last executing test programs: 43m19.422312225s ago: executing program 32 (id=2150): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x5) accept(r0, &(0x7f0000000100)=@can, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 35m21.099498233s ago: executing program 33 (id=10046): syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x5883, 0x0, 0x0, 0xfffffdfc}, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_usbip_server_init(0x6) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x6, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) lsetxattr$security_selinux(&(0x7f0000000400)='./file0\x00', &(0x7f0000000000), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000080)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e0000000000000000001800028014000380100001800800010000000000040003"], 0x44}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) 21m5.619800013s ago: executing program 34 (id=16660): bpf$MAP_CREATE(0x0, 0x0, 0x48) mknodat$null(0xffffffffffffffff, &(0x7f0000000500)='./file0/file0\x00', 0xb0a54e68b1cd2fdb, 0x103) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x1a, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1}) mount$9p_unix(0x0, &(0x7f0000000180)='.\x00', &(0x7f0000000280), 0x808008, &(0x7f00000004c0)=ANY=[@ANYBLOB='trqyans=unix']) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x4, @perf_bp={0x0, 0x15}, 0xc92, 0xffffffff, 0xd15, 0x6, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="500100001000130428bd700000000000e0000001000000000000000000000000ac1e0101000000000000000000000000000000004e2400000200202000000000", @ANYRES8=r0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}}, 0x804) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007208", 0x39}], 0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000318680907070000000f0000ff3f04000000170a001700000000040037000d00030001332564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB="301aadf06f8c99013d1c000000", @ANYRES16=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000001, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) getgroups(0x0, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000000000000000046400010073797a300000000044000000090a01040000000000000000010000000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f0800034000000004640000000e0a01020000000000000000010000000900bcd55a7107cd99c54d65020073797a32000000000900010073797a30000000003800038061e9d8733fd1370b638f72a32d06b9b9296eff58afe8f71557eb284a16daa9874d90f882f94c16f2dc"], 0xf0}, 0x1, 0x0, 0x0, 0x80}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mprotect(&(0x7f00004a4000/0x800000)=nil, 0x800000, 0x2) socket(0x10, 0x3, 0x0) link(&(0x7f0000000300)='.\x00', &(0x7f0000000480)='./file0/file0\x00') 20m14.573648473s ago: executing program 35 (id=16804): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2b, 0x801, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)=ANY=[@ANYRES32=r0], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) r4 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) write$evdev(r4, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e24, @local}, 0x10) bind$inet(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x8}, 0x400, 0x0, 0x6, 0x3, 0x401, 0x0, 0xfc00, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x8, 0x1000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r5, 0x3) setsockopt$inet_tcp_int(r1, 0x6, 0x6, &(0x7f0000000340)=0xb, 0x4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x21}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000000)='kmem_cache_free\x00', r6, 0x0, 0x7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r7 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x106f) r9 = syz_genetlink_get_family_id$wireguard(&(0x7f00000005c0), r0) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r11}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21481e, &(0x7f0000000300), 0x1, 0x4f2, &(0x7f0000000600)="$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") sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="ec000000", @ANYRES16=r9, @ANYBLOB="01000000000000000000010000000800050001000000140002007767310000000000000000000000000024000300a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5420800050000000000900008808c00008024000100975c9d81c983c8209ee781254b899f8ed925ae9f0923c23c62f53c57cdbf691c640009801c000080"], 0xec}, 0x1, 0x0, 0x0, 0x4084}, 0x80) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), r0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1a0, r12, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4008d2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}]}, @TIPC_NLA_NODE={0x150, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x40, 0x4, {'gcm(aes)\x00', 0x18, "11a106b3c1e753486848374568868e83051e45f5a495c136"}}, @TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "7f5cc50fbc69532e8194f7164d036c3a03e12e707ce3795ddfdf725ed31010"}}, @TIPC_NLA_NODE_ID={0xae, 0x3, "193af33ae672252f3c789bda52a04dbf5466384120178ddb5699960852030d25f94c6e1bf9cac9618a5d10d1bb93f9262ece2b586e6590b694d87f2888e2573eadb90f64ee673e63a1562bb77012d5b35c12bb8886ae2125310e597540ae16c9f9859cfb47e42acef02b3be64b6e6ef82106467fdbc97aaaf402a4a78c603afc24af117aeec8dc270c7491ad04e9f1eb5999a5295434506eea5ce2b698274c3fa629a0ce7f2e1e61f248"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x10001}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 19m42.360151667s ago: executing program 36 (id=17166): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0xc, &(0x7f0000000340)=ANY=[@ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB="00fe7d1830daa688de001dfd99d53e5090bd0000", @ANYRES32=0x0, @ANYBLOB='\x00'/16], 0x48) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='%%^\x00', 0x0) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x1, 0x0, 0x1, 0xa, 0x21005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r4}, 0x18) gettid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x4004881) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0_virt_wifi\x00', 0x2000000}, 0x18) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e23, @loopback}}, 0x0, 0x20000000005, 0x4a}, 0xd8) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e880000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x240087f9, &(0x7f0000000100)={0x2, 0x4e23, @loopback}, 0x10) close(r5) 19m41.653132341s ago: executing program 37 (id=17173): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) unshare(0x2040400) r1 = fsopen(&(0x7f0000000400)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) unshare(0x2000400) fsmount(r1, 0x0, 0x0) 19m36.558845773s ago: executing program 4 (id=17234): syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) unshare(0x2040400) r0 = fsopen(&(0x7f0000000400)='cgroup2\x00', 0x0) unshare(0x2000400) fsmount(r0, 0x0, 0x0) 19m36.152985971s ago: executing program 4 (id=17236): r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x2008042, &(0x7f00000000c0), 0x1, 0x571, &(0x7f0000000780)="$eJzs3c+PG1cdAPDvzP5yk7SbQA9QAQlQCCiKnXXaqOql5QJCVSVExQFxSJddZ7XEjkPsLd0lUrd/A0ggcYI/gQMSB6SeOHDjiMQBEOWAVCACJUgcBs3Yu+ts7MSNvXaz/nykybyZN+Pve/bOvOdnxy+AmXUuInYjYjEi3oyI5e7+pLvEq50lP+7undtr9+7cXksiy974Z1Lk5/ui55zcye5jliLim1+L+G7yYNzW9s711Xq9dqu7XWk3blZa2zsXNxurG7WN2o1q9crKlUsvXX6xOra6nm388oOvbr72rd/8+tPv/373yz/Mi3Wqm9dbj3HqVH1hP05uPiJeO4pgUzDXXS9OuRw8njQiPhYRnyuu/+WYK/46AYDjLMuWI1vu3QYAjru0GANL0nJEpGm3E1DujOE9GyfSerPVvnCtuXVjvTNWdjoW0mub9dqlM0t//H5x8EKSb68UeUV+sV09tH05Is5ExI+Xniq2y2vN+vp0ujwAMPNO9rb/EfGfpTQtl4c6tc+negDAE6M07QIAABOn/QeA2aP9B4DZM0T73/2wf/fIywIATIb3/wAwe7T/ADB7tP8AMFO+8frr+ZLd6/7+9fpb21vXm29dXK+1rpcbW2vlteatm+WNZnOj+M2exqMer95s3lx5IbberrRrrXaltb1ztdHcutG+Wvyu99XawkRqBQA8zJmz7/0hiYjdl58qluiZy0FbDcdbOsajgCfL3Cgn6yDAE81sXzC7hmrCi07C7468LMB09P0x71Lf5P1++iGC+J4RfKSc/+Tw4//meIbjxcg+zK7HG/9/ZezlACbvscf//zzecgCTl2XJ4Tn/F/ezAIBjaYSv8GXvjKsTAkzVoybzHsvn/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHDMnIqI70WSlou5wNP837Rcjng6Ik7HQnJts167FBHPxNmIWFjKt1emXWgAYETp35Pu/F/nl58/dTh3MfnvUrGOiB/87I2fvL3abt9ayff/a3//0t70YdWD80aYVxAAGN5fhzmoaL+r3XXPG/m7d26v7S1HWMYHfPCV/clH1+7duV0snZz5yLIsiygVfYkT/05ivntOKSKei4i5McTffTciPtGv/kkxNnK6O/Npb/zoxn56ovHT++KnRV5nnT99Hx9DWWDWvJfff149fP3NFVfWueKI/td/qbhDja64/5Ui9u59B/e/veu9VJTmcPz8mj83bIwXfvv1B3Zmy528dyOem+8XP9mPnwyI//yQ8f/0qc/86JUBednPI85H//i9sSrtxs1Ka3vn4mZjdaO2UbtRrV5ZuXLppcsvVivFGHVlb6T6Qf94+cIzg8qW1//EgPidV/7kofov7p/7hSHr/4v/vfmdzx5sLh2O/6XP93/9ny3W/Z//vE384pDxV0/8auD03Xn89QH1f9Trf2HI+O//bWd9yEMBgAlobe9cX63Xa7dGSuTvQj/8WVmWvZOX4SHH5NnDPeBed3G06vwlisTB05JEEqM/P/cn8s7YMAcvjFyd+xJ7wyXjrk6fxPx+X3G8j/zth/+1DEosjhI0HXstHicRp7uJu5MKOpXbETBBBxf9tEsCAAAAAAAAAAAAAAAMMon/wzTtOgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHB8/T8AAP//Z1e+LQ==") (async, rerun: 32) r1 = socket$packet(0x11, 0x3, 0x300) (rerun: 32) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) (async) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000080)=[{0x48}, {0x6, 0x37, 0x0, 0x9}]}, 0x10) (async) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000040)='l', 0x1, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) (async) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0xe410}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x58, r3, 0x2, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x40}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x36}, @NL80211_ATTR_IE={0x28, 0x2a, [@ht={0x2d, 0x1a, {0x400, 0x1, 0x0, 0x0, {0xff, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x2, 0x1}, 0x1, 0xde, 0xbe}}, @cf={0x4, 0x6, {0x8, 0x7, 0xb5, 0x400}}]}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x58}, 0x1, 0x0, 0x0, 0x20040010}, 0x85) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000910095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r4, 0x2f, 0x0, @void}, 0x10) rseq(&(0x7f0000000440)={0x0, 0x0, 0x0, 0x3}, 0x20, 0x0, 0x0) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x18) (async) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) (async) r9 = creat(&(0x7f0000000080)='./file0\x00', 0xc7) close(r9) (async) r10 = syz_open_dev$vcsu(&(0x7f0000009c40), 0x8765, 0x0) (async) r11 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r11}}) writev(r8, &(0x7f0000002340)=[{&(0x7f0000000fc0)="a2db", 0x2}], 0x1) (async) socket$inet_sctp(0x2, 0x1, 0x84) (async) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0300000004000000040000000a000000000000008e3d566adf3bee7b143781448ff2214e8f073b895e510d05a43e18b23f67be995b5d6dafb8fc7a44ded78540c50950008a12dcd8e25a11c16f425a3858856c332a11fbad8f42acc4dc46cf17d2e2a83f70d97793dfd074ec009528b783c875a75c2eba0957aa472df11228b3eb3ef61abe7c2bf36a78019c9e9fea2a8b776917306276d4b07951241f7df7bfbf3b8507adf02cdda8eea92a50050937786d00e744e6137058dc401f6fa1bd30f45a7c4a0b259eecbb12721f0e867020c42234cd0b11c4e41df7af9c9f9752357ba2588741", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r12, 0x0}, 0x20) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000140)=r5, 0x4) (async) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000200)=ANY=[@ANYRES8=r7, @ANYRES32=0x0, @ANYBLOB='\x00'/16], 0x2c, 0x0) (async) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x801460, 0x0, 0x2, 0x0, &(0x7f0000000000)) (async) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) r14 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x18100, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0800000009000000000000000100000000020000", @ANYRES32=r10, @ANYBLOB="ffff6822ebc00000b75daa9f4055e219", @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="02000000000000000200"/28], 0x50) (async, rerun: 64) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000180)=0x2) (rerun: 64) 19m35.924729806s ago: executing program 4 (id=17241): r0 = syz_open_dev$loop(&(0x7f0000000100), 0xf01c, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.stat\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r1, 0x0, {0x2a00, 0x80010000, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa, 0x1c, "fee8a2ab78fc5e3ed1e00d96072000001ea89de2b7fb0000e60080b8785d96000100", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d4509d4992861ac00", "90be885f126752e4f700003f52f322080000bcf66a75fcf700", [0xfffffffffffffffc]}}) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x6) prlimit64(0x0, 0xf, &(0x7f0000000140)={0x8, 0x8000000000000001}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="060000000400000008000000080000000000000032109b7c0ac1c900831957676f9b7155b12b", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYRESHEX=r2], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x501) ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, 0x0) futex(&(0x7f000000cffc)=0x1, 0xd, 0x0, 0x0, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) fgetxattr(r3, &(0x7f0000000300)=@known='security.selinux\x00', 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mount$nfs(&(0x7f0000000040)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x2080020, &(0x7f0000000380)=ANY=[@ANYBLOB]) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x5) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000000400000008"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00'}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) 19m34.990898674s ago: executing program 4 (id=17251): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0xb, &(0x7f0000000640)=ANY=[@ANYRES8], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xffffffffffffff54}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c16, &(0x7f0000000180)={[{@nobh}, {@noauto_da_alloc}]}, 0x1, 0x240, &(0x7f00000002c0)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r3, &(0x7f0000000a00)=ANY=[@ANYBLOB="7f454c4604070003070000000000000002000300030000000903000038000000fcffffff0e000000000020000100050000000000000000000300000008000000f30000007f00000004"], 0x58) close(r3) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000240), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x1001, 0x0) 19m34.431466356s ago: executing program 4 (id=17257): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x1d, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000280)='./file1\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000", @ANYRES32], 0x1, 0x2b2, &(0x7f00000006c0)="$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") syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000002200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1a4a438, &(0x7f0000000200)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRESOCT=r2, @ANYRES64=r2], 0xb, 0x0, &(0x7f0000000000)) renameat2(0xffffffffffffffff, &(0x7f0000000b40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 19m32.896835106s ago: executing program 4 (id=17287): syz_clone(0x2d300800, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/vlan/vlan1\x00') bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES64=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='jbd2_handle_extend\x00', r1, 0x0, 0x6}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[], 0x48) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) syz_open_dev$evdev(0x0, 0x9, 0xbebf80) socket$inet_tcp(0x2, 0x1, 0x0) r2 = epoll_create1(0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)=@o_path={0x0, r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0xa}) syz_usb_connect(0x4, 0x24, 0x0, 0x0) epoll_pwait(r2, &(0x7f0000000080)=[{}], 0x1, 0x4c6, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', 0x0, r1, 0x4, 0x5, 0x3}, 0x50) 19m32.844534418s ago: executing program 38 (id=17287): syz_clone(0x2d300800, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/vlan/vlan1\x00') bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES64=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='jbd2_handle_extend\x00', r1, 0x0, 0x6}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[], 0x48) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) syz_open_dev$evdev(0x0, 0x9, 0xbebf80) socket$inet_tcp(0x2, 0x1, 0x0) r2 = epoll_create1(0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)=@o_path={0x0, r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0xa}) syz_usb_connect(0x4, 0x24, 0x0, 0x0) epoll_pwait(r2, &(0x7f0000000080)=[{}], 0x1, 0x4c6, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', 0x0, r1, 0x4, 0x5, 0x3}, 0x50) 13m38.970050792s ago: executing program 1 (id=23468): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x0) 13m38.899972853s ago: executing program 1 (id=23469): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) close(r0) r1 = socket(0x2b, 0x1, 0x1) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) close_range(r1, 0xffffffffffffffff, 0x0) 13m38.082180409s ago: executing program 1 (id=23500): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 13m38.012801581s ago: executing program 1 (id=23501): syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x200000, &(0x7f0000000100)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xffff}}]}, 0x3, 0x570, &(0x7f0000000c00)="$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") r0 = open(&(0x7f00000000c0)='./file1\x00', 0x14927e, 0x6) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x100000000000001, 0x8005, 0x0, 0x0, 0x19, 0x1c, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x203]}) fallocate(r0, 0x0, 0x0, 0x1001f0) 13m37.787364035s ago: executing program 1 (id=23505): r0 = mq_open(&(0x7f0000000040)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!Tnux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x80000000, 0x0) 13m37.578232559s ago: executing program 1 (id=23515): sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 13m37.57795935s ago: executing program 39 (id=23515): sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11m25.848609863s ago: executing program 6 (id=26037): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x10000000}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000180), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESDEC=r3]) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r4 = memfd_create(&(0x7f00000000c0)='-B\xd5N4\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\x8a\xd7Uw\x00\xbc\xa92\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x19\xea\xef\xe3\xe1@\x84\x13\xefZb:\x8f\t\x01B\xec\xde\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@Ip]D\xd6\r\xac\v#co\xd5\xb9\xc806\xa8\x99\xffs7\xa1b1\xb1;i)j\x0e\x1e\xedI\xa2\x80\x89\x1d\xd9p!\xc86s\xe07(\xee\xf9<\"\xf0\xc8\xae\x96J\xe2]\x01\x86\xb7.<\xf5N\xd3\x94W1\xff\x18z>\xa7q,\xf7\x96\xb8{\x8e\xbf4\xe0\x95\x1ce\xe4\x85\xcdi\xed\xd3>\xeb\xa5\xaf\x87\x90@\xd1\xbd`^\xfa\xb6\x9cj\x13/\xc5\\W\x04\br\x17X\xe3\xfb\xc8\xd4\xaeX\xc9s\xd18\xd9L\xbf\xa0\xa6\xdf2\a\x99i\xb1/\x19@\x1cq\xeb?\xc1z:\x913\xfa8\xac\xd3q\xe4vPGU', 0x1) r5 = dup(r4) write$binfmt_elf32(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c464a030103ff0700000000000002000300040000003e03000038000000d600000097700000fe03200001"], 0x3e) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1a, 0x2000000000000159, &(0x7f0000001100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5b90000180100002020640500000000002020207b1af8ff80000000bfa100000000000007010000f8ffffffb702000008000000c80300000000000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1002046, &(0x7f0000000700)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@journal_checksum}, {@data_err_ignore}, {@discard}, {@data_err_ignore}, {@nobarrier}, {@noblock_validity}, {@sb={'sb', 0x3d, 0x3ff}}, {@bh}, {@i_version}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}, 0xf, 0x579, &(0x7f0000000b80)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffd2d) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYRES64=r1, @ANYRES16=r7], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xd, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYBLOB="6e4d97200d4f96dbf9ba4fa276840bbf845728b9cc318d84407d8e3c13642e4d7d842a933b2be8113ff81c7c93371d7a9b66af1ebcfecef0616fc02b9a19238c5d0971b9371cb85caebb25580ee3", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r8, 0x0, 0xfffffffffffff001}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB='\x00\x00\x00'], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a31000000001400078005001500070000000800124000000000050005000200000005000400000000000d000300686173683a6e6574"], 0x5c}}, 0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff}, 0x4080) mount$9p_fd(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x4000, &(0x7f0000000900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r11, @ANYBLOB="0000000000000080af081a7b7a35bd4307838553a744458c3baa3096365c7a216d591503d43cb009d80d", @ANYRESHEX=r8, @ANYBLOB=',privport,debug=0x0000000000000080,\x00']) sendmsg$IPSET_CMD_ADD(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000090601060000000000000000000000000900020073797a310000000005000100070000001c0007800c00018008000140ffffffff0c000280080001407f"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) 11m25.752110585s ago: executing program 6 (id=26038): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) syz_mount_image$iso9660(&(0x7f0000000780), &(0x7f0000000000)='./file0\x00', 0x21488b, &(0x7f00000004c0)=ANY=[@ANYBLOB='map=acorn,sbsector=0x0000000000000000,uid=', @ANYRESDEC=0x0, @ANYBLOB="0000b18eb07a9dbec07d91edf772ce16e8f4545927e1e38533740c5b1da10b839e273fa468d364205a63adda5262cda8e690d1049c884d79e243210c733da8adfb6db6f3b3464aca805a08f3cacf9bce83fd7888eb1f09a8a7f55959926a7fd5ac27fd519bccdcfda872f503656169", @ANYRES16, @ANYBLOB="48aa122ce7bad1d4005fd66df97f8ec44bbc8f22ca2298ce346671617bb371da3c639abd9ee548b49a9c10009f28579f82efb3cf18d7e4f7d0cda9f6feec4c5df95db277defa1414ccf2075e6fd144cdc78c1f843f1574502ce415c27f3cec8893fe5950104e7d7b43440fd107294cf00fe8000000000000", @ANYRESOCT], 0x1, 0x65b, &(0x7f00000007c0)="$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") r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x90) getdents64(r1, &(0x7f0000000f80)=""/4096, 0x1000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2, 0x0, 0x3}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet_tcp(0x2, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x100) 11m25.637013767s ago: executing program 6 (id=26042): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0xfe, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x1e1802, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000080)=0x4) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000100)=0x2000004) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000600)="00214717db8300000000030600710a5eeb9d0471048beb00000000000000000000000000000094cb46291d6baae9e7b59552", 0x32}], 0x1, 0xee, 0x4000004) 11m25.558446079s ago: executing program 6 (id=26045): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) mq_open(&(0x7f0000000480)='!sel\x00\x00\x00\x10\x00\x00\x00\x00\xd7\\P\xc1\xde.O\xcb]0y\x00\x00\x00\x00\x00\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x196, &(0x7f0000000440)={0x2000000000002000, 0x2000001, 0x55, 0x3}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000"], 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) r5 = syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x5f}, 0x18) ptrace$pokeuser(0x6, r5, 0x358, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001400)=@newqdisc={0x3c, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x9}, {0xffff, 0xffff}, {0xfff1}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_ACK_FILTER={0x8, 0x10, 0x2}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40815}, 0x8d0) sendto$packet(r1, &(0x7f00000002c0)="44c33b69ebc9e05e9bdec0c286dd", 0xe, 0x830, &(0x7f0000000440)={0x11, 0x0, r4, 0x1, 0x2, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xe}}, 0x14) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000640)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x9, &(0x7f0000000180)={[{@nombcache}, {@jqfmt_vfsv0}, {@nobh}, {}, {@nojournal_checksum}, {@grpjquota, 0x2e}], [], 0x2e}, 0x6, 0x48d, &(0x7f0000000980)="$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") r10 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) r11 = fspick(r10, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r11, 0x7, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_VENDOR(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="ae8625bd8826f300000000010000000000006700010008000300", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4853}, 0x20000010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) r12 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r12, &(0x7f0000000000)='./file0\x00', 0x5) 11m25.321089893s ago: executing program 6 (id=26048): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000000c0)='kfree\x00', r3}, 0x18) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r5, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001ec0)=@newtfilter={0x27d0, 0x2c, 0xd3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0xb, 0xfff3}, {}, {0x7, 0x300}}, [@filter_kind_options=@f_flow={{0x9}, {0x27a0, 0x2, [@TCA_FLOW_ADDEND={0x8, 0x5, 0xb}, @TCA_FLOW_ACT={0x310, 0x9, 0x0, 0x1, [@m_nat={0x110, 0x1d, 0x0, 0x0, {{0x8}, {0xa4, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xce1, 0x1, 0x8, 0x3, 0x3ff}, @empty, @multicast1, 0xffffff00, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x781, 0x81, 0x20000000, 0x3, 0x6}, @local, @multicast1, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x6, 0xc269, 0x1, 0x1f05, 0xfffffffd}, @multicast2, @local, 0xffffffff, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0x8, 