][T15353] ? clear_bhb_loop+0x25/0x80 [ 288.885124][T15353] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.885151][T15353] RIP: 0033:0x7fa0a413bb7c [ 288.885170][T15353] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 288.885192][T15353] RSP: 002b:00007fa0a27a7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 288.885216][T15353] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413bb7c [ 288.885310][T15353] RDX: 000000000000000f RSI: 00007fa0a27a70a0 RDI: 0000000000000006 [ 288.885367][T15353] RBP: 00007fa0a27a7090 R08: 0000000000000000 R09: 0000000000000000 [ 288.885382][T15353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.885398][T15353] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 288.885421][T15353] [ 289.017655][T15357] xt_hashlimit: size too large, truncated to 1048576 [ 289.020209][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 289.165099][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 289.172852][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 289.180628][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 289.188415][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 289.196247][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 289.204062][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 289.211938][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 289.219786][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 289.227560][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 289.252865][ T3444] hid-generic 0000:007F:FFFFFFFE.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 289.399486][T15376] batadv0 speed is unknown, defaulting to 1000 [ 289.494815][T15387] xt_hashlimit: size too large, truncated to 1048576 [ 289.969848][T15420] xt_hashlimit: size too large, truncated to 1048576 [ 290.547877][T15467] xt_hashlimit: size too large, truncated to 1048576 [ 291.176043][T15512] xt_hashlimit: size too large, truncated to 1048576 [ 291.343327][T15519] batadv0 speed is unknown, defaulting to 1000 [ 291.480583][T15526] siw: device registration error -23 [ 291.677687][T15536] batadv0 speed is unknown, defaulting to 1000 [ 292.118217][T15562] xt_hashlimit: size too large, truncated to 1048576 [ 292.917892][T15596] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4233'. [ 292.941542][T15596] block device autoloading is deprecated and will be removed. [ 293.053730][T15606] xt_hashlimit: size too large, truncated to 1048576 [ 293.424754][ T3352] page_pool_release_retry() stalled pool shutdown: id 104, 2 inflight 60 sec [ 293.471622][T15621] siw: device registration error -23 [ 293.482223][T15619] batadv0 speed is unknown, defaulting to 1000 [ 293.847428][ T29] kauditd_printk_skb: 6824 callbacks suppressed [ 293.847446][ T29] audit: type=1400 audit(1744130066.673:126854): avc: denied { read } for pid=15634 comm="syz.6.4245" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 293.847478][ T29] audit: type=1400 audit(1744130066.673:126855): avc: denied { open } for pid=15634 comm="syz.6.4245" path="/dev/rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 293.913131][T15637] team0 (unregistering): Port device team_slave_0 removed [ 293.918641][T15637] team0 (unregistering): Port device team_slave_1 removed [ 294.488935][T12626] block device autoloading is deprecated and will be removed. [ 294.519206][ T29] audit: type=1326 audit(1744130067.343:126856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15646 comm="syz.6.4249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 294.519469][ T29] audit: type=1326 audit(1744130067.343:126857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15646 comm="syz.6.4249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 294.618427][T15651] xt_hashlimit: size too large, truncated to 1048576 [ 294.635321][ T29] audit: type=1326 audit(1744130067.393:126858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15646 comm="syz.6.4249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 294.635424][ T29] audit: type=1326 audit(1744130067.393:126859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15646 comm="syz.6.4249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=439 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 294.635519][ T29] audit: type=1326 audit(1744130067.393:126860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15646 comm="syz.6.4249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 294.794365][ T29] audit: type=1326 audit(1744130067.613:126861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.4.4252" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fed7ef9d169 code=0x7ffc0000 [ 294.794480][ T29] audit: type=1326 audit(1744130067.613:126862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.4.4252" exe="/root/syz-executor" sig=0 arch=c000003e syscall=447 compat=0 ip=0x7fed7ef9d169 code=0x7ffc0000 [ 294.794512][ T29] audit: type=1326 audit(1744130067.613:126863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.4.4252" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fed7ef9d169 code=0x7ffc0000 [ 295.107811][T15659] siw: device registration error -23 [ 295.187886][T15661] xt_hashlimit: size too large, truncated to 1048576 [ 295.479932][T15673] loop7: detected capacity change from 0 to 512 [ 295.498238][T15673] EXT4-fs error (device loop7): ext4_orphan_get:1390: inode #15: comm syz.7.4256: iget: bad extended attribute block 1 [ 295.547663][T15673] EXT4-fs error (device loop7): ext4_orphan_get:1395: comm syz.7.4256: couldn't read orphan inode 15 (err -117) [ 295.575031][T15673] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 295.721905][T15673] EXT4-fs (loop7): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 295.769407][T14072] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 295.780440][T15688] netlink: 'syz.5.4263': attribute type 1 has an invalid length. [ 295.788375][T15688] netlink: 224 bytes leftover after parsing attributes in process `syz.5.4263'. [ 295.802481][T15688] Invalid ELF header magic: != ELF [ 295.851290][T15693] loop7: detected capacity change from 0 to 8192 [ 295.855035][T15693] syz.7.4264: attempt to access beyond end of device [ 295.855035][T15693] loop7: rw=0, sector=57847, nr_sectors = 1 limit=8192 [ 295.872555][T15693] FAT-fs (loop7): error, invalid access to FAT (entry 0x0000e1b1) [ 295.872581][T15693] FAT-fs (loop7): Filesystem has been set read-only [ 295.889022][T15693] FAT-fs (loop7): error, invalid access to FAT (entry 0x0000e1b1) [ 295.897069][T15693] FAT-fs (loop7): error, invalid access to FAT (entry 0x0000e1b1) [ 295.969529][T15685] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 295.969619][T15685] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 296.158192][T15700] loop7: detected capacity change from 0 to 2048 [ 296.189351][T15700] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 296.369393][T15708] xt_hashlimit: size too large, truncated to 1048576 [ 296.654078][T15717] FAULT_INJECTION: forcing a failure. [ 296.654078][T15717] name failslab, interval 1, probability 0, space 0, times 0 [ 296.654105][T15717] CPU: 0 UID: 0 PID: 15717 Comm: syz.5.4273 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 296.654190][T15717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 296.654202][T15717] Call Trace: [ 296.654272][T15717] [ 296.654279][T15717] dump_stack_lvl+0xf6/0x150 [ 296.654304][T15717] dump_stack+0x15/0x1a [ 296.654326][T15717] should_fail_ex+0x261/0x270 [ 296.654358][T15717] should_failslab+0x8f/0xb0 [ 296.654430][T15717] __kmalloc_cache_noprof+0x55/0x320 [ 296.654470][T15717] ? v9fs_mount+0x56/0x580 [ 296.654505][T15717] v9fs_mount+0x56/0x580 [ 296.654592][T15717] ? __pfx_v9fs_mount+0x10/0x10 [ 296.654624][T15717] legacy_get_tree+0x77/0xd0 [ 296.654666][T15717] vfs_get_tree+0x56/0x1e0 [ 296.654814][T15717] do_new_mount+0x246/0x6b0 [ 296.654934][T15717] path_mount+0x49b/0xb30 [ 296.654974][T15717] __se_sys_mount+0x28f/0x2e0 [ 296.655078][T15717] __x64_sys_mount+0x67/0x80 [ 296.655118][T15717] x64_sys_call+0xd11/0x2e10 [ 296.655219][T15717] do_syscall_64+0xc9/0x1c0 [ 296.655254][T15717] ? clear_bhb_loop+0x25/0x80 [ 296.655282][T15717] ? clear_bhb_loop+0x25/0x80 [ 296.655347][T15717] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.655374][T15717] RIP: 0033:0x7fa0a413d169 [ 296.655391][T15717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 296.655434][T15717] RSP: 002b:00007fa0a27a7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 296.655458][T15717] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413d169 [ 296.655472][T15717] RDX: 0000200000000080 RSI: 0000200000000300 RDI: 0000000000000000 [ 296.655487][T15717] RBP: 00007fa0a27a7090 R08: 00002000000000c0 R09: 0000000000000000 [ 296.655501][T15717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.655517][T15717] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 296.655540][T15717] [ 296.964762][T15738] xt_hashlimit: size too large, truncated to 1048576 [ 297.661614][T14072] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 298.022113][T15782] FAULT_INJECTION: forcing a failure. [ 298.022113][T15782] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 298.035284][T15782] CPU: 0 UID: 0 PID: 15782 Comm: syz.5.4299 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 298.035307][T15782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 298.035319][T15782] Call Trace: [ 298.035324][T15782] [ 298.035330][T15782] dump_stack_lvl+0xf6/0x150 [ 298.035430][T15782] dump_stack+0x15/0x1a [ 298.035444][T15782] should_fail_ex+0x261/0x270 [ 298.035469][T15782] should_fail+0xb/0x10 [ 298.035493][T15782] should_fail_usercopy+0x1a/0x20 [ 298.035559][T15782] _copy_from_user+0x1c/0xa0 [ 298.035591][T15782] copy_msghdr_from_user+0x54/0x2b0 [ 298.035685][T15782] ? __fget_files+0x186/0x1c0 [ 298.035705][T15782] __sys_sendmsg+0x141/0x240 [ 298.035749][T15782] __x64_sys_sendmsg+0x46/0x50 [ 298.035829][T15782] x64_sys_call+0x26f3/0x2e10 [ 298.035850][T15782] do_syscall_64+0xc9/0x1c0 [ 298.035886][T15782] ? clear_bhb_loop+0x25/0x80 [ 298.035909][T15782] ? clear_bhb_loop+0x25/0x80 [ 298.035928][T15782] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 298.035949][T15782] RIP: 0033:0x7fa0a413d169 [ 298.036040][T15782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.036059][T15782] RSP: 002b:00007fa0a27a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 298.036096][T15782] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413d169 [ 298.036109][T15782] RDX: 0000000000000010 RSI: 0000200000000540 RDI: 0000000000000005 [ 298.036122][T15782] RBP: 00007fa0a27a7090 R08: 0000000000000000 R09: 0000000000000000 [ 298.036134][T15782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 298.036144][T15782] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 298.036231][T15782] [ 298.062960][T15778] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 298.247958][T15786] Invalid ELF header magic: != ELF [ 298.262587][T15778] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 298.268828][T15788] netlink: 'syz.5.4302': attribute type 1 has an invalid length. [ 298.278152][T15788] netlink: 224 bytes leftover after parsing attributes in process `syz.5.4302'. [ 298.325992][T15788] Invalid ELF header magic: != ELF [ 298.878104][ T29] kauditd_printk_skb: 9600 callbacks suppressed [ 298.878119][ T29] audit: type=1326 audit(1744130071.703:136461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15807 comm="syz.3.4309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fedcd169 code=0x7ffc0000 [ 298.908136][ T29] audit: type=1326 audit(1744130071.703:136462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15807 comm="syz.3.4309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fedcd169 code=0x7ffc0000 [ 298.951796][ T29] audit: type=1400 audit(1744130071.773:136463): avc: denied { create } for pid=15813 comm="syz.3.4312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 298.979149][ T29] audit: type=1400 