last executing test programs: 4m16.971938895s ago: executing program 32 (id=102): bpf$PROG_LOAD(0x5, 0x0, 0x63) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = io_uring_setup(0x7, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x231}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x27}, 0x74) sendmmsg$unix(r2, &(0x7f0000000b00)=[{{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}, {{&(0x7f0000000e80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000740)=[{&(0x7f0000001dc0)="bb", 0x1}, {0x0}], 0x2}}, {{&(0x7f0000000580)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f00000006c0)=[{0x0}], 0x1}}], 0x3, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe88}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000010c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) 4m14.806344385s ago: executing program 33 (id=122): r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000200)={'fscrypt:', @desc2}, &(0x7f0000000300)={0x0, "1e4e1557a609bff6a596dea0fb0503f22231b15d27fce60137b6c6cbf512f89b435f5dd9b4ae337bbf37b108c1ec26276567359e079abe967f5d8aad34301a48", 0x13}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x54, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000400000008"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f00000008c0), &(0x7f0000000880)=r2}, 0x20) r3 = socket$key(0xf, 0x3, 0x2) socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4, 0xffffffffffffffff}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x101042, 0x1) socket(0x10, 0x803, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, 0x0, 0x4c094) socket(0x10, 0x3, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r8}, 0x18) socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0202000311000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000bb000000000000000002000100000007000000000b000000000200090000000000000000000000000005000600000000000a00000000000000fe8800000000000000000000000000010000000000000000010018"], 0x88}}, 0x0) 4m11.485501219s ago: executing program 34 (id=145): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xfffffffffffff001}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1b00000000000000000000000800000000000000", @ANYRES32=0x1], 0x50) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r4 = dup(r3) write$P9_RLERRORu(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x101, 0x0, 0x0, 0x41100, 0x59}, 0x94) write$binfmt_elf64(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) open(&(0x7f0000000300)='./file0\x00', 0x145142, 0x102) 3m38.04146943s ago: executing program 35 (id=515): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="4800000010000104000500"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001280090001007665746800000000180002801400010000000000", @ANYRES32=r4], 0x48}}, 0x0) 3m12.187664999s ago: executing program 36 (id=894): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x18) faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_emit_ethernet(0x200000, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000001680)=ANY=[@ANYBLOB="2000000010001000000000000000000000000000357ca8e1ab9c9035e88f9ee5107edc62cd21dc77f737eef3a8ec4679a4e0a71bfc54ccfb589d5654c71665c69eb80465edc9ed46ab298eb9d5747dbbb16831409bb5bd5ddcf6232cbe940019389be3994a152fb0867445895405f3af6488b9d6f2756829c4ce87226354b0f8c12069d764bb1824d99b2758e21e05fea34c3b4aa7599d718c30c8624511b90371545eb6480382ab964cfe09f49a25e61d50669a50be5197e4beba320d913fdd92", @ANYBLOB="8842000000000000"], 0x20}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r3, 0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0xb8}, 0x1, 0x0, 0x0, 0x20}, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r1, 0x7, &(0x7f0000000280)={0x1, 0x0, 0x2f, 0x9}) fcntl$lock(r1, 0x7, &(0x7f00000000c0)={0x0, 0x2, 0x7, 0x401}) prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={0x0, r4}, 0x18) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000040)) r7 = syz_open_dev$usbmon(&(0x7f0000000300), 0x7, 0x20000) read$usbmon(r7, 0x0, 0x0) ioctl$MON_IOCX_GET(r7, 0x40189206, &(0x7f0000000180)={0x0, 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0x205, 0x44680) pwritev2(r5, &(0x7f0000000200)=[{&(0x7f00000014c0)="424d3f85b240893d1d20f01a3f91dfbffe42c5aa1b3a42002cf5d5c075a8285d9bd2f33c6cd381846821ac1a03936e3c85418ed92f133c610f82dc75b5336e5609604c27dc2198350151db97ae32669dd02a99c4a7d9bf00936eb2fd6117647df84d0e80f50b3e71975bcd72bd73f04120e4d46d046a5ffecd1aabec077f283816bc844b47f9659ff0f54d36ec790619e62956e32c9bf09265661feb", 0x9c}], 0x1, 0x100, 0x1, 0x18) r8 = socket$kcm(0x10, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000000)={0x0, r8, 0x3a9, 0x2, 0x7, 0x3}) sendmsg$kcm(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001900)="2e00000011008188040900000000000000a1810031000000000f000000028002002d1f000000000000", 0x29}], 0x1}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) 3m12.12541688s ago: executing program 37 (id=896): r0 = timerfd_create(0x8, 0x80800) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000240)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000780)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x20, 0x7ffc1ffb}]}) timerfd_gettime(r0, &(0x7f0000000180)) 2m7.095835449s ago: executing program 8 (id=2044): syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000280)='./bus\x00', 0x3c9c9b, 0x0, 0x0, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r0}, &(0x7f0000000400), &(0x7f00000004c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) mount$9p_unix(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00', &(0x7f00000000c0), 0x4481, &(0x7f0000000100)={'trans=unix,', {[{@noextend}, {@dfltgid}, {@cache_readahead}, {@noextend}, {@debug={'debug', 0x3d, 0x9}}], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x64, 0x63, 0x64, 0x64, 0x37, 0x32, 0x64], 0x2d, [0x37, 0x39, 0x33, 0x62], 0x2d, [0x37, 0x34, 0x34, 0x62], 0x2d, [0x31, 0x34, 0x64, 0x30], 0x2d, [0x30, 0x66, 0x38, 0x66, 0x39, 0x62, 0x30, 0x33]}}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@appraise}]}}) 2m7.091648779s ago: executing program 8 (id=2050): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregset(0x4205, r0, 0x1, &(0x7f0000000100)={&(0x7f0000000040)="dcef58b7f29c1f7c93d183044aedba283413e674c7719c33a4b17f028f68610a6c55bb2bf8282853f3e16f8394a8676ff55a3507e2ad50248c6130863b0f7433c7fbc9b978a39eae88bffd05d139cedbee444f7c98e1f92b0f64462b4b470bedced2125e0b1f38fbaa348c6d75aa1a4011e9cdae15ecb9309b0101edbf6dd6d111d6132f1821a4e4cbec8438c571a70e7ca7b0451a6cc5", 0x97}) ptrace$setregset(0x4205, r0, 0x1, &(0x7f00000001c0)={&(0x7f0000000000)="c9459d22eb6a3f6de5f13f1f14050000", 0x10}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000170000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000009b00000095"], 0x0, 0xffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3014850, &(0x7f0000000700), 0x3, 0x4e2, &(0x7f0000001c80)="$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") newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) chown(&(0x7f0000000040)='./file1\x00', r1, r2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@usrquota}, {@discard}, {@bh}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@debug}, {@discard}]}, 0x1, 0x609, &(0x7f0000000f80)="$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") syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0xd9726125b1f0997, &(0x7f0000000c00)={[{@inlinecrypt}, {@nomblk_io_submit}, {@lazytime}, {@grpquota}, {@grpjquota}, {@minixdf}, {@journal_async_commit}, {}, {@test_dummy_encryption}], [{@appraise}, {@fsmagic={'fsmagic', 0x3d, 0xe}}, {@appraise}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_role={'obj_role', 0x3d, '\xba\xb2\xd2\xb6[\xfe6&\xec\xde[\x97E\x97\xc5\xcb\t\xedCQ\x05\xd6\xe2\x04\xc8\xf4\xb9W\x8b\x1bX5\xa7\xdb\xb7\xd5\xe1\xb2\fd{\xb9\xc5\x9c\xe1s\xe6E.%\x97\xc6\xfe:\xbde\xea\xba6A\xd0.\xce\\\x88\xc1\xf2bq\xb8\xaf\x82P\x1f\x1d#\v<>q\xc9\x84^!#NA#$5E\xd9Cxs\xac\xcf\xff\xf0\x8a\xd9\x05\x00\x00\x00\xa7\x06$\x8fd\x92\xbb6\xc3\x90\xbd\x937n4\\\x8e\x85\x02F\xa6V\xab\x04\xb7\xf3\xd4\x9f\x18\x8f\xb6\x84\xf6?\xde\xa8\xd4\x0e%`\a\"\x1fT\xf8\xde\xe5\xb1n\\\xb3\xc8\'3\x90R\xa9\xaa\x19\xd87\xe7d?