0x0, 0x196, 0x8}, @remote, @empty, 0xff}}]}, {0x45, 0x6, "18304ab44f1f9618a1489dca698fe81557581297437c25122012e576fd281744ba8532dcd8f15d671816de49ee761c9f24ce1ca9e9ff96bde44c3b297c5cfc6855"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ct={0x100, 0x8, 0x0, 0x0, {{0x7}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e21}, @TCA_CT_MARK_MASK={0x8, 0x6, 0xff}]}, {0xc5, 0x6, "e7c12a6d45b50e509af278b6db498a4287e13effc100e07352d11a98a3d411fdaedb576e17cb794d2995fb8486c2bc980ef1457faa42563f4663513bbdbca640f1df9254dd6d0c67794f7242a69956c54fe9bbb16dcfdfed48cf8a7a16e7c1060c3dcbe0ebc605a455ddddf82cb7f5df6bd983ea46ec13b6704e86786ad0e1459a6b1d72e4f05730dbf548fc84061615c3c197c7afc2769ecba115cfaae7deac4f84928b9776648617e8e452314b484b443ad952fb3d7ba09c3e803e012e0edce2"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_sample={0xfc, 0x18, 0x0, 0x0, {{0xb}, {0x14, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x7}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x7177eb9b}]}, {0xbe, 0x6, "bd848d582fdc687c456778544cfe993eed7cd16a0478f5b6fbd08aabb08826bc5ed9415e4d40a5d9de37b82d4e9eda08b114798c148dc691cd5648c83f84237a60af8c26f4bb2b8be180995cbc2e441374e4c1b1138a0b9d1ed683d60576ff512733e1a6104dffdc4c8d975836cf0b2457edf66c5748ede9ca7ba89c2c7a7c4d03692b542869466833de4bc29a854aefce2e3fc62ec52a4e06c07d916f1244338a6475858ea21ad49341e4dc4aa7901623343b6dfb0e7b3aeb5f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_FLOW_PERTURB={0x8, 0xc, 0x8001}, @TCA_FLOW_POLICE={0x1064, 0xa, 0x0, 0x1, [@TCA_POLICE_TBF={0x3c, 0x1, {0x135, 0x10000000, 0xfffffc00, 0x2, 0x401, {0x1, 0x1, 0x401, 0x401, 0x5, 0x5}, {0x4, 0x1, 0xfff1, 0x2, 0x7a, 0x5}, 0x0, 0x2, 0x4000}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3, 0x0, 0xaff6, 0x400, 0x7, 0x80000000, 0x9aa, 0xfffffffc, 0xfffff959, 0x1, 0x5, 0x4, 0x6, 0x2, 0x0, 0x8, 0xf, 0x10000, 0x1, 0x5, 0x435, 0x2, 0x49, 0xc, 0x5, 0x2, 0x2, 0x160c, 0xfffffffa, 0xd, 0x3, 0x5, 0x11, 0x5, 0x5, 0x8, 0xa, 0x4, 0x5, 0xee, 0x2, 0x8001, 0x4, 0x8d, 0x8, 0x7fffffff, 0x1, 0x7fffffff, 0x2, 0x4, 0xb, 0x80000001, 0x10001, 0xffff, 0x400, 0x800, 0x9, 0x9, 0x4, 0x2439, 0x9, 0x3, 0x4, 0x6b0, 0x401, 0x6, 0x5, 0x7fffffff, 0x0, 0xffff, 0x0, 0x8, 0xc, 0x34b9, 0x40000000, 0x4, 0xffffffff, 0x1, 0x8, 0x2, 0x0, 0x5, 0x8, 0x80000000, 0x2, 0xd, 0x7fff, 0x7, 0x0, 0x9a54, 0x0, 0x5, 0x81, 0x7fff, 0xf64d, 0x40, 0x4, 0x6, 0xf, 0x0, 0x1, 0x101, 0x297, 0x530, 0xe, 0x9, 0x50000000, 0x8, 0x0, 0x4, 0x6, 0x0, 0x1, 0x10000, 0x1, 0x2, 0x8, 0x4, 0x89a, 0x2, 0x2cc8, 0x401, 0x400, 0xfffffff8, 0x762, 0x7, 0x49, 0x3ff, 0x4, 0x3, 0x6, 0xfffffffe, 0xa2e, 0x6, 0x4, 0xb, 0x5, 0x5, 0x1, 0x400, 0x7, 0xbc, 0x9, 0x49a, 0x2, 0x90a, 0x7, 0x101, 0xb, 0x80000000, 0x16ab, 0x3, 0x0, 0x0, 0x1, 0x3, 0x3, 0x1, 0x200, 0x400, 0x8, 0x1, 0x11f5, 0x81, 0x966, 0x80d, 0x8, 0x5, 0x5, 0xff, 0x7fffffff, 0x2, 0x4, 0x8, 0x4, 0x0, 0x8, 0x502, 0xe0, 0x1, 0x7, 0x3c, 0xfffff622, 0x7, 0x5, 0x6, 0x4, 0x0, 0x40, 0xfffff38f, 0xfff, 0x7, 0x5, 0x9, 0x3, 0x7, 0x8, 0x5, 0xffffffff, 0x5, 0x5, 0x2, 0x8000, 0x401, 0xf, 0x5, 0xde, 0x3ff, 0x9, 0x6, 0x81, 0x6, 0x7f, 0x101, 0x5, 0x9, 0x5, 0x1ff, 0x6, 0x64, 0x6, 0x5, 0x4, 0x7, 0x1ff, 0x8, 0x6, 0x6, 0x5, 0x6, 0x1ab, 0x6, 0x0, 0x5, 0x2, 0x8000, 0x2, 0x800, 0x2, 0x800, 0xd24, 0x2, 0x10001, 0x4, 0xb989, 0x2, 0x8, 0x336, 0x7, 0x7, 0x9, 0x2245, 0x1, 0x0, 0x3, 0x6]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x4, 0x2c7, 0x3, 0xd, 0x400, 0x6, 0x6, 0x1, 0x7f, 0x4, 0x5, 0x5, 0x8, 0x3, 0x10000, 0xc414, 0x8, 0x0, 0x1d6, 0x3, 0x0, 0x5, 0x2, 0x7, 0xffff, 0x1000, 0x5, 0xe9, 0x2, 0x7ff, 0x2, 0x5, 0x3, 0x8, 0x2, 0x163, 0x7, 0x4, 0x3fa8, 0x3, 0x9, 0x3, 0x8001, 0xa62b, 0xff, 0x8, 0x69, 0x3, 0xb, 0x55fb825d, 0x1ff, 0x0, 0x5, 0x3, 0x5, 0xffffffff, 0xa, 0x80000, 0x7, 0x1, 0x7, 0x10000, 0x1, 0x7, 0x8, 0x4eb, 0xa, 0x2, 0x6, 0x2, 0x9, 0x6, 0x1, 0xd63, 0xfffff69d, 0x6, 0xab, 0x7, 0x49d7331b, 0x6, 0xb, 0xb, 0x7, 0x7, 0x0, 0x3, 0xc50e, 0x4c, 0xa582, 0x52a227da, 0x101, 0x7fffffff, 0x2, 0xd11, 0x7f8000, 0x0, 0x0, 0x10200000, 0x4, 0xf, 0x346, 0x10, 0xcf6f, 0x89b, 0x5, 0x200, 0xb, 0x7fff, 0x1, 0x100, 0x101, 0x1, 0x10, 0x81, 0x3, 0x7ff, 0x5, 0x6, 0x2, 0x9, 0x4, 0x7fff, 0x8a69, 0xa97c, 0x7fff, 0x40, 0x3, 0x8, 0xfffffff8, 0x5, 0x1, 0x4, 0x0, 0x1000, 0x4, 0x4c52d800, 0x5, 0xda, 0x10, 0xc1b, 0xfffffd57, 0x7b, 0xffffff8d, 0x27f200, 0x1, 0x9, 0xa, 0x6, 0x8, 0x400, 0x7fffffff, 0x80000001, 0x6, 0x4, 0x9, 0x7, 0xfffffffd, 0x40, 0x6, 0x6, 0x5b72, 0xfffff761, 0x9, 0x7, 0x6, 0x2, 0xf70, 0x4, 0x5, 0xd5, 0x8, 0x4, 0x5, 0x8000, 0x3ff, 0xaeb3, 0x6, 0x5bf916dd, 0x84, 0x401, 0xd8, 0x2, 0x6, 0x8, 0x4, 0x1, 0x200, 0x5, 0x400, 0x7fffffff, 0x1, 0x9, 0xd8, 0x1, 0x29d3, 0x9, 0xd9, 0x6, 0xffff7fff, 0xfff, 0x6, 0xfffffff2, 0x81, 0x4, 0xd, 0x0, 0x5, 0x8, 0x9, 0x10000, 0x4, 0x1ff, 0x48f0, 0x7ec00000, 0x89, 0x3, 0xfffffffc, 0xff, 0x4, 0x9, 0xb8, 0x20, 0x7, 0xde92, 0x0, 0x4, 0x2, 0x1, 0x4, 0x7f, 0x2, 0x4, 0x9, 0x1, 0x2e, 0x9, 0x3, 0x8, 0x6, 0x8, 0x6, 0x1, 0xdd, 0x9, 0x9, 0x3, 0x6465, 0x7, 0x10000, 0x9, 0x3ff, 0xd, 0x2, 0x2c, 0x4]}, @TCA_POLICE_RESULT={0x8, 0x5, 0xff}, @TCA_POLICE_RATE={0x404, 0x2, [0x3ff, 0x4c, 0x1, 0x0, 0x88fd, 0x1ff, 0xffff954b, 0x4, 0x6, 0x7, 0x3, 0x3ff, 0x8, 0x7, 0x4d9e, 0x4, 0x6, 0x1, 0x7fffffff, 0x2, 0x7, 0xd, 0x0, 0x7, 0xffff, 0x4a3, 0x3, 0x3, 0x1c64, 0xfffffffc, 0x8, 0x2, 0x6, 0xffffffff, 0x7, 0x3, 0x6, 0xe704, 0x1, 0x7, 0x8, 0x10001, 0x8, 0x8, 0x8, 0xfffffff8, 0x2, 0x9, 0x9, 0x1, 0x6, 0x7, 0x0, 0xffffffff, 0x5b0, 0x4b2e, 0x90c7, 0x9, 0x0, 0x8, 0x5, 0x2, 0x4919, 0x1, 0x8, 0x7bdc, 0xfaa, 0x5, 0xfffffffb, 0x2, 0x3, 0x2, 0x80, 0x8ba, 0x9, 0x4, 0x6, 0x8, 0x200, 0x4, 0x3, 0x3, 0x4, 0x6, 0x6, 0x4, 0xa, 0x3, 0x3, 0x6, 0x570d, 0xc, 0x80, 0xb2b, 0x4, 0x7, 0x80000001, 0x40, 0xf, 0x40, 0xffffffff, 0x8000, 0x55f9, 0x8, 0x6, 0x52, 0x0, 0x3, 0x80, 0x401, 0x8, 0xd79, 0xe10d, 0x0, 0x9, 0x76, 0x1, 0x8000, 0xe, 0x6, 0xfffffffb, 0x2af, 0xc3, 0x7fffffff, 0x7, 0x4, 0xffffffff, 0xf6300, 0x1, 0x7, 0xa8b, 0x9, 0x0, 0x4, 0x5, 0x200, 0x401, 0x9, 0x7, 0x4, 0xfffffffd, 0x80, 0x101, 0x3, 0x3, 0x7, 0x2, 0xb, 0x5, 0xf, 0x5, 0x8, 0x7556, 0x5, 0x2, 0x5, 0x7, 0x2, 0x3, 0x4, 0x6, 0xa70b, 0x1, 0x8, 0x7, 0xb7, 0x401, 0xffffffff, 0x81, 0x5, 0x5, 0x5, 0x0, 0x3, 0x1, 0x4, 0x8000, 0xc639, 0x3, 0x0, 0x80, 0x80000000, 0x1, 0xffffffff, 0x5, 0xfffffffb, 0x6, 0xfffffff9, 0x7fffffff, 0x1, 0x1, 0x8, 0x8, 0x7, 0x9, 0x7, 0x9, 0xfff, 0x5, 0x8, 0x101, 0x3, 0x40, 0x3ff, 0x8, 0x2321, 0x0, 0x3, 0x0, 0x8, 0x69495da9, 0x8, 0x1, 0x4, 0x2, 0x584, 0xe902, 0x6, 0x87, 0x9, 0xf, 0x9, 0x400, 0x5, 0x7, 0xbc, 0x80000000, 0x1000, 0x9, 0x4, 0x1ff, 0x533, 0x200, 0x7f, 0x4, 0x4, 0x7, 0x1000, 0x2a, 0x7fff, 0xc1000000, 0x9, 0xf, 0x1, 0xf, 0x2, 0x9, 0x6, 0x1, 0xfffffff8, 0x6, 0x2, 0x1, 0x2, 0x3, 0x3]}, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x9f, 0x0, 0xc8, 0x101, 0xb4b, 0x1, 0x5, 0x81, 0x77b0fff4, 0x6, 0x3, 0x6b8ad3d6, 0x0, 0x8, 0x6, 0x1, 0x4, 0x8, 0x4, 0x20ce, 0xff, 0xfff, 0x1, 0x10000, 0x9, 0x7, 0xff, 0xd7e, 0x7fffffff, 0xc44, 0x1, 0xdad, 0x80000, 0xffff, 0x1, 0x48000, 0x8, 0x9, 0x8, 0x6, 0xb, 0xd8, 0x3, 0x2, 0x0, 0x8, 0xa, 0x0, 0x1ff, 0x1, 0x4, 0xc, 0x1, 0x3, 0x6, 0xffffff7f, 0xffffffd1, 0x5, 0x1ff, 0xfffffff9, 0x6e, 0x3ff, 0x6, 0x3, 0x2, 0x800, 0x2, 0x2, 0x400, 0x2, 0xa, 0x9, 0x98a, 0x9, 0x8, 0x6, 0x3, 0x6, 0x9, 0x6, 0xf, 0x1, 0x7, 0x401, 0x1, 0x7ff, 0x200, 0x9, 0x0, 0x8000, 0xbd, 0x3, 0x5, 0x7, 0x5, 0x7, 0x200, 0xf600000, 0x8, 0x335, 0x5, 0x3, 0x2, 0xbc79, 0x40, 0x9df2, 0x5, 0x2, 0x8388, 0x800, 0x1, 0x7, 0xffff, 0xc, 0x2, 0xa1, 0x7, 0x7, 0x1, 0x6, 0x2, 0x6, 0xffffff3f, 0xbf, 0x8, 0x3, 0x3, 0x3, 0x4, 0xffff, 0x0, 0x2, 0x1, 0x8, 0x0, 0x5, 0x5, 0x8, 0x7, 0xcd9d, 0x3, 0xb9f, 0x9, 0x25, 0x3, 0x2a7, 0x6, 0xf, 0x3, 0x80, 0x400, 0x5, 0x8, 0x7, 0x40, 0x1, 0x2, 0x9, 0xe, 0x6, 0x3, 0x6, 0x1, 0x800, 0x0, 0x5, 0x7fffffff, 0x3e0, 0x8, 0xfffffffb, 0x0, 0xfffffffa, 0x67, 0x80, 0x3, 0x9, 0x81, 0xd269, 0x200, 0x280, 0x1, 0x8, 0x4, 0xfff, 0xe674, 0x8, 0x0, 0x9, 0x3, 0xb79b, 0x21, 0x2, 0x7, 0x8, 0x401, 0x5, 0x4, 0x4, 0x6, 0x2, 0x1, 0x5, 0x9, 0x2, 0xf2d, 0x8, 0x1, 0x0, 0x1, 0xc843, 0x2, 0xffff, 0x7, 0x6, 0x9, 0x4, 0x1, 0x7, 0x1000, 0x0, 0x8, 0x9, 0x6, 0x400, 0x93, 0x88ef, 0xbee, 0x1, 0x4, 0xfff, 0x3, 0x41, 0x4, 0x8, 0x8, 0x6, 0x3, 0x8, 0x0, 0x0, 0x2, 0x6, 0x6, 0x9, 0xc, 0x9, 0x8, 0x7fff, 0x7, 0xb, 0x800, 0x5, 0xffffff80, 0x6, 0xff]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x8000000000000001}]}, @TCA_FLOW_ACT={0x1418, 0x9, 0x0, 0x1, [@m_connmark={0x138, 0xa, 0x0, 0x0, {{0xd}, {0xc8, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5, 0x8, 0x4, 0x8, 0x6}, 0x2}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xf, 0x5, 0x7, 0x4, 0x3}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0x4, 0x20000000, 0x2, 0x1000}, 0x43}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x9d, 0x5, 0x6, 0x6c6, 0x7b1}, 0x1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x290, 0x7, 0x0, 0x800, 0x9}, 0x3}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0x3, 0x5, 0xf22, 0x8}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1ff, 0x9, 0x20000000, 0x1, 0xc85}, 0x7}}]}, {0x44, 0x6, "e17d49adf651f09e4dd321dc675f0295a2a64ff2f57e63a2ccbdcf4cb59739daf88b8da5992087667bd700ff5379c228e9c0d504a74a3daad9e5037533be9e81"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_mirred={0x114, 0x1f, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x400, 0x3ff, 0x1, 0xffffffff, 0x2}, 0x2, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xd23, 0x7, 0x6, 0x7, 0x3}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0x3, 0x2, 0x81, 0x3}, 0x1}}]}, {0x88, 0x6, "722d62da0b02cebd6e50c9fbd6c6cc21c0a61c7060dcb12137920f1986be27578182d81856d022dce9041071d25172093bbe56bb2650e08f7c31701f7f5c80e3331d32cc8c87fc568c3d32ebc89df9ba9371bac86369067f8ad95c3fd8ab079b36af4e12c275e087bdc5302e02cf32802034cdbf2abfbd992d64d9d7f9c22dd7cc933275"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}, @m_csum={0xac, 0x14, 0x0, 0x0, {{0x9}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x1, 0x7, 0x2, 0x3, 0x6}, 0x3e}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3f1cc17f, 0x1000, 0x20000000, 0x6, 0x10000}, 0x18}}]}, {0x48, 0x6, "c974d37b6d60bba62e591bccaad216169dcf1fd3977795c7fe14e1ba74d8b92d5588b330ab5060570777bfea943f913d9558ecd2e4107d8d932adb5d32fb3731365dc024"}, {0xc}, {0xc, 0x8, {0x4, 0x1}}}}, @m_ctinfo={0x10c, 0x11, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x5}]}, {0xd5, 0x6, "4abaa3fd847f932880dcf977c836c930ee7481d4f61ac5bb4f77af436148f002b43f279ec5a808ab757dc192bb067f870b1e0dcd3e90271f539011230665c13bda8d4c5edd1ac8722c1ff7e1aa31f5fb3bef425bad4ba049d1184fa274e0cb093b488cccca427c2e8e4fd60f780b0bbf21b69a307a72628139c02bc83d18b1fd14cbdab524762f438f4a5241fd71e9bc287c395f96830cff9901a5e525d42f58bac31459f6b30e60ba8eaf26d5206dcd35ecec7d14b225a71dda3642868a4f744c8af4cd429c929310463a1bf8ff3e8f2d"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_ct={0xfc, 0x11, 0x0, 0x0, {{0x7}, {0x80, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x3, 0x2, 0x6, 0x6}}, @TCA_CT_MARK={0x8, 0x5, 0x1f0}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e21}, @TCA_CT_LABELS_MASK={0x14, 0x8, "8efb6fd299598e0b72b1f5089beffbde"}, @TCA_CT_ACTION={0x6}, @TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @private=0xa010101}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @loopback}, @TCA_CT_LABELS={0x14, 0x7, "b82813bcd58e23f3ab19d10a693393cc"}, @TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @multicast2}]}, {0x55, 0x6, "b619585b7ca2780a8909302a4b8f3a5a7716bed5acdfc5c34a66aebbf71e84064cccd560e514ddc6b4e558db7fe7017202ba846e7d071f65963c062ad78a98012fa50d5521bcc1fe57ce49c907c56894e9"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_xt={0xd9c, 0x4, 0x0, 0x0, {{0x7}, {0x174, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_TARG={0xc0, 0x6, {0xa, 'filter\x00', 0x0, 0xb0, "2977bb07a9a950ca407663da3063c2e5f2e71fc6fea915a607223392eb0923f42a1ea36de5f54b81707355ff029196bee170b10ae64e27a894ca05b34b11583201bec5c664283e159284b2192daae7b2f053df4223c9156bb22495819daada4b59f2655ce42847255736a064798a6fb69bb02883bb5db340c038519962f93ea3de12d8dadaefff2e3842c71050276f8a12542e29f3ce"}}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_INDEX={0x8, 0x3, 0x6}, @TCA_IPT_TARG={0x97, 0x6, {0x2, 'security\x00', 0x2, 0x64, "58a25b662257944d974a8aaee2c448f9f1309c0719051ece7ab774e1e4689e243b51843e35a9857ad101740c261967342966126261213acfb64298f29d74b718743e23219f0696e825eb3bfcbf2dc81d2f02aabdca48862beb1b6a0205aefec67482ad4416fd52c94ba31eea4e"}}]}, {0xc04, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_csum={0xe4, 0x15, 0x0, 0x0, {{0x9}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x400, 0x0, 0x7, 0xffffffff, 0xb25}, 0x33}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x5, 0x75, 0x2, 0x4, 0x2}, 0x59}}]}, {0x7e, 0x6, "87c33cb12fb7ef9dcd9c1cbc41bcb3da2a3df2e335a168b50edabc64946df920a5174f135b739f2d4d1a89cd99e8aea892f0757356e86f333b4fd0f2bc6d8af2ef0effe4590610a4f3fc0a3a0434c7d35918cbe13c9b63fe650e3f13c63b81394183bfe07bf611b75630dcfda52e2533083173b26303411bfe59"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_skbedit={0x94, 0x1b, 0x0, 0x0, {{0xc}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x401, 0x1000, 0x4, 0x551aa13e, 0x7}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x7, 0x7}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x10003, 0xc}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6}]}, {0x38, 0x6, "f2cad1e5e20b2e3b333ec794f0eb27b674300746cabcbd8aa0819910c91979f682256fefbbd5f25c75e69f74fd8fde4a48b2fdb5"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x5, 0x2}}}}]}]}}]}, 0x27d0}}, 0x0) 11m24.869651513s ago: executing program 6 (id=26055): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0xfe, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x1e1802, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000080)=0x4) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000100)=0x2000004) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000600)="00214717db8300000000030600710a5eeb9d0471048beb00000000000000000000000000000094cb46291d6baae9e7b59552", 0x32}], 0x1, 0xee, 0x4000004) 11m24.860091602s ago: executing program 40 (id=26055): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0xfe, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x1e1802, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000080)=0x4) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000100)=0x2000004) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000600)="00214717db8300000000030600710a5eeb9d0471048beb00000000000000000000000000000094cb46291d6baae9e7b59552", 0x32}], 0x1, 0xee, 0x4000004) 10m58.494397989s ago: executing program 5 (id=26572): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYBLOB="6d61703d61636f726e2c6d61703d61636f726e2c686964652c73686f776173736f632c6e6f726f636b2c6d6f64653d30783030303030303030303030301b3030662c636865636b3d7374726963742c686964652c6d61703d61636f726e2c00"], 0x0, 0x41e, &(0x7f0000000ac0)="$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") mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9b301a, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) umount2(&(0x7f00000003c0)='./file0\x00', 0xa) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000040)=""/81, 0x51) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) mount_setattr(r2, &(0x7f0000001d80)='.\x00', 0x8800, &(0x7f0000001dc0)={0x0, 0x0, 0x80000}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x7, 0xe, 0x2, 0xfffffff8}]}) 10m58.45431568s ago: executing program 5 (id=26574): r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0xfffffffc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2, 0x4}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000000380)={[{@errors_remount}, {@discard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5e}}, {@noauto_da_alloc}, {@bsdgroups}, {@jqfmt_vfsv1}, {@abort}, {@data_err_ignore}]}, 0x1, 0x476, &(0x7f0000000540)="$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") 10m57.609194227s ago: executing program 5 (id=26590): syz_clone(0x2d300800, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/vlan/vlan1\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYRESHEX=r2, @ANYRES64=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1, 0x0, 0x6}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[], 0x48) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) syz_open_dev$evdev(0x0, 0x9, 0xbebf80) socket$inet_tcp(0x2, 0x1, 0x0) r3 = epoll_create1(0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)=@o_path={0x0, r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000400)={0xa}) syz_usb_connect(0x4, 0x24, 0x0, 0x0) epoll_pwait(r3, &(0x7f0000000080)=[{}], 0x1, 0x4c6, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', 0x0, r1, 0x4, 0x5, 0x3}, 0x50) 10m55.742885625s ago: executing program 5 (id=26620): timer_create(0x2, &(0x7f0000000040)={0x0, 0x30, 0x2}, &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r3 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f00000002c0)={[{@barrier}, {@nodioread_nolock}, {@noquota}, {@barrier}, {@auto_da_alloc}, {@nodioread_nolock}]}, 0x1, 0x599, &(0x7f0000001280)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r5, &(0x7f0000000140)="12", 0x1, 0x1000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r4, 0x0) truncate(&(0x7f0000000680)='./file1\x00', 0x2) timer_settime(r0, 0x1, &(0x7f0000000100)={{r1, r2+60000000}, {0x0, 0x989680}}, &(0x7f0000000140)) r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$cont(0x7, r6, 0x1478, 0x350) kcmp$KCMP_EPOLL_TFD(r6, 0x0, 0x7, r4, &(0x7f0000000200)={r5, r3, 0x9a}) r7 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000b, 0x12, r7, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000280)={0x3, &(0x7f0000000240)=[{0x4, 0x0, 0x3, 0x1ff}, {0xe5, 0x8, 0x7, 0x7fff}, {0xe, 0xde, 0x4, 0x1}]}) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r8, 0x0, 0x4}, 0x18) mlockall(0x3) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b4000000000000006111cc000000000006000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0xf, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 10m55.060656088s ago: executing program 5 (id=26628): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt(0xffffffffffffffff, 0x84, 0x81, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./file1\x00', 0x1808004, &(0x7f0000000180)=ANY=[@ANYRES16=0x0, @ANYRESHEX], 0x4, 0x7e2, &(0x7f0000000f40)="$eJzs3U1sHOXdAPD/ODEJRsqLeF/lfRWFMAm8UpDArNdg6nKAZT22B9a71u66SlRVNAIHWXGAQlFLLhBVgrZqVfXUI+XKrTeqSq3UQ9tTpXLopTckThWV+iWqCsnVzK4Tf+zaSXDM1+9n2c/szH/meZ7Z8fxn1t5nAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACIpD5TqUwk0ci/sXQmHa4+024t7LB8fXu/2lRs8timeiOS4jsOH44P/96b9z9XFx8tfpyK471Hx+NwURyOS7cdvf2R/z44sr7+Dg26USevMS6JeK1o1IVzq6vLL96Ehuyj7//iulf511rxcy5r5p1WvlCby9K800qnp6YqD8zPdtLZvJF1zna62UJab2e1bqudnq7fm05MT0+m2fjZ1lJzbqbWyNZnPnx/tVKZSp8YX8xq7U6r+cAT0anP541G3pwrY6qVb0UR83BxID6Zd9NuVltI0/Mrq8uTG1qVDGpqETQxaMGB3vFz/J7b33/5vb+tLBcH5LD+Jv0DszoxUa1OTD00/dDDlcrBaqW6eUZli7gSESMRRcRNOWj5DNnbEzh8DCP9/B+NyKMZS3Em0i1foxExGvWYiXa0YqGY98fRbVF96/n//x/4y+93qndj/u9n+cMbFh+LMv+f6D06MSz/b2vFjl+j1xV9TV8vxStxKS7EuViN1ViOF/d2+4f2vMUjH3cLyaZHc5FFM/LoRCvyWIhaOSftz0ljOqZiKirxVMzHbHQijdnIIyKLTpyNTnQjK4+oerQji1p0oxXtSON01OPeSGMipmM6JiONLMbjbLRiKZoxF/dHLRqRxflYKff75JZWHr01fv7sH95/s5i+EjSxU7eKi7ki6K87BG1L9zvm/7W14npha4T8/0W39ydxuEFr6/kfAAAA+NxKylffk/Il/jvLqdm8kX31GtbsHtyH5gEAAAB7oPzL//GiGC2m7oykuP+vDIh8d9/bBgAAAOyNpHyPXRIRY3FXb+p8rMRrsRyDXgQAAAAAPoPKv/+fKIqxiFfLGevDpbj/BwAAgM+J7w4bY/+99TF2O4uHkl+WYwAnlxfP3JNcrBVxtYsHeuv1i69c2WJ39lhypL+Rspg6eOm2JCIO1rPjyfrolx8d6pUflD+PXR1LYNhY/0m7vWMDYucGlI/iB3GyF3PymV75TH9J0qtlbDZvZOP1VuORckjE4rv78nMr344oav9ec+FIEudXVpfHn35+9ZmyLZeLrVy+2B9AcdM4imv/tWNb1vp7IO4c3OPR8o0Y/XrHevVWNvZ/pFz732vlOLND+59srPP1ONWLOTXWK8fWl/TqPFzUOTH+yETUakdGutmZ7strG3rfb8XEbj3f5Vl4Pe7uxdx9+u5eMaAV1U2teG57K6obW9HbFzEScWQvWvHmyVfP/PM3rSSb3K0Vk4NbMXBfrB2I2NoKgE/K+XLUn6tZ6NYyCxVJpVDk/y1599b1NYed5Taca/9xtZbeVcZH/c1GxIZcdzC2Zver27627L4WvTP66V7M6d71xMFjA/JKZcAZ/YWVF37bP6M/+PZPfvq1E7/7WVnvDWW3t+PeXky/iDt+PSTHFn3+4Zas+laxxlsD6y2uwTqNahKXIw588+ILcfSlVy7dv3Lx3LPLzy4/V61OTlUerFQeqsZoeanQL3ZoKQBfXLt/xs7QiFv6m0geHHZX3c94d1z5l4LxeDqej9UorgDu6sXetb3ed4o78Q3/hnDfLnetYxs+4eW+Xe4tr8ZWt8cmMSR2csMe+98fl8WHN+XpAIB9cWqHPLxL/r/yyvx9u9x3b87lW+6OY3guH+RLN3VvAMAXQ9b+IBnrvpG02/niUxPT0xO17nyWtlv1J9N2PjOXpXmzm7Xr87XmXJYutlvdVn39heOZrJN2lhYXW+1uOttqpzHSyc+Un/ye9j/6vZMt1JrdvN5ZbGS1TpbWW81urd5NZ/JOPV1ceryRd+azdrlyZzGr57N5vdbNW82001pq17PxNO1k2YbAfCZrdvPZvJhspovtfKHWvhwRjaWFLJ3JOvV2vtht9Ta4XlfenG21F8rNjm/v/p/3e38DwKfBS69cunBudXX5xRub+NO1BH/SfQQANpOlAQAAAAAAAAAAAADg02/72/WKuR/jHYHXN3EobnoVn82J4lm47rW+3B+SsTenmPq0dGf/J0Z7ff/6o49eGBbz+Kv/N39tGxz8mzLora5vHIm45Z0f9eY8Njz4O/3fv73p8rs3crRcurCW7BCz6TRxy/6elQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgsP8EAAD//2ruZ0o=") r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x18) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') r2 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0) write$binfmt_script(r2, &(0x7f00000003c0)={'#! ', './file0'}, 0xb) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r3, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80511, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x7, 0x8}, 0x0, 0xfffe, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r5 = syz_io_uring_setup(0x495, &(0x7f0000000a40)={0x0, 0x34eb, 0x0, 0x0, 0x20e}, 0x0, &(0x7f0000000680)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0x3, 0x0, 0x4) syz_io_uring_submit(0x0, r6, &(0x7f00000002c0)=@IORING_OP_UNLINKAT={0x24, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x200}) io_uring_enter(r5, 0x40f9, 0x217, 0xa5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000010000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r7}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00'}, 0x18) syz_open_dev$tty20(0xc, 0x4, 0x1) 10m54.924045281s ago: executing program 5 (id=26633): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='objagg_obj_root_create\x00', r1, 0x0, 0x5}, 0x18) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x100000, 0x2, 0x800000, 0x3, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xa0}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="240000001900010028bd7000fbdbdf251d01020008000900", @ANYRES32, @ANYBLOB="08000a00e1"], 0x24}, 0x1, 0x0, 0x0, 0x4048855}, 0x30004016) sendmmsg(r4, &(0x7f0000000000), 0x400000000000235, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x5c, r5, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x9}, {0x4}}, {0x8}}}]}}]}, 0x5c}, 0x1, 0xf000}, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000280)={0x0, 0x4}, 0xe) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={r6, 0x5, 0x9, 0x7f, 0x81, 0x1}, &(0x7f0000000100)=0x14) r7 = open(&(0x7f0000000240)='.\x00', 0x0, 0x0) r8 = syz_open_dev$usbfs(&(0x7f0000000140), 0x77, 0x3501) ioctl$USBDEVFS_SUBMITURB(r8, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x81, &(0x7f00000004c0)={0x4b5a9da54893e123, 0x3, 0x19, 0x2}, 0x8, 0xfffffffc, 0x40008, 0x0, 0x0, 0x40, 0x0}) close_range(r7, 0xffffffffffffffff, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000004c0)={'erspan0\x00', 0x0}) sendto$packet(r9, 0x0, 0x36, 0x0, &(0x7f0000000140)={0x11, 0x0, r11}, 0x14) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x103003, 0x0) 10m54.923800561s ago: executing program 41 (id=26633): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='objagg_obj_root_create\x00', r1, 0x0, 0x5}, 0x18) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x100000, 0x2, 0x800000, 0x3, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xa0}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="240000001900010028bd7000fbdbdf251d01020008000900", @ANYRES32, @ANYBLOB="08000a00e1"], 0x24}, 0x1, 0x0, 0x0, 0x4048855}, 0x30004016) sendmmsg(r4, &(0x7f0000000000), 0x400000000000235, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x5c, r5, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x9}, {0x4}}, {0x8}}}]}}]}, 0x5c}, 0x1, 0xf000}, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000280)={0x0, 0x4}, 0xe) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={r6, 0x5, 0x9, 0x7f, 0x81, 0x1}, &(0x7f0000000100)=0x14) r7 = open(&(0x7f0000000240)='.