audit(1744130071.803:136464): avc: denied { connect } for pid=15813 comm="syz.3.4312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 298.999178][ T29] audit: type=1400 audit(1744130071.803:136465): avc: denied { write } for pid=15813 comm="syz.3.4312" path="socket:[47331]" dev="sockfs" ino=47331 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 299.022975][ T29] audit: type=1400 audit(1744130071.803:136466): avc: denied { setopt } for pid=15817 comm="wg1" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 299.052671][ T29] audit: type=1400 audit(1744130071.873:136467): avc: denied { kexec_image_load } for pid=15820 comm="syz.3.4315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 299.073743][ T29] audit: type=1400 audit(1744130071.893:136468): avc: denied { write } for pid=15817 comm="wg1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 299.206892][ T29] audit: type=1400 audit(1744130071.943:136469): avc: denied { execmem } for pid=15826 comm="syz.7.4318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 299.206931][ T29] audit: type=1400 audit(1744130071.993:136470): avc: denied { write } for pid=15820 comm="syz.3.4315" name="001" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 299.386533][T15834] batadv0 speed is unknown, defaulting to 1000 [ 299.793307][T15842] siw: device registration error -23 [ 300.003863][T15848] siw: device registration error -23 [ 300.251189][T15865] batadv0 speed is unknown, defaulting to 1000 [ 300.738482][T15888] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4342'. [ 300.782410][T15888] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.802707][T15890] siw: device registration error -23 [ 300.861715][T15888] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.926657][T15897] xt_hashlimit: size too large, truncated to 1048576 [ 301.049467][T15888] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.096914][T15903] batadv0 speed is unknown, defaulting to 1000 [ 301.158287][T15888] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.270925][T15888] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.274182][T15888] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.297552][T15888] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.378843][T15888] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.749136][T15930] siw: device registration error -23 [ 301.759401][T15928] Invalid ELF header magic: != ELF [ 301.913325][T15938] xt_hashlimit: size too large, truncated to 1048576 [ 302.571275][T15966] siw: device registration error -23 [ 302.691695][T15974] xt_hashlimit: size too large, truncated to 1048576 [ 302.712833][T15976] siw: device registration error -23 [ 303.288253][T15988] uprobe: syz.7.4380:15988 failed to unregister, leaking uprobe [ 303.384064][T15992] Invalid ELF header magic: != ELF [ 303.447961][T15998] siw: device registration error -23 [ 303.647612][T16012] xt_hashlimit: size too large, truncated to 1048576 [ 303.704157][T16018] FAULT_INJECTION: forcing a failure. [ 303.704157][T16018] name failslab, interval 1, probability 0, space 0, times 0 [ 303.716959][T16018] CPU: 1 UID: 0 PID: 16018 Comm: syz.4.4392 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 303.716993][T16018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 303.717006][T16018] Call Trace: [ 303.717013][T16018] [ 303.717020][T16018] dump_stack_lvl+0xf6/0x150 [ 303.717047][T16018] dump_stack+0x15/0x1a [ 303.717063][T16018] should_fail_ex+0x261/0x270 [ 303.717150][T16018] should_failslab+0x8f/0xb0 [ 303.717200][T16018] __kmalloc_cache_node_noprof+0x58/0x340 [ 303.717225][T16018] ? __get_vm_area_node+0xfb/0x1c0 [ 303.717252][T16018] __get_vm_area_node+0xfb/0x1c0 [ 303.717340][T16018] __vmalloc_node_range_noprof+0x285/0xe80 [ 303.717368][T16018] ? bpf_prog_alloc_no_stats+0x49/0x390 [ 303.717489][T16018] ? avc_has_perm_noaudit+0x1cc/0x210 [ 303.717518][T16018] ? selinux_capable+0x1f9/0x260 [ 303.717553][T16018] ? bpf_prog_alloc_no_stats+0x49/0x390 [ 303.717572][T16018] __vmalloc_noprof+0x5e/0x70 [ 303.717597][T16018] ? bpf_prog_alloc_no_stats+0x49/0x390 [ 303.717632][T16018] bpf_prog_alloc_no_stats+0x49/0x390 [ 303.717652][T16018] ? bpf_prog_alloc+0x28/0x150 [ 303.717705][T16018] bpf_prog_alloc+0x3a/0x150 [ 303.717723][T16018] bpf_prog_load+0x532/0x10e0 [ 303.717754][T16018] __sys_bpf+0x533/0x800 [ 303.717780][T16018] __x64_sys_bpf+0x43/0x50 [ 303.717855][T16018] x64_sys_call+0x23da/0x2e10 [ 303.717876][T16018] do_syscall_64+0xc9/0x1c0 [ 303.717909][T16018] ? clear_bhb_loop+0x25/0x80 [ 303.717935][T16018] ? clear_bhb_loop+0x25/0x80 [ 303.717958][T16018] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.717996][T16018] RIP: 0033:0x7fed7ef9d169 [ 303.718011][T16018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 303.718028][T16018] RSP: 002b:00007fed7d607038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 303.718046][T16018] RAX: ffffffffffffffda RBX: 00007fed7f1b5fa0 RCX: 00007fed7ef9d169 [ 303.718058][T16018] RDX: 0000000000000094 RSI: 00002000000003c0 RDI: 0000000000000005 [ 303.718120][T16018] RBP: 00007fed7d607090 R08: 0000000000000000 R09: 0000000000000000 [ 303.718141][T16018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.718152][T16018] R13: 0000000000000000 R14: 00007fed7f1b5fa0 R15: 00007ffdd6e47ba8 [ 303.718173][T16018] [ 303.718181][T16018] warn_alloc: 5 callbacks suppressed [ 303.718192][T16018] syz.4.4392: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null) [ 303.897070][ T29] kauditd_printk_skb: 9855 callbacks suppressed [ 303.897090][ T29] audit: type=1326 audit(1744130076.723:146326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15931 comm="syz.3.4358" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa2fedc4127 code=0x7ffc0000 [ 303.902644][T16018] ,cpuset= [ 303.941770][ T29] audit: type=1326 audit(1744130076.743:146327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15931 comm="syz.3.4358" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa2fed69359 code=0x7ffc0000 [ 303.942647][T16018] / [ 303.945755][ T29] audit: type=1326 audit(1744130076.743:146328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15931 comm="syz.3.4358" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa2fedc4127 code=0x7ffc0000 [ 303.951016][T16018] ,mems_allowed=0 [ 303.964871][ T29] audit: type=1326 audit(1744130076.743:146329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15931 comm="syz.3.4358" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa2fed69359 code=0x7ffc0000 [ 303.971189][T16018] [ 303.971203][T16018] CPU: 1 UID: 0 PID: 16018 Comm: syz.4.4392 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 303.971242][T16018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 303.971258][T16018] Call Trace: [ 303.971268][T16018] [ 303.971278][T16018] dump_stack_lvl+0xf6/0x150 [ 303.971315][T16018] dump_stack+0x15/0x1a [ 303.971374][T16018] warn_alloc+0x145/0x1b0 [ 303.971413][T16018] __vmalloc_node_range_noprof+0x2aa/0xe80 [ 303.971454][T16018] ? avc_has_perm_noaudit+0x1cc/0x210 [ 303.971493][T16018] ? selinux_capable+0x1f9/0x260 [ 303.971588][T16018] ? bpf_prog_alloc_no_stats+0x49/0x390 [ 303.971615][T16018] __vmalloc_noprof+0x5e/0x70 [ 303.971699][T16018] ? bpf_prog_alloc_no_stats+0x49/0x390 [ 303.971724][T16018] bpf_prog_alloc_no_stats+0x49/0x390 [ 303.971747][T16018] ? bpf_prog_alloc+0x28/0x150 [ 303.971771][T16018] bpf_prog_alloc+0x3a/0x150 [ 303.971839][T16018] bpf_prog_load+0x532/0x10e0 [ 303.971877][T16018] __sys_bpf+0x533/0x800 [ 303.971909][T16018] __x64_sys_bpf+0x43/0x50 [ 303.971931][T16018] x64_sys_call+0x23da/0x2e10 [ 303.971993][T16018] do_syscall_64+0xc9/0x1c0 [ 303.972026][T16018] ? clear_bhb_loop+0x25/0x80 [ 303.972092][T16018] ? clear_bhb_loop+0x25/0x80 [ 303.972118][T16018] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.972174][T16018] RIP: 0033:0x7fed7ef9d169 [ 303.972192][T16018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 303.972213][T16018] RSP: 002b:00007fed7d607038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 303.972234][T16018] RAX: ffffffffffffffda RBX: 00007fed7f1b5fa0 RCX: 00007fed7ef9d169 [ 303.972248][T16018] RDX: 0000000000000094 RSI: 00002000000003c0 RDI: 0000000000000005 [ 303.972263][T16018] RBP: 00007fed7d607090 R08: 0000000000000000 R09: 0000000000000000 [ 303.972277][T16018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.972291][T16018] R13: 0000000000000000 R14: 00007fed7f1b5fa0 R15: 00007ffdd6e47ba8 [ 303.972317][T16018] [ 303.972394][T16018] Mem-Info: [ 303.994808][ T29] audit: type=1326 audit(1744130076.743:146330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15931 comm="syz.3.4358" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa2fedc4127 code=0x7ffc0000 [ 303.997835][T16018] active_anon:6745 inactive_anon:2 isolated_anon:0 [ 303.997835][T16018] active_file:24955 inactive_file:2417 isolated_file:0 [ 303.997835][T16018] unevictable:4 dirty:466 writeback:0 [ 303.997835][T16018] slab_reclaimable:3620 slab_unreclaimable:53534 [ 303.997835][T16018] mapped:28920 shmem:3166 pagetables:951 [ 303.997835][T16018] sec_pagetables:0 bounce:0 [ 303.997835][T16018] kernel_misc_reclaimable:0 [ 303.997835][T16018] free:1834412 free_pcp:2867 free_cma:0 [ 304.021364][ T29] audit: type=1326 audit(1744130076.743:146331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15931 comm="syz.3.4358" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa2fed69359 code=0x7ffc0000 [ 304.023766][T16018] Node 0 active_anon:26980kB inactive_anon:8kB active_file:99820kB inactive_file:9668kB unevictable:16kB isolated(anon):0kB isolated(file):0kB mapped:115680kB dirty:1864kB writeback:0kB shmem:12664kB writeback_tmp:0kB kernel_stack:3840kB pagetables:3804kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 304.047306][ T29] audit: type=1326 audit(1744130076.743:146332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15931 comm="syz.3.4358" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa2fedc4127 code=0x7ffc0000 [ 304.047333][ T29] audit: type=1326 audit(1744130076.743:146333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15931 comm="syz.3.4358" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa2fed69359 code=0x7ffc0000 [ 304.050945][T16018] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 304.074510][ T29] audit: type=1326 audit(1744130076.743:146334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15931 comm="syz.3.4358" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa2fedc4127 code=0x7ffc0000 [ 304.076914][T16018] lowmem_reserve[]: [ 304.087645][ T29] audit: type=1326 audit(1744130076.743:146335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15931 comm="syz.3.4358" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa2fed69359 code=0x7ffc0000 [ 304.528291][T16018] 0 2882 7860 7860 [ 304.532144][T16018] Node 0 DMA32 free:2947708kB boost:0kB min:4132kB low:7060kB high:9988kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2951336kB mlocked:0kB bounce:0kB free_pcp:3628kB local_pcp:3528kB free_cma:0kB [ 304.560912][T16018] lowmem_reserve[]: 0 0 4978 4978 [ 304.566002][T16018] Node 0 Normal free:4374580kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB active_anon:26868kB inactive_anon:8kB active_file:99820kB inactive_file:9668kB unevictable:16kB writepending:1864kB present:5242880kB managed:5098244kB mlocked:16kB bounce:0kB free_pcp:7748kB local_pcp:1568kB free_cma:0kB [ 304.596303][T16018] lowmem_reserve[]: 0 0 0 0 [ 304.600878][T16018] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 304.613846][T16018] Node 0 DMA32: 3*4kB (M) 0*8kB 1*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 4*512kB (M) 3*1024kB (M) 2*2048kB (M) 717*4096kB (M) = 2947708kB [ 304.629651][T16018] Node 0 Normal: 914*4kB (UME) 1856*8kB (UME) 1447*16kB (UME) 1106*32kB (UME) 784*64kB (UME) 532*128kB (UME) 415*256kB (UM) 415*512kB (UM) 236*1024kB (UME) 9*2048kB (UM) 879*4096kB (UM) = 4374520kB [ 304.649526][T16018] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 