\xa4\x91)\xf1`\x8cE\x90\xc4\'}x\xdc\x9c\fGs\r\xa6\xc6\xbc\xc7/?V\x95\x14\xfd\x94\x1a\xc2\"c/\x91\xd3\xd8\xd9\x16Z\vq\xe7WI\x9d\xf4(\xd5=\xa2\xe6\"a\xa7\x93\xf2\x19\xe2P\xd0\x89_ay\x91\x13\xf60x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x10, 0x0, r2, 0x0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, 0x0, 0x530}, 0x0, 0x1000}) io_uring_enter(r2, 0x47f8, 0x1e43, 0x0, 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000100)=0x9) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x142000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) ioctl$SG_IO(r5, 0x2285, &(0x7f00000004c0)={0x53, 0xfffffffffffffffe, 0x6, 0x2, @scatter={0x1, 0xdd, &(0x7f0000000040)=[{&(0x7f0000000580)=""/226, 0x95}]}, &(0x7f00000000c0)="ff33501ef663", 0x0, 0x840804, 0x10032, 0x1000, 0x0}) 2m5.792371783s ago: executing program 8 (id=2098): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000240)=ANY=[@ANYBLOB="240100001600010428bd700000000000fe8000000000000000000000000000bbfc01000000000000000000000000000100040000000000000000a00000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ff02000000000000000000000000000100000000330000000a0101010000000000000000000000000000000000004e340100000000000000000000000000000004000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000a0000002bbd70000000000000000200000000000000000008000020ffffffdf2c0027cc"], 0x124}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0xa, 0x0, &(0x7f0000000a80)="b8000005000000000152", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610414000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r7, @ANYRESHEX=r6], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r8, 0x0, 0xffffffffffffffff}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000340)={[{@grpquota}, {@i_version}, {@acl}, {@nodelalloc}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@nombcache}, {@auto_da_alloc}]}, 0x1, 0x4fa, &(0x7f0000000ac0)="$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") mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file1\x00', 0x0, 0x5000, 0x0) r9 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x110) ioctl$LOOP_SET_STATUS64(r9, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x8005, 0x0, 0x0, 0x15, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cb19976d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "64885973ff030000000000000000d01cd3160000ffffff7f0000000000002000", [0x200]}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x1000}) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getdents64(r10, 0x0, 0x0) socket(0x400000000010, 0x3, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r11}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 2m5.43620945s ago: executing program 8 (id=2105): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/13], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = open(&(0x7f0000000240)='./file1\x00', 0x14d142, 0x0) sendfile(r0, r0, 0x0, 0x800000009) 2m4.90286235s ago: executing program 8 (id=2113): syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000280)='./bus\x00', 0x3c9c9b, 0x0, 0x0, 0x0, &(0x7f00000000c0)) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=ANY=[], 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r1}, &(0x7f0000000400), &(0x7f00000004c0)=r2}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) getpeername$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000080)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e000000000000000000180002801400038010"], 0x44}}, 0x0) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x9c) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r6, 0x40089413, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000f80)=ANY=[@ANYRESDEC, @ANYBLOB="302b6eff52a55a9c3ff89c5391ed0178b7d6df01911c727d8c7a8d340a26ff2cb8921987aab69a1fb47fa5edf3bee3d2ca09657d8f2cc07be31fc642150b9ef2713becedbcc15cb8f783369416847ab9e77cd53f9026e0c77fe6f2fbff2b1a332c4344eb249088cd52895b0e1a309825e5cf51c5cbe8a460cbe94538496111b394f5dc09b64e9dbd25085e14659cd3203fd7c10cb02800b7360fd3d69ca5eabca7c397a554c715df475d5dd4820a47", @ANYRES16=r6, @ANYRES64=r6, @ANYRESOCT, @ANYRES16=r0, @ANYBLOB="0ffe05", @ANYRES8, @ANYBLOB="e8fa88e70da1b9c76cfaf3d80659ae68eb29563234049e665da79cebc620be16778776225013943b37faa22e2cf1c8182f9f145839b2c310bbb276b81cf5e8f79bbcdaca26dc11e2aac8f915fd6f248216e714865dc635d6f0f3b375b0dbba056bdf18a7f200de6a9e995dca5fa8beda1ef93e1a9b241640634e6a6687d44c4cb189bcdfa08b86714d70495d799a713d0b284c17e515c6f31fb7427d327feaf324", @ANYBLOB="8e992400028447ab6903d457b10100c104a0b14ac8f07d96cff44ef48944010165fbcfdd", @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYRES8=r9, @ANYBLOB="7de0de6148d7d44c4d01eeff92df69b773e9c6727f8fbda7576c2a151378b664926695450adc68e745", @ANYRESDEC=r7, @ANYRESOCT, @ANYBLOB='\b', @ANYRES32=r8, @ANYBLOB="08000300", @ANYRES32=0xee00, @ANYBLOB="080004", @ANYRES16=r8], 0x94, 0x1) mount$9p_unix(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00', &(0x7f00000000c0), 0x4481, &(0x7f0000000100)={'trans=unix,', {[{@noextend}, {@dfltgid={'dfltgid', 0x3d, r8}}, {@cache_readahead}, {@noextend}, {@debug={'debug', 0x3d, 0x9}}], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x64, 0x63, 0x64, 0x64, 0x37, 0x32, 0x64], 0x2d, [0x37, 0x39, 0x33, 0x62], 0x2d, [0x37, 0x34, 0x34, 0x62], 0x2d, [0x31, 0x34, 0x64, 0x30], 0x2d, [0x30, 0x66, 0x38, 0x66, 0x39, 0x62, 0x30, 0x33]}}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@appraise}]}}) 2m4.90002073s ago: executing program 38 (id=2113): syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000280)='./bus\x00', 0x3c9c9b, 0x0, 0x0, 0x0, &(0x7f00000000c0)) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=ANY=[], 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r1}, &(0x7f0000000400), &(0x7f00000004c0)=r2}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) getpeername$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000080)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e000000000000000000180002801400038010"], 0x44}}, 0x0) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x9c) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r6, 0x40089413, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000f80)=ANY=[@ANYRESDEC, @ANYBLOB="302b6eff52a55a9c3ff89c5391ed0178b7d6df01911c727d8c7a8d340a26ff2cb8921987aab69a1fb47fa5edf3bee3d2ca09657d8f2cc07be31fc642150b9ef2713becedbcc15cb8f783369416847ab9e77cd53f9026e0c77fe6f2fbff2b1a332c4344eb249088cd52895b0e1a309825e5cf51c5cbe8a460cbe94538496111b394f5dc09b64e9dbd25085e14659cd3203fd7c10cb02800b7360fd3d69ca5eabca7c397a554c715df475d5dd4820a47", @ANYRES16=r6, @ANYRES64=r6, @ANYRESOCT, @ANYRES16=r0, @ANYBLOB="0ffe05", @ANYRES8, @ANYBLOB="e8fa88e70da1b9c76cfaf3d80659ae68eb29563234049e665da79cebc620be16778776225013943b37faa22e2cf1c8182f9f145839b2c310bbb276b81cf5e8f79bbcdaca26dc11e2aac8f915fd6f248216e714865dc635d6f0f3b375b0dbba056bdf18a7f200de6a9e995dca5fa8beda1ef93e1a9b241640634e6a6687d44c4cb189bcdfa08b86714d70495d799a713d0b284c17e515c6f31fb7427d327feaf324", @ANYBLOB="8e992400028447ab6903d457b10100c104a0b14ac8f07d96cff44ef48944010165fbcfdd", @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYRES8=r9, @ANYBLOB="7de0de6148d7d44c4d01eeff92df69b773e9c6727f8fbda7576c2a151378b664926695450adc68e745", @ANYRESDEC=r7, @ANYRESOCT, @ANYBLOB='\b', @ANYRES32=r8, @ANYBLOB="08000300", @ANYRES32=0xee00, @ANYBLOB="080004", @ANYRES16=r8], 0x94, 0x1) mount$9p_unix(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00', &(0x7f00000000c0), 0x4481, &(0x7f0000000100)={'trans=unix,', {[{@noextend}, {@dfltgid={'dfltgid', 0x3d, r8}}, {@cache_readahead}, {@noextend}, {@debug={'debug', 0x3d, 0x9}}], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x64, 0x63, 0x64, 0x64, 0x37, 0x32, 0x64], 0x2d, [0x37, 0x39, 0x33, 0x62], 0x2d, [0x37, 0x34, 0x34, 0x62], 0x2d, [0x31, 0x34, 0x64, 0x30], 0x2d, [0x30, 0x66, 0x38, 0x66, 0x39, 0x62, 0x30, 0x33]}}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@appraise}]}}) 1m22.784840956s ago: executing program 0 (id=2818): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0xffffffff, {0x0, 0x0, 0x0, r2, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x10001, 0x1, 0x3, 0x8, 0xffffffc0}, 0x4, 0x1, 0x8, 0x0, 0x3, 0x0, 0x16, 0x13, 0x3, 0xca, {0x0, 0x8, 0x3, 0x5, 0x84, 0x8}}}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@newchain={0x24, 0x64, 0x1, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, {0x10, 0xb}, {0xfff1, 0x9}, {0x5, 0x3}}}, 0x24}, 0x1, 0x0, 0x0, 0x44851}, 0x20040054) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x3}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="fc1000001a0007000000000000000000fc010000000000000000000000000000e0000002000000000000000000000000ffff0000000000000000000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="ff010000000000000000000000000001000000003c000000fc00000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000700000000000000fdffffffffffffff0000040000000000e80a000000000000000000000a00020070000000000000000c1008"], 0x10fc}}, 0x0) write(r3, &(0x7f0000000140)="24000000010006", 0x7) mremap(&(0x7f00006c6000/0x3000)=nil, 0x3000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) r7 = io_uring_setup(0x6c4, &(0x7f0000000080)={0x0, 0x4075, 0x18, 0x2}) io_uring_register$IORING_REGISTER_BUFFERS(r7, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x6, 0xffffffff, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x50032, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r7, 0x10, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000002700)=""/4096, 0x1000}], 0x0, 0xa}, 0x20) 1m22.623263559s ago: executing program 0 (id=2819): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000940)={0x0, 0x38, &(0x7f0000000100)=[{&(0x7f0000000800)="d8000000210081044e81f782db44b9040200000000806c01000015000a001800feffffff09000d2000000401a80018000a000e4006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee062e1c547cbc7225e6756cfb39b0590b4800089e408e8d8ef52b49816277cf4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db701000000eafad95667e006dcdf969b3ef35ce3bb9ad809d561cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d939acd92637429397f632838", 0xd8}], 0x1}, 0x8040040) 1m22.622582929s ago: executing program 0 (id=2820): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a2809302060000ff41fd01020400000a00120002002800000019002d007fffffff0022de1330d54400009b84136ef75afb83de066a5900e1baac968300000000f2ff000001000000", 0x55}], 0x1, 0x0, 0x0, 0x7a000000}, 0x4000884) 1m22.605667159s ago: executing program 0 (id=2822): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000c40)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2901090, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') mount(0x0, &(0x7f0000000d40)='./file0/../file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x3000000, 0x0) 1m22.56929017s ago: executing program 0 (id=2824): syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x34, 0x3, 0xffffffffffffffff, 0x0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0, 0x40000000}) r0 = syz_io_uring_setup(0x74d, &(0x7f0000000100)={0x0, 0x59c4, 0x800, 0x1000, 0x5cc}, &(0x7f0000000300)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/201, 0xc9}], 0x1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x30, 0x4, 0x0, 0x2}]}, 0xffffffffffffff0e) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000400000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x69, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x0, 0x0, 0xffffffffffffffff, 0x0, r0}) io_uring_enter(r0, 0x749f, 0x4, 0x0, 0x0, 0xfffffffffffffef5) 1m22.451436552s ago: executing program 0 (id=2828): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) r2 = socket(0x400000000010, 0x2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001300)=@newtfilter={0x74, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0x9, 0x8}, {}, {0xb, 0x3}}, [@filter_kind_options=@f_flow={{0x9}, {0x44, 0x2, [@TCA_FLOW_POLICE={0x40, 0xa, 0x0, 0x1, [@TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x7, 0x9, 0x9, 0x4, {0x6, 0x0, 0x6b, 0xffc0, 0x5, 0xb}, {0x7, 0x0, 0x800, 0x5, 0x8001, 0x7}, 0xffffff00, 0x7, 0x3}}]}]}}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x408c014) 1m22.451248532s ago: executing program 39 (id=2828): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) r2 = socket(0x400000000010, 0x2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001300)=@newtfilter={0x74, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0x9, 0x8}, {}, {0xb, 0x3}}, [@filter_kind_options=@f_flow={{0x9}, {0x44, 0x2, [@TCA_FLOW_POLICE={0x40, 0xa, 0x0, 0x1, [@TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x7, 0x9, 0x9, 0x4, {0x6, 0x0, 0x6b, 0xffc0, 0x5, 0xb}, {0x7, 0x0, 0x800, 0x5, 0x8001, 0x7}, 0xffffff00, 0x7, 0x3}}]}]}}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x408c014) 1m20.118421936s ago: executing program 5 (id=2865): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a2809302060000ff41fd01020400000a00120002002800000019002d007fffffff0022de1330d54400009b84136ef75afb83de066a5900e1baac968300000000f2ff000001000000", 0x55}], 0x1, 0x0, 0x0, 0x7a000000}, 0x4000884) 1m19.973702909s ago: executing program 5 (id=2868): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000001000000000c00000008000500205e00dd"], 0x24}}, 0x0) 1m19.436442709s ago: executing program 5 (id=2872): openat$tun(0xffffffffffffff9c, &(0x7f0000000e40), 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002380)="1b0000001a007f029e741683c28f7b331d00"/27, 0x1b}], 0x1}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="02030003100000002cbd7000fcdbdf2502000900080000001c0000000000000005000600000000000a0000000000000000000000000000000000000000000001020000000000000002000100040000000000070c0000000005000500000000000a0000000000000000000000000000000000000000000001070000000000000041b712167763d9f7f2acf2b49bbe179f8d7016b2b8b2b434eb5b822319478b8304e822000000000000"], 0x80}, 0x1, 0x7}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3a55, 0x1, 0xffffffffffffffff}, {0x800, 0x0, 0x6, 0x80000000}}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x3}}, 0xe8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000)=0x6, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x4, 0x8, 0xa}]}, 0x10) 1m18.964770828s ago: executing program 5 (id=2877): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x808, &(0x7f0000000a00)={[{@noblock_validity}, {@stripe={'stripe', 0x3d, 0x1}}, {@journal_dev={'journal_dev', 0x3d, 0x3}}, {@grpid}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x3}}, {@nolazytime}, {@noload}]}, 0xf5, 0x484, &(0x7f0000000f40)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x8004587d, &(0x7f0000000080)={@desc={0xff00, 0x0, @desc2}}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=0x0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x28004, &(0x7f00000001c0), 0x1, 0x4e4, &(0x7f0000001900)="$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") mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x5, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f00000003c0), 0x200044, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n'], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) umount2(&(0x7f00000002c0)='./file0/../file0\x00', 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0x7}, 0x18) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000dc0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="dfbf00000000000000006700000008000300", @ANYRES32=r6, @ANYBLOB="0800c300741300000800c4"], 0x30}, 0x1, 0x0, 0x0, 0x240408c3}, 0x0) 1m18.676382383s ago: executing program 5 (id=2885): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0xc, 0x0, 0x7ffc0002}]}) capget(&(0x7f0000000340)={0x20071026}, 0x0) 1m18.166961023s ago: executing program 5 (id=2888): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) r1 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) connect$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @multicast}, 0x10) 1m18.136008453s ago: executing program 40 (id=2888): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) r1 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) connect$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @multicast}, 0x10) 1m16.692184261s ago: executing program 9 (id=2904): syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x34, 0x3, 0xffffffffffffffff, 0x0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0, 0x40000000}) r0 = syz_io_uring_setup(0x74d, &(0x7f0000000100)={0x0, 0x59c4, 0x800, 0x1000, 0x5cc}, &(0x7f0000000300)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x30, 0x4, 0x0, 0x2}]}, 0xffffffffffffff0e) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000400000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x69, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x0, 0x0, 0xffffffffffffffff, 0x0, r0}) io_uring_enter(r0, 0x749f, 0x4, 0x0, 0x0, 0xfffffffffffffef5) 1m16.586646183s ago: executing program 9 (id=2907): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000001000000000c00000008000500205e00dd"], 0x24}}, 0x0) 1m16.409436977s ago: executing program 9 (id=2908): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b700000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0xc, 0x0, 0x7ffc0002}]}) capget(&(0x7f0000000340)={0x20071026}, 0x0) 1m16.361464117s ago: executing program 9 (id=2911): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x808, &(0x7f0000000a00)={[{@noblock_validity}, {@stripe={'stripe', 0x3d, 0x1}}, {@journal_dev={'journal_dev', 0x3d, 0x3}}, {@grpid}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x3}}, {@nolazytime}, {@noload}]}, 0xf5, 0x484, &(0x7f0000000f40)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x8004587d, &(0x7f0000000080)={@desc={0xff00, 0x0, @desc2}}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=0x0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x28004, &(0x7f00000001c0), 0x1, 0x4e4, &(0x7f0000001900)="$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") mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x5, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f00000003c0), 0x200044, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n'], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) umount2(&(0x7f00000002c0)='./file0/../file0\x00', 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0x7}, 0x18) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000dc0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="dfbf00000000000000006700000008000300", @ANYRES32=r6, @ANYBLOB="0800c300741300000800c4"], 0x30}, 0x1, 0x0, 0x0, 0x240408c3}, 0x0) 1m16.165923731s ago: executing program 9 (id=2915): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000002c0)={@loopback, @local, 0x0}, &(0x7f0000000900)=0xc) bind$packet(r0, &(0x7f0000000940)={0x11, 0x5, r1, 0x1, 0x3, 0x6, @link_local}, 0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000001000000000000010000000000000000000000000000000105000000100000000000000000000003000000000100000002"], 0x0, 0x53}, 0x20) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000001080)=0x8) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0xf45c, 0x2}, 0x0, 0x10000, 0x5, 0x0, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a00000014000780050015000000000008001240"], 0x60}}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x2b40, 0x410, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x480, 0x7f, 0x0, 0x1, 0x8, 0x20005, 0xffff, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ec0)={&(0x7f0000000bc0)='kfree\x00', r3, 0x0, 0xfffffffffffffff4}, 0x18) io_uring_register$IORING_UNREGISTER_RING_FDS(0xffffffffffffffff, 0x15, &(0x7f0000002bc0), 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r5}, 0x10) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r6 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x12, r6, 0xbdd94000) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'gre0\x00'}) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r7, 0x5608) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x4, 0x0, 0x6, 0x6, 0x3a, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x80, 0x40, 0x9, 0xffff3a61}}) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'veth0_vlan\x00'}) 1m15.980326754s ago: executing program 9 (id=2919): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000000c0)='kfree\x00', r1}, 0x18) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4b, &(0x7f0000000100)=0x4, 