\x00', 0x0, 0x0) r8 = syz_open_dev$usbfs(&(0x7f0000000140), 0x77, 0x3501) ioctl$USBDEVFS_SUBMITURB(r8, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x81, &(0x7f00000004c0)={0x4b5a9da54893e123, 0x3, 0x19, 0x2}, 0x8, 0xfffffffc, 0x40008, 0x0, 0x0, 0x40, 0x0}) close_range(r7, 0xffffffffffffffff, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000004c0)={'erspan0\x00', 0x0}) sendto$packet(r9, 0x0, 0x36, 0x0, &(0x7f0000000140)={0x11, 0x0, r11}, 0x14) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x103003, 0x0) 10m27.853044782s ago: executing program 8 (id=27213): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffff}, 0x1320, 0x0, 0x3, 0x5, 0x0, 0x800001, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x8) read(r1, &(0x7f0000003e40)=""/248, 0xf8) sched_setaffinity(0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5, 0x0, 0x59}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x4b46, &(0x7f0000000200)={0x1, 0xb2, 0x2}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r8}, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r8}, &(0x7f00000001c0), &(0x7f0000000300)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4048000}, 0x44450) sendmsg$NFT_BATCH(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a80000000060a0b0400000000000000000200000054000480500001800a0001006d6174636800000040000280080002400000000124000300d67a8527f76ec1d39e537c4c3060c6a405106c72848aa8bcb429b3a20d5324520e000100636f6e6e6c696d69740000000900010073797a30000000000900020073797a32"], 0xa8}}, 0x4048010) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r7) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="796100000000000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x4000054) 10m26.613260637s ago: executing program 8 (id=27233): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000400000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0xfffc, 0xa305]) 10m26.416709951s ago: executing program 8 (id=27235): r0 = socket(0x10, 0x803, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x4, 0xc}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='kfree\x00', r4}, 0x18) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) r6 = socket(0x400000000010, 0x3, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@newtfilter={0x24, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0x5, 0xfff3}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0xb380, 0x4, 0x0, 0xd87, 0x6}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x0) 10m26.157699766s ago: executing program 8 (id=27242): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0x3, &(0x7f0000000380)=ANY=[@ANYRES8], &(0x7f00000003c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x2d, 0x0, @val=@netfilter={0x2, 0x0, 0x6, 0x1}}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r3, 0x0, 0x0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$read(0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7e}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000400000006a0a80fe000000008500000053000000b7000000000000009500001000000000a80501363034fdb117168bd07ba00af739d1a1ee35fe163a255c33282044b32495ef8ab9adc67ccc945f105d802f5132143c0a9fc7a84452569957c1002ed7d4d8e17f791f4798c8eb483e9973320d046c3126c6afcfd84de03352c69b3edff5be26f8ffa5f8f2879021c2ea53ea79acd7fb38dd1abb75aa393cea26d465637d11f705000000473e7b7c4ae7dd5e4dee88518ddf12dddd4bfc6a4dd3b6beba51074229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff2357ef17f95a25780c3a057844f226ef4e912f01a201e694e3806e8c70e8b69524cd19f7525d8d66bb766f7f3f918c86a70252236800001897133af94a5a4cfc794d8b9d7c33632152c48eaf302f0b2e0c252b00000000000000006f1bbefbe08de65e3762e194ba4cae8b13535d7d11ee917bca4885bbf597a14ab2458efce78510d86272d88e0c8088f404f011289ebc5623faa1182632161e073af1d69a2e36bed435000025ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222674280f55e98107450c19b9d86329bd5b4697336112b0b8754ce3574046bf6114d1a88597850b77378fa8edfff8faf8b8ec039bab385cac0535373bb8fab90539b1a65ddff841eb671f3faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4f189edbf9fb7c42b1f435ccd4d96822e6b70100912c92e3943e9c4f45d8bcd528fa8a3ea847f10e9b2506f3bb506f1d7fbde8010000000000a073d0de5538ab42e170b3baae34c35987b0dda497ac3f5e97e6e6aeea15c6d5ed24310100000003bb6030f84b63aaf8690db0221b1705c501f802ff59b4e683efa4b6e77e042072bd2ac37d413008ec9eb8166f6e28b49a77ed91befc65315896f88a8fb1dd679fb4c515f8b7a5b7aca6a251a89d47b728502f7e621cc0e3ba04000000c149ee6601728c750d304197c22da8650579475afd96187d881e93b42a5fdfd686d8900c44c67133dad58037fda65885a15a429edfe3027a5ebf95254744f10fd607bc3300b94932b8d944e0b083bbd86b19cb074577a25ff581d92af08a06f857310a2f14326b0b290205e91a682e00c8762cbc6b904c980eef6e6a1def886c95676dce6a8194479700a02b92bdc8d05eae1f24fdd7b80d1bb404c22f681594de2ebb9687219de8d73ac83823feb402a2415a9850d5f0183ec67be96dc0e4c2d7acf1dfe79d6771903b76e21190c22d641030e1ddacf006c3116e1803af20a5f2b5f7ba58aca5bcabbbab24414a3810788e5503e4be66d683daac5f0001000077339b4200000000108a3c87b19d5b9a00c75d84a92d6dcf00ba96edf35ede0e2b57c26e94801b498924166bde57d5f24258d9fd028096cc15a8b912b494d4bbe609031ea1ca65a548971d5d16296dd08e020000007a27310d5d01f8a8a0f5212d7f628f554afea715ccbc66cbb1016490f5d579308cb3188cf2fcaf67e0c16443d526ba4b968f07ae362c2133c168313e84beb871203880dd453c45d0a137d7f5a8b039dbfa62fb2b4214f8e69f967bf1fbd89e77fcca110000000800000000000000f8877994ebdc35f7efd41e3babd9b3782edd6776d5b6cb4ecd72c9de9b5503747d71440378cf2c2c7ea2dc5febb654a867f853713cf4c0bb322fbbe446d18dee4c821275ef18259cafc346c8b3b9fb0f3adcf6ea310a6b9a3f59e29a5909ea047fb61affb4bc8bbea1fb761b8933795b1a91358a7791aa843d07020e8bb6fc18458c49ac6313e7165b7d9f65e94a62b69f1011b94340cdb7303f01e5cdb5682ddf73d65c3de1d88dd7496d6345d5b9de0223988056a53e19a8b96b9640bc6c09d3c2ff894d626b57c776ed53f94d5e22ff148061b37f72bd92924cb1d0a725e19b264346b7cae0251a850de78316503f3c3d395c7e3f04fc8d52583327cd2341ce4b2d092815376299686f41353b2823814563011a2223b9dd00000000000000000000003a131374a3371cb3e2a9bb4d798b91cefa444501f40b7c9589e8c0bb6c82123d2b45ce905d0903b32ecf30e828c71a07a83f3275f3d661d1af0ffbd5d7f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r5, 0xfeffff, 0x680, 0x3f000002, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0xf0, 0xffffff0c}, 0x40) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r1], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00', r7}, 0x18) r9 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x808003, &(0x7f0000000000), 0x3, 0x4fc, &(0x7f0000001500)="$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") r10 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) openat(r9, 0x0, 0x640, 0x2) r11 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r11, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r11, 0x0) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_register(r10, &(0x7f0000000000)={0x3a, 'syz2', 0x3a, 'E', 0x3a, 0x7, 0x3a, 'M', 0x3a, 'M', 0x3a, './file2', 0x3a, [0x46]}, 0x2a) r13 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010000100ab5a0000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4024}, 0x4000010) 10m26.072412788s ago: executing program 8 (id=27246): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfc, 0x0, 0x7ffc0002}]}) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8000000000000000, 0x7}, 0x4130, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfff4}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x2}, 0x0, 0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x440, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='rss_stat\x00', r1, 0x0, 0x9}, 0x18) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) syz_clone(0x21205400, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000004c0)={[{@grpquota}, {@lazytime}, {@minixdf}, {@abort}, {@resuid}, {@noinit_itable}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x400) syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x1, 0x200, 0x1, 0x8000021e}, &(0x7f00000001c0), &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000040)) r3 = open(&(0x7f00000000c0)='.\x00', 0x8000, 0x50) getdents(r3, &(0x7f0000001fc0)=""/184, 0xb8) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010026bd7000fcdbdf250200000008000100", @ANYRES32], 0x1c}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000380), 0x1, 0x0) setsockopt$MRT6_DONE(r5, 0x29, 0xc9, 0x0, 0x0) 10m25.93537068s ago: executing program 8 (id=27250): munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x5, 0x40, 0x7, 0x0, 0x7fffffff, 0x9d6d1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_bp={0x0, 0xa}, 0x800, 0x7fff, 0x7, 0x1, 0x81, 0x4, 0x5, 0x0, 0x4000000, 0x0, 0x80000001}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf, 0x12, r1, 0xbdeca000) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], 0x28}}, 0x40000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89f3, &(0x7f0000000900)={'tunl0\x00', @random="0000230c1100"}) r4 = syz_open_dev$sg(&(0x7f0000000200), 0x8, 0x40042) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000240)) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803003a000b12d25a80648c2594f90324fc60100c034002a10100feff000037153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x2000c16, &(0x7f0000000280)={[{@usrquota}, {@nodelalloc}]}, 0xff, 0x257, &(0x7f0000000500)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101142, 0x104) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8441, 0x141) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e880000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffede, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r9, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_submit(0x0, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r9, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 10m25.906753161s ago: executing program 42 (id=27250): munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x5, 0x40, 0x7, 0x0, 0x7fffffff, 0x9d6d1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_bp={0x0, 0xa}, 0x800, 0x7fff, 0x7, 0x1, 0x81, 0x4, 0x5, 0x0, 0x4000000, 0x0, 0x80000001}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf, 0x12, r1, 0xbdeca000) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], 0x28}}, 0x40000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89f3, &(0x7f0000000900)={'tunl0\x00', @random="0000230c1100"}) r4 = syz_open_dev$sg(&(0x7f0000000200), 0x8, 0x40042) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000240)) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803003a000b12d25a80648c2594f90324fc60100c034002a10100feff000037153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x2000c16, &(0x7f0000000280)={[{@usrquota}, {@nodelalloc}]}, 0xff, 0x257, &(0x7f0000000500)="$eJzs3U9oFFccB/DfzO42TbKUtL0USv9AKaUNhPRW6CW9tBAoIZRSaAsppfSiJEJM8JZ48uJBj6KSk5cg3oweJZfgRRE8Rc0hXgQNHgweVFjZnQTyTxOzmx1xPh+YzEzy5v3eMPN9ExaGDaCweiJiICJKEdEbEZWISDY2+DJbetZ2ZzoXRiJqtd8eJ4122X5m/bjuiJiOiB8iYj5N4lA5YnLur+Wni798c3Ki8vWFuT8723qSa1aWl35dPT904vLg95M3bz8cSmIgqpvOq/WSHX5XTiI+Oohib4mknPcI2IvhY5fu1HP/cUR81ch/JdLILt6p8ffmK/HduVcde/rRrU/bOVag9Wq1Sv0ZOF0DCieNiGokaV9EZNtp2teX/Q9/t9SVHh4bP9r7/9jE6H95z1RAq1Qjln6+2nGle0v+H5Sy/APvqOxDqaXfh2fv1TdWS3kPCGiLz7JV/fnf+8/UtyH/UDjyD8Ul/1Bc8g/FJf9QXPIPxSX/UFzyD8Ul/1Bc+87/mRcHNyigLTbmHwAollrHvt4abv2LyEDb5T3/AAAAAAAAAAAAAAAAAAAA2810LoysL63psbxri+tnI1Z+yppur19qfB9xxPuNn11Pkk09Jnuq8Hp/f9FkB026mPPb1x/cz7f+jc/zrT81GjF9PCL6y+Xt91+ydv/t34e7/L3yb5MF3lCyZf/HP9pbf6vns/nWH1yMuFaff/p3mn/S+KSx3nn+qdavX5P1jzxrsgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADa5mUAAAD//7FLbdg=") r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101142, 0x104) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8441, 0x141) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e880000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffede, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r9, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_submit(0x0, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r9, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 2.120846348s ago: executing program 9 (id=40346): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000005c0)='sys_enter\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) rt_sigaction(0x19, 0x0, 0x0, 0x8, &(0x7f0000000100)) 2.108505938s ago: executing program 7 (id=40348): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1a, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000118110000", @ANYRES32=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) getgroups(0xa, &(0x7f0000000000)=[0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0x0, 0xee01, 0xee01, 0xee01, 0xee00, 0xee01]) 2.00394258s ago: executing program 7 (id=40350): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) chown(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) 1.987461741s ago: executing program 7 (id=40351): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000080104"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000280)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) 1.955062541s ago: executing program 7 (id=40352): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r1}, 0x18) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) 1.953643441s ago: executing program 7 (id=40353): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x101c0ca, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x6, 0x2c0, &(0x7f0000000900)="$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") perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x8020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x9, 0x1c, 0xca, &(0x7f0000000600)}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00', r1}, 0x10) futimesat(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) listen(r3, 0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) close(r4) accept4(r3, 0x0, 0x0, 0x400000000000000) syz_usb_disconnect(r2) 1.939531972s ago: executing program 3 (id=40354): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1a, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00'}, 0x10) getgroups(0xa, &(0x7f0000000000)=[0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0x0, 0xee01, 0xee01, 0xee01, 0xee00, 0xee01]) 1.868554533s ago: executing program 9 (id=40355): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r4}, 0x18) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000040900010073797a30000000009c000000090a010400000000000000000700000308000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d58001280200001800e000100636f6e6e6c696d69740000000c0002800800014000000008200001800e000100636f6e6e6c696d69740000000c000280080001400000000014000180090001006c617374000000000400028008000340000001"], 0xe4}}, 0x20050800) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}, {0xd, 0x3}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_MAX_RATE={0x8, 0x7, 0x800}]}}]}, 0x38}}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x0, 0xfc, 0x0, 0x1, 0xffffffff}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40080c0}, 0x0) r9 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x6c, r9, 0x800, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x121}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'kfree\x00'}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xfffffffffffffffe}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0x8, 0xa, '+:{#'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8810}, 0x20004004) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140), 0x4) 1.868317563s ago: executing program 3 (id=40356): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f00000002c0)=[{0x0, 0xec7b, 0x1000}], 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x402280, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="70000000100003042abd70009da1d2b900000004", @ANYRES32=0x0, @ANYBLOB="0000000000000000500012800b0001006272696467650000400002800800050000000000050029000100000006002700040000000c00220006000000000000000c0021"], 0x70}}, 0x0) 1.868086513s ago: executing program 2 (id=40357): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000080104"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[]) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24000000700001002bbd70000000000007000000", @ANYRES32=r6, @ANYBLOB="0c00028005000300030000008f605b08b7ecc06c8398eee0668aa13fd5cd01aa"], 0x24}, 0x1, 0x0, 0x0, 0x881}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) sendto$inet6(r2, &(0x7f0000000080)='8', 0x1, 0x61059, &(0x7f0000000340)={0xa, 0x4e23, 0x85, @dev={0xfe, 0x80, '\x00', 0x29}, 0x3}, 0x1c) 1.832934294s ago: executing program 3 (id=40358): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = syz_io_uring_setup(0x10c, &(0x7f0000000400)={0x0, 0xa430, 0x400, 0x0, 0x8b}, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x8, 0x4004, @fd_index=0x3, 0x0, 0x0}) io_uring_enter(r0, 0x3516, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_io_uring_setup(0x1593, &(0x7f0000001900)={0x0, 0xe5dc, 0x8, 0x3, 0x2f0}, 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r5 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049dd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6, 0x0, 0x1000000000}, 0x18) write$binfmt_elf32(r5, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x58) close(r5) execve(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xfffffffffffffca1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r7, 0x0, 0x9}, 0x18) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FIEMAP(r8, 0xc020660b, &(0x7f0000000600)=ANY=[@ANYBLOB="09000000000000000dcf00000000000005"]) ioctl$TCSETA(0xffffffffffffffff, 0x5405, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000200)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3e}}], 0x10) r9 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r9, 0x40345410, &(0x7f0000000280)={{0x1}}) readv(r9, &(0x7f0000000140)=[{&(0x7f0000000000)=""/47, 0x2f}], 0x1) 1.815797904s ago: executing program 2 (id=40359): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000040) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0)="0e030e00c4e8120006001e0089", 0xd, 0x28000000, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x984c1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r1, &(0x7f0000001d80)={&(0x7f0000000480)=@abs, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000001b80)=""/233, 0xe9}, {&(0x7f0000000500)=""/141, 0x8d}, {&(0x7f0000000380)=""/57, 0x39}], 0x3, &(0x7f0000001cc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa0}, 0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r0, 0x200, &(0x7f0000000080)={&(0x7f00000000c0)=""/112, 0x70}) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[@ANYBLOB='-', @ANYRESOCT], 0x44) chown(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) 1.777415615s ago: executing program 2 (id=40360): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r4}, 0x18) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000040900010073797a30000000009c000000090a010400000000000000000700000308000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d58001280200001800e000100636f6e6e6c696d69740000000c0002800800014000000008200001800e000100636f6e6e6c696d69740000000c000280080001400000000014000180090001006c617374000000000400028008000340000001"], 0xe4}}, 0x20050800) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}, {0xd, 0x3}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_MAX_RATE={0x8, 0x7, 0x800}]}}]}, 0x38}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x0, 0xfc, 0x0, 0x1, 0xffffffff}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40080c0}, 0x0) 1.750270665s ago: executing program 2 (id=40361): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="021202000600000000000000ffdbdf25040003000000000400"/48], 0x30}}, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ppoll(&(0x7f0000000000)=[{r1, 0x602}], 0x1, 0x0, 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @local, 0x7}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000700)="d0aced127c543987a9e2550978b9a231bc144df0151d3f11d7bfc5cbfa80f7251ddba5053b6f29ef0c782cc4098daf606911abe778d45dbdd303e24fe3ae7316710877a86d9b908b8ec6ea497daa0e7640ce7eb904cd5fed1be82a1a543ca68b031bf1bf3c9e805e4d26002380d9a7c31327e6e54a8483a6bd6554ac2abb16fceb4bd952ac9cc4e74acf3a20908596084a56bb0c7af6c5aacaf7f8d4c0a53301f2e6b4ae506d91616d731c5c7ec875669087", 0xb2}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x3, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone3(&(0x7f0000000680)={0x40004000, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, 0x0}, 0x58) 1.383522593s ago: executing program 0 (id=40367): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1a, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000118110000", @ANYRES32], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r0}, 0x10) getgroups(0xa, &(0x7f0000000000)=[0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0x0, 0xee01, 0xee01, 0xee01, 0xee00, 0xee01]) 1.337525034s ago: executing program 0 (id=40368): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000007d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) r1 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001100)="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", 0x192}, {&(0x7f0000000d80)="7d68e6de85f9b0cbc9d710267f321ec64eab043ecad9af7e01e9463218ec45924a99867163e468d36a682fadd749caa325e685d75559a87139e02fae7271be8f55671cfd32a09896278d1941370174720838039d0989bc3394b8a4c4f4a30f0496be313d6d60fe47966c634a3ee1f659e8ef310647725bda0130d5de5028220a4cf5fc808a75694738ee26cb21302b4bba4265b845a5d5dce706d9820c6936b122f9658446d74a9016b94424971dd443a6907eb5c73b6b200e92b23f2c36a214729b0bc231511e", 0xc7}, {&(0x7f0000000380)="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", 0x353}], 0x3}}], 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000}, 0x400}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) 1.337002744s ago: executing program 0 (id=40369): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f00000002c0)=[{0x0, 0xec7b, 0x1000}], 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x402280, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="70000000100003042abd70009da1d2b900000004", @ANYRES32=0x0, @ANYBLOB="0000000000000000500012800b0001006272696467650000400002800800050000000000050029000100000006002700040000000c00220006000000000000000c0021"], 0x70}}, 0x0) 1.290112535s ago: executing program 0 (id=40370): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000ffffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000022000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004000009"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x5, 0x2, 0xffff, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_getevents(r2, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) io_submit(r2, 0x1, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040), &(0x7f00000001c0)=0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r3, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@uname={'uname', 0x3d, '\xd0\xae\xde\xc1\xaa \xff\xd8\x1d\x1b\xf8\x93)!|\xb0X\xa3\x96\xed\xa2\xab@\xa2m\x93\xdd\b<\x00t\xdc\xabl\xab!