304.658861][T16018] 30542 total pagecache pages [ 304.663542][T16018] 3 pages in swap cache [ 304.667796][T16018] Free swap = 124984kB [ 304.671961][T16018] Total swap = 124996kB [ 304.676195][T16018] 2097051 pages RAM [ 304.680015][T16018] 0 pages HighMem/MovableOnly [ 304.684724][T16018] 80816 pages reserved [ 304.759265][T16028] siw: device registration error -23 [ 304.764728][T16026] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4395'. [ 304.835122][T16037] FAULT_INJECTION: forcing a failure. [ 304.835122][T16037] name failslab, interval 1, probability 0, space 0, times 0 [ 304.835151][T16037] CPU: 1 UID: 0 PID: 16037 Comm: syz.6.4400 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 304.835175][T16037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 304.835199][T16037] Call Trace: [ 304.835205][T16037] [ 304.835212][T16037] dump_stack_lvl+0xf6/0x150 [ 304.835237][T16037] dump_stack+0x15/0x1a [ 304.835257][T16037] should_fail_ex+0x261/0x270 [ 304.835289][T16037] should_failslab+0x8f/0xb0 [ 304.835355][T16037] ? __pfx_free_ioctx_users+0x10/0x10 [ 304.835416][T16037] __kmalloc_cache_noprof+0x55/0x320 [ 304.835442][T16037] ? percpu_ref_init+0x96/0x240 [ 304.835534][T16037] ? __pfx_free_ioctx_users+0x10/0x10 [ 304.835557][T16037] percpu_ref_init+0x96/0x240 [ 304.835588][T16037] ioctx_alloc+0x1b8/0x4c0 [ 304.835612][T16037] __se_sys_io_setup+0x6b/0x1b0 [ 304.835646][T16037] __x64_sys_io_setup+0x31/0x40 [ 304.835677][T16037] x64_sys_call+0x2b35/0x2e10 [ 304.835773][T16037] do_syscall_64+0xc9/0x1c0 [ 304.835857][T16037] ? clear_bhb_loop+0x25/0x80 [ 304.835882][T16037] ? clear_bhb_loop+0x25/0x80 [ 304.835907][T16037] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 304.835930][T16037] RIP: 0033:0x7f11db66d169 [ 304.835954][T16037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.835971][T16037] RSP: 002b:00007f11d9cd7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 304.835988][T16037] RAX: ffffffffffffffda RBX: 00007f11db885fa0 RCX: 00007f11db66d169 [ 304.836003][T16037] RDX: 0000000000000000 RSI: 0000200000000680 RDI: 0000000000002004 [ 304.836133][T16037] RBP: 00007f11d9cd7090 R08: 0000000000000000 R09: 0000000000000000 [ 304.836144][T16037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.836156][T16037] R13: 0000000000000000 R14: 00007f11db885fa0 R15: 00007ffe6779f998 [ 304.836174][T16037] [ 305.449400][T16128] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4413'. [ 305.779385][T16139] ipvlan2: entered promiscuous mode [ 305.779405][T16139] ipvlan2: entered allmulticast mode [ 305.779530][T16139] bridge0: entered allmulticast mode [ 306.628283][T16165] siw: device registration error -23 [ 306.719196][T16167] batadv0 speed is unknown, defaulting to 1000 [ 306.875108][T16175] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4428'. [ 308.195109][T16230] block device autoloading is deprecated and will be removed. [ 308.195298][T16230] syz.3.4441: attempt to access beyond end of device [ 308.195298][T16230] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 308.322710][T16239] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4444'. [ 308.430839][T16243] xt_hashlimit: size too large, truncated to 1048576 [ 308.683173][T16258] batadv0 speed is unknown, defaulting to 1000 [ 308.907005][ T29] kauditd_printk_skb: 7792 callbacks suppressed [ 308.907024][ T29] audit: type=1400 audit(1744130081.733:154128): avc: denied { unlink } for pid=14072 comm="syz-executor" name="file0" dev="tmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 309.013777][ T29] audit: type=1326 audit(1744130081.823:154129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16278 comm="syz.5.4450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 309.013879][ T29] audit: type=1326 audit(1744130081.823:154130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16278 comm="syz.5.4450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=447 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 309.013914][ T29] audit: type=1326 audit(1744130081.823:154131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16278 comm="syz.5.4450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 309.013941][ T29] audit: type=1326 audit(1744130081.823:154132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16278 comm="syz.5.4450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 309.014005][ T29] audit: type=1326 audit(1744130081.823:154133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16278 comm="syz.5.4450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 309.014076][ T29] audit: type=1326 audit(1744130081.823:154134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16278 comm="syz.5.4450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 309.014103][ T29] audit: type=1326 audit(1744130081.823:154135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16278 comm="syz.5.4450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 309.014128][ T29] audit: type=1326 audit(1744130081.823:154136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16278 comm="syz.5.4450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 309.014173][ T29] audit: type=1326 audit(1744130081.823:154137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16278 comm="syz.5.4450" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 309.079229][T16282] FAULT_INJECTION: forcing a failure. [ 309.079229][T16282] name failslab, interval 1, probability 0, space 0, times 0 [ 309.079332][T16282] CPU: 1 UID: 0 PID: 16282 Comm: syz.3.4452 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 309.079386][T16282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 309.079405][T16282] Call Trace: [ 309.079423][T16282] [ 309.079431][T16282] dump_stack_lvl+0xf6/0x150 [ 309.079457][T16282] dump_stack+0x15/0x1a [ 309.079477][T16282] should_fail_ex+0x261/0x270 [ 309.079504][T16282] should_failslab+0x8f/0xb0 [ 309.079619][T16282] __kmalloc_noprof+0xad/0x410 [ 309.079642][T16282] ? nla_strdup+0x7d/0xc0 [ 309.079669][T16282] nla_strdup+0x7d/0xc0 [ 309.079769][T16282] nf_tables_newtable+0x40b/0xf10 [ 309.079798][T16282] nfnetlink_rcv+0xb6e/0x1610 [ 309.079828][T16282] ? __kfree_skb+0x102/0x150 [ 309.079896][T16282] netlink_unicast+0x605/0x6c0 [ 309.079923][T16282] netlink_sendmsg+0x609/0x720 [ 309.079956][T16282] ? __pfx_netlink_sendmsg+0x10/0x10 [ 309.079983][T16282] __sock_sendmsg+0x140/0x180 [ 309.080074][T16282] ____sys_sendmsg+0x350/0x4e0 [ 309.080112][T16282] __sys_sendmsg+0x1a0/0x240 [ 309.080168][T16282] __x64_sys_sendmsg+0x46/0x50 [ 309.080254][T16282] x64_sys_call+0x26f3/0x2e10 [ 309.080282][T16282] do_syscall_64+0xc9/0x1c0 [ 309.080318][T16282] ? clear_bhb_loop+0x25/0x80 [ 309.080339][T16282] ? clear_bhb_loop+0x25/0x80 [ 309.080364][T16282] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 309.080471][T16282] RIP: 0033:0x7fa2fedcd169 [ 309.080489][T16282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.080511][T16282] RSP: 002b:00007fa2fd437038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 309.080533][T16282] RAX: ffffffffffffffda RBX: 00007fa2fefe5fa0 RCX: 00007fa2fedcd169 [ 309.080548][T16282] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 309.080563][T16282] RBP: 00007fa2fd437090 R08: 0000000000000000 R09: 0000000000000000 [ 309.080628][T16282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 309.080640][T16282] R13: 0000000000000000 R14: 00007fa2fefe5fa0 R15: 00007fffdf888808 [ 309.080660][T16282] [ 309.150783][T16290] xt_hashlimit: size too large, truncated to 1048576 [ 309.333675][T16292] netlink: 36 bytes leftover after parsing attributes in process `syz.7.4456'. [ 309.467260][T16296] Invalid ELF header magic: != ELF [ 309.780560][T16298] batadv0 speed is unknown, defaulting to 1000 [ 310.841941][T16318] IPVS: nq: UDP 224.0.0.2:0 - no destination available [ 310.854986][ T3378] IPVS: starting estimator thread 0... [ 310.944398][T16320] IPVS: using max 2400 ests per chain, 120000 per kthread [ 310.976171][T16327] xt_hashlimit: size too large, truncated to 1048576 [ 311.458845][T16350] netlink: 132 bytes leftover after parsing attributes in process `syz.4.4478'. [ 311.576889][T16354] netlink: 88 bytes leftover after parsing attributes in process `syz.6.4479'. [ 311.609144][T16350] 9pnet_fd: Insufficient options for proto=fd [ 311.689045][T16358] xt_hashlimit: size too large, truncated to 1048576 [ 311.845984][T16366] batadv0 speed is unknown, defaulting to 1000 [ 311.960245][T16369] FAULT_INJECTION: forcing a failure. [ 311.960245][T16369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.960278][T16369] CPU: 1 UID: 0 PID: 16369 Comm: syz.4.4484 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 311.960341][T16369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 311.960358][T16369] Call Trace: [ 311.960366][T16369] [ 311.960375][T16369] dump_stack_lvl+0xf6/0x150 [ 311.960406][T16369] dump_stack+0x15/0x1a [ 311.960429][T16369] should_fail_ex+0x261/0x270 [ 311.960542][T16369] should_fail+0xb/0x10 [ 311.960572][T16369] should_fail_usercopy+0x1a/0x20 [ 311.960675][T16369] _copy_from_user+0x1c/0xa0 [ 311.960789][T16369] get_sg_io_hdr+0xbf/0x390 [ 311.960827][T16369] ? bpf_get_ns_current_pid_tgid+0xf4/0x130 [ 311.960873][T16369] ? __rcu_read_unlock+0x4e/0x70 [ 311.960922][T16369] sg_new_write+0xcd/0x930 [ 311.961014][T16369] sg_ioctl+0xd71/0x18a0 [ 311.961045][T16369] ? __fget_files+0x186/0x1c0 [ 311.961071][T16369] ? __pfx_sg_ioctl+0x10/0x10 [ 311.961101][T16369] __se_sys_ioctl+0xc9/0x140 [ 311.961138][T16369] __x64_sys_ioctl+0x43/0x50 [ 311.961171][T16369] x64_sys_call+0x168d/0x2e10 [ 311.961200][T16369] do_syscall_64+0xc9/0x1c0 [ 311.961237][T16369] ? clear_bhb_loop+0x25/0x80 [ 311.961297][T16369] ? clear_bhb_loop+0x25/0x80 [ 311.961370][T16369] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 311.961397][T16369] RIP: 0033:0x7fed7ef9d169 [ 311.961427][T16369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.961450][T16369] RSP: 002b:00007fed7d607038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.961472][T16369] RAX: ffffffffffffffda RBX: 00007fed7f1b5fa0 RCX: 00007fed7ef9d169 [ 311.961488][T16369] RDX: 0000200000000040 RSI: 0000000000002285 RDI: 0000000000000004 [ 311.961504][T16369] RBP: 00007fed7d607090 R08: 0000000000000000 R09: 0000000000000000 [ 311.961519][T16369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 311.961534][T16369] R13: 0000000000000000 R14: 00007fed7f1b5fa0 R15: 00007ffdd6e47ba8 [ 311.961559][T16369] [ 311.993254][T16372] FAULT_INJECTION: forcing a failure. [ 311.993254][T16372] name failslab, interval 1, probability 0, space 0, times 0 [ 311.993284][T16372] CPU: 0 UID: 0 PID: 16372 Comm: syz.4.4486 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 311.993363][T16372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 311.993379][T16372] Call Trace: [ 311.993387][T16372] [ 311.993395][T16372] dump_stack_lvl+0xf6/0x150 [ 311.993428][T16372] dump_stack+0x15/0x1a [ 311.993450][T16372] should_fail_ex+0x261/0x270 [ 311.993484][T16372] should_failslab+0x8f/0xb0 [ 311.993599][T16372] __kmalloc_cache_noprof+0x55/0x320 [ 311.993623][T16372] ? audit_log_d_path+0x8e/0x150 [ 311.993661][T16372] audit_log_d_path+0x8e/0x150 [ 311.993689][T16372] audit_log_d_path_exe+0x42/0x70 [ 311.993717][T16372] audit_log_task+0x1f1/0x250 [ 311.993804][T16372] audit_seccomp+0x68/0x130 [ 311.993828][T16372] __seccomp_filter+0x694/0x10e0 [ 311.993865][T16372] ? vfs_write+0x669/0x950 [ 311.993897][T16372] ? putname+0xe1/0x100 [ 311.993927][T16372] __secure_computing+0x7e/0x160 [ 311.994007][T16372] syscall_trace_enter+0xcf/0x1f0 [ 311.994037][T16372] ? fpregs_assert_state_consistent+0x83/0xa0 [ 311.994132][T16372] do_syscall_64+0xaa/0x1c0 [ 311.994163][T16372] ? clear_bhb_loop+0x25/0x80 [ 311.994188][T16372] ? clear_bhb_loop+0x25/0x80 [ 311.994211][T16372] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 311.994275][T16372] RIP: 