0x4) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0x1c) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x137b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x4e20}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x40800) (fail_nth: 3) 1m15.951741735s ago: executing program 41 (id=2919): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000000c0)='kfree\x00', r1}, 0x18) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4b, &(0x7f0000000100)=0x4, 0x4) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0x1c) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x137b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x4e20}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x40800) (fail_nth: 3) 1m9.85919698s ago: executing program 6 (id=2966): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000020000000900010073797a30000000002c000000030a01010000000000000000020000000900010073797a30000000000900030073797a32000000003a000000030a03000000000000000000020000000900010073797a30000000000900030073797a32"], 0xa0}}, 0x8040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) chroot(0x0) r4 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x2000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x91) newfstatat(0xffffffffffffff9c, &(0x7f00000006c0)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) setreuid(0x0, r5) r6 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r6, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x0, 0x0}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x300, 0x0, 0x0, 0x0}) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 1m9.685943383s ago: executing program 6 (id=2968): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket(0x2a, 0x2, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x807, @empty, 'vlan1\x00'}}, 0x1e) fsmount(0xffffffffffffffff, 0x0, 0x86) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) getdents64(0xffffffffffffffff, &(0x7f000003f980)=""/4088, 0xff8) r2 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x103400, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x0) r3 = socket$igmp6(0xa, 0x3, 0x3a) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) setsockopt$MRT6_ADD_MFC(r3, 0x29, 0x22, &(0x7f0000000000)={{0xa, 0x0, 0x101, @loopback, 0xa3c}, {0xa, 0xfffe, 0xffdffffd, @dev, 0x4}, 0x1000, {[0x9, 0x0, 0xfffffffe, 0xfffffef9, 0x0, 0x1, 0x2]}}, 0x5c) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) bpf$MAP_CREATE(0x1101000000000000, 0x0, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000001040)={'gre0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f00, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x1, 0x0, 0x0, 0x2f, 0x0, @empty, @empty}}}}) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x40000) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x14, &(0x7f0000000280)=ANY=[@ANYRES8=r2, @ANYRES32=r7, @ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r8, 0x0, 0x4092}, 0x18) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x54, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r9, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)=[0x8], 0x0, 0x0, 0x1}}, 0x40) getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff}}, [@TCA_RATE={0x6, 0x5, {0x8, 0xfe}}, @TCA_RATE={0x6, 0x5, {0x9}}, @TCA_RATE={0x6, 0x5, {0x5, 0x1}}]}, 0x3c}}, 0x0) 1m9.590329135s ago: executing program 6 (id=2969): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x46, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0_virt_wifi\x00', 0x2000000}, 0x18) 1m9.589756535s ago: executing program 6 (id=2970): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x2008042, &(0x7f00000000c0), 0x1, 0x571, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x862b01) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000b40)={0x52, 0x5, 0x1, {0x0, 0x1}, {0x45, 0x2}, @ramp={0x5, 0xfb, {0x1, 0x0, 0xc74, 0x7}}}) write$char_usb(r1, &(0x7f0000000040)="e2", 0x2250) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x80, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000001200)='./file0\x00', 0x1000000, &(0x7f00000001c0)={[{@nodots}, {@fat=@discard}, {@nodots}, {@fat=@flush}, {@nodots}, {@fat=@discard}, {@nodots}, {@nodots}, {}]}, 0x1, 0x11f1, &(0x7f0000001240)="$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") rename(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file2\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) syz_clone(0x6a000000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./bus\x00', 0x3) creat(&(0x7f0000000100)='./bus\x00', 0x104) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4) 1m8.766722411s ago: executing program 6 (id=2981): setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0xfffffffd) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f3bbb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68000000000000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd3170400000085be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5eaff07000000000000b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df902aeec50e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f000000000100000000d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b909006f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2c74664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ae2a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08e01dc5e8c6732e6dc59b5c8cb400000000000000592c9b68f09c8f5ddb20b4ae08b4d9df548e5ed6cd47b91a4bea8b6aa52edf64576aef1e43f2958437fdc20fbbd0d4e13d8cce1193b2f9b4f107e25af178d056e1b1e40bd75b013f7484fae0bc447b1ffaf34819fe3ad1a634c94345e26e1e68dec08723a37b05d1594a66a4718a51d4d67fc880c9d640f4eacc509873f1a103c87f69"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x57) r2 = memfd_create(&(0x7f0000000140)='\x02A\xbb\xcc\x96\x0e\x00\x00\x00\x00\x00\x00', 0x5) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000002, 0x12, r2, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000280)='./file1\x00', 0x14806, &(0x7f0000000080)=ANY=[], 0xfd, 0x708, &(0x7f00000018c0)="$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") stat(&(0x7f0000000000)='./file1\x00', 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x3, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000400)=[{&(0x7f0000000100)='|', 0x1}], 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$sndseq(r8, 0x0, 0x0) splice(r7, 0x0, r9, 0x0, 0xf3a, 0x0) splice(r4, 0x0, r9, 0x0, 0xc, 0x0) write(r6, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r10}, 0x10) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000003280)=ANY=[@ANYBLOB="140000001000010000000000000000030000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000020900010073797a30000000000900030073797a3200000000240b0000060a010400000000000000000100000008000b4000000000fc0a048028000180080001006c6f67001c0002800e00024073797a6b616c6c65720000000800054000000008d00a01800e000100696d6d656469617465000000bc0a0280640002804c0002800900020073797a32000000000900020073797a310000000008000180fffffffc0900020073797a31000000000800034000009c920900020073797a300000000008000180ffffffff14000280080003400000000808000180fffffffb0800014000000002080001400000000b500002804b000100fa62d7ba9ceeacf9aa4f832b78f35731f355d63e192a72aef5e68a05d1b806151b6bd1e2d74abafd383790ad363fdc1b7766748630b48f9beefdb33c86d5835a470b5ffd20d7e9006c0102805c00028008000180fffffffe0900020073797a30000000000900020073797a320000000008000180ffffffff0900020073797a320000000008000180fffffffd0900020073797a310000000008000180fffffffc0800034000000e5628000280080003400000000608000340000000070900020073797a320000000008000180fffffffe540002800900020073797a320000000008000180fffffffe0800034000000000080003400000000008000340000000090900020073797a310000000008000180fffffffe080003400000800108000180fffffffd8e000100818ce881ff18470752e86442e8b77ddcfc7a4c87f05cd36147be26c85cc854cc117db1906007a5a8c298f4724c8c743d46ec7f3ba478d9dfb10bbe9e4fdfc2188d62db9bb1364fed383fe0b0c3fbbab83959470cb0ffb14765c32f10b54d99531d04caaf264214997543a1c63637d9a3a20b7ce9312e545626eb375c88462c198f35cf8a11616de4fa0c000098020280eb00010099c8e680eb4d0e7f78e1fb62226ae541d997c8cb51c5ebd0bb7e2730b61310dcd7525807288a7ad8c00f6aa230a1d1b876ddb0e188384e7c79cd8af94a02451a04d8f116bde38077da45650d82bdd1767b03e3f35bc4a5769e659d8cdb6d9d9d717c78b50f6b3ac899b07a9eaf2c989654de7d6609299bad01ca1f3fa8b6229a6c69627a07f627880e902231b20368f3ae64fd12fc37afeb95f14a4dc3d0bc5f6e2afd0fc8ef6982054cffa703ee1376654019ad6d2add9052c5d2f2e0ba3318f931b2c5f2dcce5cbca6093c64d23b64e2f2061da3dd5983644280de22d592b63b5d7f6b571beb005400010041bbc64da6bacaad1bebec23352accccbca40d6ba87943f82df945bf4ccc5250a0c2b2cb13793380f424b280bfb960885af6df4afa26efa8fcd7a1243389ef3fcf1d709f775a9cd1dfb2b84fd03e5d70f800010001950b7c0ec30534e476b721ba6e82d03078fe63b683918ecbbb9c339c8cdd63689339ac43acd5973f4aac8720a98d18e13b98e11e291f3f3621ed29c717639f84bdd28810da6ae30538775f15e00133741e9de3f96f69ab363752fa962b3c71041ba1e463a91d782a968d9febb648b66e71a6827c53b3be014b785f61c4fd46fef00658f64cdd465edb61ba4c5f00849b2935c485da99a38489ecc29837433ac5446c3922d73153fd8fb2368a5ce4201760ca6778f570b7fcb38be633a02d57c5884b6bcbaf3bc28ca7686edb5d59e1b823a8f0f5ff788625995d51c16413783c6290a9714bd4dcbd2a388139f3e46f69916f335c0002800900020073797a3000000000080003400000000908000180000000000900020073797a3000000000080003400000000808000180fffffffd080003400000000408000340fffffff908000180fffffffb0800034000000003a80002801c000280080003400000020008000340fffffff508000340000000001400028008000340000000050800034000000007720001001c2cce526d2ee30fb33f426450278