\xae\x16\xc4\xcd\xf9{\xdc5_;A\xd2{eC\x014\\\xb3\xc4\xce\xc3yS2-\x01\xbe\xaarW\x96O\xd3\x0f\xe2\xd7/\x17\x1d\xa7.8\x9f8-\xea<\x8d\x91\x90j\xea\xd5\xd5\xae\xcc\xc0\x97\xef\x10\x92\xea\x98|+\x00\x00\x00\x00\x00\x00\x00\x00'}}]}}) 1.065468999s ago: executing program 0 (id=40371): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000040) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x28000000, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x984c1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x88c040, 0x59) fcntl$setlease(r1, 0x400, 0x1) fcntl$setlease(r1, 0x400, 0x2) 1.041714959s ago: executing program 0 (id=40372): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x1000, 0xa}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000200)='.log\x00', 0x40, 0x113) syz_io_uring_setup(0x1f19, &(0x7f0000000040)={0x0, 0xedfe, 0x2, 0x2, 0x87, 0x0, r0}, &(0x7f00000000c0), &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x80) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x22a0044, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$bt_hci(r1, 0x84, 0x83, 0x0, &(0x7f0000000000)=0xa) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x49) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r5, 0x0, 0x200000000000006}, 0x18) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) ioctl$EVIOCGABS0(r3, 0x80184540, &(0x7f0000000340)=""/129) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0185879, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x972, &(0x7f0000006680)) syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x818018, &(0x7f0000000300)={[{@minixdf}, {@grpjquota}]}, 0x1, 0x72d, &(0x7f00000014c0)="$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") mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f00000001c0), 0x0, 0x0) 1.04124454s ago: executing program 9 (id=40373): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r1, 0xa, 0x13) fcntl$setlease(r1, 0x400, 0x0) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 944.973532ms ago: executing program 3 (id=40374): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r1}, 0x18) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) 927.299312ms ago: executing program 3 (id=40375): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = syz_io_uring_setup(0x10c, &(0x7f0000000400)={0x0, 0xa430, 0x400, 0x0, 0x8b}, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x8, 0x4004, @fd_index=0x3, 0x0, 0x0}) io_uring_enter(r0, 0x3516, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_io_uring_setup(0x1593, &(0x7f0000001900)={0x0, 0xe5dc, 0x8, 0x3, 0x2f0}, 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r5 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049dd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6, 0x0, 0x1000000000}, 0x18) write$binfmt_elf32(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c4604070003070000000000000002000300030000000903000038000000fcffffff0e"], 0x58) close(r5) execve(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xfffffffffffffca1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r7, 0x0, 0x9}, 0x18) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FIEMAP(r8, 0xc020660b, &(0x7f0000000600)=ANY=[@ANYBLOB="09000000000000000dcf00000000000005"]) ioctl$TCSETA(0xffffffffffffffff, 0x5405, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000200)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3e}}], 0x10) r9 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r9, 0x40345410, &(0x7f0000000280)={{0x1}}) readv(r9, &(0x7f0000000140)=[{&(0x7f0000000000)=""/47, 0x2f}], 0x1) 888.150393ms ago: executing program 2 (id=40376): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000280)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) 791.949134ms ago: executing program 2 (id=40377): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = syz_io_uring_setup(0x10c, &(0x7f0000000400)={0x0, 0xa430, 0x400, 0x0, 0x8b}, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x8, 0x4004, @fd_index=0x3, 0x0, 0x0}) io_uring_enter(r0, 0x3516, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_io_uring_setup(0x1593, &(0x7f0000001900)={0x0, 0xe5dc, 0x8, 0x3, 0x2f0}, 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r5 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049dd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6, 0x0, 0x1000000000}, 0x18) write$binfmt_elf32(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c4604070003070000000000000002000300030000000903000038000000fcffffff0e"], 0x58) close(r5) execve(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xfffffffffffffca1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r7, 0x0, 0x9}, 0x18) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FIEMAP(r8, 0xc020660b, &(0x7f0000000600)=ANY=[@ANYBLOB="09000000000000000dcf00000000000005"]) ioctl$TCSETA(0xffffffffffffffff, 0x5405, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000200)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3e}}], 0x10) r9 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r9, 0x40345410, &(0x7f0000000280)={{0x1}}) readv(r9, &(0x7f0000000140)=[{&(0x7f0000000000)=""/47, 0x2f}], 0x1) 588.684108ms ago: executing program 7 (id=40378): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 129.267808ms ago: executing program 9 (id=40379): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000080104"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[]) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) sendto$inet6(r2, &(0x7f0000000080)='8', 0x1, 0x61059, &(0x7f0000000340)={0xa, 0x4e23, 0x85, @dev={0xfe, 0x80, '\x00', 0x29}, 0x3}, 0x1c) 84.686608ms ago: executing program 9 (id=40380): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1a, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000118110000", @ANYRES32], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r0}, 0x10) getgroups(0xa, &(0x7f0000000000)=[0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0x0, 0xee01, 0xee01, 0xee01, 0xee00, 0xee01]) 49.633299ms ago: executing program 3 (id=40381): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r4}, 0x18) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000040900010073797a30000000009c000000090a010400000000000000000700000308000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d58001280200001800e000100636f6e6e6c696d69740000000c0002800800014000000008200001800e000100636f6e6e6c696d69740000000c000280080001400000000014000180090001006c617374000000000400028008000340000001"], 0xe4}}, 0x20050800) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}, {0xd, 0x3}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_MAX_RATE={0x8, 0x7, 0x800}]}}]}, 0x38}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x0, 0xfc, 0x0, 0x1, 0xffffffff}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40080c0}, 0x0) 0s ago: executing program 9 (id=40382): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000ffffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000022000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000090000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x5, 0x2, 0xffff, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_getevents(r2, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) io_submit(r2, 0x1, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040), &(0x7f00000001c0)=0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r3, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@uname={'uname', 0x3d, '\xd0\xae\xde\xc1\xaa \xff\xd8\x1d\x1b\xf8\x93)!|\xb0X\xa3\x96\xed\xa2\xab@\xa2m\x93\xdd\b<\x00t\xdc\xabl\xab!\xae\x16\xc4\xcd\xf9{\xdc5_;A\xd2{eC\x014\\\xb3\xc4\xce\xc3yS2-\x01\xbe\xaarW\x96O\xd3\x0f\xe2\xd7/\x17\x1d\xa7.8\x9f8-\xea<\x8d\x91\x90j\xea\xd5\xd5\xae\xcc\xc0\x97\xef\x10\x92\xea\x98|+\x00\x00\x00\x00\x00\x00\x00\x00'}}]}}) kernel console output (not intermixed with test programs): misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2741.761211][T18363] lo speed is unknown, defaulting to 1000 [ 2741.767541][T18363] lo speed is unknown, defaulting to 1000 [ 2741.773429][T18363] lo speed is unknown, defaulting to 1000 [ 2741.806925][T18363] infiniband sz1: set down [ 2741.811476][T18363] infiniband sz1: added lo [ 2741.818531][T27461] lo speed is unknown, defaulting to 1000 [ 2741.828905][T18363] RDS/IB: sz1: added [ 2741.832897][T18363] smc: adding ib device sz1 with port count 1 [ 2741.839145][T18363] smc: ib device sz1 port 1 has pnetid [ 2741.845381][T18363] lo speed is unknown, defaulting to 1000 [ 2741.878777][T18363] lo speed is unknown, defaulting to 1000 [ 2741.911443][T18363] lo speed is unknown, defaulting to 1000 [ 2741.943646][T18363] lo speed is unknown, defaulting to 1000 [ 2741.976927][T18363] lo speed is unknown, defaulting to 1000 [ 2742.010218][T18363] lo speed is unknown, defaulting to 1000 [ 2742.043727][T18363] lo speed is unknown, defaulting to 1000 [ 2742.077202][ T3384] lo speed is unknown, defaulting to 1000 [ 2742.198560][T18384] netlink: 20 bytes leftover after parsing attributes in process `syz.9.38885'. [ 2742.334145][ T3384] IPVS: starting estimator thread 0... [ 2742.402670][T18420] netlink: 'syz.9.38896': attribute type 13 has an invalid length. [ 2742.418426][T18420] gretap0: refused to change device tx_queue_len [ 2742.425405][T18420] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2742.425571][T18423] netlink: 4 bytes leftover after parsing attributes in process `syz.3.38897'. [ 2742.442599][T18402] IPVS: using max 2592 ests per chain, 129600 per kthread [ 2742.458745][T18423] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2742.467465][T18423] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2742.486712][T18420] siw: device registration error -23 [ 2742.543043][T18433] bridge14: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2742.654966][T18450] bridge15: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2742.700457][T18446] serio: Serial port ptm0 [ 2742.706762][T18459] netlink: 'syz.2.38909': attribute type 10 has an invalid length. [ 2742.740136][T18462] netlink: 'syz.2.38910': attribute type 13 has an invalid length. [ 2742.750250][T18462] gretap0: refused to change device tx_queue_len [ 2742.756881][T18462] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2742.772530][ T3384] lo speed is unknown, defaulting to 1000 [ 2742.778347][ T3384] syz0: Port: 1 Link ACTIVE [ 2742.805820][T18466] netlink: 'syz.7.38907': attribute type 5 has an invalid length. [ 2742.927063][T18488] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(10) [ 2742.931360][T18487] tipc: Resetting bearer [ 2742.933689][T18488] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 2742.946966][T18488] vhci_hcd vhci_hcd.0: Device attached [ 2742.950241][ T3401] lo speed is unknown, defaulting to 1000 [ 2742.956449][T18491] vhci_hcd: connection closed [ 2742.958172][ T3401] syz0: Port: 1 Link DOWN [ 2742.967533][T14845] vhci_hcd: stop threads [ 2742.971902][T14845] vhci_hcd: release socket [ 2742.976332][T14845] vhci_hcd: disconnect device [ 2743.011635][T18494] netlink: 'syz.2.38921': attribute type 10 has an invalid length. [ 2743.068589][T18500] gretap0: refused to change device tx_queue_len [ 2743.075501][T18500] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2743.093308][T18500] siw: device registration error -23 [ 2743.246436][T18523] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2743.255210][T18523] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2743.292877][T18534] gretap0: refused to change device tx_queue_len [ 2743.299793][T18534] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2743.317679][T18534] siw: device registration error -23 [ 2743.355297][T18539] syzkaller0: entered promiscuous mode [ 2743.360837][T18539] syzkaller0: entered allmulticast mode [ 2743.373084][T18539] bridge1: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2743.508599][T18554] 8021q: adding VLAN 0 to HW filter on device team0 [ 2743.521840][T18554] bond0: (slave team0): Enslaving as an active interface with an up link [ 2743.575491][T18562] gretap0: refused to change device tx_queue_len [ 2743.582281][T18562] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2743.599917][T18562] siw: device registration error -23 [ 2743.629663][T18564] lo speed is unknown, defaulting to 1000 [ 2743.635889][T18564] lo speed is unknown, defaulting to 1000 [ 2743.901548][T18622] FAULT_INJECTION: forcing a failure. [ 2743.901548][T18622] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2743.914661][T18622] CPU: 0 UID: 0 PID: 18622 Comm: syz.3.38962 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2743.914692][T18622] Tainted: [W]=WARN [ 2743.914699][T18622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2743.914721][T18622] Call Trace: [ 2743.914727][T18622] [ 2743.914735][T18622] __dump_stack+0x1d/0x30 [ 2743.914758][T18622] dump_stack_lvl+0xe8/0x140 [ 2743.914776][T18622] dump_stack+0x15/0x1b [ 2743.914789][T18622] should_fail_ex+0x265/0x280 [ 2743.914816][T18622] should_fail+0xb/0x20 [ 2743.914888][T18622] should_fail_usercopy+0x1a/0x20 [ 2743.915022][T18622] _copy_from_iter+0xd2/0xe80 [ 2743.915055][T18622] ? __build_skb_around+0x1a0/0x200 [ 2743.915078][T18622] ? __alloc_skb+0x223/0x320 [ 2743.915102][T18622] netlink_sendmsg+0x471/0x6b0 [ 2743.915183][T18622] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2743.915220][T18622] __sock_sendmsg+0x142/0x180 [ 2743.915252][T18622] ____sys_sendmsg+0x31e/0x4e0 [ 2743.915288][T18622] ___sys_sendmsg+0x17b/0x1d0 [ 2743.915433][T18622] __x64_sys_sendmsg+0xd4/0x160 [ 2743.915471][T18622] x64_sys_call+0x191e/0x2ff0 [ 2743.915499][T18622] do_syscall_64+0xd2/0x200 [ 2743.915563][T18622] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2743.915587][T18622] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2743.915619][T18622] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2743.915715][T18622] RIP: 0033:0x7fd770bdec29 [ 2743.915733][T18622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2743.915756][T18622] RSP: 002b:00007fd76f647038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2743.915777][T18622] RAX: ffffffffffffffda RBX: 00007fd770e25fa0 RCX: 00007fd770bdec29 [ 2743.915789][T18622] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000006 [ 2743.915802][T18622] RBP: 00007fd76f647090 R08: 0000000000000000 R09: 0000000000000000 [ 2743.915816][T18622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2743.915830][T18622] R13: 00007fd770e26038 R14: 00007fd770e25fa0 R15: 00007ffcb5a3b608 [ 2743.915904][T18622] [ 2744.431820][T18666] bridge4: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2744.468225][T18665] FAULT_INJECTION: forcing a failure. [ 2744.468225][T18665] name failslab, interval 1, probability 0, space 0, times 0 [ 2744.480958][T18665] CPU: 1 UID: 0 PID: 18665 Comm: syz.9.38978 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2744.480996][T18665] Tainted: [W]=WARN [ 2744.481055][T18665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2744.481067][T18665] Call Trace: [ 2744.481072][T18665] [ 2744.481079][T18665] __dump_stack+0x1d/0x30 [ 2744.481102][T18665] dump_stack_lvl+0xe8/0x140 [ 2744.481135][T18665] dump_stack+0x15/0x1b [ 2744.481153][T18665] should_fail_ex+0x265/0x280 [ 2744.481227][T18665] should_failslab+0x8c/0xb0 [ 2744.481249][T18665] kmem_cache_alloc_noprof+0x50/0x310 [ 2744.481272][T18665] ? getname_flags+0x80/0x3b0 [ 2744.481354][T18665] getname_flags+0x80/0x3b0 [ 2744.481460][T18665] __x64_sys_symlink+0x40/0x60 [ 2744.481481][T18665] x64_sys_call+0x23cc/0x2ff0 [ 2744.481522][T18665] do_syscall_64+0xd2/0x200 [ 2744.481598][T18665] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2744.481625][T18665] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2744.481658][T18665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2744.481692][T18665] RIP: 0033:0x7f3c2263ec29 [ 2744.481704][T18665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2744.481757][T18665] RSP: 002b:00007f3c210a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 2744.481892][T18665] RAX: ffffffffffffffda RBX: 00007f3c22885fa0 RCX: 00007f3c2263ec29 [ 2744.481907][T18665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2744.481920][T18665] RBP: 00007f3c210a7090 R08: 0000000000000000 R09: 0000000000000000 [ 2744.481934][T18665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2744.481947][T18665] R13: 00007f3c22886038 R14: 00007f3c22885fa0 R15: 00007ffe9c8db138 [ 2744.481988][T18665] [ 2744.680171][ T29] kauditd_printk_skb: 581 callbacks suppressed [ 2744.680221][ T29] audit: type=1400 audit(2000001211.131:191474): avc: denied { read } for pid=18673 comm="syz.7.38981" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2744.709946][ T29] audit: type=1400 audit(2000001211.131:191475): avc: denied { open } for pid=18673 comm="syz.7.38981" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2744.733964][ T29] audit: type=1400 audit(2000001211.131:191476): avc: denied { ioctl } for pid=18673 comm="syz.7.38981" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2744.771634][T18674] lo speed is unknown, defaulting to 1000 [ 2744.780003][T18674] lo speed is unknown, defaulting to 1000 [ 2744.816518][ T29] audit: type=1326 audit(2000001211.231:191477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18673 comm="syz.7.38981" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2744.840449][ T29] audit: type=1326 audit(2000001211.231:191478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18673 comm="syz.7.38981" exe="/root/syz-executor" sig=0 arch=c000003e syscall=441 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2744.864341][ T29] audit: type=1326 audit(2000001211.231:191479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18673 comm="syz.7.38981" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2744.888104][ T29] audit: type=1326 audit(2000001211.231:191480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18673 comm="syz.7.38981" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2744.920638][ T29] audit: type=1400 audit(2000001211.271:191481): avc: denied { execmem } for pid=18685 comm="syz.0.38982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2744.940982][ T29] audit: type=1400 audit(2000001211.381:191482): avc: denied { allowed } for pid=18696 comm="syz.0.38985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2744.962026][ T29] audit: type=1400 audit(2000001211.421:191483): avc: denied { create } for pid=18696 comm="syz.0.38985" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2745.020962][T18713] __nla_validate_parse: 13 callbacks suppressed [ 2745.020980][T18713] netlink: 16 bytes leftover after parsing attributes in process `syz.9.38987'. [ 2745.208541][T18727] netlink: 48 bytes leftover after parsing attributes in process `syz.9.38994'. [ 2745.329352][T18751] validate_nla: 6 callbacks suppressed [ 2745.329364][T18751] netlink: 'syz.3.39001': attribute type 10 has an invalid length. [ 2745.381284][T18740] lo speed is unknown, defaulting to 1000 [ 2745.389258][T18740] lo speed is unknown, defaulting to 1000 [ 2745.626896][ T5211] tipc: Disabling bearer [ 2745.636922][T18873] FAULT_INJECTION: forcing a failure. [ 2745.636922][T18873] name failslab, interval 1, probability 0, space 0, times 0 [ 2745.649726][T18873] CPU: 1 UID: 0 PID: 18873 Comm: syz.7.39008 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2745.649772][T18873] Tainted: [W]=WARN [ 2745.649779][T18873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2745.649791][T18873] Call Trace: [ 2745.649796][T18873] [ 2745.649802][T18873] __dump_stack+0x1d/0x30 [ 2745.649824][T18873] dump_stack_lvl+0xe8/0x140 [ 2745.649844][T18873] dump_stack+0x15/0x1b [ 2745.649882][T18873] should_fail_ex+0x265/0x280 [ 2745.649903][T18873] should_failslab+0x8c/0xb0 [ 2745.649924][T18873] kmem_cache_alloc_node_noprof+0x57/0x320 [ 2745.649952][T18873] ? __alloc_skb+0x101/0x320 [ 2745.650008][T18873] __alloc_skb+0x101/0x320 [ 2745.650047][T18873] ? ip_generic_getfrag+0x135/0x1b0 [ 2745.650083][T18873] __ip_append_data+0x1935/0x2440 [ 2745.650122][T18873] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 2745.650174][T18873] ip_append_data+0xd6/0x130 [ 2745.650207][T18873] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 2745.650300][T18873] udp_sendmsg+0x36e/0x13c0 [ 2745.650333][T18873] ? mntput+0x4b/0x80 [ 2745.650364][T18873] ? __rcu_read_unlock+0x4f/0x70 [ 2745.650387][T18873] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 2745.650479][T18873] ? avc_has_perm+0xf7/0x180 [ 2745.650506][T18873] ? __pfx_udp_sendmsg+0x10/0x10 [ 2745.650538][T18873] inet_sendmsg+0xac/0xd0 [ 2745.650564][T18873] __sock_sendmsg+0x102/0x180 [ 2745.650671][T18873] __sys_sendto+0x268/0x330 [ 2745.650703][T18873] __x64_sys_sendto+0x76/0x90 [ 2745.650725][T18873] x64_sys_call+0x2d05/0x2ff0 [ 2745.650768][T18873] do_syscall_64+0xd2/0x200 [ 2745.650800][T18873] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2745.650826][T18873] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2745.650910][T18873] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2745.650929][T18873] RIP: 0033:0x7fb2a41dec29 [ 2745.650945][T18873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2745.650966][T18873] RSP: 002b:00007fb2a2c47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2745.651017][T18873] RAX: ffffffffffffffda RBX: 00007fb2a4425fa0 RCX: 00007fb2a41dec29 [ 2745.651028][T18873] RDX: 000000000000fdbe RSI: 0000200000000100 RDI: 0000000000000003 [ 2745.651045][T18873] RBP: 00007fb2a2c47090 R08: 0000000000000000 R09: 0000000011000a00 [ 2745.651105][T18873] R10: 0000000004004084 R11: 0000000000000246 R12: 0000000000000001 [ 2745.651116][T18873] R13: 00007fb2a4426038 R14: 00007fb2a4425fa0 R15: 00007fffac817f58 [ 2745.651133][T18873] [ 2746.055756][T18740] chnl_net:caif_netlink_parms(): no params data found [ 2746.185582][T18924] netlink: 24 bytes leftover after parsing attributes in process `syz.3.39017'. [ 2746.201646][T18740] bridge0: port 1(bridge_slave_0) entered blocking state [ 2746.208744][T18740] bridge0: port 1(bridge_slave_0) entered disabled state [ 2746.224160][T18740] bridge_slave_0: entered allmulticast mode [ 2746.244609][T18740] bridge_slave_0: entered promiscuous mode [ 2746.277524][T18740] bridge0: port 2(bridge_slave_1) entered blocking state [ 2746.284583][T18740] bridge0: port 2(bridge_slave_1) entered disabled state [ 2746.296421][T18959] netlink: 4 bytes leftover after parsing attributes in process `syz.7.39020'. [ 2746.317293][T18740] bridge_slave_1: entered allmulticast mode [ 2746.323822][T18740] bridge_slave_1: entered promiscuous mode [ 2746.351302][T18740] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2746.386256][T18740] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2746.412016][T19005] netlink: 'syz.7.39025': attribute type 13 has an invalid length. [ 2746.429124][T18740] team0: Port device team_slave_0 added [ 2746.459961][T19044] siw: device registration error -23 [ 2746.463118][T18965] lo speed is unknown, defaulting to 1000 [ 2746.466280][T18740] team0: Port device team_slave_1 added [ 2746.507121][T19005] gretap0: refused to change device tx_queue_len [ 2746.517832][T19005] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2746.533722][T14838] bridge_slave_1: left allmulticast mode [ 2746.539505][T14838] bridge_slave_1: left promiscuous mode [ 2746.545188][T14838] bridge0: port 2(bridge_slave_1) entered disabled state [ 2746.578296][T14838] bridge_slave_0: left allmulticast mode [ 2746.584007][T14838] bridge_slave_0: left promiscuous mode [ 2746.589786][T14838] bridge0: port 1(bridge_slave_0) entered disabled state [ 2747.348530][T14838] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2747.358308][T14838] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2747.367574][T14838] bond0 (unregistering): (slave team0): Releasing backup interface [ 2747.375988][T14838] bond0 (unregistering): Released all slaves [ 2747.384940][T14838] bond1 (unregistering): Released all slaves [ 2747.393196][ T3384] lo speed is unknown, defaulting to 1000 [ 2747.398967][ T3384] sz1: Port: 1 Link ACTIVE [ 2747.405540][T18965] lo speed is unknown, defaulting to 1000 [ 2747.411511][ T3384] lo speed is unknown, defaulting to 1000 [ 2747.412442][T18740] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2747.424223][T18740] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2747.450249][T18740] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2747.482379][T18740] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2747.489348][T18740] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2747.515336][T18740] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2747.533029][T14838] tipc: Left network mode [ 2747.593778][T14838] hsr_slave_0: left promiscuous mode [ 2747.656977][T14838] team0 (unregistering): Port device team_slave_1 removed [ 2747.675866][T14838] team0 (unregistering): Port device team_slave_0 removed [ 2747.792735][T18740] hsr_slave_0: entered promiscuous mode [ 2747.799029][T18740] hsr_slave_1: entered promiscuous mode [ 2747.804885][T18740] debugfs: 'hsr0' already exists in 'hsr' [ 2747.810652][T18740] Cannot create hsr debugfs directory [ 2748.103784][T19232] lo speed is unknown, defaulting to 1000 [ 2748.183833][T19266] netlink: 12 bytes leftover after parsing attributes in process `syz.0.39036'. [ 2748.223555][T19266] bridge3: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2748.233606][T18740] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2748.255058][T18740] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2748.280473][T18740] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2748.328986][T18740] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2748.446610][T18740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2748.460849][T19293] netlink: 'syz.7.39038': attribute type 13 has an invalid length. [ 2748.473064][T18740] 8021q: adding VLAN 0 to HW filter on device team0 [ 2748.484135][T19298] netlink: 12 bytes leftover after parsing attributes in process `syz.0.39040'. [ 2748.496224][T19293] gretap0: refused to change device tx_queue_len [ 2748.504482][T19293] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2748.526319][T19298] bridge4: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2748.536531][T19293] lo speed is unknown, defaulting to 1000 [ 2748.545362][T14847] bridge0: port 1(bridge_slave_0) entered blocking state [ 2748.552453][T14847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2748.563601][T14847] bridge0: port 2(bridge_slave_1) entered blocking state [ 2748.570712][T14847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2748.586928][T19300] lo speed is unknown, defaulting to 1000 [ 2748.613615][T19293] lo speed is unknown, defaulting to 1000 [ 2748.621435][T19293] lo speed is unknown, defaulting to 1000 [ 2748.628294][T19293] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 2748.664544][T19293] lo speed is unknown, defaulting to 1000 [ 2748.699620][T19309] netdevsim netdevsim3: Direct firmware load for ..