0033:0x7fed7ef9d169 [ 311.994291][T16372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.994317][T16372] RSP: 002b:00007fed7d607038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 311.994340][T16372] RAX: ffffffffffffffda RBX: 00007fed7f1b5fa0 RCX: 00007fed7ef9d169 [ 311.994355][T16372] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000000 [ 311.994460][T16372] RBP: 00007fed7d607090 R08: 0000000000000000 R09: 0000000000000000 [ 311.994474][T16372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 311.994488][T16372] R13: 0000000000000000 R14: 00007fed7f1b5fa0 R15: 00007ffdd6e47ba8 [ 311.994512][T16372] [ 312.228401][T16388] siw: device registration error -23 [ 312.269278][T16380] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 312.269355][T16380] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 312.394137][T16397] xt_hashlimit: size too large, truncated to 1048576 [ 312.845377][T16415] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4498'. [ 313.016182][T16422] xt_hashlimit: size too large, truncated to 1048576 [ 313.293577][T16427] siw: device registration error -23 [ 313.638753][T16438] vcan0: tx drop: invalid da for name 0x0000000000000001 [ 313.884877][T16439] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 313.885008][T16439] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 313.918119][ T29] kauditd_printk_skb: 11081 callbacks suppressed [ 313.918136][ T29] audit: type=1326 audit(1744130086.743:165219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16412 comm="syz.7.4500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f57962c9359 code=0x7ffc0000 [ 313.918880][ T29] audit: type=1326 audit(1744130086.743:165220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16412 comm="syz.7.4500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5796324127 code=0x7ffc0000 [ 313.977874][ T29] audit: type=1326 audit(1744130086.783:165221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16412 comm="syz.7.4500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f57962c9359 code=0x7ffc0000 [ 314.001671][ T29] audit: type=1326 audit(1744130086.783:165222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16412 comm="syz.7.4500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5796324127 code=0x7ffc0000 [ 314.001711][ T29] audit: type=1326 audit(1744130086.783:165223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16412 comm="syz.7.4500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f57962c9359 code=0x7ffc0000 [ 314.001749][ T29] audit: type=1326 audit(1744130086.783:165224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16412 comm="syz.7.4500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5796324127 code=0x7ffc0000 [ 314.001853][ T29] audit: type=1326 audit(1744130086.783:165225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16412 comm="syz.7.4500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f57962c9359 code=0x7ffc0000 [ 314.096134][ T29] audit: type=1326 audit(1744130086.783:165226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16412 comm="syz.7.4500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5796324127 code=0x7ffc0000 [ 314.119810][ T29] audit: type=1326 audit(1744130086.783:165227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16412 comm="syz.7.4500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f57962c9359 code=0x7ffc0000 [ 314.143409][ T29] audit: type=1326 audit(1744130086.783:165228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16412 comm="syz.7.4500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5796324127 code=0x7ffc0000 [ 314.725802][T16455] xt_hashlimit: size too large, truncated to 1048576 [ 315.054232][T16461] xt_hashlimit: size too large, truncated to 1048576 [ 315.409440][T16466] FAULT_INJECTION: forcing a failure. [ 315.409440][T16466] name failslab, interval 1, probability 0, space 0, times 0 [ 315.422107][T16466] CPU: 0 UID: 0 PID: 16466 Comm: syz.5.4519 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 315.422131][T16466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 315.422142][T16466] Call Trace: [ 315.422148][T16466] [ 315.422155][T16466] dump_stack_lvl+0xf6/0x150 [ 315.422229][T16466] dump_stack+0x15/0x1a [ 315.422248][T16466] should_fail_ex+0x261/0x270 [ 315.422341][T16466] should_failslab+0x8f/0xb0 [ 315.422421][T16466] __kmalloc_cache_noprof+0x55/0x320 [ 315.422475][T16466] ? nfnetlink_rcv+0x53a/0x1610 [ 315.422504][T16466] nfnetlink_rcv+0x53a/0x1610 [ 315.422605][T16466] ? __kfree_skb+0x102/0x150 [ 315.422632][T16466] ? nlmon_xmit+0x51/0x60 [ 315.422699][T16466] ? dev_hard_start_xmit+0x3d1/0x400 [ 315.422735][T16466] ? __dev_queue_xmit+0xb76/0x20b0 [ 315.422802][T16466] ? should_fail_ex+0xd7/0x270 [ 315.422826][T16466] ? ref_tracker_free+0x3b8/0x420 [ 315.422872][T16466] netlink_unicast+0x605/0x6c0 [ 315.422902][T16466] netlink_sendmsg+0x609/0x720 [ 315.423005][T16466] ? __pfx_netlink_sendmsg+0x10/0x10 [ 315.423034][T16466] __sock_sendmsg+0x140/0x180 [ 315.423069][T16466] ____sys_sendmsg+0x350/0x4e0 [ 315.423125][T16466] __sys_sendmsg+0x1a0/0x240 [ 315.423167][T16466] __x64_sys_sendmsg+0x46/0x50 [ 315.423197][T16466] x64_sys_call+0x26f3/0x2e10 [ 315.423224][T16466] do_syscall_64+0xc9/0x1c0 [ 315.423289][T16466] ? clear_bhb_loop+0x25/0x80 [ 315.423311][T16466] ? clear_bhb_loop+0x25/0x80 [ 315.423331][T16466] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 315.423355][T16466] RIP: 0033:0x7fa0a413d169 [ 315.423387][T16466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 315.423407][T16466] RSP: 002b:00007fa0a27a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 315.423499][T16466] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413d169 [ 315.423514][T16466] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000005 [ 315.423528][T16466] RBP: 00007fa0a27a7090 R08: 0000000000000000 R09: 0000000000000000 [ 315.423540][T16466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 315.423551][T16466] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 315.423570][T16466] [ 315.654837][T16466] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4519'. [ 315.654862][T16466] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4519'. [ 315.654881][T16466] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4519'. [ 315.721377][T16470] netlink: 'syz.5.4520': attribute type 10 has an invalid length. [ 315.729251][T16470] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4520'. [ 315.748386][T16470] batadv0: entered promiscuous mode [ 315.753596][T16470] batadv0: entered allmulticast mode [ 315.774238][T16470] bridge0: port 3(batadv0) entered blocking state [ 315.774274][T16470] bridge0: port 3(batadv0) entered disabled state [ 315.782125][T16470] bridge0: port 3(batadv0) entered blocking state [ 315.782163][T16470] bridge0: port 3(batadv0) entered forwarding state [ 315.826523][T15318] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 315.826541][T15318] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 316.317519][T16491] netlink: 'syz.3.4529': attribute type 4 has an invalid length. [ 316.435560][T16500] netlink: 64 bytes leftover after parsing attributes in process `syz.7.4532'. [ 316.882461][T16518] FAULT_INJECTION: forcing a failure. [ 316.882461][T16518] name failslab, interval 1, probability 0, space 0, times 0 [ 316.895232][T16518] CPU: 0 UID: 0 PID: 16518 Comm: syz.4.4541 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 316.895264][T16518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 316.895278][T16518] Call Trace: [ 316.895287][T16518] [ 316.895295][T16518] dump_stack_lvl+0xf6/0x150 [ 316.895351][T16518] dump_stack+0x15/0x1a [ 316.895368][T16518] should_fail_ex+0x261/0x270 [ 316.895398][T16518] should_failslab+0x8f/0xb0 [ 316.895436][T16518] __kmalloc_noprof+0xad/0x410 [ 316.895456][T16518] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 316.895550][T16518] genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 316.895708][T16518] ? ns_capable+0x7d/0xb0 [ 316.895734][T16518] genl_rcv_msg+0x486/0x6f0 [ 316.895767][T16518] ? __pfx_ip_vs_genl_set_cmd+0x10/0x10 [ 316.895828][T16518] ? __dev_queue_xmit+0xb76/0x20b0 [ 316.895885][T16518] ? should_fail_ex+0xd7/0x270 [ 316.895913][T16518] ? ref_tracker_free+0x3b8/0x420 [ 316.895983][T16518] netlink_rcv_skb+0x12f/0x230 [ 316.896005][T16518] ? __pfx_genl_rcv_msg+0x10/0x10 [ 316.896048][T16518] genl_rcv+0x28/0x40 [ 316.896081][T16518] netlink_unicast+0x605/0x6c0 [ 316.896121][T16518] netlink_sendmsg+0x609/0x720 [ 316.896152][T16518] ? __pfx_netlink_sendmsg+0x10/0x10 [ 316.896194][T16518] __sock_sendmsg+0x140/0x180 [ 316.896235][T16518] ____sys_sendmsg+0x350/0x4e0 [ 316.896268][T16518] __sys_sendmsg+0x1a0/0x240 [ 316.896331][T16518] __x64_sys_sendmsg+0x46/0x50 [ 316.896438][T16518] x64_sys_call+0x26f3/0x2e10 [ 316.896463][T16518] do_syscall_64+0xc9/0x1c0 [ 316.896496][T16518] ? clear_bhb_loop+0x25/0x80 [ 316.896520][T16518] ? clear_bhb_loop+0x25/0x80 [ 316.896550][T16518] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 316.896588][T16518] RIP: 0033:0x7fed7ef9d169 [ 316.896605][T16518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 316.896623][T16518] RSP: 002b:00007fed7d607038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 316.896682][T16518] RAX: ffffffffffffffda RBX: 00007fed7f1b5fa0 RCX: 00007fed7ef9d169 [ 316.896694][T16518] RDX: 0000000020000000 RSI: 00002000000015c0 RDI: 0000000000000006 [ 316.896705][T16518] RBP: 00007fed7d607090 R08: 0000000000000000 R09: 0000000000000000 [ 316.896717][T16518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 316.896730][T16518] R13: 0000000000000000 R14: 00007fed7f1b5fa0 R15: 00007ffdd6e47ba8 [ 316.896752][T16518] [ 317.257072][T16528] netlink: 'syz.4.4546': attribute type 64 has an invalid length. [ 317.344517][ T3378] page_pool_release_retry() stalled pool shutdown: id 126, 2 inflight 60 sec [ 317.388244][T16539] Invalid ELF header magic: != ELF [ 317.439862][T16547] FAULT_INJECTION: forcing a failure. [ 317.439862][T16547] name failslab, interval 1, probability 0, space 0, times 0 [ 317.452537][T16547] CPU: 1 UID: 0 PID: 16547 Comm: syz.6.4555 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 317.452561][T16547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 317.452572][T16547] Call Trace: [ 317.452577][T16547] [ 317.452659][T16547] dump_stack_lvl+0xf6/0x150 [ 317.452684][T16547] dump_stack+0x15/0x1a [ 317.452700][T16547] should_fail_ex+0x261/0x270 [ 317.452729][T16547] should_failslab+0x8f/0xb0 [ 317.452763][T16547] kmem_cache_alloc_noprof+0x59/0x340 [ 317.452787][T16547] ? skb_clone+0x154/0x1f0 [ 317.452860][T16547] skb_clone+0x154/0x1f0 [ 317.452890][T16547] bpf_clone_redirect+0x78/0x200 [ 317.452946][T16547] bpf_prog_6893982b85ceadf7+0x5f/0x64 [ 317.452966][T16547] ? __rcu_read_unlock+0x4e/0x70 [ 317.452996][T16547] ? avc_has_perm_noaudit+0x1cc/0x210 [ 317.453023][T16547] ? avc_has_perm+0xd6/0x150 [ 317.453070][T16547] ? __rcu_read_unlock+0x4e/0x70 [ 317.453101][T16547] ? 