cb35ac06b1cef15fefc26b5c17a8c9251bed316fccb5588f2e071fc355537fcf458cf14217f16ce4c12a4b559f3e807c94c6cc4f418baebc6024b74b9dbc5ef66dbbe91812ea247db80670c101ed494f105ad9c09b4eaf8d5c133b46a311c1a00001c0302802000028008000180fffffffc0900020073797a320000000008000340000000035c00028008000180fffffffc08000180fffffffc08000180fffffffb0900020073797a300000000008000340000000060900020073797a30000000000900020073797a31000000000900020073797a310000000008000180fffffffbf6000100330e5af714359ac9da33381a13071148dbe4293800e6be0290efbb549850cda132ca27a55553fd77c3067504c4596086f4001f53d49e8111395ebccb983c6b04735a58ab2617dfc62123b09c8dc5a47154667414dc28e8369829764b2e3cc23303a882890bad6d3a70d9e15701ec8c4c15a46d38c9ed6bc8658f8a45a02083f563324a27c649bab7cbcb485c289bd8df0a040128df6891ab48095977e0463f8e3ed7ba6df976ee30768954dfeb3f08c942b2c9384aa0b78baf92ecf5e4d73788afb1bc5a8f7c4b454897cd8bcac7f19cdd949fac66756da3b9311e13362eee317df853f6bc7e4638eb145a1484d3780e09b50000c8000100d5c1e4159bf770e02e6e1ebe911d7513709588175328d2e11f2ebf3f6967c49bedcb2a5459a45272bb8084e3bb55ea7a80166d97ec16457ed7d2a834d9aafdb2a54110ddc7975eaeda4f897ec7d533c27df0ce5ff92cfedadc67fff850ee5d07822d72b27af229d17ad2f8d802ae40d98f373e348a04b4f0270c71f82319de3a0331f165204896e0e448cf7ea0f8eb32a312fda6716f72f0234742fe6708ad0adf587ea21d94b8c8f5080028dda1e21d3d9ac82d8edd12941631b72b692ecc262d6ae12393000100c56deda494a09379df59bad8f0f17376b307ce49571034af728b1c4bf694e3b91406b976944238ab36ccaf40e3d92952ba87aa27af6353a82868c9508577a1b6a349fce75b3e4952b04b9527f496b5555e6db110dec07430b01446635eff12f136dbcb54fd4dc90b02e1bc6488ed74efd9eeb1b6de6e2a234f6c323df5c28a0352d03b34ee4f64ab614078125aa3cc0048000280080003400000000c08000340000000010900020073797a310000000008000180fffffffd0800034000008000080003400000dc5b08000180fffffffc08000180fffffffb2c0202804b000100cece2d8ff50c68c1060c2e691ddc50c6d87b46b4e5f6695010163d98bac2d9d7693cff0ec1e2107f58d3c305c78e5a596df92f1dbe80793dce5424be9e7951890023db7d0b9b2700e5000100f46e4b21dd4b92221713eece21b0e3bfb3fe995725eca78713a8d11ac82a6aefeeeab4720bd136479523ccafa34771afedeafc55275842bb7adb37ff3c93b19d9d5139f8b67ee81e380faa9506e6c8e5956cf7efc9828438d340aa4bfe771769c6ddb2f8c31049c1fc37e8f28812ea0aadd0caa7e32f6bb4b2b7a4473e5fa876c87bf285a503660ea12a0cfff6863a87c64ea83c31e737e278edcad77cb964828c7049d335e25156fd4d1c2faada6a8363794fe487155fbfd7c2e1b8504d4a744357734f51fca0426ffe929280df27411f8a90a067b285e970fa1e403722ae91dd000000f400010073e22ba6603d1c92836887468b100c2dc430efeb2ef19c66bd0582fe94df7b5a20292fdfbd2009980dbf9651685f7713bfb0f42583e452670f29e2cabf848fcdcb7a2067f0b257efd7dc927e540584b08f026e14be231afa797e36410d8ad6cbced8c5d2cce2f5a8b75713e57b3161b5b4ce78f283bf59a04f90bc1c5a4371abed0124c621ecb51b6166ad39f14216c09456232b7ea8dd7058bbbeae8b1c13df7ffa1515a359309683421d783f4fb00547cb06b3f974e65f28397c2c16675436a414b6e28d61800c35bdc05f9837e14491ce0fa7c0fbf6f61dd8f7eceac62373ed913de212a188ad5fa12d0eab8a0b440900010073797a30"], 0xb98}, 0x1, 0x0, 0x0, 0x20000000}, 0x40800) ioctl$TIOCGSID(r8, 0x5429, &(0x7f00000002c0)=0x0) prlimit64(r12, 0x8, &(0x7f0000000300)={0x0, 0x6}, 0x0) 1m6.325569157s ago: executing program 6 (id=3055): sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="300000000706050000000000000000000100000705000100070000000900020073797a30000000000800064000000104"], 0x30}, 0x1, 0x0, 0x0, 0x8800}, 0x20040000) 1m6.267856598s ago: executing program 42 (id=3055): sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="300000000706050000000000000000000100000705000100070000000900020073797a30000000000800064000000104"], 0x30}, 0x1, 0x0, 0x0, 0x8800}, 0x20040000) 2.491692033s ago: executing program 7 (id=4921): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3000010, &(0x7f0000000340)={[{@errors_remount}, {@nodioread_nolock}]}, 0x1, 0x512, &(0x7f0000000380)="$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") truncate(&(0x7f0000000180)='./file0\x00', 0x8fff5) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021181500001e0a05010000000000000000070000000900020073797a31000000000900010073797a3000000000ec140380300000802c000180250001"], 0x159c}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x7, 0x2, 0x80000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.441766493s ago: executing program 7 (id=4925): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) rt_sigaction(0x4, &(0x7f0000000480)={&(0x7f00000002c0)="c4817928f9f20fd0aeba6b913126410f1acf4208442b0440d9d03e3e4202b600800000450f38caf2f2440f59cbf30fbcc165f346d0980010c0fe", 0x14000004, &(0x7f0000000300)="c4e1c9764899266566440f1b934f300000360f64ff440fb2328c418f430f01eec4633549f007802a2c6426410f01ee40df27", {[0x2]}}, &(0x7f0000000c40)={&(0x7f0000000bc0)="c461c9f29474aa0000002e2e66660f6c6a2a2e66400f38dd9f00008000c4c250f25800450febca460f0f0d0900000097407f44c441e571e706263666420ff1b0000000003ec15b274b", 0x0, &(0x7f0000000580)="c4e1457d2431450fd3bcae00000100660f38f6f3c441c5f35b00c482712b21f30f52d236f3a5c44125eeaf00000000670fb07f020fa336"}, 0x8, &(0x7f0000000c80)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@auto_da_alloc}, {@min_batch_time={'min_batch_time', 0x3d, 0x5}}, {@norecovery}, {@noload}, {@sysvgroups}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)='2', 0xff10, 0x8000c61) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="180000000000f15316f0ddd40b83de54f8d047fa5041c7b80000000000009500000088271bbc2ca6e7a6b3bb0a611e64e0fe44263cead799ad3dc7e0def763797d37f7785900b01a2125018703d859ffe71f0e7d0cd098127acdd60fc1c80ceec4cce1c7bc5c7825085a532b4acc94c0640564a06135aadebff9aff060dd3c051b5d8f9f0aa0a858c18c54f8e72264eedecd9bb38d5f3476b0a9093d7dbaebf7267f359e11ac4674ef1b6b381676cf815e2899d266d6c7cf42db54afc8218f08446f748dedc4fe939026730b3a591ac93bdb2176664c051ffbbb0feb2c6e7ef7ff7461b97f8d0683643cb82ca34da2d67136dda6d300"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(r2, &(0x7f0000000f80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000d00)=@ipv6_delroute={0x204, 0x19, 0x100, 0x70bd27, 0x25dfdbfc, {0xa, 0x10, 0x80, 0x1a, 0xfe, 0x0, 0x0, 0x2, 0x200}, [@RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @MPLS_IPTUNNEL_DST={0x8, 0x1, [{0x2, 0x0, 0x1}]}}, @RTA_METRICS={0xef, 0x8, 0x0, 0x1, "58e2f8a58e4bd8666cf48039b8cd63af11679ea7fae0bb1a163bb1a073e5bbea48a2aaf6c32888b22fee7b883557b9524732a444f0e883790c5837ac24e0ab0176438820dc671f9d644f5e4c2301f3f76f12032743ab2e9ff68cf6970da02691ac7eb7bd6f3ae7b4568eddbf3f204b2e680b20e8adbf084bc62eb3bd63c36fa57ef045d7edd1f3cc06d4ed839465546ce14ab16e2c3faf19cf08c34353e9f720a5964b79b97b5b87ab3ee1777330459daefda640329207cb5f4a8d884fc7ea793bd3949554cb8da412f16228387a599405c5770baa75d2054607859991bc53e34aef0755c5750d94e75af3"}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @SEG6_LOCAL_ACTION={0x8, 0x1, 0xe}}, @RTA_METRICS={0xde, 0x8, 0x0, 0x1, "85341276cd234352587273e49cfcff40af2a7535a3f13c739a16dacc6f707e4b8ce5cc3dc9d57e4ccce3b2c6ea1e1f0de0098622f349c776082500e2a122027ac21015e9b8081e568f0f78ea616c2229521eff40999a1e6a79420f30443e9db59172bafe9ee723a74e317c409874f61bb9efc6f71adf359a375486a1f16e96f8b06c9435e53b3d497144461afa1871fa9ca3c94c8fd26571d768aa7b6633896719ef711fc7b42a28e145a107cd071b00f6531b056d64ab03c7309031ad3cb876f7403d6b1ea79c1423daed470272aab588d535ada4a2ca54f802"}]}, 0x204}, 0x1, 0x0, 0x0, 0x6927abe97dcca506}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) r6 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) write$selinux_validatetrans(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a646c6d5f636f6e74726f6c5f6465766963655f743a73302073797374656d5f753a6f626a6563745ff47406a2ad42d15b73302030303030303030303030303030303030303030392073797374656d5f753a73797374656d5f723a6b65726e656c5f743a733000dcaae8a1eb93c4af56284ae686a4c1e6357fe774234afc2b5a77de9f1a28726736f07959d616"], 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r4, 0x0, 0x2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, 0x94) r7 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCL_BLANKSCREEN(r7, 0x4b67, &(0x7f0000000180)) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x14a) fallocate(r8, 0x20, 0x2000, 0x8000) 2.019213412s ago: executing program 7 (id=4940): pipe(&(0x7f00000002c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x2}, 0x18) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000840)=0x5, 0x4) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c0000000800124000000000050005000a000000050004000000000010000300686173683a6970"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a9d000105000100079d"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) 1.845218935s ago: executing program 1 (id=4941): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r1, 0x0, 0x100000000}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x10000, 0x0, 0xfffffffffffffffe}, 0x0, 0x1, 0xffffffffffffffff, 0x0) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xff0f}], 0x1}, 0x0) 1.798857866s ago: executing program 7 (id=4943): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000200)='\x00\xc76\xbe\x91\x8d\x182)!\x9a%\xd9\x19\x17\xb0\xed|\xb3\xc2\x017h\xe9{L\xa2\xd28\xd6\x06\a\x0e\xfd\xfe\x12\x8f&\x13\xae%@T\xa3\xb0>\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdcQ\xee\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\x7f\xa4\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\x1c\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9Or\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8\xf0_o\x16Oy\x00\x16h\xcc\x81.F/\xb9-&R\x8e\xb2\xb3bBx\x1e1\x18\x8f2\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8#K\xb6\xe4R$\xaa\x00U\x92\xd2\x99\xb8\xde\xf9s\xcb\x89\xf2\xf6a\xcb[\xcc+\x1a`.