€ failed with error -2 [ 2748.701412][T19293] lo speed is unknown, defaulting to 1000 [ 2748.735359][T19293] lo speed is unknown, defaulting to 1000 [ 2748.751899][T19293] lo speed is unknown, defaulting to 1000 [ 2748.758184][T19293] lo speed is unknown, defaulting to 1000 [ 2748.764172][T19293] lo speed is unknown, defaulting to 1000 [ 2748.770269][T19293] lo speed is unknown, defaulting to 1000 [ 2748.776576][T19293] lo speed is unknown, defaulting to 1000 [ 2748.853712][T18740] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2748.884234][T19360] FAULT_INJECTION: forcing a failure. [ 2748.884234][T19360] name failslab, interval 1, probability 0, space 0, times 0 [ 2748.896918][T19360] CPU: 1 UID: 0 PID: 19360 Comm: syz.3.39049 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2748.896987][T19360] Tainted: [W]=WARN [ 2748.896994][T19360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2748.897060][T19360] Call Trace: [ 2748.897067][T19360] [ 2748.897075][T19360] __dump_stack+0x1d/0x30 [ 2748.897157][T19360] dump_stack_lvl+0xe8/0x140 [ 2748.897231][T19360] dump_stack+0x15/0x1b [ 2748.897251][T19360] should_fail_ex+0x265/0x280 [ 2748.897280][T19360] should_failslab+0x8c/0xb0 [ 2748.897310][T19360] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 2748.897374][T19360] ? kstrdup_const+0x3e/0x50 [ 2748.897403][T19360] kstrdup+0x3e/0xd0 [ 2748.897511][T19360] kstrdup_const+0x3e/0x50 [ 2748.897537][T19360] alloc_lookup_fw_priv+0x160/0x350 [ 2748.897577][T19360] _request_firmware+0x28b/0xbb0 [ 2748.897668][T19360] ? avc_has_perm_noaudit+0x1b1/0x200 [ 2748.897730][T19360] ? cred_has_capability+0x210/0x280 [ 2748.897755][T19360] ? __rcu_read_unlock+0x4f/0x70 [ 2748.897782][T19360] request_firmware+0x36/0x50 [ 2748.897852][T19360] devlink_compat_flash_update+0xb2/0x1b0 [ 2748.897974][T19360] dev_ethtool+0x14a1/0x1660 [ 2748.898003][T19360] ? full_name_hash+0x92/0xe0 [ 2748.898038][T19360] dev_ioctl+0x2e0/0x960 [ 2748.898135][T19360] sock_do_ioctl+0x197/0x220 [ 2748.898213][T19360] sock_ioctl+0x41b/0x610 [ 2748.898293][T19360] ? __pfx_sock_ioctl+0x10/0x10 [ 2748.898329][T19360] __se_sys_ioctl+0xce/0x140 [ 2748.898353][T19360] __x64_sys_ioctl+0x43/0x50 [ 2748.898456][T19360] x64_sys_call+0x1816/0x2ff0 [ 2748.898483][T19360] do_syscall_64+0xd2/0x200 [ 2748.898527][T19360] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2748.898639][T19360] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2748.898686][T19360] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2748.898705][T19360] RIP: 0033:0x7fd770bdec29 [ 2748.898720][T19360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2748.898741][T19360] RSP: 002b:00007fd76f647038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2748.898771][T19360] RAX: ffffffffffffffda RBX: 00007fd770e25fa0 RCX: 00007fd770bdec29 [ 2748.898832][T19360] RDX: 0000200000000100 RSI: 0000000000008946 RDI: 0000000000000006 [ 2748.898848][T19360] RBP: 00007fd76f647090 R08: 0000000000000000 R09: 0000000000000000 [ 2748.898863][T19360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2748.898930][T19360] R13: 00007fd770e26038 R14: 00007fd770e25fa0 R15: 00007ffcb5a3b608 [ 2748.898953][T19360] [ 2749.195043][T19369] netlink: 20 bytes leftover after parsing attributes in process `syz.0.39052'. [ 2749.263766][T18740] veth0_vlan: entered promiscuous mode [ 2749.273540][T18740] veth1_vlan: entered promiscuous mode [ 2749.295590][T18740] veth0_macvtap: entered promiscuous mode [ 2749.307903][T18740] veth1_macvtap: entered promiscuous mode [ 2749.315991][T19384] lo speed is unknown, defaulting to 1000 [ 2749.326847][T18740] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2749.332255][T19381] netlink: 4 bytes leftover after parsing attributes in process `syz.7.39056'. [ 2749.348305][T18740] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2749.359682][T14842] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2749.370575][T14842] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2749.380182][T14842] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2749.393145][T14842] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2749.416800][T19384] lo speed is unknown, defaulting to 1000 [ 2749.688512][ T29] kauditd_printk_skb: 172 callbacks suppressed [ 2749.688528][ T29] audit: type=1400 audit(2000001216.152:191656): avc: denied { create } for pid=19442 comm="syz.7.39068" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon=F3F13AE104A569DDC9282C6EE33B7BD845A9F74072ECA8B4489EC94DFB2A03230F2BED0669C3E99CE44AB4D25C275156404B291DD70BD2C4A1F9D749804F9B3B2658C02B75E840 [ 2749.728832][ T29] audit: type=1400 audit(2000001216.152:191657): avc: denied { read open } for pid=19442 comm="syz.7.39068" path="/79/file1" dev="tmpfs" ino=435 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon=F3F13AE104A569DDC9282C6EE33B7BD845A9F74072ECA8B4489EC94DFB2A03230F2BED0669C3E99CE44AB4D25C275156404B291DD70BD2C4A1F9D749804F9B3B2658C02B75E840 [ 2749.765341][ T29] audit: type=1400 audit(2000001216.152:191658): avc: denied { create } for pid=19442 comm="syz.7.39068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 2749.842886][T19441] netlink: 4 bytes leftover after parsing attributes in process `syz.0.39067'. [ 2749.875765][ T29] audit: type=1400 audit(2000001216.262:191659): avc: denied { unlink } for pid=16148 comm="syz-executor" name="file1" dev="tmpfs" ino=435 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon=F3F13AE104A569DDC9282C6EE33B7BD845A9F74072ECA8B4489EC94DFB2A03230F2BED0669C3E99CE44AB4D25C275156404B291DD70BD2C4A1F9D749804F9B3B2658C02B75E840 [ 2749.911831][ T29] audit: type=1400 audit(2000001216.262:191660): avc: denied { unlink } for pid=16148 comm="syz-executor" name="file0" dev="tmpfs" ino=434 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=lnk_file permissive=1 trawcon=F3F13AE104A569DDC9282C6EE33B7BD845A9F74072ECA8B4489EC94DFB2A03230F2BED0669C3E99CE44AB4D25C275156404B291DD70BD2C4A1F9D749804F9B3B2658C02B75E840 [ 2749.948084][ T29] audit: type=1400 audit(2000001216.272:191661): avc: denied { ioctl } for pid=19437 comm="syz.0.39067" path="socket:[446501]" dev="sockfs" ino=446501 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2749.973600][ T29] audit: type=1400 audit(2000001216.292:191662): avc: denied { sys_module } for pid=19437 comm="syz.0.39067" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2749.995029][ T29] audit: type=1400 audit(2000001216.332:191663): avc: denied { ioctl } for pid=19453 comm="syz.3.39072" path="socket:[446516]" dev="sockfs" ino=446516 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2750.030567][ T29] audit: type=1400 audit(2000001216.482:191664): avc: denied { recv } for pid=19456 comm="modprobe" saddr=10.128.0.163 src=30036 daddr=10.128.1.68 dest=41578 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2750.072542][ T29] audit: type=1400 audit(2000001216.532:191665): avc: denied { prog_load } for pid=19460 comm="syz.0.39074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2750.097358][T19463] netlink: 24 bytes leftover after parsing attributes in process `syz.7.39075'. [ 2750.138270][T19454] netlink: 16 bytes leftover after parsing attributes in process `syz.3.39072'. [ 2750.173181][T19470] bridge0: entered promiscuous mode [ 2750.178536][T19470] macsec1: entered promiscuous mode [ 2750.186193][T19470] bridge0: port 3(macsec1) entered blocking state [ 2750.192749][T19470] bridge0: port 3(macsec1) entered disabled state [ 2750.202207][T19470] macsec1: entered allmulticast mode [ 2750.207576][T19470] bridge0: entered allmulticast mode [ 2750.220037][T19470] macsec1: left allmulticast mode [ 2750.225403][T19470] bridge0: left allmulticast mode [ 2750.241060][T19470] bridge0: left promiscuous mode [ 2750.440378][T19498] netlink: 24 bytes leftover after parsing attributes in process `syz.9.39085'. [ 2750.469870][T19498] netlink: 4 bytes leftover after parsing attributes in process `syz.9.39085'. [ 2751.067233][T19522] netlink: 24 bytes leftover after parsing attributes in process `syz.3.39088'. [ 2751.234257][T19529] netlink: 8 bytes leftover after parsing attributes in process `syz.0.39091'. [ 2751.265134][T19531] netlink: 8 bytes leftover after parsing attributes in process `syz.2.39092'. [ 2751.417772][T19540] netlink: 20 bytes leftover after parsing attributes in process `syz.2.39096'. [ 2751.756456][T19555] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=19555 comm=syz.2.39099 [ 2751.806608][T19555] netlink: 20 bytes leftover after parsing attributes in process `syz.2.39099'. [ 2751.948052][T19563] netlink: 52 bytes leftover after parsing attributes in process `syz.9.39104'. [ 2752.151241][T19573] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2752.177657][T19573] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2752.598104][T19593] hsr_slave_1 (unregistering): left promiscuous mode [ 2752.982695][T19632] lo speed is unknown, defaulting to 1000 [ 2753.105840][T19632] lo speed is unknown, defaulting to 1000 [ 2753.360314][T19669] serio: Serial port ptm0 [ 2753.471739][T19641] FAULT_INJECTION: forcing a failure. [ 2753.471739][T19641] name failslab, interval 1, probability 0, space 0, times 0 [ 2753.484495][T19641] CPU: 0 UID: 0 PID: 19641 Comm: syz.3.39130 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2753.484527][T19641] Tainted: [W]=WARN [ 2753.484535][T19641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2753.484601][T19641] Call Trace: [ 2753.484606][T19641] [ 2753.484611][T19641] __dump_stack+0x1d/0x30 [ 2753.484628][T19641] dump_stack_lvl+0xe8/0x140 [ 2753.484642][T19641] dump_stack+0x15/0x1b [ 2753.484654][T19641] should_fail_ex+0x265/0x280 [ 2753.484672][T19641] should_failslab+0x8c/0xb0 [ 2753.484736][T19641] kmem_cache_alloc_node_noprof+0x57/0x320 [ 2753.484824][T19641] ? __alloc_skb+0x101/0x320 [ 2753.484946][T19641] __alloc_skb+0x101/0x320 [ 2753.484968][T19641] netlink_alloc_large_skb+0xba/0xf0 [ 2753.485016][T19641] netlink_sendmsg+0x3cf/0x6b0 [ 2753.485157][T19641] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2753.485238][T19641] __sock_sendmsg+0x142/0x180 [ 2753.485268][T19641] ____sys_sendmsg+0x31e/0x4e0 [ 2753.485371][T19641] ___sys_sendmsg+0x17b/0x1d0 [ 2753.485407][T19641] __x64_sys_sendmsg+0xd4/0x160 [ 2753.485512][T19641] x64_sys_call+0x191e/0x2ff0 [ 2753.485541][T19641] do_syscall_64+0xd2/0x200 [ 2753.485576][T19641] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2753.485598][T19641] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2753.485627][T19641] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2753.485654][T19641] RIP: 0033:0x7fd770bdec29 [ 2753.485673][T19641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2753.485692][T19641] RSP: 002b:00007fd76f647038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2753.485739][T19641] RAX: ffffffffffffffda RBX: 00007fd770e25fa0 RCX: 00007fd770bdec29 [ 2753.485752][T19641] RDX: 0000000000000010 RSI: 0000200000000680 RDI: 000000000000000e [ 2753.485764][T19641] RBP: 00007fd76f647090 R08: 0000000000000000 R09: 0000000000000000 [ 2753.485776][T19641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2753.485788][T19641] R13: 00007fd770e26038 R14: 00007fd770e25fa0 R15: 00007ffcb5a3b608 [ 2753.485811][T19641] [ 2753.756417][T19686] 9pnet_fd: Insufficient options for proto=fd [ 2753.835466][T19693] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2753.844292][T19693] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2753.898268][T19701] netlink: 'syz.3.39142': attribute type 13 has an invalid length. [ 2753.912355][T19701] gretap0: refused to change device tx_queue_len [ 2753.919225][T19701] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2753.942439][T19701] siw: device registration error -23 [ 2753.962479][T19704] netlink: 'syz.3.39143': attribute type 1 has an invalid length. [ 2753.981601][T19704] FAULT_INJECTION: forcing a failure. [ 2753.981601][T19704] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2753.994737][T19704] CPU: 1 UID: 0 PID: 19704 Comm: syz.3.39143 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2753.994761][T19704] Tainted: [W]=WARN [ 2753.994766][T19704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2753.994776][T19704] Call Trace: [ 2753.994780][T19704] [ 2753.994863][T19704] __dump_stack+0x1d/0x30 [ 2753.994880][T19704] dump_stack_lvl+0xe8/0x140 [ 2753.994896][T19704] dump_stack+0x15/0x1b [ 2753.994908][T19704] should_fail_ex+0x265/0x280 [ 2753.994928][T19704] should_fail+0xb/0x20 [ 2753.994973][T19704] should_fail_usercopy+0x1a/0x20 [ 2753.995013][T19704] _copy_to_user+0x20/0xa0 [ 2753.995057][T19704] copy_siginfo_to_user+0x22/0xb0 [ 2753.995077][T19704] x64_setup_rt_frame+0x2b5/0x580 [ 2753.995118][T19704] arch_do_signal_or_restart+0x27c/0x480 [ 2753.995140][T19704] exit_to_user_mode_loop+0x7a/0x100 [ 2753.995211][T19704] do_syscall_64+0x1d6/0x200 [ 2753.995238][T19704] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2753.995284][T19704] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2753.995374][T19704] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2753.995398][T19704] RIP: 0033:0x7fd770bdec27 [ 2753.995411][T19704] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 2753.995426][T19704] RSP: 002b:00007fd76f647038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2753.995443][T19704] RAX: 0000000000000000 RBX: 00007fd770e25fa0 RCX: 00007fd770bdec29 [ 2753.995454][T19704] RDX: 000000000000effd RSI: 0000000000000000 RDI: 0000000000000008 [ 2753.995549][T19704] RBP: 00007fd76f647090 R08: 0000000000000000 R09: 0000000000000000 [ 2753.995613][T19704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2753.995624][T19704] R13: 00007fd770e26038 R14: 00007fd770e25fa0 R15: 00007ffcb5a3b608 [ 2753.995716][T19704] [ 2754.277899][T19719] netlink: 'syz.0.39148': attribute type 13 has an invalid length. [ 2754.292725][T19719] gretap0: refused to change device tx_queue_len [ 2754.300026][T19719] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2754.325832][T19719] siw: device registration error -23 [ 2754.404192][T19731] syzkaller0: entered promiscuous mode [ 2754.409708][T19731] syzkaller0: entered allmulticast mode [ 2754.420263][T19740] netlink: 'syz.7.39156': attribute type 1 has an invalid length. [ 2754.434112][T19731] bridge4: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2754.512946][T19749] serio: Serial port ptm0 [ 2754.644919][T19759] lo speed is unknown, defaulting to 1000 [ 2754.684411][T19759] lo speed is unknown, defaulting to 1000 [ 2754.893544][ T29] kauditd_printk_skb: 314 callbacks suppressed [ 2754.893560][ T29] audit: type=1400 audit(2000001221.353:191980): avc: denied { recv } for pid=17097 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.68 dest=41578 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2754.927943][ T29] audit: type=1400 audit(2000001221.393:191981): avc: denied { read } for pid=19739 comm="syz.7.39156" path="/dev/qrtr-tun" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2754.952265][ T29] audit: type=1400 audit(2000001221.393:191982): avc: denied { map_create } for pid=19801 comm="syz.9.39167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2754.971777][ T29] audit: type=1400 audit(2000001221.393:191983): avc: denied { bpf } for pid=19801 comm="syz.9.39167" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2754.992696][ T29] audit: type=1400 audit(2000001221.393:191984): avc: denied { open } for pid=19802 comm="syz.2.39168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2755.000883][T19804] syzkaller0: entered promiscuous mode [ 2755.012262][ T29] audit: type=1400 audit(2000001221.393:191985): avc: denied { perfmon } for pid=19802 comm="syz.2.39168" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2755.012315][ T29] audit: type=1400 audit(2000001221.393:191986): avc: denied { kernel } for pid=19802 comm="syz.2.39168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2755.012343][ T29] audit: type=1400 audit(2000001221.393:191987): avc: denied { map_read map_write } for pid=19802 comm="syz.2.39168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2755.012415][ T29] audit: type=1400 audit(2000001221.393:191988): avc: denied { prog_load } for pid=19802 comm="syz.2.39168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2755.013210][ T29] audit: type=1400 audit(2000001221.433:191989): avc: denied { prog_run } for pid=19801 comm="syz.9.39167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2755.018065][T19804] syzkaller0: entered allmulticast mode [ 2755.128207][T19807] bridge1: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2755.262014][T19821] __nla_validate_parse: 10 callbacks suppressed [ 2755.262030][T19821] netlink: 20 bytes leftover after parsing attributes in process `syz.2.39171'. [ 2755.338329][T19833] netlink: 4 bytes leftover after parsing attributes in process `syz.0.39177'. [ 2755.360676][T19833] FAULT_INJECTION: forcing a failure. [ 2755.360676][T19833] name failslab, interval 1, probability 0, space 0, times 0 [ 2755.373359][T19833] CPU: 0 UID: 0 PID: 19833 Comm: syz.0.39177 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2755.373392][T19833] Tainted: [W]=WARN [ 2755.373400][T19833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2755.373482][T19833] Call Trace: [ 2755.373501][T19833] [ 2755.373508][T19833] __dump_stack+0x1d/0x30 [ 2755.373526][T19833] dump_stack_lvl+0xe8/0x140 [ 2755.373542][T19833] dump_stack+0x15/0x1b [ 2755.373556][T19833] should_fail_ex+0x265/0x280 [ 2755.373583][T19833] should_failslab+0x8c/0xb0 [ 2755.373660][T19833] kmem_cache_alloc_node_noprof+0x57/0x320 [ 2755.373693][T19833] ? __alloc_skb+0x101/0x320 [ 2755.373718][T19833] __alloc_skb+0x101/0x320 [ 2755.373857][T19833] netlink_alloc_large_skb+0xba/0xf0 [ 2755.373877][T19833] netlink_sendmsg+0x3cf/0x6b0 [ 2755.373901][T19833] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2755.373996][T19833] __sock_sendmsg+0x142/0x180 [ 2755.374025][T19833] ____sys_sendmsg+0x31e/0x4e0 [ 2755.374126][T19833] ___sys_sendmsg+0x17b/0x1d0 [ 2755.374177][T19833] __x64_sys_sendmsg+0xd4/0x160 [ 2755.374258][T19833] x64_sys_call+0x191e/0x2ff0 [ 2755.374357][T19833] do_syscall_64+0xd2/0x200 [ 2755.374385][T19833] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2755.374428][T19833] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2755.374457][T19833] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2755.374480][T19833] RIP: 0033:0x7feca3bbec29 [ 2755.374555][T19833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2755.374574][T19833] RSP: 002b:00007feca261f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2755.374590][T19833] RAX: ffffffffffffffda RBX: 00007feca3e05fa0 RCX: 00007feca3bbec29 [ 2755.374601][T19833] RDX: 0000000000000000 RSI: 0000200000005840 RDI: 0000000000000003 [ 2755.374613][T19833] RBP: 00007feca261f090 R08: 0000000000000000 R09: 0000000000000000 [ 2755.374625][T19833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2755.374657][T19833] R13: 00007feca3e06038 R14: 00007feca3e05fa0 R15: 00007ffdaf591968 [ 2755.374678][T19833] [ 2755.652371][T19842] syzkaller0: entered promiscuous mode [ 2755.658051][T19842] syzkaller0: entered allmulticast mode [ 2755.692791][T19842] netlink: 12 bytes leftover after parsing attributes in process `syz.2.39182'. [ 2755.717365][T19842] bridge2: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2755.748295][T19865] netlink: 24 bytes leftover after parsing attributes in process `syz.9.39190'. [ 2755.796698][T19865] netlink: 4 bytes leftover after parsing attributes in process `syz.9.39190'. [ 2756.049232][T19921] netlink: 24 bytes leftover after parsing attributes in process `syz.3.39205'. [ 2756.068059][T19921] netlink: 4 bytes leftover after parsing attributes in process `syz.3.39205'. [ 2756.161346][T19951] netlink: 20 bytes leftover after parsing attributes in process `syz.0.39211'. [ 2756.307374][T19966] selection: kmalloc() failed [ 2756.311435][T19964] lo speed is unknown, defaulting to 1000 [ 2756.352884][T19976] netlink: 24 bytes leftover after parsing attributes in process `syz.3.39220'. [ 2756.393974][T19976] netlink: 4 bytes leftover after parsing attributes in process `syz.3.39220'. [ 2756.394526][T19979] $Hÿ: renamed from bond0 (while UP) [ 2756.414609][T19979] $Hÿ: entered promiscuous mode [ 2756.419714][T19979] bond_slave_0: entered promiscuous mode [ 2756.425594][T19979] bond_slave_1: entered promiscuous mode [ 2756.446720][T19964] lo speed is unknown, defaulting to 1000 [ 2756.618560][T20038] lo speed is unknown, defaulting to 1000 [ 2756.665689][T20038] lo speed is unknown, defaulting to 1000 [ 2756.832488][T20060] lo speed is unknown, defaulting to 1000 [ 2756.846119][T20050] netlink: 'syz.3.39233': attribute type 13 has an invalid length. [ 2756.884101][T20050] gretap0: refused to change device tx_queue_len [ 2756.903861][T20050] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2756.935394][T20086] 9pnet_fd: Insufficient options for proto=fd [ 2757.076874][T20060] lo speed is unknown, defaulting to 1000 [ 2757.088211][T20092] siw: device registration error -23 [ 2757.176469][T20111] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2757.204377][T20111] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2757.709368][T20177] serio: Serial port ptm0 [ 2757.998512][T20199] usb usb1: usbfs: interface 0 claimed by hub while 'syz.9.39261' sets config #0 [ 2758.585523][T20215] lo speed is unknown, defaulting to 1000 [ 2758.719787][T20215] lo speed is unknown, defaulting to 1000 [ 2758.826675][T20243] FAULT_INJECTION: forcing a failure. [ 2758.826675][T20243] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2758.839856][T20243] CPU: 1 UID: 0 PID: 20243 Comm: syz.3.39267 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2758.839946][T20243] Tainted: [W]=WARN [ 2758.839955][T20243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2758.839970][T20243] Call Trace: [ 2758.839978][T20243] [ 2758.839986][T20243] __dump_stack+0x1d/0x30 [ 2758.840007][T20243] dump_stack_lvl+0xe8/0x140 [ 2758.840024][T20243] dump_stack+0x15/0x1b [ 2758.840038][T20243] should_fail_ex+0x265/0x280 [ 2758.840110][T20243] should_fail+0xb/0x20 [ 2758.840140][T20243] should_fail_usercopy+0x1a/0x20 [ 2758.840169][T20243] _copy_from_user+0x1c/0xb0 [ 2758.840199][T20243] ___sys_sendmsg+0xc1/0x1d0 [ 2758.840256][T20243] __x64_sys_sendmsg+0xd4/0x160 [ 2758.840289][T20243] x64_sys_call+0x191e/0x2ff0 [ 2758.840387][T20243] do_syscall_64+0xd2/0x200 [ 2758.840484][T20243] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2758.840512][T20243] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2758.840546][T20243] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2758.840637][T20243] RIP: 0033:0x7fd770bdec29 [ 2758.840681][T20243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2758.840702][T20243] RSP: 002b:00007fd76f647038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2758.840722][T20243] RAX: ffffffffffffffda RBX: 00007fd770e25fa0 RCX: 00007fd770bdec29 [ 2758.840734][T20243] RDX: 0000000000044000 RSI: 0000200000000240 RDI: 0000000000000005 [ 2758.840811][T20243] RBP: 00007fd76f647090 R08: 0000000000000000 R09: 0000000000000000 [ 2758.840833][T20243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2758.840846][T20243] R13: 00007fd770e26038 R14: 00007fd770e25fa0 R15: 00007ffcb5a3b608 [ 2758.840865][T20243] [ 2759.127343][T20247] FAULT_INJECTION: forcing a failure. [ 2759.127343][T20247] name failslab, interval 1, probability 0, space 0, times 0 [ 2759.140188][T20247] CPU: 0 UID: 0 PID: 20247 Comm: syz.3.39269 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2759.140215][T20247] Tainted: [W]=WARN [ 2759.140221][T20247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2759.140234][T20247] Call Trace: [ 2759.140241][T20247] [ 2759.140304][T20247] __dump_stack+0x1d/0x30 [ 2759.140322][T20247] dump_stack_lvl+0xe8/0x140 [ 2759.140338][T20247] dump_stack+0x15/0x1b [ 2759.140351][T20247] should_fail_ex+0x265/0x280 [ 2759.140376][T20247] should_failslab+0x8c/0xb0 [ 2759.140480][T20247] __kvmalloc_node_noprof+0x123/0x4e0 [ 2759.140513][T20247] ? tun_device_event+0x491/0x980 [ 2759.140536][T20247] tun_device_event+0x491/0x980 [ 2759.140574][T20247] ? inetdev_event+0x566/0xc10 [ 2759.140703][T20247] ? macvtap_device_event+0x58/0x300 [ 2759.140736][T20247] ? __pfx_tun_device_event+0x10/0x10 [ 2759.140807][T20247] raw_notifier_call_chain+0x6f/0x1b0 [ 2759.140860][T20247] ? call_netdevice_notifiers_info+0x9c/0x100 [ 2759.140896][T20247] call_netdevice_notifiers_info+0xae/0x100 [ 2759.140943][T20247] netif_change_tx_queue_len+0xba/0x170 [ 2759.140971][T20247] dev_change_tx_queue_len+0xc0/0x170 [ 2759.140996][T20247] dev_ifsioc+0x1a1/0xaa0 [ 2759.141097][T20247] ? __rcu_read_unlock+0x4f/0x70 [ 2759.141180][T20247] dev_ioctl+0x70a/0x960 [ 2759.141261][T20247] sock_do_ioctl+0x197/0x220 [ 2759.141298][T20247] sock_ioctl+0x41b/0x610 [ 2759.141369][T20247] ? __pfx_sock_ioctl+0x10/0x10 [ 2759.141399][T20247] __se_sys_ioctl+0xce/0x140 [ 2759.141436][T20247] __x64_sys_ioctl+0x43/0x50 [ 2759.141457][T20247] x64_sys_call+0x1816/0x2ff0 [ 2759.141480][T20247] do_syscall_64+0xd2/0x200 [ 2759.141567][T20247] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2759.141591][T20247] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2759.141698][T20247] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2759.141722][T20247] RIP: 0033:0x7fd770bdec29 [ 2759.141739][T20247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2759.141760][T20247] RSP: 002b:00007fd76f647038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2759.141798][T20247] RAX: ffffffffffffffda RBX: 00007fd770e25fa0 RCX: 00007fd770bdec29 [ 2759.141809][T20247] RDX: 0000200000002280 RSI: 0000000000008943 RDI: 0000000000000004 [ 2759.141819][T20247] RBP: 00007fd76f647090 R08: 0000000000000000 R09: 0000000000000000 [ 2759.141886][T20247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2759.141897][T20247] R13: 00007fd770e26038 R14: 00007fd770e25fa0 R15: 00007ffcb5a3b608 [ 2759.141913][T20247] [ 2759.141923][T20247] syzkaller0: refused to change device tx_queue_len [ 2759.925300][ T29] kauditd_printk_skb: 411 callbacks suppressed [ 2759.925331][ T29] audit: type=1400 audit(2000001226.394:192401): avc: granted { setsecparam } for pid=20289 comm="syz.2.39282" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 2760.097171][ T29] audit: type=1400 audit(2000001226.564:192402): avc: denied { create } for pid=20295 comm="syz.2.39285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2760.134337][ T29] audit: type=1400 audit(2000001226.584:192403): avc: denied { bind } for pid=20295 comm="syz.2.39285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2760.154647][ T29] audit: type=1400 audit(2000001226.584:192404): avc: denied { setopt } for pid=20295 comm="syz.2.39285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2760.174942][ T29] audit: type=1400 audit(2000001226.584:192405): avc: denied { write } for pid=20295 comm="syz.2.39285" path="socket:[448009]" dev="sockfs" ino=448009 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2760.270023][ T29] audit: type=1326 audit(2000001226.604:192406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20300 comm="syz.0.39287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feca3bbec29 