0xffffffffa0000954 [ 317.453114][T16547] ? is_bpf_text_address+0x141/0x160 [ 317.453139][T16547] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 317.453163][T16547] ? kernel_text_address+0x96/0xb0 [ 317.453248][T16547] ? __kernel_text_address+0xd/0x40 [ 317.453280][T16547] ? unwind_get_return_address+0x16/0x30 [ 317.453308][T16547] ? arch_stack_walk+0xff/0x150 [ 317.453333][T16547] ? find_stack+0xcf/0x170 [ 317.453369][T16547] ? stack_depot_save_flags+0x7d0/0x8b0 [ 317.453390][T16547] ? read_tsc+0x9/0x20 [ 317.453404][T16547] ? ktime_get+0x1ef/0x210 [ 317.453438][T16547] bpf_test_run+0x1e7/0x4a0 [ 317.453467][T16547] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 317.453521][T16547] ? bpf_test_run+0x106/0x4a0 [ 317.453553][T16547] bpf_prog_test_run_skb+0x857/0xbe0 [ 317.453582][T16547] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 317.453694][T16547] bpf_prog_test_run+0x20e/0x3a0 [ 317.453724][T16547] __sys_bpf+0x440/0x800 [ 317.453754][T16547] __x64_sys_bpf+0x43/0x50 [ 317.453774][T16547] x64_sys_call+0x23da/0x2e10 [ 317.453824][T16547] do_syscall_64+0xc9/0x1c0 [ 317.453862][T16547] ? clear_bhb_loop+0x25/0x80 [ 317.453924][T16547] ? clear_bhb_loop+0x25/0x80 [ 317.453948][T16547] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 317.453966][T16547] RIP: 0033:0x7f11db66d169 [ 317.453984][T16547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.454052][T16547] RSP: 002b:00007f11d9cd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 317.454071][T16547] RAX: ffffffffffffffda RBX: 00007f11db885fa0 RCX: 00007f11db66d169 [ 317.454085][T16547] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 317.454143][T16547] RBP: 00007f11d9cd7090 R08: 0000000000000000 R09: 0000000000000000 [ 317.454154][T16547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 317.454164][T16547] R13: 0000000000000000 R14: 00007f11db885fa0 R15: 00007ffe6779f998 [ 317.454181][T16547] [ 317.763792][T16551] veth0_macvtap: left promiscuous mode [ 317.765799][T16553] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4558'. [ 317.780348][T16551] macvtap0: refused to change device tx_queue_len [ 317.831427][T16558] xt_hashlimit: size too large, truncated to 1048576 [ 318.255911][T16626] siw: device registration error -23 [ 318.271108][T16629] random: crng reseeded on system resumption [ 318.369666][T16625] siw: device registration error -23 [ 318.493280][T16655] xt_hashlimit: size too large, truncated to 1048576 [ 318.706567][T16684] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 318.760281][T16680] Invalid ELF header magic: != ELF [ 318.848770][T16727] FAULT_INJECTION: forcing a failure. [ 318.848770][T16727] name failslab, interval 1, probability 0, space 0, times 0 [ 318.861501][T16727] CPU: 1 UID: 0 PID: 16727 Comm: syz.5.4584 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 318.861604][T16727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 318.861620][T16727] Call Trace: [ 318.861627][T16727] [ 318.861636][T16727] dump_stack_lvl+0xf6/0x150 [ 318.861662][T16727] dump_stack+0x15/0x1a [ 318.861681][T16727] should_fail_ex+0x261/0x270 [ 318.861740][T16727] should_failslab+0x8f/0xb0 [ 318.861777][T16727] __kmalloc_cache_noprof+0x55/0x320 [ 318.861873][T16727] ? qdisc_get_rtab+0x1a3/0x2c0 [ 318.861910][T16727] qdisc_get_rtab+0x1a3/0x2c0 [ 318.861944][T16727] tbf_change+0x176/0xce0 [ 318.861968][T16727] ? stack_trace_save+0x66/0x90 [ 318.862007][T16727] ? _raw_spin_lock_irqsave+0x40/0xb0 [ 318.862031][T16727] ? __list_add_valid_or_report+0x38/0xe0 [ 318.862226][T16727] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 318.862255][T16727] ? rtnetlink_rcv+0x1c/0x30 [ 318.862290][T16727] ? netlink_unicast+0x605/0x6c0 [ 318.862315][T16727] ? __hrtimer_setup+0x13d/0x170 [ 318.862464][T16727] ? read_tsc+0x9/0x20 [ 318.862482][T16727] tbf_init+0x72/0x90 [ 318.862514][T16727] ? __pfx_tbf_init+0x10/0x10 [ 318.862535][T16727] qdisc_create+0x541/0x930 [ 318.862686][T16727] tc_modify_qdisc+0xe13/0x14d0 [ 318.862779][T16727] ? ns_capable+0x7d/0xb0 [ 318.862800][T16727] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 318.862828][T16727] rtnetlink_rcv_msg+0x6b7/0x740 [ 318.862862][T16727] ? ref_tracker_free+0x3b8/0x420 [ 318.862939][T16727] netlink_rcv_skb+0x12f/0x230 [ 318.862963][T16727] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 318.862997][T16727] rtnetlink_rcv+0x1c/0x30 [ 318.863022][T16727] netlink_unicast+0x605/0x6c0 [ 318.863121][T16727] netlink_sendmsg+0x609/0x720 [ 318.863148][T16727] ? __pfx_netlink_sendmsg+0x10/0x10 [ 318.863233][T16727] __sock_sendmsg+0x140/0x180 [ 318.863271][T16727] ____sys_sendmsg+0x350/0x4e0 [ 318.863326][T16727] __sys_sendmsg+0x1a0/0x240 [ 318.863367][T16727] __x64_sys_sendmsg+0x46/0x50 [ 318.863393][T16727] x64_sys_call+0x26f3/0x2e10 [ 318.863418][T16727] do_syscall_64+0xc9/0x1c0 [ 318.863504][T16727] ? clear_bhb_loop+0x25/0x80 [ 318.863528][T16727] ? clear_bhb_loop+0x25/0x80 [ 318.863546][T16727] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 318.863569][T16727] RIP: 0033:0x7fa0a413d169 [ 318.863586][T16727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.863692][T16727] RSP: 002b:00007fa0a27a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.863712][T16727] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413d169 [ 318.863725][T16727] RDX: 0000000000000000 RSI: 00002000000012c0 RDI: 0000000000000003 [ 318.863738][T16727] RBP: 00007fa0a27a7090 R08: 0000000000000000 R09: 0000000000000000 [ 318.863750][T16727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.863760][T16727] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 318.863795][T16727] [ 318.863806][T16727] sch_tbf: burst 3092 is lower than device lo mtu (65550) ! [ 319.063911][T16721] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 319.182439][T16721] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 319.270887][ T29] kauditd_printk_skb: 3808 callbacks suppressed [ 319.270902][ T29] audit: type=1400 audit(1744130092.093:169037): avc: denied { lock } for pid=16753 comm="syz.4.4590" path="socket:[49040]" dev="sockfs" ino=49040 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 319.516365][T16763] FAULT_INJECTION: forcing a failure. [ 319.516365][T16763] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 319.529539][T16763] CPU: 0 UID: 0 PID: 16763 Comm: syz.5.4591 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 319.529598][T16763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 319.529612][T16763] Call Trace: [ 319.529619][T16763] [ 319.529692][T16763] dump_stack_lvl+0xf6/0x150 [ 319.529713][T16763] dump_stack+0x15/0x1a [ 319.529726][T16763] should_fail_ex+0x261/0x270 [ 319.529768][T16763] should_fail+0xb/0x10 [ 319.529788][T16763] should_fail_usercopy+0x1a/0x20 [ 319.529835][T16763] _copy_to_user+0x20/0xa0 [ 319.529863][T16763] simple_read_from_buffer+0xb2/0x130 [ 319.529902][T16763] proc_fail_nth_read+0x103/0x140 [ 319.529933][T16763] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 319.529997][T16763] vfs_read+0x1b2/0x710 [ 319.530020][T16763] ? kmem_cache_free+0xe4/0x2e0 [ 319.530039][T16763] ? __rcu_read_unlock+0x4e/0x70 [ 319.530065][T16763] ? __fget_files+0x186/0x1c0 [ 319.530109][T16763] ksys_read+0xeb/0x1b0 [ 319.530213][T16763] __x64_sys_read+0x42/0x50 [ 319.530243][T16763] x64_sys_call+0x2a3b/0x2e10 [ 319.530314][T16763] do_syscall_64+0xc9/0x1c0 [ 319.530339][T16763] ? clear_bhb_loop+0x25/0x80 [ 319.530357][T16763] ? clear_bhb_loop+0x25/0x80 [ 319.530389][T16763] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 319.530407][T16763] RIP: 0033:0x7fa0a413bb7c [ 319.530419][T16763] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 319.530435][T16763] RSP: 002b:00007fa0a27a7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 319.530450][T16763] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413bb7c [ 319.530464][T16763] RDX: 000000000000000f RSI: 00007fa0a27a70a0 RDI: 0000000000000004 [ 319.530474][T16763] RBP: 00007fa0a27a7090 R08: 0000000000000000 R09: 0000000000000000 [ 319.530484][T16763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.530494][T16763] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 319.530510][T16763] [ 319.780383][T16770] xt_hashlimit: size too large, truncated to 1048576 [ 319.937355][ T29] audit: type=1326 audit(1744130092.763:169038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16779 comm="syz.5.4599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 319.961159][ T29] audit: type=1326 audit(1744130092.763:169039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16779 comm="syz.5.4599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 319.990475][ T29] audit: type=1326 audit(1744130092.813:169040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16779 comm="syz.5.4599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 320.014104][ T29] audit: type=1326 audit(1744130092.813:169041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16779 comm="syz.5.4599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 320.037824][ T29] audit: type=1326 audit(1744130092.813:169042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16779 comm="syz.5.4599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 320.038579][T16780] xt_hashlimit: size too large, truncated to 1048576 [ 320.070515][ T29] audit: type=1326 audit(1744130092.863:169043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16779 comm="syz.5.4599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 320.094193][ T29] audit: type=1326 audit(1744130092.863:169044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16779 comm="syz.5.4599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 320.118161][ T29] audit: type=1326 audit(1744130092.863:169045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16779 comm="syz.5.4599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 320.141892][ T29] audit: type=1326 audit(1744130092.863:169046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16779 comm="syz.5.4599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fa0a413d169 code=0x7ffc0000 [ 320.229139][T16787] siw: device registration error -23 [ 320.289811][T16796] netlink: 48 bytes leftover after parsing attributes in process `syz.3.4603'. [ 320.300082][T16796] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4603'. [ 320.360497][T16795] batadv0 speed is unknown, defaulting to 1000 [ 320.402937][T16808] xt_hashlimit: size too large, truncated to 1048576 [ 320.416860][T16806] FAULT_INJECTION: forcing a failure. [ 320.416860][T16806] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 320.430061][T16806] CPU: 1 UID: 0 PID: 16806 Comm: syz.5.4608 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 320.430143][T16806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 320.430156][T16806] Call Trace: [ 320.430163][T16806] [ 320.430171][T16806] dump_stack_lvl+0xf6/0x150 [ 320.430275][T16806] dump_stack+0x15/0x1a [ 320.430295][T16806] should_fail_ex+0x261/0x270 [ 320.430323][T16806] should_fail+0xb/0x10 [ 320.430345][T16806] should_fail_usercopy+0x1a/0x20 [ 320.430376][T16806] strncpy_from_user+0x25/0x230 [ 320.430441][T16806] ? getname_flags+0x81/0x3b0 [ 320.430465][T16806] getname_flags+0xb0/0x3b0 [ 320.430485][T16806] user_path_at+0x26/0x140 [ 320.430512][T16806] do_sys_truncate+0x5f/0x130 [ 320.430543][T16806] __x64_sys_truncate+0x31/0x40 [ 320.430576][T16806] x64_sys_call+0x268f/0x2e10 [ 320.430656][T16806] do_syscall_64+0xc9/0x1c0 [ 320.430684][T16806] ? clear_bhb_loop+0x25/0x80 [ 320.430706][T16806] ? clear_bhb_loop+0x25/0x80 [ 320.430804][T16806] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 320.430877][T16806] RIP: 0033:0x7fa0a413d169 [ 320.430893][T16806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.430914][T16806] RSP: 002b:00007fa0a27a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 320.430936][T16806] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413d169 [ 320.431024][T16806] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000040 [ 320.431037][T16806] RBP: 00007fa0a27a7090 R08: 0000000000000000 R09: 0000000000000000 [ 320.431050][T16806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.431161][T16806] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 320.431263][T16806] [ 320.677902][T16814] xt_hashlimit: overflow, try lower: 18446744073709551615/7 [ 320.752858][T16822] netlink: 'syz.7.4615': attribute type 298 has an invalid length. [ 320.791967][T16827] siw: device registration error -23 [ 320.989327][T16832] batadv0 speed is unknown, defaulting to 1000 [ 321.483674][T16839] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 321.483821][T16839] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 321.798897][T16853] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 321.895145][T16853] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 321.930137][T16863] SELinux: policydb string does not match