\x00\xcf\x1c\x14\x1d$\x98\xf3\xed\x1cA\xc1+0\x87\xd1\xf2\xc6\x8fs>\x16\x8b\xdeV\b$e\xe5\x8d/\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\xe1\xa3\xe0\x18\xe5\xee\xb0\x93\xfe\xac\x98m\xaf\xb9K\xac\xa0\x1a\xe2\xb4\xfd\x1cO5\xce9\xf9\x02h\x0e%\xa1\x11COf\xed[z\xc6\xc1:L\xdb\xac\x84Ru=E\xf7\x94\xae\x18v\v\xcc\xcd\b\xa5\x19\xb5idBc\xf1S\x93\x0f\x82me\x9a\xb8\a\xff\x91\xed\x9d|\xa7D\xf1\xb2\x14\xff\xc5\xaf[\x86\xca!E\x9a<\x00', 0x5) fsetxattr$security_selinux(r0, &(0x7f0000000480), &(0x7f00000004c0)='system_u:object_r:hwdata_t:s0\x00', 0x1a, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x541c, &(0x7f0000001100)={0xd, 0xbcb4e19}) pwrite64(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0xfecc) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0x7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) eventfd(0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x14, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bond0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x1, 0x4) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffc}]}) socket$netlink(0x10, 0x3, 0x4) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) 1.726891987s ago: executing program 1 (id=4946): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r1}, &(0x7f00000004c0), &(0x7f0000000300)=r2}, 0x20) listen(r0, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, &(0x7f0000002300)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x4e22, 0x1}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x4) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x300) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x480c0}, 0x0) accept4(r0, 0x0, 0x0, 0x400000000000000) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000070000000300000048"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r7}, 0x10) connect$netlink(0xffffffffffffffff, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1, 0x400000}, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000300), 0xc, &(0x7f00000002c0)={&(0x7f0000001580)=@newtaction={0x18, 0x32, 0x829, 0x0, 0x0, {}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x6011}, 0x80) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) recvmmsg(r6, &(0x7f0000001140), 0x700, 0x2, 0x0) 1.59532192s ago: executing program 3 (id=4951): socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000a00)=ANY=[@ANYBLOB="146000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc0800034000000014400000000c0a01011d000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xac}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 1.56565837s ago: executing program 3 (id=4952): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$pptp(0x18, 0x1, 0x2) syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) io_uring_setup(0x1de0, &(0x7f00000000c0)={0x0, 0x3605, 0x80, 0xfffffffc, 0x2ac}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x1000) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001d40)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x5}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x10) socket$kcm(0x10, 0x2, 0x0) 1.260469236s ago: executing program 4 (id=4957): r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500001a860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x82100, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) pwrite64(r4, &(0x7f0000000140), 0x0, 0xfecc) fallocate(r3, 0x0, 0xbf5, 0x2000402) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000075b0"], 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x1000, 0x0}, 0x8) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000005000000000000000200000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70200080000eaffb6030000000000008500000083000000bf090000000000145509010000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000f1", @ANYRES8=r6, @ANYBLOB="0000000000000000850000006d000000bf91000000000000b7020000010000008500000085000000b700000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xed41d0969ec4053c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$INCFS_IOC_FILL_BLOCKS(r10, 0x80106720, &(0x7f00000006c0)={0x5, &(0x7f0000000600)=[{0xffff, 0xbf, &(0x7f0000000380)="826497ee95288d863a6327696c542269b2577d384a9ee66f00c28a605b6b2828d3cb3a7c63c712ba2795e28803b7302ff478fb42e9a2c45aa2c627bd81f7b6f1e1cf3db235ce0ec917cb3135a97ee12aa798c7ae91470549d080ce99844531aca2d9469b6e845e7c6bba6e9191deace1d1e2c87f241062aad3a194e9ab27b6f4453e2e2fd3c852ab7c8733f9cdf6d97f9babc7b00515925ab19df79f3cf3b42558cb099f2782dd43d557b019ea5aaa2b3011d24d10ef6c42908ac595d29f92"}, {0x9, 0xb7, &(0x7f0000000540)="45fe6f3f6bbcdc6236d4ec9fe701d6bd95df56e01cfea41d76a4a7d9c0117378f7f2b1ff61b08249255a4b652080a86040e25a61470825dcad5144585968510284817ac160fb4357ca711ac923385257932e75d5412d7a98a83e29a7d5135f26dbaa07b2f77b3f039696ef553d4c94480a5d04cec87d08bce458c365a6c3a67b759deff7cc05c631e63b01e95da92191ba4d0b97326dc1e148c4b9a4a018618a3d586df94299d38ebcd03332c24657c51af08214bfb25d"}, {0x6, 0x0, &(0x7f0000000100), 0x1}, {0x7, 0x0, &(0x7f00000002c0), 0x1, 0x1}, {0x9, 0x11, &(0x7f0000000300)="04f4f405370c6babdcb2917c18a5d1de8c", 0x1}]}) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYRES8=r8, @ANYRESHEX=r5, @ANYRES16=r11, @ANYRES16=0x0, @ANYRESOCT=r11, @ANYRESDEC=r3, @ANYRES64=r9, @ANYRES32=r0, @ANYRES8=0x0], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xd, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r12, 0x0, 0xffffffffffffffff}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@restrict, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}}, 0x0, 0x46, 0x0, 0xa}, 0x28) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0xc, r3, 0x0, 0x0, 0x0, 0xfffffffffdffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) r14 = socket$inet6(0x10, 0x2, 0x0) write(r14, &(0x7f0000000000)="fc0000001c000705ab092509b86813000aab080102000000b85b0e93210001c0f0060848050000010000000000039815fa2c53c28648000000b937799f377a00bc000c00f0036cdf0db400600033d44000040060b16a482c0a3c313012dafd5a32e273fc83ab82d710f74cec18444ef90d475ef8b2863ef3d92c94170e5bba2e177312e081f691bc5110556888100000463ae4f5df1b394cfd6239ec2a0f0d1bcae5f5502943283f4b9e611183b102b2b8f5566791cb19020191bd0733802e0784f2013cd1890058a10000c880ac801fe4af000049f0d4794eedfca92c09d776e7a90ab79a6f00a1960548deac279c00"/252, 0xfc) setsockopt$inet6_tcp_TCP_ULP(r14, 0x6, 0x1f, &(0x7f0000000f40), 0x4) r15 = eventfd(0xfffffffe) r16 = eventfd(0x5) io_submit(r13, 0x3, &(0x7f0000000f00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x1, r12, &(0x7f0000000700)="bd665a32b986dce20e1f06d83d95f9319d14bc750485aa3a2d6d8dcb6333dd94eb691b88b0bace9b12ac3dfc65e18c66429880c36f51a223eab10d68b07d9b256f5837b2330b10a9ae72a2813a6ecbd2cc6eb32ac807c7d04d3bf80187e6622e53b8219f2952cafd43fa6da488cf7d0ba751", 0x72, 0xc836, 0x0, 0x77458b7debcf6f23, r15}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x3, 0x7, r5, &(0x7f0000000880)="002afcc5f33d2bfeefb889af026404ac72785382a3c7d93d6e913d5ee9889a5eb1c225df8b3ffb1ffd47b039ed32c9b4bc28cfb147ebbe509b7831fcb07e31c39b0b9ef422d5e08ecf54a61a3011a4c679", 0x51, 0x6, 0x0, 0x2}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x4, 0xd, r5, &(0x7f0000000940)="6fb1918c30f1031d186485a9dde640598381c51b1bdc620dca6100e44bc9a49dd3b4b470e990cc04c84293a7801db20b843059c955ceb6ba628229b9f8c4d2ebc262a52190717042e6b64a15b4e57aef5c5764225f35b9c21c23b5a9f87d3838a362500f08e5f9dd31fb5f653a7a5783ef1d057da56298eaa93a2cf59296bd5a4445d3b75b574970c9be13e172c17f98de44607af6e21dfca79d80013424b5d58a209433ac2de1fd474cbbeb3fa8112cc0332eb458bd31a0c0a7", 0xba, 0x7, 0x0, 0x3, r16}]) 893.882593ms ago: executing program 2 (id=4962): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000580)={&(0x7f00000005c0)={0x2, 0x4, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000003a80)=[@rdma_args={0x48, 0x114, 0x1, {{0x0, 0x2}, {0x0}, &(0x7f0000003a00)=[{0x0}], 0x1, 0x39, 0x2}}], 0x48, 0x4000000}, 0x0) 893.605623ms ago: executing program 1 (id=4963): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='comm\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="0100000100000004000180"], 0x18}}, 0x0) write$tun(r0, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800002017f02a1ad800000000000034a93b6e00bd7130fecd16779cc466550d5bae054caef2e4aa63b29017ce0429dc7f2969f5b746e5dfcb395a3899c65429ac6569af1bb4b98878266e500877b7599ba0800489909f", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="a0010000100001000000000000000000fe880000000000000000000000000101ac14143c00000000000000000000ff0000000000000200000000000064000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000fc010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000002000000000000000000000000000002000000000000000000000002000000cd000000000000004800020063626328616573290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c00170000000000fdffffff000000000000000028bd7000000000004c001400636d616328616573290000"], 0x1a0}}, 0x800) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000004c0)=ANY=[@ANYRES32=r10, @ANYBLOB="0000000000000000b702000003000000850000008600000095", @ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT, @ANYRES64=r6, @ANYRESHEX=r7, @ANYRES16=r9], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/power/wakeup_count', 0x80800, 0x8) read$char_usb(r12, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r10, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7, 0x4, 0x80, 0x1, 0x28, r8, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r13}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r14}, 