code=0x7ffc0000 [ 2760.293887][ T29] audit: type=1326 audit(2000001226.604:192407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20300 comm="syz.0.39287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feca3bbec29 code=0x7ffc0000 [ 2760.317757][ T29] audit: type=1326 audit(2000001226.604:192408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20300 comm="syz.0.39287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feca3bbec29 code=0x7ffc0000 [ 2760.341510][ T29] audit: type=1326 audit(2000001226.604:192409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20300 comm="syz.0.39287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feca3bbec29 code=0x7ffc0000 [ 2760.365496][ T29] audit: type=1326 audit(2000001226.604:192410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20300 comm="syz.0.39287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feca3bbec29 code=0x7ffc0000 [ 2760.520141][T20333] __nla_validate_parse: 12 callbacks suppressed [ 2760.520156][T20333] netlink: 24 bytes leftover after parsing attributes in process `syz.0.39298'. [ 2760.552459][T20331] netlink: 24 bytes leftover after parsing attributes in process `syz.2.39300'. [ 2760.566715][T20352] syzkaller0: entered promiscuous mode [ 2760.572213][T20352] syzkaller0: entered allmulticast mode [ 2760.589013][T20352] netlink: 12 bytes leftover after parsing attributes in process `syz.9.39303'. [ 2760.602656][T20359] netlink: 4 bytes leftover after parsing attributes in process `syz.3.39302'. [ 2760.602855][T20355] netlink: 24 bytes leftover after parsing attributes in process `syz.2.39304'. [ 2760.627964][T20352] bridge6: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2760.639787][T20337] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2760.648329][T20337] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2761.277821][T20405] netlink: 24 bytes leftover after parsing attributes in process `syz.7.39316'. [ 2761.288764][T20407] netlink: 12 bytes leftover after parsing attributes in process `syz.3.39317'. [ 2761.323470][T20425] netlink: 12 bytes leftover after parsing attributes in process `syz.3.39319'. [ 2761.337708][T20425] bridge3: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2761.347690][T20423] lo speed is unknown, defaulting to 1000 [ 2761.385743][T20423] lo speed is unknown, defaulting to 1000 [ 2761.435892][T20423] 9pnet_fd: Insufficient options for proto=fd [ 2761.475855][T20462] netlink: 24 bytes leftover after parsing attributes in process `syz.3.39322'. [ 2761.872750][T20514] netlink: 24 bytes leftover after parsing attributes in process `syz.7.39334'. [ 2761.889825][T20494] FAULT_INJECTION: forcing a failure. [ 2761.889825][T20494] name failslab, interval 1, probability 0, space 0, times 0 [ 2761.902481][T20494] CPU: 1 UID: 0 PID: 20494 Comm: syz.0.39330 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2761.902514][T20494] Tainted: [W]=WARN [ 2761.902522][T20494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2761.902535][T20494] Call Trace: [ 2761.902542][T20494] [ 2761.902550][T20494] __dump_stack+0x1d/0x30 [ 2761.902574][T20494] dump_stack_lvl+0xe8/0x140 [ 2761.902591][T20494] dump_stack+0x15/0x1b [ 2761.902609][T20494] should_fail_ex+0x265/0x280 [ 2761.902636][T20494] should_failslab+0x8c/0xb0 [ 2761.902661][T20494] kmem_cache_alloc_noprof+0x50/0x310 [ 2761.902684][T20494] ? mas_alloc_nodes+0x265/0x520 [ 2761.902712][T20494] mas_alloc_nodes+0x265/0x520 [ 2761.902747][T20494] mas_preallocate+0x33e/0x520 [ 2761.902783][T20494] __split_vma+0x240/0x650 [ 2761.902810][T20494] ? __mpol_equal+0x2e/0x1e0 [ 2761.902843][T20494] ? can_vma_merge_right+0x105/0x2e0 [ 2761.902866][T20494] vma_modify+0x21e/0xc80 [ 2761.902888][T20494] vma_modify_policy+0x101/0x130 [ 2761.902915][T20494] mbind_range+0x1b8/0x440 [ 2761.902935][T20494] ? mas_find+0x5d5/0x700 [ 2761.902967][T20494] __se_sys_mbind+0x648/0xac0 [ 2761.903002][T20494] __x64_sys_mbind+0x78/0x90 [ 2761.903026][T20494] x64_sys_call+0x2932/0x2ff0 [ 2761.903043][T20494] do_syscall_64+0xd2/0x200 [ 2761.903073][T20494] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2761.903098][T20494] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2761.903129][T20494] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2761.903147][T20494] RIP: 0033:0x7feca3bbec29 [ 2761.903163][T20494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2761.903178][T20494] RSP: 002b:00007feca261f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 2761.903196][T20494] RAX: ffffffffffffffda RBX: 00007feca3e05fa0 RCX: 00007feca3bbec29 [ 2761.903209][T20494] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000001000 [ 2761.903221][T20494] RBP: 00007feca261f090 R08: 0000000000000000 R09: 0000000000000000 [ 2761.903231][T20494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2761.903241][T20494] R13: 00007feca3e06038 R14: 00007feca3e05fa0 R15: 00007ffdaf591968 [ 2761.903257][T20494] [ 2762.469082][T20555] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2762.478755][T20555] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2762.984043][T20598] netlink: 'syz.3.39355': attribute type 13 has an invalid length. [ 2763.006883][T20598] gretap0: refused to change device tx_queue_len [ 2763.027424][T20598] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2763.066052][T20598] siw: device registration error -23 [ 2763.344365][T20628] lo speed is unknown, defaulting to 1000 [ 2763.375108][T20639] netlink: 'syz.2.39369': attribute type 13 has an invalid length. [ 2763.386904][T20639] gretap0: refused to change device tx_queue_len [ 2763.394149][T20639] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2763.435384][T20642] bridge7: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2763.446420][T20628] lo speed is unknown, defaulting to 1000 [ 2763.455691][T20639] siw: device registration error -23 [ 2763.555541][T20680] lo speed is unknown, defaulting to 1000 [ 2763.662333][T20680] lo speed is unknown, defaulting to 1000 [ 2764.718020][T20758] syzkaller0: entered promiscuous mode [ 2764.723583][T20758] syzkaller0: entered allmulticast mode [ 2764.752323][T20758] bridge3: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2764.806419][T20766] lo speed is unknown, defaulting to 1000 [ 2764.900135][T20786] netlink: 'syz.7.39401': attribute type 10 has an invalid length. [ 2764.994199][T20766] lo speed is unknown, defaulting to 1000 [ 2765.047705][ T29] kauditd_printk_skb: 308 callbacks suppressed [ 2765.047718][ T29] audit: type=1326 audit(2000001231.515:192719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20814 comm="syz.2.39404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2765.129881][ T29] audit: type=1326 audit(2000001231.515:192720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20814 comm="syz.2.39404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2765.153953][ T29] audit: type=1326 audit(2000001231.515:192721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20814 comm="syz.2.39404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2765.177730][ T29] audit: type=1326 audit(2000001231.515:192722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20814 comm="syz.2.39404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2765.201718][ T29] audit: type=1326 audit(2000001231.525:192723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20814 comm="syz.2.39404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2765.365718][ T29] audit: type=1326 audit(2000001231.695:192724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20814 comm="syz.2.39404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2765.389646][ T29] audit: type=1326 audit(2000001231.695:192725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20814 comm="syz.2.39404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2765.413486][ T29] audit: type=1326 audit(2000001231.715:192726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20814 comm="syz.2.39404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=218 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2765.437445][ T29] audit: type=1326 audit(2000001231.715:192727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20814 comm="syz.2.39404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2765.461345][ T29] audit: type=1326 audit(2000001231.715:192728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20814 comm="syz.2.39404" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2765.632620][T20838] __nla_validate_parse: 6 callbacks suppressed [ 2765.632632][T20838] netlink: 8 bytes leftover after parsing attributes in process `syz.3.39410'. [ 2765.667703][T20831] lo speed is unknown, defaulting to 1000 [ 2765.707692][T20838] netlink: 4 bytes leftover after parsing attributes in process `syz.3.39410'. [ 2765.778163][T20831] lo speed is unknown, defaulting to 1000 [ 2766.367883][T20924] lo speed is unknown, defaulting to 1000 [ 2766.524287][T20924] lo speed is unknown, defaulting to 1000 [ 2766.659226][T20963] netlink: 'syz.3.39435': attribute type 13 has an invalid length. [ 2766.669802][T20963] gretap0: refused to change device tx_queue_len [ 2766.677655][T20963] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2766.705269][T20963] siw: device registration error -23 [ 2766.845436][T20987] syzkaller0: entered promiscuous mode [ 2766.851005][T20987] syzkaller0: entered allmulticast mode [ 2766.875104][T20994] netlink: 20 bytes leftover after parsing attributes in process `syz.0.39446'. [ 2766.885339][T20987] netlink: 12 bytes leftover after parsing attributes in process `syz.2.39444'. [ 2766.898662][T20987] bridge4: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2766.949297][T21003] netlink: 4 bytes leftover after parsing attributes in process `syz.9.39449'. [ 2767.045484][T21024] netlink: 24 bytes leftover after parsing attributes in process `syz.9.39458'. [ 2767.078523][T21038] netlink: 12 bytes leftover after parsing attributes in process `syz.0.39459'. [ 2767.093151][T21038] bridge5: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2767.179787][T21056] netlink: 20 bytes leftover after parsing attributes in process `syz.7.39467'. [ 2767.404616][T21072] netlink: 12 bytes leftover after parsing attributes in process `syz.2.39473'. [ 2767.420665][T21072] bridge5: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2767.452075][T21078] netlink: 12 bytes leftover after parsing attributes in process `syz.2.39475'. [ 2767.619906][T21117] bridge8: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2767.910172][T21151] bridge4: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2769.198865][T21228] lo speed is unknown, defaulting to 1000 [ 2769.290633][T21228] lo speed is unknown, defaulting to 1000 [ 2769.305939][T21252] lo speed is unknown, defaulting to 1000 [ 2769.349335][T21257] FAULT_INJECTION: forcing a failure. [ 2769.349335][T21257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2769.362520][T21257] CPU: 1 UID: 0 PID: 21257 Comm: syz.7.39535 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2769.362581][T21257] Tainted: [W]=WARN [ 2769.362587][T21257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2769.362646][T21257] Call Trace: [ 2769.362653][T21257] [ 2769.362661][T21257] __dump_stack+0x1d/0x30 [ 2769.362685][T21257] dump_stack_lvl+0xe8/0x140 [ 2769.362703][T21257] dump_stack+0x15/0x1b [ 2769.362716][T21257] should_fail_ex+0x265/0x280 [ 2769.362737][T21257] should_fail+0xb/0x20 [ 2769.362794][T21257] should_fail_usercopy+0x1a/0x20 [ 2769.362821][T21257] _copy_from_iter+0xd2/0xe80 [ 2769.362922][T21257] ? mntput_no_expire+0x6f/0x460 [ 2769.362951][T21257] ? mntput+0x4b/0x80 [ 2769.363092][T21257] tun_get_user+0x3d0/0x2680 [ 2769.363116][T21257] ? _parse_integer_limit+0x170/0x190 [ 2769.363138][T21257] ? ref_tracker_alloc+0x1f2/0x2f0 [ 2769.363160][T21257] ? selinux_file_permission+0x1e4/0x320 [ 2769.363197][T21257] tun_chr_write_iter+0x15e/0x210 [ 2769.363213][T21257] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 2769.363228][T21257] vfs_write+0x527/0x960 [ 2769.363252][T21257] ksys_write+0xda/0x1a0 [ 2769.363282][T21257] __x64_sys_write+0x40/0x50 [ 2769.363306][T21257] x64_sys_call+0x27fe/0x2ff0 [ 2769.363329][T21257] do_syscall_64+0xd2/0x200 [ 2769.363372][T21257] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2769.363398][T21257] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2769.363427][T21257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2769.363445][T21257] RIP: 0033:0x7fb2a41dec29 [ 2769.363457][T21257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2769.363472][T21257] RSP: 002b:00007fb2a2c47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2769.363492][T21257] RAX: ffffffffffffffda RBX: 00007fb2a4425fa0 RCX: 00007fb2a41dec29 [ 2769.363503][T21257] RDX: 000000000000fdef RSI: 0000200000000240 RDI: 0000000000000003 [ 2769.363537][T21257] RBP: 00007fb2a2c47090 R08: 0000000000000000 R09: 0000000000000000 [ 2769.363551][T21257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2769.363564][T21257] R13: 00007fb2a4426038 R14: 00007fb2a4425fa0 R15: 00007fffac817f58 [ 2769.363583][T21257] [ 2769.617550][T21252] lo speed is unknown, defaulting to 1000 [ 2770.338040][ T29] kauditd_printk_skb: 267 callbacks suppressed [ 2770.338054][ T29] audit: type=1400 audit(2000001236.796:192996): avc: denied { sys_module } for pid=21316 comm="syz.3.39538" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2770.390465][ T29] audit: type=1400 audit(2000001236.836:192997): avc: denied { create } for pid=21324 comm="syz.0.39539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2770.410433][ T29] audit: type=1400 audit(2000001236.836:192998): avc: denied { create } for pid=21324 comm="syz.0.39539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2770.431512][ T29] audit: type=1400 audit(2000001236.836:192999): avc: denied { write } for pid=21324 comm="syz.0.39539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2770.452435][ T29] audit: type=1400 audit(2000001236.836:193000): avc: denied { setopt } for pid=21324 comm="syz.0.39539" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2770.490714][ T29] audit: type=1400 audit(2000001236.946:193001): avc: denied { create } for pid=21327 comm="syz.3.39540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2770.510498][ T29] audit: type=1400 audit(2000001236.946:193002): avc: denied { write } for pid=21327 comm="syz.3.39540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2770.530163][ T29] audit: type=1400 audit(2000001236.946:193003): avc: denied { create } for pid=21327 comm="syz.3.39540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2770.589243][T21331] lo speed is unknown, defaulting to 1000 [ 2770.593278][ T29] audit: type=1400 audit(2000001237.016:193004): avc: denied { write } for pid=21327 comm="syz.3.39540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2770.614810][ T29] audit: type=1400 audit(2000001237.016:193005): avc: denied { connect } for pid=21327 comm="syz.3.39540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2770.729310][T21331] lo speed is unknown, defaulting to 1000 [ 2770.729483][T21335] lo speed is unknown, defaulting to 1000 [ 2770.969333][T21335] lo speed is unknown, defaulting to 1000 [ 2771.060053][T21335] cgroup: fork rejected by pids controller in /syz3 [ 2771.281770][T21417] __nla_validate_parse: 15 callbacks suppressed [ 2771.281787][T21417] netlink: 20 bytes leftover after parsing attributes in process `syz.2.39551'. [ 2771.419821][T21422] lo speed is unknown, defaulting to 1000 [ 2771.456414][T21422] lo speed is unknown, defaulting to 1000 [ 2771.833996][T21476] FAULT_INJECTION: forcing a failure. [ 2771.833996][T21476] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2771.847072][T21476] CPU: 0 UID: 0 PID: 21476 Comm: syz.9.39564 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2771.847100][T21476] Tainted: [W]=WARN [ 2771.847106][T21476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2771.847127][T21476] Call Trace: [ 2771.847134][T21476] [ 2771.847141][T21476] __dump_stack+0x1d/0x30 [ 2771.847163][T21476] dump_stack_lvl+0xe8/0x140 [ 2771.847181][T21476] dump_stack+0x15/0x1b [ 2771.847200][T21476] should_fail_ex+0x265/0x280 [ 2771.847299][T21476] should_fail+0xb/0x20 [ 2771.847317][T21476] should_fail_usercopy+0x1a/0x20 [ 2771.847344][T21476] _copy_from_user+0x1c/0xb0 [ 2771.847430][T21476] ___sys_sendmsg+0xc1/0x1d0 [ 2771.847472][T21476] __x64_sys_sendmsg+0xd4/0x160 [ 2771.847562][T21476] x64_sys_call+0x191e/0x2ff0 [ 2771.847581][T21476] do_syscall_64+0xd2/0x200 [ 2771.847617][T21476] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2771.847644][T21476] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2771.847705][T21476] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2771.847780][T21476] RIP: 0033:0x7f3c2263ec29 [ 2771.847793][T21476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2771.847807][T21476] RSP: 002b:00007f3c210a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2771.847824][T21476] RAX: ffffffffffffffda RBX: 00007f3c22885fa0 RCX: 00007f3c2263ec29 [ 2771.847838][T21476] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000004 [ 2771.847852][T21476] RBP: 00007f3c210a7090 R08: 0000000000000000 R09: 0000000000000000 [ 2771.847909][T21476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2771.847919][T21476] R13: 00007f3c22886038 R14: 00007f3c22885fa0 R15: 00007ffe9c8db138 [ 2771.847935][T21476] [ 2772.130474][T21487] netlink: 8 bytes leftover after parsing attributes in process `syz.9.39569'. [ 2772.158104][T21487] netlink: 4 bytes leftover after parsing attributes in process `syz.9.39569'. [ 2772.169049][T21490] lo speed is unknown, defaulting to 1000 [ 2772.182857][T21487] hsr_slave_1 (unregistering): left promiscuous mode [ 2772.259339][T21490] lo speed is unknown, defaulting to 1000 [ 2772.549953][T21544] netlink: 'syz.2.39577': attribute type 13 has an invalid length. [ 2772.561015][T21544] gretap0: refused to change device tx_queue_len [ 2772.586230][T21544] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2772.603740][T21548] siw: device registration error -23 [ 2772.700168][T21556] block device autoloading is deprecated and will be removed. [ 2772.715176][T21560] netlink: 20 bytes leftover after parsing attributes in process `syz.2.39583'. [ 2772.819778][T21566] netlink: 24 bytes leftover after parsing attributes in process `syz.2.39586'. [ 2772.969550][T21581] netlink: 12 bytes leftover after parsing attributes in process `syz.0.39593'. [ 2773.019306][T21581] bridge6: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2773.114163][T21593] netlink: 24 bytes leftover after parsing attributes in process `syz.7.39598'. [ 2773.336948][T21621] netlink: 24 bytes leftover after parsing attributes in process `syz.9.39610'. [ 2773.617329][T21660] netlink: 8 bytes leftover after parsing attributes in process `syz.9.39623'. [ 2773.662911][T21660] netlink: 4 bytes leftover after parsing attributes in process `syz.9.39623'. [ 2773.718040][T21673] FAULT_INJECTION: forcing a failure. [ 2773.718040][T21673] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2773.731247][T21673] CPU: 1 UID: 0 PID: 21673 Comm: syz.9.39626 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2773.731278][T21673] Tainted: [W]=WARN [ 2773.731285][T21673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2773.731300][T21673] Call Trace: [ 2773.731308][T21673] [ 2773.731316][T21673] __dump_stack+0x1d/0x30 [ 2773.731341][T21673] dump_stack_lvl+0xe8/0x140 [ 2773.731383][T21673] dump_stack+0x15/0x1b [ 2773.731396][T21673] should_fail_ex+0x265/0x280 [ 2773.731417][T21673] should_fail+0xb/0x20 [ 2773.731457][T21673] should_fail_usercopy+0x1a/0x20 [ 2773.731535][T21673] _copy_from_iter+0xd2/0xe80 [ 2773.731578][T21673] ? alloc_pages_mpol+0x201/0x250 [ 2773.731696][T21673] copy_page_from_iter+0x178/0x2a0 [ 2773.731737][T21673] tun_get_user+0x679/0x2680 [ 2773.731794][T21673] ? ref_tracker_alloc+0x1f2/0x2f0 [ 2773.731829][T21673] tun_chr_write_iter+0x15e/0x210 [ 2773.731852][T21673] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 2773.731872][T21673] vfs_write+0x527/0x960 [ 2773.731897][T21673] ksys_write+0xda/0x1a0 [ 2773.731977][T21673] __x64_sys_write+0x40/0x50 [ 2773.731998][T21673] x64_sys_call+0x27fe/0x2ff0 [ 2773.732022][T21673] do_syscall_64+0xd2/0x200 [ 2773.732057][T21673] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2773.732120][T21673] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2773.732154][T21673] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2773.732173][T21673] RIP: 0033:0x7f3c2263d6df [ 2773.732186][T21673] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 2773.732209][T21673] RSP: 002b:00007f3c210a7000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2773.732231][T21673] RAX: ffffffffffffffda RBX: 00007f3c22885fa0 RCX: 00007f3c2263d6df [ 2773.732293][T21673] RDX: 00000000000000d2 RSI: 00002000000000c0 RDI: 00000000000000c8 [ 2773.732355][T21673] RBP: 00007f3c210a7090 R08: 0000000000000000 R09: 0000000000000000 [ 2773.732370][T21673] R10: 00000000000000d2 R11: 0000000000000293 R12: 0000000000000001 [ 2773.732386][T21673] R13: 00007f3c22886038 R14: 00007f3c22885fa0 R15: 00007ffe9c8db138 [ 2773.732410][T21673] [ 2773.995437][T21677] bridge7: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2774.025916][T21683] netlink: 'syz.7.39629': attribute type 13 has an invalid length. [ 2774.040726][T21683] gretap0: refused to change device tx_queue_len [ 2774.048751][T21683] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2774.064554][T13045] lo speed is unknown, defaulting to 1000 [ 2774.280657][T21729] netlink: 'syz.7.39642': attribute type 13 has an invalid length. [ 2774.291883][T21729] gretap0: refused to change device tx_queue_len [ 2774.298758][T21729] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2774.469292][T21775] netlink: 'syz.7.39656': attribute type 13 has an invalid length. [ 2774.488610][T21775] gretap0: refused to change device tx_queue_len [ 2774.504149][T21775] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2774.588423][T21786] lo speed is unknown, defaulting to 1000 [ 2774.710242][T21786] lo speed is unknown, defaulting to 1000 [ 2774.746763][T21824] netlink: 'syz.9.39671': attribute type 13 has an invalid length. [ 2774.795373][T21824] gretap0: refused to change device tx_queue_len [ 2774.802131][T21841] siw: device registration error -23 [ 2774.821064][T21824] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2774.909171][T21859] FAULT_INJECTION: forcing a failure. [ 2774.909171][T21859] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2774.922287][T21859] CPU: 0 UID: 0 PID: 21859 Comm: syz.9.39676 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2774.922325][T21859] Tainted: [W]=WARN [ 2774.922334][T21859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2774.922345][T21859] Call Trace: [ 2774.922351][T21859] [ 2774.922357][T21859] __dump_stack+0x1d/0x30 [ 2774.922376][T21859] dump_stack_lvl+0xe8/0x140 [ 2774.922442][T21859] dump_stack+0x15/0x1b [ 2774.922461][T21859] should_fail_ex+0x265/0x280 [ 2774.922495][T21859] should_fail+0xb/0x20 [ 2774.922513][T21859] should_fail_usercopy+0x1a/0x20 [ 2774.922616][T21859] _copy_to_user+0x20/0xa0 [ 2774.922652][T21859] bpf_test_finish+0x15c/0x500 [ 2774.922726][T21859] bpf_prog_test_run_skb+0xb2b/0xbd0 [ 2774.922758][T21859] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 2774.922785][T21859] bpf_prog_test_run+0x22a/0x390 [ 2774.922819][T21859] __sys_bpf+0x4b9/0x7b0 [ 2774.922875][T21859] __x64_sys_bpf+0x41/0x50 [ 2774.922924][T21859] x64_sys_call+0x2aea/0x2ff0 [ 2774.922949][T21859] do_syscall_64+0xd2/0x200 [ 2774.922994][T21859] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2774.923072][T21859] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2774.923100][T21859] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2774.923137][T21859] RIP: 0033:0x7f3c2263ec29 [ 2774.923151][T21859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2774.923171][T21859] RSP: 002b:00007f3c210a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2774.923191][T21859] RAX: ffffffffffffffda RBX: 00007f3c22885fa0 RCX: 00007f3c2263ec29 [ 2774.923204][T21859] RDX: 0000000000000024 RSI: 0000200000000640 RDI: 000000000000000a [ 2774.923266][T21859] RBP: 00007f3c210a7090 R08: 0000000000000000 R09: 0000000000000000 [ 2774.923276][T21859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2774.923286][T21859] R13: 00007f3c22886038 R14: 00007f3c22885fa0 R15: 00007ffe9c8db138 [ 2774.923302][T21859] [ 2775.219886][T21876] bridge_slave_1: left allmulticast mode [ 2775.225748][T21876] bridge_slave_1: left promiscuous mode [ 2775.231544][T21876] bridge0: port 2(bridge_slave_1) entered disabled state [ 2775.243528][T21876] bridge_slave_0: left allmulticast mode [ 2775.249293][T21876] bridge_slave_0: left promiscuous mode [ 2775.254949][T21876] bridge0: port 1(bridge_slave_0) entered disabled state [ 2775.418468][ T29] kauditd_printk_skb: 336 callbacks suppressed [ 2775.418483][ T29] audit: type=1400 audit(2000001241.877:193340): avc: denied { write } for pid=21904 comm="syz.2.39692" path="socket:[451311]" dev="sockfs" ino=451311 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2775.647984][T21924] bridge6: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2775.807810][ T29] audit: type=1326 audit(2000001242.267:193341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21933 comm="syz.2.39703" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2775.831684][ T29] audit: type=1326 audit(2000001242.267:193342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21933 comm="syz.2.39703" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2775.893678][ T29] audit: type=1326 audit(2000001242.317:193343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21933 comm="syz.2.39703" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2775.917467][ T29] audit: type=1326 audit(2000001242.317:193344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21933 comm="syz.2.39703" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2775.941492][ T29] audit: type=1326 audit(2000001242.317:193345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21933 comm="syz.2.39703" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2775.965420][ T29] audit: type=1326 audit(2000001242.317:193346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21933 comm="syz.2.39703" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2775.989242][ T29] audit: type=1326 audit(2000001242.317:193347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21933 comm="syz.2.39703" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2776.013001][ T29] audit: type=1326 audit(2000001242.317:193348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21933 comm="syz.2.39703" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2776.036622][ T29] audit: type=1326 audit(2000001242.317:193349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21933 comm="syz.2.39703" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4307e0ec29 code=0x7ffc0000 [ 2776.302289][T21982] block device autoloading is deprecated and will be removed. [ 2776.345463][T21990] netlink: 'syz.9.39726': attribute type 13 has an invalid length. [ 2776.358514][T21990] gretap0: refused to change device tx_queue_len [ 2776.366643][T21990] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2776.593806][T21992] lo speed is unknown, defaulting to 1000 [ 2776.660962][T21992] lo speed is unknown, defaulting to 1000 [ 2776.899308][T22041] FAULT_INJECTION: forcing a failure. [ 2776.899308][T22041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2776.912430][T22041] CPU: 0 UID: 0 PID: 22041 Comm: syz.3.39737 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2776.912472][T22041] Tainted: [W]=WARN [ 2776.912479][T22041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2776.912491][T22041] Call Trace: [ 2776.912496][T22041] [ 2776.912502][T22041] __dump_stack+0x1d/0x30 [ 2776.912521][T22041] dump_stack_lvl+0xe8/0x140 [ 2776.912611][T22041] dump_stack+0x15/0x1b [ 2776.912629][T22041] should_fail_ex+0x265/0x280 [ 2776.912656][T22041] should_fail+0xb/0x20 [ 2776.912679][T22041] should_fail_usercopy+0x1a/0x20 [ 2776.912746][T22041] _copy_from_user+0x1c/0xb0 [ 2776.912829][T22041] ____sys_sendmsg+0x1c5/0x4e0 [ 2776.912862][T22041] ___sys_sendmsg+0x17b/0x1d0 [ 2776.912921][T22041] __x64_sys_sendmsg+0xd4/0x160 [ 2776.912950][T22041] x64_sys_call+0x191e/0x2ff0 [ 2776.912968][T22041] do_syscall_64+0xd2/0x200 [ 2776.913047][T22041] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2776.913075][T22041] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2776.913134][T22041] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2776.913224][T22041] RIP: 0033:0x7fd770bdec29 [ 2776.913235][T22041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2776.913249][T22041] RSP: 002b:00007fd76f647038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2776.913268][T22041] RAX: ffffffffffffffda RBX: 00007fd770e25fa0 RCX: 00007fd770bdec29 [ 2776.913286][T22041] RDX: 0000000000000000 RSI: 0000200000001600 RDI: 0000000000000006 [ 2776.913295][T22041] RBP: 00007fd76f647090 R08: 0000000000000000 R09: 0000000000000000 [ 2776.913304][T22041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2776.913314][T22041] R13: 00007fd770e26038 R14: 00007fd770e25fa0 R15: 00007ffcb5a3b608 [ 2776.913328][T22041] [ 2777.137542][T22051] FAULT_INJECTION: forcing a failure. [ 2777.137542][T22051] name failslab, interval 1, probability 0, space 0, times 0 [ 2777.150276][T22051] CPU: 0 UID: 0 PID: 22051 Comm: syz.0.39741 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2777.150330][T22051] Tainted: [W]=WARN [ 2777.150336][T22051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2777.150347][T22051] Call Trace: [ 2777.150352][T22051] [ 2777.150358][T22051] __dump_stack+0x1d/0x30 [ 2777.150377][T22051] dump_stack_lvl+0xe8/0x140 [ 2777.150451][T22051] dump_stack+0x15/0x1b [ 2777.150465][T22051] should_fail_ex+0x265/0x280 [ 2777.150486][T22051] should_failslab+0x8c/0xb0 [ 2777.150508][T22051] kmem_cache_alloc_node_noprof+0x57/0x320 [ 2777.150606][T22051] ? set_task_ioprio+0x174/0x270 [ 2777.150630][T22051] set_task_ioprio+0x174/0x270 [ 2777.150653][T22051] __se_sys_ioprio_set+0x465/0x5a0 [ 2777.150755][T22051] ? trace_sys_enter+0xd0/0xf0 [ 2777.150776][T22051] __x64_sys_ioprio_set+0x43/0x50 [ 2777.150805][T22051] x64_sys_call+0x2faf/0x2ff0 [ 2777.150890][T22051] do_syscall_64+0xd2/0x200 [ 2777.150918][T22051] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2777.150938][T22051] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2777.151044][T22051] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2777.151062][T22051] RIP: 0033:0x7feca3bbec29 [ 2777.151075][T22051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2777.151090][T22051] RSP: 002b:00007feca261f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fb [ 2777.151152][T22051] RAX: ffffffffffffffda RBX: 00007feca3e05fa0 RCX: 00007feca3bbec29 [ 2777.151163][T22051] RDX: 0000000000004000 RSI: 0000000000000000 RDI: 0000000000000002 [ 2777.151173][T22051] RBP: 00007feca261f090 R08: 0000000000000000 R09: 0000000000000000 [ 2777.151184][T22051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2777.151194][T22051] R13: 00007feca3e06038 R14: 00007feca3e05fa0 R15: 00007ffdaf591968 [ 2777.151210][T22051] [ 2777.376652][T22054] __nla_validate_parse: 12 callbacks suppressed [ 2777.376669][T22054] netlink: 12 bytes leftover after parsing attributes in process `syz.3.39743'. [ 2777.398952][T22057] netlink: 24 bytes leftover after parsing attributes in process `syz.0.39744'. [ 2777.411217][T22054] bridge5: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2777.525536][T22079] netlink: 4 bytes leftover after parsing attributes in process `syz.9.39752'. [ 2777.586654][T22079] netlink: 4 bytes leftover after parsing attributes in process `syz.9.39752'. [ 2777.695901][T22100] netlink: 12 bytes leftover after parsing attributes in process `syz.0.39758'. [ 2777.714926][T22100] bridge7: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2777.816117][T22111] SELinux: failed to load policy [ 2777.920712][T22126] netlink: 24 bytes leftover after parsing attributes in process `syz.9.39766'. [ 2777.937789][T22128] netlink: 24 bytes leftover after parsing attributes in process `syz.7.39768'. [ 2777.995860][T22139] netlink: 12 bytes leftover after parsing attributes in process `syz.7.39771'. [ 2778.015323][T22139] bridge9: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2778.398636][T22168] netlink: 24 bytes leftover after parsing attributes in process `syz.3.39779'. [ 2778.883899][T22211] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=22211 comm=syz.2.39790 [ 2778.922705][T22211] FAULT_INJECTION: forcing a failure. [ 2778.922705][T22211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2778.935865][T22211] CPU: 1 UID: 0 PID: 22211 Comm: syz.2.39790 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2778.935899][T22211] Tainted: [W]=WARN [ 2778.935908][T22211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2778.935924][T22211] Call Trace: [ 2778.935932][T22211] [ 2778.935940][T22211] __dump_stack+0x1d/0x30 [ 2778.936034][T22211] dump_stack_lvl+0xe8/0x140 [ 2778.936058][T22211] dump_stack+0x15/0x1b [ 2778.936079][T22211] should_fail_ex+0x265/0x280 [ 2778.936147][T22211] should_fail+0xb/0x20 [ 2778.936177][T22211] should_fail_usercopy+0x1a/0x20 [ 2778.936222][T22211] _copy_to_user+0x20/0xa0 [ 2778.936307][T22211] simple_read_from_buffer+0xb5/0x130 [ 2778.936335][T22211] proc_fail_nth_read+0x10e/0x150 [ 2778.936368][T22211] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2778.936430][T22211] vfs_read+0x1a5/0x770 [ 2778.936456][T22211] ? __rcu_read_unlock+0x4f/0x70 [ 2778.936481][T22211] ? __fget_files+0x184/0x1c0 [ 2778.936506][T22211] ksys_read+0xda/0x1a0 [ 2778.936564][T22211] __x64_sys_read+0x40/0x50 [ 2778.936591][T22211] x64_sys_call+0x27bc/0x2ff0 [ 2778.936616][T22211] do_syscall_64+0xd2/0x200 [ 2778.936742][T22211] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2778.936767][T22211] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2778.936795][T22211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2778.936860][T22211] RIP: 0033:0x7f4307e0d63c [ 2778.936934][T22211] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2778.936957][T22211] RSP: 002b:00007f4306856030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2778.936980][T22211] RAX: ffffffffffffffda RBX: 00007f4308056090 RCX: 00007f4307e0d63c [ 2778.936996][T22211] RDX: 000000000000000f RSI: 00007f43068560a0 RDI: 0000000000000006 [ 2778.937011][T22211] RBP: 00007f4306856090 R08: 0000000000000000 R09: 0000000000000000 [ 2778.937022][T22211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2778.937074][T22211] R13: 00007f4308056128 R14: 00007f4308056090 R15: 00007ffd49cea5f8 [ 2778.937097][T22211] [ 2779.378152][T22235] FAULT_INJECTION: forcing a failure. [ 2779.378152][T22235] name failslab, interval 1, probability 0, space 0, times 0 [ 2779.391200][T22235] CPU: 0 UID: 0 PID: 22235 Comm: syz.7.39796 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2779.391253][T22235] Tainted: [W]=WARN [ 2779.391259][T22235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2779.391279][T22235] Call Trace: [ 2779.391284][T22235] [ 2779.391291][T22235] __dump_stack+0x1d/0x30 [ 2779.391308][T22235] dump_stack_lvl+0xe8/0x140 [ 2779.391325][T22235] dump_stack+0x15/0x1b [ 2779.391338][T22235] should_fail_ex+0x265/0x280 [ 2779.391390][T22235] should_failslab+0x8c/0xb0 [ 2779.391412][T22235] kmem_cache_alloc_noprof+0x50/0x310 [ 2779.391435][T22235] ? getname_flags+0x80/0x3b0 [ 2779.391460][T22235] getname_flags+0x80/0x3b0 [ 2779.391489][T22235] __x64_sys_symlink+0x40/0x60 [ 2779.391517][T22235] x64_sys_call+0x23cc/0x2ff0 [ 2779.391544][T22235] do_syscall_64+0xd2/0x200 [ 2779.391618][T22235] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2779.391640][T22235] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2779.391666][T22235] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2779.391733][T22235] RIP: 0033:0x7fb2a41dec29 [ 2779.391746][T22235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2779.391911][T22235] RSP: 002b:00007fb2a2c47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 2779.391927][T22235] RAX: ffffffffffffffda RBX: 00007fb2a4425fa0 RCX: 00007fb2a41dec29 [ 2779.391938][T22235] RDX: 0000000000000000 RSI: 0000200000000cc0 RDI: 0000000000000000 [ 2779.391954][T22235] RBP: 00007fb2a2c47090 R08: 0000000000000000 R09: 0000000000000000 [ 2779.391970][T22235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2779.391985][T22235] R13: 00007fb2a4426038 R14: 00007fb2a4425fa0 R15: 00007fffac817f58 [ 2779.392059][T22235] [ 2779.632422][T22247] netlink: 20 bytes leftover after parsing attributes in process `syz.7.39801'. [ 2779.769654][T22376] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=22376 comm=syz.0.39806 [ 2780.042174][T22487] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2780.092994][T22487] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2780.854459][T22598] FAULT_INJECTION: forcing a failure. [ 2780.854459][T22598] name failslab, interval 1, probability 0, space 0, times 0 [ 2780.867175][T22598] CPU: 1 UID: 0 PID: 22598 Comm: syz.0.39847 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2780.867203][T22598] Tainted: [W]=WARN [ 2780.867211][T22598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2780.867225][T22598] Call Trace: [ 2780.867231][T22598] [ 2780.867239][T22598] __dump_stack+0x1d/0x30 [ 2780.867297][T22598] dump_stack_lvl+0xe8/0x140 [ 2780.867366][T22598] dump_stack+0x15/0x1b [ 2780.867381][T22598] should_fail_ex+0x265/0x280 [ 2780.867407][T22598] should_failslab+0x8c/0xb0 [ 2780.867436][T22598] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 2780.867513][T22598] ? __d_alloc+0x3d/0x340 [ 2780.867545][T22598] ? xas_load+0x413/0x430 [ 2780.867579][T22598] __d_alloc+0x3d/0x340 [ 2780.867679][T22598] d_alloc_parallel+0x53/0xc60 [ 2780.867715][T22598] ? __rcu_read_unlock+0x4f/0x70 [ 2780.867741][T22598] ? __d_lookup+0x316/0x340 [ 2780.867943][T22598] ? default_pointer+0xf2/0x5e0 [ 2780.868025][T22598] __lookup_slow+0x8c/0x250 [ 2780.868063][T22598] lookup_noperm+0xc9/0x180 [ 2780.868111][T22598] simple_start_creating+0x97/0x120 [ 2780.868140][T22598] start_creating+0xe9/0x160 [ 2780.868169][T22598] __debugfs_create_file+0x6b/0x330 [ 2780.868228][T22598] debugfs_create_file_full+0x3f/0x60 [ 2780.868259][T22598] ? __pfx_br_dev_setup+0x10/0x10 [ 2780.868281][T22598] ref_tracker_dir_debugfs+0x100/0x1e0 [ 2780.868319][T22598] alloc_netdev_mqs+0x1a2/0xa30 [ 2780.868356][T22598] ? should_fail_ex+0xdb/0x280 [ 2780.868399][T22598] br_add_bridge+0x35/0xc0 [ 2780.868421][T22598] br_ioctl_stub+0x3d0/0x860 [ 2780.868450][T22598] ? ioctl_has_perm+0x257/0x2a0 [ 2780.868548][T22598] ? __pfx_br_ioctl_stub+0x10/0x10 [ 2780.868722][T22598] sock_ioctl+0x39c/0x610 [ 2780.868788][T22598] ? __pfx_sock_ioctl+0x10/0x10 [ 2780.868898][T22598] __se_sys_ioctl+0xce/0x140 [ 2780.868993][T22598] __x64_sys_ioctl+0x43/0x50 [ 2780.869014][T22598] x64_sys_call+0x1816/0x2ff0 [ 2780.869038][T22598] do_syscall_64+0xd2/0x200 [ 2780.869074][T22598] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2780.869144][T22598] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2780.869178][T22598] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2780.869203][T22598] RIP: 0033:0x7feca3bbec29 [ 2780.869220][T22598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2780.869278][T22598] RSP: 002b:00007feca261f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2780.869295][T22598] RAX: ffffffffffffffda RBX: 00007feca3e05fa0 RCX: 00007feca3bbec29 [ 2780.869313][T22598] RDX: 0000200000000340 RSI: 00000000000089a0 RDI: 0000000000000008 [ 2780.869323][T22598] RBP: 00007feca261f090 R08: 0000000000000000 R09: 0000000000000000 [ 2780.869333][T22598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2780.869343][T22598] R13: 00007feca3e06038 R14: 00007feca3e05fa0 R15: 00007ffdaf591968 [ 2780.869413][T22598] [ 2781.295711][T22616] lo speed is unknown, defaulting to 1000 [ 2781.404592][T22616] lo speed is unknown, defaulting to 1000 [ 2781.544706][T22652] SELinux: ebitmap: truncated map [ 2781.551411][ T29] kauditd_printk_skb: 215 callbacks suppressed [ 2781.551424][ T29] audit: type=1400 audit(2000001247.988:193565): avc: denied { write } for pid=22651 comm="syz.7.39859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2781.587452][T22652] SELinux: failed to load policy [ 2781.670414][ T29] audit: type=1400 audit(2000001248.088:193566): avc: denied { accept } for pid=22651 comm="syz.7.39859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2781.703405][T22653] lo speed is unknown, defaulting to 1000 [ 2781.742375][ T29] audit: type=1400 audit(2000001248.208:193567): avc: denied { name_bind } for pid=22748 comm="syz.7.39863" src=65534 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 2781.769992][ T29] audit: type=1400 audit(2000001248.208:193568): avc: denied { create } for pid=22748 comm="syz.7.39863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2781.789772][ T29] audit: type=1400 audit(2000001248.238:193569): avc: denied { setopt } for pid=22748 comm="syz.7.39863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2781.821012][T22653] lo speed is unknown, defaulting to 1000 [ 2782.107140][ T29] audit: type=1400 audit(2000001248.558:193570): avc: denied { relabelfrom } for pid=22817 comm="syz.2.39867" name="NETLINK" dev="sockfs" ino=453137 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2782.132003][ T29] audit: type=1400 audit(2000001248.558:193571): avc: denied { relabelto } for pid=22817 comm="syz.2.39867" name="NETLINK" dev="sockfs" ino=453137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 2782.260260][ T29] audit: type=1400 audit(2000001248.718:193572): avc: denied { sqpoll } for pid=22833 comm="syz.7.39874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2782.286305][ T29] audit: type=1326 audit(2000001248.748:193573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22833 comm="syz.7.39874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2782.310096][ T29] audit: type=1326 audit(2000001248.748:193574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22833 comm="syz.7.39874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2782.386147][T22846] __nla_validate_parse: 8 callbacks suppressed [ 2782.386162][T22846] netlink: 24 bytes leftover after parsing attributes in process `syz.9.39876'. [ 2782.461107][T22851] lo speed is unknown, defaulting to 1000 [ 2782.580710][T22851] lo speed is unknown, defaulting to 1000 [ 2782.710482][T22865] lo speed is unknown, defaulting to 1000 [ 2782.767559][T22865] lo speed is unknown, defaulting to 1000 [ 2783.255566][T23044] lo speed is unknown, defaulting to 1000 [ 2783.519535][T23044] lo speed is unknown, defaulting to 1000 [ 2783.525592][T23053] lo speed is unknown, defaulting to 1000 [ 2783.649772][T23053] lo speed is unknown, defaulting to 1000 [ 2783.653697][T23205] netlink: 24 bytes leftover after parsing attributes in process `syz.9.39906'. [ 2784.112866][T23356] lo speed is unknown, defaulting to 1000 [ 2784.197469][T23363] netlink: 16 bytes leftover after parsing attributes in process `syz.9.39922'. [ 2784.243296][T23356] lo speed is unknown, defaulting to 1000 [ 2784.288192][T23363] serio: Serial port ptm0 [ 2784.735812][T23419] netlink: 48 bytes leftover after parsing attributes in process `syz.3.39936'. [ 2784.807696][T23419] netlink: 4 bytes leftover after parsing attributes in process `syz.3.39936'. [ 2784.824734][T23442] 9pnet_virtio: no channels available for device  [ 2784.877605][T23442] netlink: 'syz.0.39944': attribute type 13 has an invalid length. [ 2784.907436][T23442] gretap0: refused to change device tx_queue_len [ 2784.914429][T23442] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2784.932424][T23442] siw: device registration error -23 [ 2784.949896][T23457] lo speed is unknown, defaulting to 1000 [ 2784.952291][T23464] netlink: 20 bytes leftover after parsing attributes in process `syz.7.39953'. [ 2784.993313][T23457] lo speed is unknown, defaulting to 1000 [ 2785.150802][T23506] netlink: 48 bytes leftover after parsing attributes in process `syz.3.39959'. [ 2785.224555][T23506] netlink: 4 bytes leftover after parsing attributes in process `syz.3.39959'. [ 2785.290000][T23524] netlink: 16 bytes leftover after parsing attributes in process `syz.0.39966'. [ 2785.323691][T23532] netlink: 12 bytes leftover after parsing attributes in process `syz.7.39968'. [ 2785.335637][T23532] bridge10: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2785.355458][T23535] serio: Serial port ptm0 [ 2785.730170][T23577] lo speed is unknown, defaulting to 1000 [ 2785.846244][T23577] lo speed is unknown, defaulting to 1000 [ 2785.925622][T23617] lo speed is unknown, defaulting to 1000 [ 2785.963863][T23617] lo speed is unknown, defaulting to 1000 [ 2786.141966][T23760] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2786.150845][T23760] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2786.457681][T23781] lo speed is unknown, defaulting to 1000 [ 2786.494149][T23781] lo speed is unknown, defaulting to 1000 [ 2786.768179][T23816] serio: Serial port ptm0 [ 2787.058363][T23832] lo speed is unknown, defaulting to 1000 [ 2787.090999][T23832] lo speed is unknown, defaulting to 1000 [ 2787.171939][T23856] bridge6: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2787.242876][ T29] kauditd_printk_skb: 132 callbacks suppressed [ 2787.242921][ T29] audit: type=1326 audit(2000001253.709:193707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23859 comm="syz.3.40017" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2787.273499][ T29] audit: type=1326 audit(2000001253.709:193708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23859 comm="syz.3.40017" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2787.297449][ T29] audit: type=1326 audit(2000001253.709:193709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23859 comm="syz.3.40017" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2787.321443][ T29] audit: type=1326 audit(2000001253.709:193710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23859 comm="syz.3.40017" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2787.345262][ T29] audit: type=1326 audit(2000001253.709:193711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23859 comm="syz.3.40017" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2787.369760][ T29] audit: type=1326 audit(2000001253.739:193712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23859 comm="syz.3.40017" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2787.393508][ T29] audit: type=1326 audit(2000001253.739:193713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23859 comm="syz.3.40017" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2787.417332][ T29] audit: type=1326 audit(2000001253.739:193714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23859 comm="syz.3.40017" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2787.441096][ T29] audit: type=1326 audit(2000001253.739:193715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23859 comm="syz.3.40017" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2787.464723][ T29] audit: type=1326 audit(2000001253.739:193716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23859 comm="syz.3.40017" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2787.558222][T23876] __nla_validate_parse: 7 callbacks suppressed [ 2787.558238][T23876] netlink: 20 bytes leftover after parsing attributes in process `syz.0.40022'. [ 2787.611270][T23880] netlink: 40 bytes leftover after parsing attributes in process `syz.7.40024'. [ 2787.763099][T23903] netlink: 16 bytes leftover after parsing attributes in process `syz.2.40033'. [ 2787.818559][T23903] serio: Serial port ptm0 [ 2787.834763][T23920] netlink: 40 bytes leftover after parsing attributes in process `syz.9.40038'. [ 2787.845937][T23919] lo speed is unknown, defaulting to 1000 [ 2787.884206][T23919] lo speed is unknown, defaulting to 1000 [ 2788.250302][T23981] netlink: 24 bytes leftover after parsing attributes in process `syz.9.40052'. [ 2788.276020][T23984] netlink: 40 bytes leftover after parsing attributes in process `syz.9.40054'. [ 2788.301400][T23982] netlink: 48 bytes leftover after parsing attributes in process `syz.3.40053'. [ 2788.350175][T23982] netlink: 4 bytes leftover after parsing attributes in process `syz.3.40053'. [ 2788.382133][T23992] lo speed is unknown, defaulting to 1000 [ 2788.419321][T23992] lo speed is unknown, defaulting to 1000 [ 2788.694908][T24032] netlink: 48 bytes leftover after parsing attributes in process `syz.7.40062'. [ 2788.717013][T24038] netlink: 80 bytes leftover after parsing attributes in process `syz.2.40063'. [ 2788.838069][T24145] netlink: 'syz.3.40065': attribute type 13 has an invalid length. [ 2788.850201][T24145] gretap0: refused to change device tx_queue_len [ 2788.867193][T24145] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2788.912164][T24145] siw: device registration error -23 [ 2789.133820][T24281] netlink: 'syz.9.40079': attribute type 13 has an invalid length. [ 2789.147639][T24281] gretap0: refused to change device tx_queue_len [ 2789.155788][T24281] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2789.178009][T24281] siw: device registration error -23 [ 2789.271957][T24301] bridge0: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2789.418567][T24323] netlink: 'syz.9.40091': attribute type 13 has an invalid length. [ 2789.429894][T24323] gretap0: refused to change device tx_queue_len [ 2789.436874][T24323] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2789.458383][T24323] siw: device registration error -23 [ 2789.584267][T24350] lo speed is unknown, defaulting to 1000 [ 2789.620766][T24350] lo speed is unknown, defaulting to 1000 [ 2789.823939][T24388] netlink: 'syz.9.40104': attribute type 13 has an invalid length. [ 2789.833927][T24388] gretap0: refused to change device tx_queue_len [ 2789.841351][T24388] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2789.859057][T24388] siw: device registration error -23 [ 2790.014724][T24415] netlink: 'syz.0.40116': attribute type 13 has an invalid length. [ 2790.027722][T24415] gretap0: refused to change device tx_queue_len [ 2790.040104][T24415] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2790.087142][T24415] siw: device registration error -23 [ 2790.141599][T24429] bridge8: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2790.326931][T24461] bridge11: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2790.576039][T24501] lo speed is unknown, defaulting to 1000 [ 2790.689918][T24501] lo speed is unknown, defaulting to 1000 [ 2790.997995][T24556] netlink: 'syz.3.40165': attribute type 13 has an invalid length. [ 2791.058769][T24556] gretap0: refused to change device tx_queue_len [ 2791.085640][T24556] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2791.163117][T24560] lo speed is unknown, defaulting to 1000 [ 2791.399604][T24560] lo speed is unknown, defaulting to 1000 [ 2791.802151][T24710] netlink: 'syz.3.40178': attribute type 13 has an invalid length. [ 2791.839625][T24710] gretap0: refused to change device tx_queue_len [ 2791.883642][T24710] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2792.021227][T24837] lo speed is unknown, defaulting to 1000 [ 2792.087867][T24837] lo speed is unknown, defaulting to 1000 [ 2792.163994][T24965] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2792.187980][T24965] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2792.369370][ T29] kauditd_printk_skb: 238 callbacks suppressed [ 2792.369438][ T29] audit: type=1326 audit(2000001258.840:193955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24964 comm="syz.0.40194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feca3bbec29 code=0x7ffc0000 [ 2792.400632][ T29] audit: type=1326 audit(2000001258.870:193956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24964 comm="syz.0.40194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feca3bbec29 code=0x7ffc0000 [ 2792.662760][ T29] audit: type=1326 audit(2000001259.130:193957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25205 comm="syz.3.40205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2792.686555][ T29] audit: type=1326 audit(2000001259.130:193958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25205 comm="syz.3.40205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2792.710413][ T29] audit: type=1326 audit(2000001259.130:193959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25205 comm="syz.3.40205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2792.734170][ T29] audit: type=1326 audit(2000001259.130:193960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25205 comm="syz.3.40205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2792.758163][ T29] audit: type=1326 audit(2000001259.130:193961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25205 comm="syz.3.40205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2792.782359][ T29] audit: type=1326 audit(2000001259.160:193962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25205 comm="syz.3.40205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2792.806147][ T29] audit: type=1326 audit(2000001259.210:193963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25205 comm="syz.3.40205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2792.829969][ T29] audit: type=1326 audit(2000001259.210:193964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25205 comm="syz.3.40205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd770bdec29 code=0x7ffc0000 [ 2792.863015][T25209] lo speed is unknown, defaulting to 1000 [ 2792.894982][T25209] lo speed is unknown, defaulting to 1000 [ 2793.018264][T25252] __nla_validate_parse: 24 callbacks suppressed [ 2793.018333][T25252] netlink: 12 bytes leftover after parsing attributes in process `syz.0.40213'. [ 2793.073507][T25262] FAULT_INJECTION: forcing a failure. [ 2793.073507][T25262] name failslab, interval 1, probability 0, space 0, times 0 [ 2793.086243][T25262] CPU: 1 UID: 0 PID: 25262 Comm: syz.3.40215 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2793.086275][T25262] Tainted: [W]=WARN [ 2793.086281][T25262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2793.086434][T25262] Call Trace: [ 2793.086440][T25262] [ 2793.086446][T25262] __dump_stack+0x1d/0x30 [ 2793.086465][T25262] dump_stack_lvl+0xe8/0x140 [ 2793.086487][T25262] dump_stack+0x15/0x1b [ 2793.086504][T25262] should_fail_ex+0x265/0x280 [ 2793.086553][T25262] should_failslab+0x8c/0xb0 [ 2793.086579][T25262] kmem_cache_alloc_node_noprof+0x57/0x320 [ 2793.086608][T25262] ? __alloc_skb+0x101/0x320 [ 2793.086627][T25262] __alloc_skb+0x101/0x320 [ 2793.086837][T25262] netlink_alloc_large_skb+0xba/0xf0 [ 2793.086860][T25262] netlink_sendmsg+0x3cf/0x6b0 [ 2793.086932][T25262] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2793.086956][T25262] __sock_sendmsg+0x142/0x180 [ 2793.086985][T25262] ____sys_sendmsg+0x31e/0x4e0 [ 2793.087016][T25262] ___sys_sendmsg+0x17b/0x1d0 [ 2793.087052][T25262] __x64_sys_sendmsg+0xd4/0x160 [ 2793.087079][T25262] x64_sys_call+0x191e/0x2ff0 [ 2793.087173][T25262] do_syscall_64+0xd2/0x200 [ 2793.087266][T25262] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2793.087342][T25262] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2793.087369][T25262] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2793.087387][T25262] RIP: 0033:0x7fd770bdec29 [ 2793.087477][T25262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2793.087493][T25262] RSP: 002b:00007fd76f647038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2793.087510][T25262] RAX: ffffffffffffffda RBX: 00007fd770e25fa0 RCX: 00007fd770bdec29 [ 2793.087520][T25262] RDX: 0000000000000000 RSI: 0000200000001540 RDI: 0000000000000003 [ 2793.087534][T25262] RBP: 00007fd76f647090 R08: 0000000000000000 R09: 0000000000000000 [ 2793.087570][T25262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2793.087582][T25262] R13: 00007fd770e26038 R14: 00007fd770e25fa0 R15: 00007ffcb5a3b608 [ 2793.087599][T25262] [ 2793.300599][T25252] bridge9: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2793.310668][T25256] lo speed is unknown, defaulting to 1000 [ 2793.335865][T25266] FAULT_INJECTION: forcing a failure. [ 2793.335865][T25266] name failslab, interval 1, probability 0, space 0, times 0 [ 2793.348560][T25266] CPU: 1 UID: 0 PID: 25266 Comm: syz.3.40216 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2793.348601][T25266] Tainted: [W]=WARN [ 2793.348647][T25266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2793.348660][T25266] Call Trace: [ 2793.348666][T25266] [ 2793.348674][T25266] __dump_stack+0x1d/0x30 [ 2793.348695][T25266] dump_stack_lvl+0xe8/0x140 [ 2793.348715][T25266] dump_stack+0x15/0x1b [ 2793.348822][T25266] should_fail_ex+0x265/0x280 [ 2793.348848][T25266] should_failslab+0x8c/0xb0 [ 2793.348875][T25266] kmem_cache_alloc_node_noprof+0x57/0x320 [ 2793.348905][T25266] ? __alloc_skb+0x101/0x320 [ 2793.348928][T25266] __alloc_skb+0x101/0x320 [ 2793.349017][T25266] netlink_alloc_large_skb+0xba/0xf0 [ 2793.349044][T25266] netlink_sendmsg+0x3cf/0x6b0 [ 2793.349075][T25266] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2793.349104][T25266] __sock_sendmsg+0x142/0x180 [ 2793.349171][T25266] ____sys_sendmsg+0x31e/0x4e0 [ 2793.349204][T25266] ___sys_sendmsg+0x17b/0x1d0 [ 2793.349394][T25266] __x64_sys_sendmsg+0xd4/0x160 [ 2793.349427][T25266] x64_sys_call+0x191e/0x2ff0 [ 2793.349523][T25266] do_syscall_64+0xd2/0x200 [ 2793.349590][T25266] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2793.349635][T25266] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2793.349709][T25266] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2793.349735][T25266] RIP: 0033:0x7fd770bdec29 [ 2793.349802][T25266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2793.349824][T25266] RSP: 002b:00007fd76f647038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2793.349844][T25266] RAX: ffffffffffffffda RBX: 00007fd770e25fa0 RCX: 00007fd770bdec29 [ 2793.349902][T25266] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 2793.349917][T25266] RBP: 00007fd76f647090 R08: 0000000000000000 R09: 0000000000000000 [ 2793.349932][T25266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2793.349947][T25266] R13: 00007fd770e26038 R14: 00007fd770e25fa0 R15: 00007ffcb5a3b608 [ 2793.350027][T25266] [ 2793.351574][T25253] netlink: 4 bytes leftover after parsing attributes in process `syz.7.40212'. [ 2793.566569][T25256] lo speed is unknown, defaulting to 1000 [ 2793.641303][T25305] netlink: 4 bytes leftover after parsing attributes in process `syz.2.40223'. [ 2793.679621][T25305] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2793.687275][T25305] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2793.701527][T25317] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2793.710842][T25317] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2793.742576][T25323] lo speed is unknown, defaulting to 1000 [ 2793.772605][T25323] lo speed is unknown, defaulting to 1000 [ 2793.916921][T25356] FAULT_INJECTION: forcing a failure. [ 2793.916921][T25356] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2793.930033][T25356] CPU: 0 UID: 0 PID: 25356 Comm: syz.9.40232 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2793.930069][T25356] Tainted: [W]=WARN [ 2793.930074][T25356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2793.930119][T25356] Call Trace: [ 2793.930125][T25356] [ 2793.930133][T25356] __dump_stack+0x1d/0x30 [ 2793.930166][T25356] dump_stack_lvl+0xe8/0x140 [ 2793.930187][T25356] dump_stack+0x15/0x1b [ 2793.930220][T25356] should_fail_ex+0x265/0x280 [ 2793.930246][T25356] should_fail+0xb/0x20 [ 2793.930342][T25356] should_fail_usercopy+0x1a/0x20 [ 2793.930365][T25356] _copy_from_user+0x1c/0xb0 [ 2793.930400][T25356] ucma_write+0xd9/0x250 [ 2793.930427][T25356] vfs_writev+0x406/0x8b0 [ 2793.930469][T25356] ? __pfx_ucma_write+0x10/0x10 [ 2793.930504][T25356] do_writev+0xe7/0x210 [ 2793.930632][T25356] __x64_sys_writev+0x45/0x50 [ 2793.930660][T25356] x64_sys_call+0x1e9a/0x2ff0 [ 2793.930684][T25356] do_syscall_64+0xd2/0x200 [ 2793.930732][T25356] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 2793.930759][T25356] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 2793.930801][T25356] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2793.930821][T25356] RIP: 0033:0x7f3c2263ec29 [ 2793.930839][T25356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2793.930855][T25356] RSP: 002b:00007f3c210a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2793.930908][T25356] RAX: ffffffffffffffda RBX: 00007f3c22885fa0 RCX: 00007f3c2263ec29 [ 2793.930922][T25356] RDX: 0000000000000003 RSI: 0000200000000000 RDI: 0000000000000004 [ 2793.930936][T25356] RBP: 00007f3c210a7090 R08: 0000000000000000 R09: 0000000000000000 [ 2793.930949][T25356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2793.930993][T25356] R13: 00007f3c22886038 R14: 00007f3c22885fa0 R15: 00007ffe9c8db138 [ 2793.931014][T25356] [ 2794.180927][T25361] netlink: 4 bytes leftover after parsing attributes in process `syz.7.40234'. [ 2794.702072][T25404] netlink: 4 bytes leftover after parsing attributes in process `syz.3.40249'. [ 2794.724125][T25401] netlink: 4 bytes leftover after parsing attributes in process `syz.0.40250'. [ 2794.742746][T25401] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2794.754203][T25401] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2794.860356][T25425] netlink: 24 bytes leftover after parsing attributes in process `syz.2.40255'. [ 2794.897324][T25429] veth0: entered promiscuous mode [ 2794.903689][T25428] netlink: 4 bytes leftover after parsing attributes in process `syz.2.40256'. [ 2795.105823][T25439] netlink: 28 bytes leftover after parsing attributes in process `syz.9.40259'. [ 2795.219958][T25449] netlink: 4 bytes leftover after parsing attributes in process `syz.9.40263'. [ 2795.393101][T25470] lo speed is unknown, defaulting to 1000 [ 2795.427733][T25470] lo speed is unknown, defaulting to 1000 [ 2795.445435][T25478] bridge12: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2795.509101][T25502] lo speed is unknown, defaulting to 1000 [ 2795.613220][T25502] lo speed is unknown, defaulting to 1000 [ 2795.719853][T25540] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2795.728395][T25540] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2795.868843][T25561] netlink: 'syz.0.40282': attribute type 13 has an invalid length. [ 2795.880205][T25561] gretap0: refused to change device tx_queue_len [ 2795.887102][T25561] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2795.907624][T25561] siw: device registration error -23 [ 2796.174133][T25613] netlink: 'syz.0.40296': attribute type 13 has an invalid length. [ 2796.185194][T25613] gretap0: refused to change device tx_queue_len [ 2796.194960][T25613] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2796.219685][T25613] siw: device registration error -23 [ 2796.344396][T25634] bridge8: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2796.525439][T25662] netlink: 'syz.2.40307': attribute type 13 has an invalid length. [ 2796.545512][T25662] gretap0: refused to change device tx_queue_len [ 2796.553951][T25662] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2796.584158][T25662] siw: device registration error -23 [ 2796.601744][T25675] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2796.610362][T25675] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2796.643346][T25684] lo speed is unknown, defaulting to 1000 [ 2796.762993][T25684] lo speed is unknown, defaulting to 1000 [ 2796.894886][T25732] lo speed is unknown, defaulting to 1000 [ 2796.928319][T25732] lo speed is unknown, defaulting to 1000 [ 2797.294658][T25976] bridge7: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2797.530466][ T29] kauditd_printk_skb: 220 callbacks suppressed [ 2797.530528][ T29] audit: type=1326 audit(2000001264.001:194185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26087 comm="syz.7.40342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2797.567656][T26109] bridge8: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2797.628206][ T29] audit: type=1326 audit(2000001264.001:194186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26087 comm="syz.7.40342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb2a417ae09 code=0x7ffc0000 [ 2797.651945][ T29] audit: type=1326 audit(2000001264.001:194187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26087 comm="syz.7.40342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2797.675962][ T29] audit: type=1326 audit(2000001264.001:194188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26087 comm="syz.7.40342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2797.699802][ T29] audit: type=1326 audit(2000001264.001:194189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26087 comm="syz.7.40342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2797.723561][ T29] audit: type=1326 audit(2000001264.001:194190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26087 comm="syz.7.40342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2797.747480][ T29] audit: type=1326 audit(2000001264.011:194191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26087 comm="syz.7.40342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2797.771328][ T29] audit: type=1326 audit(2000001264.011:194192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26087 comm="syz.7.40342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2797.795502][ T29] audit: type=1326 audit(2000001264.011:194193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26087 comm="syz.7.40342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2797.819274][ T29] audit: type=1326 audit(2000001264.011:194194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26087 comm="syz.7.40342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb2a41dec29 code=0x7ffc0000 [ 2797.878387][T26138] bridge9: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2798.109244][T26168] lo speed is unknown, defaulting to 1000 [ 2798.175712][T26168] lo speed is unknown, defaulting to 1000 [ 2798.404430][T26222] __nla_validate_parse: 15 callbacks suppressed [ 2798.404445][T26222] netlink: 12 bytes leftover after parsing attributes in process `syz.0.40369'. [ 2798.423272][T26222] bridge10: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 2798.462207][T26230] lo speed is unknown, defaulting to 1000 [ 2798.496520][T26230] lo speed is unknown, defaulting to 1000 [ 2799.743531][T26347] lo speed is unknown, defaulting to 1000 [ 2799.749447][T12156] ================================================================== [ 2799.749483][T12156] BUG: KCSAN: data-race in mem_cgroup_flush_stats_ratelimited / tick_do_update_jiffies64 [ 2799.767339][T12156] [ 2799.769654][T12156] read-write to 0xffffffff868099c0 of 8 bytes by interrupt on cpu 1: [ 2799.777712][T12156] tick_do_update_jiffies64+0x113/0x1c0 [ 2799.783257][T12156] tick_nohz_handler+0x7f/0x2d0 [ 2799.788108][T12156] __hrtimer_run_queues+0x20f/0x5a0 [ 2799.793301][T12156] hrtimer_interrupt+0x21a/0x460 [ 2799.798232][T12156] __sysvec_apic_timer_interrupt+0x5c/0x1d0 [ 2799.804132][T12156] sysvec_apic_timer_interrupt+0x6f/0x80 [ 2799.809765][T12156] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2799.815748][T12156] console_flush_all+0x55b/0x730 [ 2799.820691][T12156] console_unlock+0xa1/0x330 [ 2799.825277][T12156] vprintk_emit+0x388/0x650 [ 2799.829782][T12156] vprintk_default+0x26/0x30 [ 2799.834363][T12156] vprintk+0x1d/0x30 [ 2799.838258][T12156] _printk+0x79/0xa0 [ 2799.842156][T12156] ib_get_eth_speed+0x33d/0x4b0 [ 2799.847002][T12156] rxe_query_port+0x7d/0x220 [ 2799.851590][T12156] ib_query_port+0x125/0x3d0 [ 2799.856194][T12156] ib_setup_port_attrs+0x14a/0x1430 [ 2799.861410][T12156] add_one_compat_dev+0x261/0x360 [ 2799.866432][T12156] rdma_dev_init_net+0x182/0x210 [ 2799.871371][T12156] ops_init+0x22a/0x2e0 [ 2799.875523][T12156] setup_net+0x82/0x200 [ 2799.879696][T12156] copy_net_ns+0x266/0x390 [ 2799.884139][T12156] create_new_namespaces+0x20e/0x3d0 [ 2799.889429][T12156] copy_namespaces+0x1ad/0x210 [ 2799.894196][T12156] copy_process+0xd32/0x2000 [ 2799.898785][T12156] kernel_clone+0x16c/0x5c0 [ 2799.903291][T12156] __x64_sys_clone+0xe6/0x120 [ 2799.907969][T12156] x64_sys_call+0x119c/0x2ff0 [ 2799.912646][T12156] do_syscall_64+0xd2/0x200 [ 2799.917154][T12156] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2799.923040][T12156] [ 2799.925360][T12156] read to 0xffffffff868099c0 of 8 bytes by task 12156 on cpu 0: [ 2799.932987][T12156] mem_cgroup_flush_stats_ratelimited+0x29/0x70 [ 2799.939230][T12156] count_shadow_nodes+0x6a/0x230 [ 2799.944162][T12156] do_shrink_slab+0x60/0x680 [ 2799.948756][T12156] shrink_slab+0x448/0x760 [ 2799.953178][T12156] shrink_node+0x6c3/0x2120 [ 2799.957687][T12156] do_try_to_free_pages+0x3f6/0xcd0 [ 2799.962886][T12156] try_to_free_mem_cgroup_pages+0x1ab/0x410 [ 2799.968782][T12156] try_charge_memcg+0x358/0x9e0 [ 2799.973632][T12156] charge_memcg+0x51/0xc0 [ 2799.977963][T12156] __mem_cgroup_charge+0x28/0xb0 [ 2799.982906][T12156] filemap_add_folio+0x4e/0x1b0 [ 2799.987772][T12156] page_cache_ra_unbounded+0x1f3/0x380 [ 2799.993242][T12156] page_cache_ra_order+0x115/0x130 [ 2799.998366][T12156] do_sync_mmap_readahead+0x315/0x320 [ 2800.003739][T12156] filemap_fault+0x313/0xb40 [ 2800.008330][T12156] __do_fault+0xbc/0x200 [ 2800.012569][T12156] handle_mm_fault+0xf78/0x2c20 [ 2800.017417][T12156] do_user_addr_fault+0x636/0x1090 [ 2800.022541][T12156] exc_page_fault+0x62/0xa0 [ 2800.027050][T12156] asm_exc_page_fault+0x26/0x30 [ 2800.031925][T12156] [ 2800.034246][T12156] value changed: 0x000000010003d063 -> 0x000000010003d064 [ 2800.041349][T12156] [ 2800.043669][T12156] Reported by Kernel Concurrency Sanitizer on: [ 2800.049816][T12156] CPU: 0 UID: 0 PID: 12156 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2800.061358][T12156] Tainted: [W]=WARN [ 2800.065156][T12156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2800.075220][T12156] ================================================================== [ 2800.114978][T26347] lo speed is unknown, defaulting to 1000 [ 2800.550501][T26273] syz.0.40372 invoked oom-killer: gfp_mask=0x408d40(GFP_NOFS|__GFP_ZERO|__GFP_NOFAIL|__GFP_ACCOUNT), order=0, oom_score_adj=1000 [ 2800.564018][T26273] CPU: 1 UID: 0 PID: 26273 Comm: syz.0.40372 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 2800.564116][T26273] Tainted: [W]=WARN [ 2800.564123][T26273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 2800.564137][T26273] Call Trace: [ 2800.564143][T26273] [ 2800.564149][T26273] __dump_stack+0x1d/0x30 [ 2800.564245][T26273] dump_stack_lvl+0xe8/0x140 [ 2800.564261][T26273] dump_stack+0x15/0x1b [ 2800.564274][T26273] dump_header+0x81/0x220 [ 2800.564306][T26273] oom_kill_process+0x342/0x400 [ 2800.564342][T26273] out_of_memory+0x979/0xb80 [ 2800.564392][T26273] try_charge_memcg+0x5e6/0x9e0 [ 2800.564445][T26273] obj_cgroup_charge_pages+0xa6/0x150 [ 2800.564479][T26273] obj_cgroup_charge_account+0x73/0x1a0 [ 2800.564569][T26273] __memcg_slab_post_alloc_hook+0x398/0x580 [ 2800.564609][T26273] kmem_cache_alloc_noprof+0x220/0x310 [ 2800.564633][T26273] ? alloc_buffer_head+0x35/0x1f0 [ 2800.564653][T26273] alloc_buffer_head+0x35/0x1f0 [ 2800.564713][T26273] folio_alloc_buffers+0x14a/0x310 [ 2800.564772][T26273] create_empty_buffers+0x2c/0x200 [ 2800.564811][T26273] __block_write_begin_int+0x1d4/0xf90 [ 2800.564836][T26273] ? add_timer_global+0x51/0x70 [ 2800.564863][T26273] ? __queue_delayed_work+0x165/0x1e0 [ 2800.564887][T26273] ? queue_delayed_work_on+0xff/0x170 [ 2800.564924][T26273] ? __pfx_ext4_da_get_block_prep+0x10/0x10 [ 2800.564960][T26273] ? _raw_spin_unlock_irq+0x26/0x50 [ 2800.564984][T26273] ? wb_wakeup_delayed+0x9b/0xb0 [ 2800.565026][T26273] ? __mark_inode_dirty+0x44c/0x750 [ 2800.565159][T26273] ? __pfx_ext4_da_get_block_prep+0x10/0x10 [ 2800.565200][T26273] block_page_mkwrite+0x1a8/0x3d0 [ 2800.565234][T26273] ext4_page_mkwrite+0x859/0xb90 [ 2800.565263][T26273] ? folio_unlock+0xd9/0x120 [ 2800.565362][T26273] handle_mm_fault+0x15cb/0x2c20 [ 2800.565393][T26273] ? __rcu_read_unlock+0x4f/0x70 [ 2800.565463][T26273] do_user_addr_fault+0x3fe/0x1090 [ 2800.565507][T26273] exc_page_fault+0x62/0xa0 [ 2800.565543][T26273] asm_exc_page_fault+0x26/0x30 [ 2800.565573][T26273] RIP: 0033:0x7feca3a9f532 [ 2800.565590][T26273] Code: 0f 1f 84 00 00 00 00 00 be 08 00 00 00 48 89 df e8 c3 75 fe ff 48 8b 53 38 48 8d 42 f8 48 89 43 38 8b 43 28 83 c0 08 89 43 28 <4c> 89 62 f8 41 8d 56 01 41 39 ee 0f 83 8d 00 00 00 41 89 d6 48 8b [ 2800.565609][T26273] RSP: 002b:00007ffdaf591a10 EFLAGS: 00010206 [ 2800.565624][T26273] RAX: 0000000000024fe8 RBX: 00007feca4935720 RCX: 0000000000000000 [ 2800.565639][T26273] RDX: 0000001b343ff020 RSI: 0000000000000008 RDI: 00007feca4935720 [ 2800.565655][T26273] RBP: 000000000000094c R08: 00007feca3627048 R09: 00007feca3df2000 [ 2800.565670][T26273] R10: 00007feca3627008 R11: 0000000000000013 R12: ffffffff8567664c [ 2800.565682][T26273] R13: 00007feca3e06038 R14: 0000000000000001 R15: fffffffffffdb020 [ 2800.565714][T26273] ? xa_load+0xac/0xe0 [ 2800.565735][T26273] [ 2800.565744][T26273] memory: usage 307200kB, limit 307200kB, failcnt 7359 [ 2800.842796][T26273] memory+swap: usage 310660kB, limit 9007199254740988kB, failcnt 0 [ 2800.850684][T26273] kmem: usage 302440kB, limit 9007199254740988kB, failcnt 0 [ 2800.858484][T26273] Memory cgroup stats for /syz0: [ 2800.858680][T26273] cache 4096 [ 2800.866793][T26273] rss 4861952 [ 2800.870064][T26273] shmem 0 [ 2800.872988][T26273] mapped_file 823296 [ 2800.876903][T26273] dirty 0 [ 2800.879849][T26273] writeback 0 [ 2800.883125][T26273] workingset_refault_anon 12451 [ 2800.888004][T26273] workingset_refault_file 22773 [ 2800.892917][T26273] swap 3543040 [ 2800.896318][T26273] swapcached 0 [ 2800.899707][T26273] pgpgin 5791218 [ 2800.903250][T26273] pgpgout 5790028 [ 2800.906974][T26273] pgfault 5284959 [ 2800.910617][T26273] pgmajfault 2069 [ 2800.914241][T26273] inactive_anon 0 [ 2800.917880][T26273] active_anon 0 [ 2800.921328][T26273] inactive_file 4874240 [ 2800.925532][T26273] active_file 0 [ 2800.928995][T26273] unevictable 0 [ 2800.932445][T26273] hierarchical_memory_limit 314572800 [ 2800.937822][T26273] hierarchical_memsw_limit 9223372036854771712 [ 2800.943979][T26273] total_cache 4096 [ 2800.947710][T26273] total_rss 4861952 [ 2800.951507][T26273] total_shmem 0 [ 2800.954955][T26273] total_mapped_file 823296 [ 2800.959384][T26273] total_dirty 0 [ 2800.962857][T26273] total_writeback 0 [ 2800.966685][T26273] total_workingset_refault_anon 12451 [ 2800.972059][T26273] total_workingset_refault_file 22773 [ 2800.977462][T26273] total_swap 3543040 [ 2800.981345][T26273] total_swapcached 0 [ 2800.985238][T26273] total_pgpgin 5791218 [ 2800.989314][T26273] total_pgpgout 5790028 [ 2800.993514][T26273] total_pgfault 5284959 [ 2800.997691][T26273] total_pgmajfault 2069 [ 2801.001834][T26273] total_inactive_anon 0 [ 2801.005977][T26273] total_active_anon 0 [ 2801.009966][T26273] total_inactive_file 4874240 [ 2801.014634][T26273] total_active_file 0 [ 2801.018708][T26273] total_unevictable 0 [ 2801.022711][T26273] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.40372,pid=26273,uid=0 [ 2801.037582][T26273] Memory cgroup out of memory: Killed process 26273 (syz.0.40372) total-vm:96876kB, anon-rss:5808kB, file-rss:23212kB, shmem-rss:0kB, UID:0 pgtables:152kB oom_score_adj:1000