my string SE Linux [ 321.934825][T16864] siw: device registration error -23 [ 321.937799][T16863] SELinux: failed to load policy [ 322.008416][T16853] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.122429][T16853] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.238766][T16853] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.269762][T16875] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 322.281752][T16875] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 322.286028][T16853] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.299522][T16877] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 322.324692][T16877] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 322.344988][T16853] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.369998][T16853] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.435131][T16894] siw: device registration error -23 [ 322.744068][T16902] batadv0 speed is unknown, defaulting to 1000 [ 322.881501][T16913] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4649'. [ 322.948807][T16919] xt_hashlimit: size too large, truncated to 1048576 [ 323.087161][T16922] siw: device registration error -23 [ 323.136757][T16925] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 323.360553][T16929] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 323.369359][T16929] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 323.641403][T16955] xt_hashlimit: size too large, truncated to 1048576 [ 324.149377][T16977] FAULT_INJECTION: forcing a failure. [ 324.149377][T16977] name failslab, interval 1, probability 0, space 0, times 0 [ 324.149450][T16977] CPU: 1 UID: 0 PID: 16977 Comm: syz.3.4676 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 324.149535][T16977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 324.149552][T16977] Call Trace: [ 324.149561][T16977] [ 324.149571][T16977] dump_stack_lvl+0xf6/0x150 [ 324.149642][T16977] dump_stack+0x15/0x1a [ 324.149695][T16977] should_fail_ex+0x261/0x270 [ 324.149730][T16977] should_failslab+0x8f/0xb0 [ 324.149770][T16977] __kmalloc_noprof+0xad/0x410 [ 324.149797][T16977] ? tcf_idr_create+0x42/0x4c0 [ 324.149841][T16977] tcf_idr_create+0x42/0x4c0 [ 324.149875][T16977] ? idr_alloc_u32+0x129/0x180 [ 324.149944][T16977] tcf_idr_create_from_flags+0x63/0x80 [ 324.149990][T16977] tcf_pedit_init+0x28a/0x920 [ 324.150024][T16977] ? should_fail_ex+0xd7/0x270 [ 324.150063][T16977] tcf_action_init_1+0x34b/0x4c0 [ 324.150177][T16977] tcf_action_init+0x1ce/0x620 [ 324.150322][T16977] tc_ctl_action+0x2be/0x880 [ 324.150362][T16977] ? page_counter_charge+0x21a/0x240 [ 324.150442][T16977] ? __pfx_tc_ctl_action+0x10/0x10 [ 324.150483][T16977] rtnetlink_rcv_msg+0x6b7/0x740 [ 324.150526][T16977] ? ref_tracker_free+0x3b8/0x420 [ 324.150563][T16977] netlink_rcv_skb+0x12f/0x230 [ 324.150602][T16977] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 324.150651][T16977] rtnetlink_rcv+0x1c/0x30 [ 324.150687][T16977] netlink_unicast+0x605/0x6c0 [ 324.150733][T16977] netlink_sendmsg+0x609/0x720 [ 324.150770][T16977] ? __pfx_netlink_sendmsg+0x10/0x10 [ 324.150797][T16977] __sock_sendmsg+0x140/0x180 [ 324.150837][T16977] ____sys_sendmsg+0x350/0x4e0 [ 324.150876][T16977] __sys_sendmsg+0x1a0/0x240 [ 324.150962][T16977] __x64_sys_sendmsg+0x46/0x50 [ 324.151061][T16977] x64_sys_call+0x26f3/0x2e10 [ 324.151090][T16977] do_syscall_64+0xc9/0x1c0 [ 324.151207][T16977] ? clear_bhb_loop+0x25/0x80 [ 324.151234][T16977] ? clear_bhb_loop+0x25/0x80 [ 324.151262][T16977] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 324.151289][T16977] RIP: 0033:0x7fa2fedcd169 [ 324.151308][T16977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 324.151408][T16977] RSP: 002b:00007fa2fd437038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 324.151431][T16977] RAX: ffffffffffffffda RBX: 00007fa2fefe5fa0 RCX: 00007fa2fedcd169 [ 324.151447][T16977] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000000000000003 [ 324.151462][T16977] RBP: 00007fa2fd437090 R08: 0000000000000000 R09: 0000000000000000 [ 324.151477][T16977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.151492][T16977] R13: 0000000000000000 R14: 00007fa2fefe5fa0 R15: 00007fffdf888808 [ 324.151516][T16977] [ 324.257228][T16980] batadv0 speed is unknown, defaulting to 1000 [ 324.439281][T16988] FAULT_INJECTION: forcing a failure. [ 324.439281][T16988] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 324.520015][T16988] CPU: 0 UID: 0 PID: 16988 Comm: syz.7.4680 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 324.520042][T16988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 324.520071][T16988] Call Trace: [ 324.520078][T16988] [ 324.520084][T16988] dump_stack_lvl+0xf6/0x150 [ 324.520153][T16988] dump_stack+0x15/0x1a [ 324.520221][T16988] should_fail_ex+0x261/0x270 [ 324.520258][T16988] should_fail+0xb/0x10 [ 324.520344][T16988] should_fail_usercopy+0x1a/0x20 [ 324.520372][T16988] _copy_from_user+0x1c/0xa0 [ 324.520404][T16988] get_timespec64+0x4e/0x140 [ 324.520436][T16988] __se_sys_io_pgetevents+0x79/0x2f0 [ 324.520459][T16988] __x64_sys_io_pgetevents+0x78/0x90 [ 324.520495][T16988] x64_sys_call+0xffd/0x2e10 [ 324.520592][T16988] do_syscall_64+0xc9/0x1c0 [ 324.520621][T16988] ? clear_bhb_loop+0x25/0x80 [ 324.520642][T16988] ? clear_bhb_loop+0x25/0x80 [ 324.520664][T16988] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 324.520749][T16988] RIP: 0033:0x7f579632d169 [ 324.520764][T16988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 324.520781][T16988] RSP: 002b:00007f579498f038 EFLAGS: 00000246 ORIG_RAX: 000000000000014d [ 324.520823][T16988] RAX: ffffffffffffffda RBX: 00007f5796545fa0 RCX: 00007f579632d169 [ 324.520835][T16988] RDX: 0000000000000003 RSI: 0000000000000003 RDI: 00007f579707f000 [ 324.520846][T16988] RBP: 00007f579498f090 R08: 00002000000004c0 R09: 0000000000000000 [ 324.520858][T16988] R10: 0000200000000440 R11: 0000000000000246 R12: 0000000000000001 [ 324.520870][T16988] R13: 0000000000000000 R14: 00007f5796545fa0 R15: 00007fff49332bf8 [ 324.520889][T16988] [ 324.545878][ T29] kauditd_printk_skb: 324 callbacks suppressed [ 324.545895][ T29] audit: type=1400 audit(1744130097.363:169371): avc: denied { nlmsg_read } for pid=16978 comm="syz.6.4677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 324.554544][T16985] netlink: 88 bytes leftover after parsing attributes in process `syz.6.4677'. [ 324.696767][ T29] audit: type=1400 audit(1744130097.523:169372): avc: denied { accept } for pid=16992 comm="syz.7.4681" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 324.789508][ T3378] page_pool_release_retry() stalled pool shutdown: id 128, 2 inflight 60 sec [ 324.803963][ T29] audit: type=1400 audit(1744130097.623:169373): avc: denied { bind } for pid=16996 comm="syz.3.4682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 324.834131][ T29] audit: type=1400 audit(1744130097.653:169374): avc: denied { name_bind } for pid=16996 comm="syz.3.4682" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 324.959515][ T29] audit: type=1400 audit(1744130097.653:169375): avc: denied { node_bind } for pid=16996 comm="syz.3.4682" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 325.052783][T17005] sch_tbf: burst 3092 is lower than device lo mtu (65550) ! [ 325.089059][ T29] audit: type=1326 audit(1744130097.833:169376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17001 comm="syz.7.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 325.089145][ T29] audit: type=1326 audit(1744130097.833:169377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17001 comm="syz.7.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 325.089176][ T29] audit: type=1326 audit(1744130097.833:169378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17001 comm="syz.7.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 325.089275][ T29] audit: type=1326 audit(1744130097.833:169379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17001 comm="syz.7.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 325.089373][ T29] audit: type=1326 audit(1744130097.833:169380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17001 comm="syz.7.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=439 compat=0 ip=0x7f579632d169 code=0x7ffc0000 [ 325.209518][T17016] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 325.209748][T17016] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 325.219930][T17018] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 325.220059][T17018] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 325.828817][ T8902] page_pool_release_retry() stalled pool shutdown: id 129, 2 inflight 60 sec [ 325.846524][T17032] SELinux: Context system_u:object_r:policy_config_t:s0 is not valid (left unmapped). [ 326.169416][T17037] FAULT_INJECTION: forcing a failure. [ 326.169416][T17037] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.182535][T17037] CPU: 1 UID: 0 PID: 17037 Comm: syz.4.4698 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 326.182563][T17037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 326.182574][T17037] Call Trace: [ 326.182581][T17037] [ 326.182588][T17037] dump_stack_lvl+0xf6/0x150 [ 326.182609][T17037] dump_stack+0x15/0x1a [ 326.182691][T17037] should_fail_ex+0x261/0x270 [ 326.182755][T17037] should_fail+0xb/0x10 [ 326.182778][T17037] should_fail_usercopy+0x1a/0x20 [ 326.182809][T17037] _copy_from_user+0x1c/0xa0 [ 326.182884][T17037] kstrtouint_from_user+0x84/0x100 [ 326.182909][T17037] ? 0xffffffff81000000 [ 326.182923][T17037] ? selinux_file_permission+0x22d/0x360 [ 326.182952][T17037] proc_fail_nth_write+0x54/0x160 [ 326.183023][T17037] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 326.183055][T17037] vfs_write+0x295/0x950 [ 326.183081][T17037] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 326.183120][T17037] ? __fget_files+0x186/0x1c0 [ 326.183196][T17037] ksys_write+0xeb/0x1b0 [ 326.183272][T17037] __x64_sys_write+0x42/0x50 [ 326.183302][T17037] x64_sys_call+0x2a45/0x2e10 [ 326.183326][T17037] do_syscall_64+0xc9/0x1c0 [ 326.183495][T17037] ? clear_bhb_loop+0x25/0x80 [ 326.183517][T17037] ? clear_bhb_loop+0x25/0x80 [ 326.183542][T17037] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.183562][T17037] RIP: 0033:0x7fed7ef9bc1f [ 326.183578][T17037] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 326.183615][T17037] RSP: 002b:00007fed7d607030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 326.183635][T17037] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fed7ef9bc1f [ 326.183647][T17037] RDX: 0000000000000001 RSI: 00007fed7d6070a0 RDI: 0000000000000005 [ 326.183661][T17037] RBP: 00007fed7d607090 R08: 0000000000000000 R09: 0000000000000000 [ 326.183675][T17037] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 326.183689][T17037] R13: 0000000000000000 R14: 00007fed7f1b5fa0 R15: 00007ffdd6e47ba8 [ 326.183741][T17037] [ 326.410616][T17039] xt_hashlimit: overflow, try lower: 18446744073709551615/7 [ 326.650886][T17064] sch_tbf: burst 3092 is lower than device lo mtu (65550) ! [ 326.740830][T17062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29666 sclass=netlink_route_socket pid=17062 comm=syz.6.4709 [ 326.772777][T17072] FAULT_INJECTION: forcing a failure. [ 326.772777][T17072] name failslab, interval 1, probability 0, space 0, times 0 [ 326.772811][T17072] CPU: 1 UID: 0 PID: 17072 Comm: syz.3.4711 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 326.772852][T17072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 326.772868][T17072] Call Trace: [ 326.772877][T17072] [ 326.772939][T17072] dump_stack_lvl+0xf6/0x150 [ 326.772969][T17072] dump_stack+0x15/0x1a [ 326.772990][T17072] should_fail_ex+0x261/0x270 [ 326.773160][T17072] should_failslab+0x8f/0xb0 [ 326.773201][T17072] kmem_cache_alloc_noprof+0x59/0x340 [ 326.773229][T17072] ? sk_prot_alloc+0x41/0x190 [ 326.773280][T17072] sk_prot_alloc+0x41/0x190 [ 326.773312][T17072] sk_alloc+0x33/0x360 [ 