0x18) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 893.080213ms ago: executing program 7 (id=4964): socket$netlink(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) setrlimit(0x9, &(0x7f00000002c0)={0x4, 0x1}) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000001780)=""/4090, 0xffa}, {&(0x7f0000000340)=""/204, 0xcc}, {&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000004c0)=""/100, 0x64}, {&(0x7f0000000540)=""/72, 0x48}, {&(0x7f0000000780)=""/211, 0xd3}, {&(0x7f0000000680)=""/167, 0xa7}, {&(0x7f0000000b80)=""/220, 0xdc}, {&(0x7f0000000980)=""/141, 0x8d}], 0x9}, 0x1}], 0x1, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) unshare(0x62040200) 830.983654ms ago: executing program 2 (id=4965): pipe(&(0x7f00000002c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x2}, 0x18) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000840)=0x5, 0x4) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c0000000800124000000000050005000a000000050004000000000010000300686173683a6970"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a9d000105000100079d"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) 830.716214ms ago: executing program 7 (id=4966): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000952fa02f60ea8b6722c30f219fc548e9e6b2c8513280fbc8b7dcbf23c3e618408dd48d5b1c25f334a27dcca55c80e28bf1b7023e9dbf912b43180850f7cd13a45a8c03615ecef4ebc567a6a79d6266442147517f3e98c7dd150c1bd2f7f36276cfb568cf7fe725f4d48ab76a645ef427dd85761bff76abcd95"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x18) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000080)={0x8080, 0x1f8, 0x10}, 0x18) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) renameat2(r2, &(0x7f0000000200)='\xe9\x1fq\x89Y\x1e\x923aK\x00', r3, &(0x7f00000002c0)='.\x00', 0x3) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000002000000000000000008500000061000000850000007d00000095"], &(0x7f0000000200)='GPL\x00'}, 0x90) r5 = syz_clone(0x0, &(0x7f00000004c0)="f5c3f51d3d70da84ce0f1f1dc349acd447ef2cd22b3098f1364ef8dc60771e1f4fdffeddc61d4cb521621ed7bf6617a78497045441a89fd0a66349a07a0563a8d791537ab97a532034fad8619d38d1ac2fb9948466c18c73c1ef69654ea6a75901286dba0a66a513d293f2311a52bbe27e326032fc2079c41d5d3f2617e52274d1", 0x81, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="d8bbc3366f731fa5cd37cf619cd29cf185fb4f9dc20445238366122d12f34f0d76fe69efc69c13d29052ac8d61509c5e826e2490d18f0b095c3b3651e280bb33ee77f250c13f78014a3eca4df4f5132736043659d25a8fd94523fb602d771df37725f700d4ebf613a832878e2ca6dc1321d6747e0baf0cc531aa08c5485844f58c2029d951b98c195560b62b82c2d317c85d90d659832759c43478c51f4cc7dd88ce379f6c") timer_create(0x2, &(0x7f0000533fa0)={0x0, 0x21, 0x0, @tid=r5}, &(0x7f0000bbdffc)) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000400)={[0xfffffffffffffff5]}, 0x8, 0x80000) ppoll(&(0x7f00000000c0)=[{r6, 0x200}], 0x1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x27, 0xe, 0x0, &(0x7f0000000100)="f80204000000000e00007f5386dd", 0x0, 0x405, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$nl_xfrm(0x10, 0x3, 0x6) bind$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 825.492074ms ago: executing program 2 (id=4967): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='kfree\x00', r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000004fb83c9a20c0bf00"/27, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 814.571054ms ago: executing program 4 (id=4968): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000580), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) syz_emit_ethernet(0x2e, &(0x7f0000000240)={@multicast, @remote, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x4, 0x20, 0x67, 0x0, 0x7, 0x2, 0x0, @rand_addr=0x64010100, @local}, {0x11, 0x81, 0x0, @empty, "5af00000"}}}}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000007c0)='bcache_btree_gc_coalesce\x00', r1, 0x0, 0xfff}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r3, 0x0, 0xfffffffffffffff7}, 0x18) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a300000000008000a40ffffffff580000000c0a010100000000000000000a0000060900020073797a30000000000900010073797a31000000012c0003802800008004000180200007800e0001"], 0xbc}, 0x1, 0x0, 0x0, 0x4000851}, 0x40) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000140)=ANY=[@ANYRES8=r0], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='kfree\x00', r6}, 0x18) r7 = io_uring_setup(0x77da, &(0x7f0000000240)={0x0, 0xdb5e, 0x40, 0x0, 0x12f}) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r7, 0xb, &(0x7f0000000480)=[@ioring_restriction_sqe_flags_allowed={0x2, 0x11}], 0x1) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r8}, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r10, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000e00)={0x38, r9, 0x10ada85e65c25359, 0xfffffffd, 0x25dfdbfd, {{0x6b}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x72}}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x4}]}]}]}]}, 0x38}}, 0x0) 775.741715ms ago: executing program 1 (id=4969): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x1ff, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) socket$inet6_sctp(0xa, 0x801, 0x84) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18010000bc0000000000000000030000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r1, 0x0, 0x80000}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$inet(r2, &(0x7f0000001540)=[{{0x0, 0xfffffffffffffda1, 0x0}}], 0x40001b6, 0x0) close_range(r0, 0xffffffffffffffff, 0x2000000000000000) 775.442785ms ago: executing program 2 (id=4970): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000000000001823", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r3, 0xc0105500, &(0x7f0000000140)={0x80, 0x6, 0x100, 0xfffd, 0x0, 0x0, 0x0}) 702.952217ms ago: executing program 1 (id=4971): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f00000006c0)={[{@noblock_validity}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xe6}}, {@oldalloc}, {@barrier}, {@auto_da_alloc}, {@nodioread_nolock}]}, 0x1, 0x5b3, &(0x7f0000000780)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x91) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x18) pwrite64(r0, &(0x7f0000000140)='2', 0xfdef, 0xe7c) 702.575516ms ago: executing program 2 (id=4972): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$unix(0x1, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$unix(0x1, 0x1, 0x0) pipe(&(0x7f0000000100)) socket$unix(0x1, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a2, 0xc000, 0x8, 0xc1}) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)) io_uring_enter(r1, 0x2219, 0xcf74, 0x16, 0x0, 0x0) 678.558247ms ago: executing program 3 (id=4973): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000093c0), r0) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000009500)={0x0, 0x0, &(0x7f00000094c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010029bd7000fbdbdf252b000000080002"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r2 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0xd, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) r8 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xf4, 0xc, 0xb, 0x5d, 0x0, 0x30, 0x50098, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x6, 0xe}, 0x8, 0x7, 0xfffeffff, 0x5, 0x7, 0x7d, 0x7, 0x0, 0x1, 0x0, 0x41}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x13) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f00000002c0)={0x2, 0x80, 0x3, 0xab, 0xff, 0x7, 0x0, 0xc, 0x44, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x3, @perf_config_ext={0x2, 0x7fffffff}, 0x4008, 0x101, 0x2, 0x6, 0x5, 0x4, 0x8, 0x0, 0x8, 0x0, 0x9}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000000)={r8, 0x2, 0x5, 0x7}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x10}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a2, &(0x7f0000000080)) (fail_nth: 8) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b00)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r7, {0x3}, {0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40098}, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x4, 0xf6, 0x0, 0x0, @tick=0xf64b, {0x0, 0xb8}, {0x4, 0x6}, @control={0x2, 0x7f, 0x2}}, {0x0, 0x3, 0x0, 0x4, @time={0x85, 0xa77f}, {0x2, 0x4}, {0x1, 0x2}, @ext={0x0, &(0x7f0000000180)}}], 0x38) 671.237847ms ago: executing program 1 (id=4974): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r1}, &(0x7f00000004c0), &(0x7f0000000300)=r2}, 0x20) listen(r0, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, &(0x7f0000002300)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x4e22, 0x1}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x4) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x300) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x480c0}, 0x0) accept4(r0, 0x0, 0x0, 0x400000000000000) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000070000000300000048"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket(0x10, 0x3, 0x0) connect$netlink(r7, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1, 0x400000}, 0xc) sendmsg$nl_route_sched(r7, &(0x7f0000000080)={&(0x7f0000000300), 0xc, &(0x7f00000002c0)={&(0x7f0000001580)=@newtaction={0x18, 0x32, 0x829, 0x0, 0x0, {}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x6011}, 0x80) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) recvmmsg(r6, &(0x7f0000001140), 0x700, 0x2, 0x0) 602.861888ms ago: executing program 2 (id=4975): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$pptp(0x18, 