326.773354][T17072] ? inet_create+0x39c/0x750 [ 326.773385][T17072] inet_create+0x3b8/0x750 [ 326.773501][T17072] __sock_create+0x2e9/0x5a0 [ 326.773529][T17072] __sys_socket+0xb3/0x240 [ 326.773554][T17072] __x64_sys_socket+0x3f/0x50 [ 326.773579][T17072] x64_sys_call+0x28f1/0x2e10 [ 326.773682][T17072] do_syscall_64+0xc9/0x1c0 [ 326.773719][T17072] ? clear_bhb_loop+0x25/0x80 [ 326.773748][T17072] ? clear_bhb_loop+0x25/0x80 [ 326.773785][T17072] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.773820][T17072] RIP: 0033:0x7fa2fedcd169 [ 326.773839][T17072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.773861][T17072] RSP: 002b:00007fa2fd437038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 326.773922][T17072] RAX: ffffffffffffffda RBX: 00007fa2fefe5fa0 RCX: 00007fa2fedcd169 [ 326.773937][T17072] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000002 [ 326.773952][T17072] RBP: 00007fa2fd437090 R08: 0000000000000000 R09: 0000000000000000 [ 326.773967][T17072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.773981][T17072] R13: 0000000000000000 R14: 00007fa2fefe5fa0 R15: 00007fffdf888808 [ 326.774005][T17072] [ 326.861482][T17075] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4709'. [ 327.060334][T17090] tipc: New replicast peer: 10.1.1.2 [ 327.060378][T17090] tipc: Enabled bearer , priority 10 [ 327.153015][T17099] netlink: 36 bytes leftover after parsing attributes in process `syz.4.4719'. [ 327.153038][T17099] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4719'. [ 327.153058][T17099] netlink: 36 bytes leftover after parsing attributes in process `syz.4.4719'. [ 327.195796][T17099] netlink: 36 bytes leftover after parsing attributes in process `syz.4.4719'. [ 327.486809][T17119] FAULT_INJECTION: forcing a failure. [ 327.486809][T17119] name failslab, interval 1, probability 0, space 0, times 0 [ 327.499800][T17119] CPU: 0 UID: 0 PID: 17119 Comm: syz.5.4731 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 327.499833][T17119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 327.499922][T17119] Call Trace: [ 327.499930][T17119] [ 327.499937][T17119] dump_stack_lvl+0xf6/0x150 [ 327.499965][T17119] dump_stack+0x15/0x1a [ 327.499986][T17119] should_fail_ex+0x261/0x270 [ 327.500059][T17119] should_failslab+0x8f/0xb0 [ 327.500164][T17119] kmem_cache_alloc_noprof+0x59/0x340 [ 327.500191][T17119] ? audit_log_start+0x37f/0x6e0 [ 327.500221][T17119] audit_log_start+0x37f/0x6e0 [ 327.500284][T17119] ? kstrtouint+0x7b/0xc0 [ 327.500316][T17119] audit_seccomp+0x4b/0x130 [ 327.500342][T17119] __seccomp_filter+0x694/0x10e0 [ 327.500379][T17119] ? vfs_write+0x669/0x950 [ 327.500492][T17119] ? putname+0xe1/0x100 [ 327.500522][T17119] __secure_computing+0x7e/0x160 [ 327.500553][T17119] syscall_trace_enter+0xcf/0x1f0 [ 327.500663][T17119] ? fpregs_assert_state_consistent+0x83/0xa0 [ 327.500708][T17119] do_syscall_64+0xaa/0x1c0 [ 327.500818][T17119] ? clear_bhb_loop+0x25/0x80 [ 327.500845][T17119] ? clear_bhb_loop+0x25/0x80 [ 327.500873][T17119] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 327.500925][T17119] RIP: 0033:0x7fa0a413d169 [ 327.500940][T17119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 327.500958][T17119] RSP: 002b:00007fa0a27a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 327.500980][T17119] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413d169 [ 327.500995][T17119] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 327.501010][T17119] RBP: 00007fa0a27a7090 R08: 00000000fffffffc R09: 0000000000000000 [ 327.501048][T17119] R10: 0000000000000e7b R11: 0000000000000246 R12: 0000000000000001 [ 327.501060][T17119] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 327.501079][T17119] [ 327.719444][T17117] batadv0 speed is unknown, defaulting to 1000 [ 327.757144][T17117] vlan2: entered allmulticast mode [ 327.902118][T17123] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 327.910707][T17123] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 328.124395][ T3444] tipc: Node number set to 2886997007 [ 328.144847][ T3380] page_pool_release_retry() stalled pool shutdown: id 131, 2 inflight 60 sec [ 328.226095][T17151] pim6reg1: entered promiscuous mode [ 328.231433][T17151] pim6reg1: entered allmulticast mode [ 328.351397][T17160] sch_tbf: burst 3092 is lower than device lo mtu (65550) ! [ 328.362993][T17160] FAULT_INJECTION: forcing a failure. [ 328.362993][T17160] name failslab, interval 1, probability 0, space 0, times 0 [ 328.389952][T17160] CPU: 1 UID: 0 PID: 17160 Comm: syz.7.4748 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 328.390040][T17160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 328.390056][T17160] Call Trace: [ 328.390063][T17160] [ 328.390077][T17160] dump_stack_lvl+0xf6/0x150 [ 328.390102][T17160] dump_stack+0x15/0x1a [ 328.390123][T17160] should_fail_ex+0x261/0x270 [ 328.390213][T17160] should_failslab+0x8f/0xb0 [ 328.390246][T17160] __kmalloc_cache_noprof+0x55/0x320 [ 328.390291][T17160] ? fifo_set_limit+0xa0/0x130 [ 328.390326][T17160] fifo_set_limit+0xa0/0x130 [ 328.390361][T17160] tbf_change+0x5f6/0xce0 [ 328.390394][T17160] ? __nla_validate_parse+0x1843/0x1f60 [ 328.390442][T17160] tc_modify_qdisc+0x111f/0x14d0 [ 328.390489][T17160] ? __cond_resched+0x53/0x90 [ 328.390555][T17160] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 328.390613][T17160] rtnetlink_rcv_msg+0x6b7/0x740 [ 328.390650][T17160] ? ref_tracker_free+0x3b8/0x420 [ 328.390683][T17160] netlink_rcv_skb+0x12f/0x230 [ 328.390784][T17160] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 328.390822][T17160] rtnetlink_rcv+0x1c/0x30 [ 328.390934][T17160] netlink_unicast+0x605/0x6c0 [ 328.390960][T17160] netlink_sendmsg+0x609/0x720 [ 328.390988][T17160] ? __pfx_netlink_sendmsg+0x10/0x10 [ 328.391033][T17160] __sock_sendmsg+0x140/0x180 [ 328.391074][T17160] ____sys_sendmsg+0x350/0x4e0 [ 328.391112][T17160] __sys_sendmsg+0x1a0/0x240 [ 328.391206][T17160] __x64_sys_sendmsg+0x46/0x50 [ 328.391288][T17160] x64_sys_call+0x26f3/0x2e10 [ 328.391313][T17160] do_syscall_64+0xc9/0x1c0 [ 328.391357][T17160] ? clear_bhb_loop+0x25/0x80 [ 328.391383][T17160] ? clear_bhb_loop+0x25/0x80 [ 328.391420][T17160] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 328.391445][T17160] RIP: 0033:0x7f579632d169 [ 328.391462][T17160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.391482][T17160] RSP: 002b:00007f579498f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 328.391555][T17160] RAX: ffffffffffffffda RBX: 00007f5796545fa0 RCX: 00007f579632d169 [ 328.391569][T17160] RDX: 0000000000000000 RSI: 00002000000012c0 RDI: 0000000000000003 [ 328.391583][T17160] RBP: 00007f579498f090 R08: 0000000000000000 R09: 0000000000000000 [ 328.391597][T17160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.391611][T17160] R13: 0000000000000000 R14: 00007f5796545fa0 R15: 00007fff49332bf8 [ 328.391630][T17160] [ 328.644661][ T12] unregister_netdevice: waiting for batadv0 to become free. Usage count = 3 [ 329.055767][T17197] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4761'. [ 329.370431][T17207] xt_hashlimit: size too large, truncated to 1048576 [ 329.389344][T17203] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 329.414985][T17203] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 329.544818][T17211] FAULT_INJECTION: forcing a failure. [ 329.544818][T17211] name failslab, interval 1, probability 0, space 0, times 0 [ 329.557531][T17211] CPU: 1 UID: 0 PID: 17211 Comm: syz.3.4766 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 329.557597][T17211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 329.557609][T17211] Call Trace: [ 329.557615][T17211] [ 329.557623][T17211] dump_stack_lvl+0xf6/0x150 [ 329.557702][T17211] dump_stack+0x15/0x1a [ 329.557722][T17211] should_fail_ex+0x261/0x270 [ 329.557789][T17211] should_failslab+0x8f/0xb0 [ 329.557838][T17211] __kmalloc_noprof+0xad/0x410 [ 329.557858][T17211] ? trace_probe_init+0x50/0x280 [ 329.557894][T17211] trace_probe_init+0x50/0x280 [ 329.557974][T17211] alloc_trace_uprobe+0x9b/0x1f0 [ 329.558009][T17211] create_local_trace_uprobe+0xc0/0x300 [ 329.558045][T17211] perf_uprobe_init+0xc2/0x140 [ 329.558072][T17211] perf_uprobe_event_init+0xe2/0x140 [ 329.558185][T17211] perf_try_init_event+0xcd/0x530 [ 329.558214][T17211] ? perf_event_alloc+0xab7/0x1680 [ 329.558246][T17211] perf_event_alloc+0xac2/0x1680 [ 329.558327][T17211] __se_sys_perf_event_open+0x7f8/0x2220 [ 329.558366][T17211] ? vfs_write+0x5e1/0x950 [ 329.558414][T17211] ? putname+0xe1/0x100 [ 329.558456][T17211] __x64_sys_perf_event_open+0x67/0x80 [ 329.558544][T17211] x64_sys_call+0x27bb/0x2e10 [ 329.558565][T17211] do_syscall_64+0xc9/0x1c0 [ 329.558621][T17211] ? clear_bhb_loop+0x25/0x80 [ 329.558655][T17211] ? clear_bhb_loop+0x25/0x80 [ 329.558681][T17211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 329.558706][T17211] RIP: 0033:0x7fa2fedcd169 [ 329.558726][T17211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 329.558762][T17211] RSP: 002b:00007fa2fd437038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 329.558779][T17211] RAX: ffffffffffffffda RBX: 00007fa2fefe5fa0 RCX: 00007fa2fedcd169 [ 329.558791][T17211] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 329.558803][T17211] RBP: 00007fa2fd437090 R08: 0000000000000000 R09: 0000000000000000 [ 329.558815][T17211] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 329.558936][T17211] R13: 0000000000000000 R14: 00007fa2fefe5fa0 R15: 00007fffdf888808 [ 329.558958][T17211] [ 329.558982][T17211] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 329.584424][ T29] kauditd_printk_skb: 406 callbacks suppressed [ 329.584441][ T29] audit: type=1326 audit(1744130102.373:169785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17206 comm="syz.6.4765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 329.810940][ T29] audit: type=1326 audit(1744130102.373:169786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17206 comm="syz.6.4765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 329.840232][ T29] audit: type=1326 audit(1744130102.663:169787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17213 comm="syz.3.4767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fedcd169 code=0x7ffc0000 [ 329.873332][ T29] audit: type=1326 audit(1744130102.663:169788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17213 comm="syz.3.4767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fedcd169 code=0x7ffc0000 [ 329.897200][ T29] audit: type=1326 audit(1744130102.663:169789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17213 comm="syz.3.4767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa2fedcd169 code=0x7ffc0000 [ 329.921037][ T29] audit: type=1326 audit(1744130102.663:169790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17213 comm="syz.3.4767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fedcd169 code=0x7ffc0000 [ 329.944770][ T29] audit: type=1326 audit(1744130102.663:169791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17213 comm="syz.3.4767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fedcd169 code=0x7ffc0000 [ 329.968501][ T29] audit: type=1326 audit(1744130102.663:169792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17213 comm="syz.3.4767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa2fedcd169 code=0x7ffc0000 [ 329.992279][ T29] audit: type=1326 audit(1744130102.663:169793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17213 comm="syz.3.4767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fedcd169 code=0x7ffc0000 [ 330.015991][ T29] audit: type=1326 audit(1744130102.663:169794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17213 comm="syz.3.4767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2fedcd169 code=0x7ffc0000 [ 330.063915][T17216] tipc: Enabled bearer , priority 10 [ 330.576461][T17252] FAULT_INJECTION: forcing a failure. [ 330.576461][T17252] name failslab, interval 1, probability 0, space 0, times 0 [ 330.589174][T17252] CPU: 1 UID: 0 PID: 17252 Comm: syz.5.4782 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 330.589204][T17252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 330.589218][T17252] Call Trace: [ 330.589264][T17252] [ 330.589273][T17252] dump_stack_lvl+0xf6/0x150 [ 330.589297][T17252] dump_stack+0x15/0x1a [ 330.589316][T17252] should_fail_ex+0x261/0x270 [ 330.589343][T17252] should_failslab+0x8f/0xb0 [ 330.589376][T17252] kmem_cache_alloc_noprof+0x59/0x340 [ 330.589412][T17252] ? skb_clone+0x154/0x1f0 [ 330.589439][T17252] skb_clone+0x154/0x1f0 [ 330.589465][T17252] __netlink_deliver_tap+0x2bd/0x4f0 [ 330.589498][T17252] netlink_unicast+0x69e/0x6c0 [ 330.589599][T17252] netlink_sendmsg+0x609/0x720 [ 330.589629][T17252] ? __pfx_netlink_sendmsg+0x10/0x10 [ 330.589655][T17252] __sock_sendmsg+0x140/0x180 [ 330.589710][T17252] ____sys_sendmsg+0x350/0x4e0 [ 330.589739][T17252] __sys_sendmsg+0x1a0/0x240 [ 330.589855][T17252] __x64_sys_sendmsg+0x46/0x50 [ 330.589884][T17252] x64_sys_call+0x26f3/0x2e10 [ 330.589940][T17252] do_syscall_64+0xc9/0x1c0 [ 330.589972][T17252] ? clear_bhb_loop+0x25/0x80 [ 330.589995][T17252] ? clear_bhb_loop+0x25/0x80 [ 330.590037][T17252] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 330.590064][T17252] RIP: 0033:0x7fa0a413d169 [ 330.590115][T17252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 330.590137][T17252] RSP: 002b:00007fa0a27a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 330.590155][T17252] RAX: ffffffffffffffda RBX: 00007fa0a4355fa0 RCX: 00007fa0a413d169 [ 330.590168][T17252] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000004 [ 330.590179][T17252] RBP: 00007fa0a27a7090 R08: 0000000000000000 R09: 0000000000000000 [ 330.590191][T17252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.590203][T17252] R13: 0000000000000000 R14: 00007fa0a4355fa0 R15: 00007ffd46bb48b8 [ 330.590225][T17252] [ 330.835603][T17261] xt_hashlimit: size too large, truncated to 1048576 [ 331.047788][T17272] batadv0 speed is unknown, defaulting to 1000 [ 331.489649][T17287] xt_hashlimit: size too large, truncated to 1048576 [ 331.869815][T17313] siw: device registration error -23 [ 331.899588][T17315] batadv0 speed is unknown, defaulting to 1000 [ 331.996597][T17324] xt_hashlimit: size too large, truncated to 1048576 [ 332.224038][T17341] FAULT_INJECTION: forcing a failure. [ 332.224038][T17341] name failslab, interval 1, probability 0, space 0, times 0 [ 332.236923][T17341] CPU: 1 UID: 0 PID: 17341 Comm: syz.3.4817 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 332.236954][T17341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 332.236967][T17341] Call Trace: [ 332.236974][T17341] [ 332.236981][T17341] dump_stack_lvl+0xf6/0x150 [ 332.237009][T17341] dump_stack+0x15/0x1a [ 332.237028][T17341] should_fail_ex+0x261/0x270 [ 332.237083][T17341] should_failslab+0x8f/0xb0 [ 332.237118][T17341] kmem_cache_alloc_noprof+0x59/0x340 [ 332.237142][T17341] ? audit_log_start+0x37f/0x6e0 [ 332.237204][T17341] ? __pfx_cmp_ex_search+0x10/0x10 [ 332.237236][T17341] audit_log_start+0x37f/0x6e0 [ 332.237265][T17341] audit_seccomp+0x4b/0x130 [ 332.237294][T17341] __seccomp_filter+0x694/0x10e0 [ 332.237380][T17341] ? exc_page_fault+0x527/0x6a0 [ 332.237480][T17341] __secure_computing+0x7e/0x160 [ 332.237559][T17341] syscall_trace_enter+0xcf/0x1f0 [ 332.237586][T17341] ? __x64_sys_msgsnd+0x7a/0xc0 [ 332.237604][T17341] ? fpregs_assert_state_consistent+0x83/0xa0 [ 332.237652][T17341] do_syscall_64+0xaa/0x1c0 [ 332.237683][T17341] ? clear_bhb_loop+0x25/0x80 [ 332.237707][T17341] ? clear_bhb_loop+0x25/0x80 [ 332.237811][T17341] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 332.237835][T17341] RIP: 0033:0x7fa2fedcbb7c [ 332.237851][T17341] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 332.237871][T17341] RSP: 002b:00007fa2fd437030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 332.237892][T17341] RAX: ffffffffffffffda RBX: 00007fa2fefe5fa0 RCX: 00007fa2fedcbb7c [ 332.237906][T17341] RDX: 000000000000000f RSI: 00007fa2fd4370a0 RDI: 0000000000000005 [ 332.237994][T17341] RBP: 00007fa2fd437090 R08: 0000000000000000 R09: 0000000000000000 [ 332.238049][T17341] R10: 0000000000000800 R11: 0000000000000246 R12: 0000000000000001 [ 332.238060][T17341] R13: 0000000000000000 R14: 00007fa2fefe5fa0 R15: 00007fffdf888808 [ 332.238155][T17341] [ 332.500510][T17350] siw: device registration error -23 [ 332.522080][T17352] batadv0 speed is unknown, defaulting to 1000 [ 332.540085][T17348] SELinux: Context system_u:object_r:usbtty_device_t:s0 is not valid (left unmapped). [ 332.804474][T17387] siw: device registration error -23 [ 332.827813][T17389] batadv0 speed is unknown, defaulting to 1000 [ 333.067897][T17422] siw: device registration error -23 [ 333.172316][T17429] batadv0 speed is unknown, defaulting to 1000 [ 333.213712][T17442] FAULT_INJECTION: forcing a failure. [ 333.213712][T17442] name failslab, interval 1, probability 0, space 0, times 0 [ 333.226491][T17442] CPU: 1 UID: 0 PID: 17442 Comm: syz.6.4860 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 333.226524][T17442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 333.226538][T17442] Call Trace: [ 333.226547][T17442] [ 333.226555][T17442] dump_stack_lvl+0xf6/0x150 [ 333.226584][T17442] dump_stack+0x15/0x1a [ 333.226649][T17442] should_fail_ex+0x261/0x270 [ 333.226682][T17442] should_failslab+0x8f/0xb0 [ 333.226850][T17442] kmem_cache_alloc_noprof+0x59/0x340 [ 333.226928][T17442] ? audit_log_start+0x37f/0x6e0 [ 333.226951][T17442] audit_log_start+0x37f/0x6e0 [ 333.226973][T17442] ? kstrtouint+0x7b/0xc0 [ 333.227014][T17442] audit_seccomp+0x4b/0x130 [ 333.227073][T17442] __seccomp_filter+0x694/0x10e0 [ 333.227105][T17442] ? vfs_write+0x669/0x950 [ 333.227156][T17442] __secure_computing+0x7e/0x160 [ 333.227188][T17442] syscall_trace_enter+0xcf/0x1f0 [ 333.227292][T17442] do_syscall_64+0xaa/0x1c0 [ 333.227326][T17442] ? clear_bhb_loop+0x25/0x80 [ 333.227352][T17442] ? clear_bhb_loop+0x25/0x80 [ 333.227378][T17442] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 333.227484][T17442] RIP: 0033:0x7f11db66d169 [ 333.227502][T17442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.227524][T17442] RSP: 002b:00007f11d9cd7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 333.227546][T17442] RAX: ffffffffffffffda RBX: 00007f11db885fa0 RCX: 00007f11db66d169 [ 333.227561][T17442] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 333.227575][T17442] RBP: 00007f11d9cd7090 R08: 0000000000000000 R09: 0000000000000000 [ 333.227589][T17442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.227616][T17442] R13: 0000000000000000 R14: 00007f11db885fa0 R15: 00007ffe6779f998 [ 333.227637][T17442] [ 333.528156][T17456] xt_hashlimit: size too large, truncated to 1048576 [ 333.771122][T17474] batadv0 speed is unknown, defaulting to 1000 [ 333.813078][T17481] netlink: 'syz.6.4876': attribute type 27 has an invalid length. [ 333.910665][T17481] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.917914][T17481] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.022894][T17481] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 334.037713][T17481] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 334.132958][T17481] netdevsim netdevsim6 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.141602][T17481] netdevsim netdevsim6 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.150104][T17481] netdevsim netdevsim6 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.158544][T17481] netdevsim netdevsim6 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.794188][ T29] kauditd_printk_skb: 295 callbacks suppressed [ 334.794207][ T29] audit: type=1326 audit(1744130107.603:170086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.6.4899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 334.824174][ T29] audit: type=1326 audit(1744130107.603:170087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.6.4899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=99 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 334.847855][ T29] audit: type=1326 audit(1744130107.603:170088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.6.4899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 334.871620][ T29] audit: type=1326 audit(1744130107.603:170089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.6.4899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 334.895411][ T29] audit: type=1326 audit(1744130107.603:170090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.6.4899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 334.919165][ T29] audit: type=1326 audit(1744130107.603:170091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.6.4899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 334.943061][ T29] audit: type=1326 audit(1744130107.613:170092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.6.4899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 334.967130][ T29] audit: type=1326 audit(1744130107.613:170093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.6.4899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=118 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 334.990957][ T29] audit: type=1326 audit(1744130107.613:170094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.6.4899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 335.014941][ T29] audit: type=1326 audit(1744130107.823:170095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17554 comm="syz.6.4902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f11db66d169 code=0x7ffc0000 [ 335.040483][T17556] sch_tbf: burst 3092 is lower than device lo mtu (65550) ! [ 335.393634][T17585] batadv0 speed is unknown, defaulting to 1000 [ 335.590183][T17591] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 335.599649][T17591] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 335.774554][T17628] ================================================================== [ 335.782668][T17628] BUG: KCSAN: data-race in file_update_time / inode_update_timestamps [ 335.790842][T17628] [ 335.793165][T17628] write to 0xffff88811897c6c4 of 4 bytes by task 17627 on cpu 1: [ 335.800883][T17628] inode_update_timestamps+0x139/0x250 [ 335.806363][T17628] file_update_time+0x219/0x2b0 [ 335.811243][T17628] fault_dirty_shared_page+0xd7/0x3b0 [ 335.816642][T17628] handle_mm_fault+0x154c/0x2e80 [ 335.821597][T17628] __get_user_pages+0xf4e/0x2340 [ 335.826545][T17628] faultin_page_range+0x352/0x5d0 [ 335.831590][T17628] madvise_do_behavior+0x10e/0x2530 [ 335.836977][T17628] __x64_sys_madvise+0xcb/0x100 [ 335.841838][T17628] x64_sys_call+0x23b8/0x2e10 [ 335.846534][T17628] do_syscall_64+0xc9/0x1c0 [ 335.851075][T17628] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 335.856986][T17628] [ 335.859334][T17628] read to 0xffff88811897c6c4 of 4 bytes by task 17628 on cpu 0: [ 335.866975][T17628] file_update_time+0x8b/0x2b0 [ 335.871753][T17628] fault_dirty_shared_page+0xd7/0x3b0 [ 335.877139][T17628] handle_mm_fault+0x154c/0x2e80 [ 335.882185][T17628] __get_user_pages+0xf4e/0x2340 [ 335.887137][T17628] faultin_page_range+0x352/0x5d0 [ 335.892188][T17628] madvise_do_behavior+0x10e/0x2530 [ 335.897424][T17628] __x64_sys_madvise+0xcb/0x100 [ 335.902283][T17628] x64_sys_call+0x23b8/0x2e10 [ 335.906972][T17628] do_syscall_64+0xc9/0x1c0 [ 335.911490][T17628] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 335.917396][T17628] [ 335.919722][T17628] value changed: 0x236256a9 -> 0x23faed29 [ 335.925443][T17628] [ 335.927775][T17628] Reported by Kernel Concurrency Sanitizer on: [ 335.933943][T17628] CPU: 0 UID: 0 PID: 17628 Comm: syz.3.4930 Not tainted 6.15.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 335.944713][T17628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 335.954778][T17628] ==================================================================