0x1, 0x2) syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) io_uring_setup(0x1de0, &(0x7f00000000c0)={0x0, 0x3605, 0x80, 0xfffffffc, 0x2ac}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x1000) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001d40)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x5}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0x1, 0x120d, &(0x7f0000001280)="$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") setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x10) socket$kcm(0x10, 0x2, 0x0) 466.42636ms ago: executing program 4 (id=4976): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000340)='./file1\x00', 0x210000, &(0x7f0000002f40)={[{@nodelalloc}, {@dioread_lock}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@nolazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@errors_remount}, {@stripe={'stripe', 0x3d, 0x5}}, {@bh}, {@init_itable}]}, 0xfc, 0x56f, &(0x7f0000003780)="$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") socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x40000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8042, &(0x7f0000000500), 0x1, 0x4f8, &(0x7f0000001900)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00'}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 318.861114ms ago: executing program 4 (id=4977): pipe(&(0x7f00000002c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x2}, 0x18) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000840)=0x5, 0x4) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c0000000800124000000000050005000a000000050004000000000010000300686173683a6970"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a9d000105000100079d"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) 272.523684ms ago: executing program 4 (id=4978): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x18) utime(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000340)='./file1\x00', 0x210000, &(0x7f0000002f40)={[{@nodelalloc}, {@dioread_lock}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@nolazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@errors_remount}, {@stripe={'stripe', 0x3d, 0x5}}, {@bh}, {@init_itable}]}, 0xfc, 0x56f, &(0x7f0000003780)="$eJzs3d9rW1UcAPDvTdPup66DMdQHGezByVy6tv6YIDgfRYcDfZ+hzcpouowmHWsduD24F19kCCIOxD/Adx+H/4B/xUAHQ0bRBxEiN73psjZp2i4z2fL5wG3Pyb23535z7vf2nNyEBDC0jqU/chEvR8Q3ScShlnX5yFYeW9tu9eH1mXRJol7/9M8kkuyx5vZJ9vtAVnkpIn79KuJkbnO71eWV+WK5XFrM6hO1hSsT1eWVU5cWinOludLlqenpM29NT737zts9i/X1839//8ndD898fXz1u5/vH76dxNk4mK1rjeMJ3GitHCv+m5VG4+yGDSd70NggSfp9AOzKSJbno5FeAw7FSJb1wPPvy4ioA0Mqkf8wpJrjgObcvkfz4GfGgw/WJkCN2Mda48+vvTYSextzo/2ryWMzo3S+O96D9tM2fvnjzu10ia1fh9jXpQ6wIzduRsTpfH7z9T/Jrn+7d7rx4vHWNrYxbP9/oJ/upuOfN9qN/3Lr459oM/450CZ3d6N7/ufu96CZjtLx33ttx7/rl67xkaz2QmPMN5pcvFQunY6IFyPiRNS73vo4s3qv3mld6/gvXdL2m2PB7Dju5/c8vs9ssVaMiLFdhvyYBzcjXsm3iz9Z7/+kTf+nz8f5bbZxtHTn1U7rusf/dNV/initbf8/6tZk6/uTE43zYaJ5Vmz2162jv3Vqv9/xp/2/f+v4x5PW+7XVnbfx495/Sp3W7fb8H0s+a5SbSXCtWKstTkaMJR9vfnzq0b7NenP7NP4Tx7e+/rU7/9PJ1+fbjP/WkVsdNx2E/p/dUf/vvHDvoy9+6NT+9vr/zUbpRPZIdv1rLztXtnuAT/r8AQAAAAAAwCDJRcTBSHKF9XIuVyisvb/jSOzPlSvV2smLlaXLs9H4rOx4jOaad7oPtbwfYjJ7P2yzPrWhPh0RhyPi25F9jXphplKe7XfwAAAAAAAAAAAAAAAAAAAAMCAOdPj8f+r3kX4fHfDUNb7YYE+/jwLoh65f+d+Lb3oCBlLX/AeeW/Ifhpf8h+El/2F4yX8YXvIfhpf8h+El/wEAAAAAAAAAAAAAAAAAAAAAAAAAAKCnzp87ly711YfXZ9L67NXlpfnK1VOzpep8YWFppjBTWbxSmKtU5sqlwkxlodvfK1cqVyanYunaRK1UrU1Ul1cuLFSWLtcuXFoozpUulEb/l6gAAAAAAAAAAAAAAAAAAADg2VJdXpkvlsulRYWOhfdjIA7jaQa4Zle75wclCoUOhZtZ9+5srz5elAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgg/8CAAD//4yLMZo=") socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x80, 0x79, 0x10, 0x9a}, [@ldst={0x5, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x20}, 0x10}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x40000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_open_procfs(0x0, &(0x7f0000002380)='net/ip_mr_cache\x00') r4 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r4, 0x0, 0xc8, &(0x7f0000003d40), 0x4) setsockopt$MRT_ADD_VIF(r4, 0x0, 0xca, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={&(0x7f0000000240)="a652081d969246fd91c72ba4b862e473cef6ecb4d1529f7f15f1d88918ed746ca3aafa68eedab59ebaf370934d289a588dfc0e9cb0d3f1aab500d4c09cf255b84dccae5315", &(0x7f00000000c0)=""/57, &(0x7f0000000780)="425e184fecc3eb7cb03419c7402c332b09d87e47ab4ba1917c838d25d4eda147813bb9eae2a2a88b5f6616f710f41f4a741118bf4163249ad212ecd45f50186526a0e8289887cd4bb3d1e5ea7a3d8580e0507d05248b0f185eb42a2beaa8f2f652cc6eda78ab05dd77fea6542250fabc1eb12e119c2ad2b0d87da187bbc8067e03158831cf38f529ce377c667c806702e26892e5a462e11fac47e6655fd52556f4d9c11d409218eeb40c2748149e15696e8c0f431b2e84100572e1bf824fe24e422f6fb701c4f3f89a112afed82d97c1e3a95343b3242ae7a4c07e620e8d95add224b9ccc3a21a3f0ae3fd82b8b596b0f10085", &(0x7f00000002c0)="1c85cc452782015c89ef0292a874e3d748ae561a32296fe9353d014e540250", 0x800, r4, 0x4}, 0x38) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000000), 0x4, 0x4f2, &(0x7f0000000a40)="$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") quotactl$Q_GETQUOTA(0xffffffff80000701, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000001800)) setsockopt$inet_mreq(r5, 0x0, 0x23, &(0x7f0000000000)={@multicast1=0xe0000300, @local}, 0x8) syz_emit_ethernet(0x2a, &(0x7f0000000380)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x20, 0xfc, 0x2, 0x0, @empty, @multicast1=0xe0000300}, @echo_reply={0x0, 0x0, 0x0, 0x64, 0xff58}}}}}, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) setsockopt$MRT_ADD_MFC_PROXY(r4, 0x0, 0xd2, &(0x7f0000000080)={@broadcast, @private=0xa010100, 0x1, "34d5fdb244787aae1037b3cc0dfd25debc5e463e671f467a7381248bf19b3846", 0xe7, 0x9, 0x8, 0x8}, 0x3c) pread64(r3, &(0x7f0000000100)=""/253, 0xfd, 0x36) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8042, &(0x7f0000000500), 0x1, 0x4f8, &(0x7f0000001900)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00'}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 222.940695ms ago: executing program 3 (id=4979): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009e0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d0000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x4}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000000580)={&(0x7f00000005c0)={0x2, 0x4, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000003a80)=[@rdma_args={0x48, 0x114, 0x1, {{0x0, 0x2}, {0x0}, &(0x7f0000003a00)=[{&(0x7f00000016c0)=""/96, 0x60}], 0x1, 0x39, 0x2}}], 0x48, 0x4000000}, 0x0) 222.694266ms ago: executing program 3 (id=4980): socket$inet_sctp(0x2, 0x1, 0x84) open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x1574, @private1={0xfc, 0x1, '\x00', 0x1}, 0xc83}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) dup(r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x4, 0x14, &(0x7f00000019c0)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7b, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r5 = io_uring_setup(0x1743, &(0x7f000000c480)={0x0, 0xb1eb, 0x200, 0x4, 0x349}) r6 = io_uring_setup(0x13c01, &(0x7f00000004c0)={0x0, 0x1e28, 0x400, 0x3f, 0x8000001a}) getrlimit(0x1, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES(r6, 0x1e, &(0x7f0000000000)=[r5], 0x1) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000001900)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000001000)={r8, 0x9403, 0x401}) socket$can_raw(0x1d, 0x3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x4000, 0x0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000180)='tmpfs\x00', 0x3200890, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="07000000040000000001000001", @ANYRES16], 0x50) fsmount(0xffffffffffffffff, 0x0, 0x19) fadvise64(0xffffffffffffffff, 0x2f, 0xcf58, 0x3) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x22, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setreuid(0x0, 0xee00) writev(r10, &(0x7f0000000280)=[{&(0x7f0000000680)="841317836554c0a8614cf6ee464dceeb156522466eb6e55d63e6598c6ec757c41d3c2915d34bfdc5c10bcb576cc8e914a6d1796aaf7b999ae6f127de9ed28b11df304e244e601017cb9a9accf194856497266cb3731b5cbe8e9fcc2c27d3091354b5530f930f0fe7c304b3bc1a8a308f00916b97cef365927aae1255f46372c78ec3155724c0a02074ee12b95fa43b50a62f331df7ba51", 0x97}, {&(0x7f0000000800)="71e95adb67d042088c4cd56157bb2c6c86657e036c30e8046b1ad34763009ae53ad90375dc85d80a7ae5993348fa9a867e8d824a5aa850bf0b460368a6b26b9459092e6b3e0c92bd48752cbabffe04e86047668074ca3f173e0c113bc97eeb0ff87ec3d23e7589a744e5acc1a354345fae6d7b8c8b2f8f95f5d9f88bf80534a2203627b1ac46", 0x86}, {&(0x7f0000000a00)="fa9c6affeb49cdd187a27b1c12eae109ac32f36fed4a5ef66dccf9c1fc37a8dcde230fa72e2455773b1107d194f198ac8b3f10363bdb5f941762746802e627a47bef5137e9cc07450b9c979b9636daa57bb3a16b6e5e3e70314de4f256b30d0390fb37eaf44f314de9cc2c9facf86e70893aab77ac4096cd943ad21d00237de04d708eab2e9402d7ab3c651c770de1", 0x8f}, {&(0x7f0000000100)="15b9d7034fc6ce5b819a604783fae87529ce2c0194185f17149605d8f749f463b38930412a8c", 0x26}], 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x1, 0x1, &(0x7f00000000c0)=ANY=[@ANYRES16=r7], &(0x7f0000000200)='syzkaller\x00', 0xa, 0x0, 0x0, 0x40f00, 0xa0}, 0x94) sendmsg$inet_sctp(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)='F', 0x1}, {0x0}], 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000000007008410000001ffe9000a000400280000000b000002", @ANYRES32=r2], 0x20, 0x2400e044}, 0xff0f) 196.745506ms ago: executing program 3 (id=4981): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000d10000000000000000000095e8f422b49e516ce730f2803367c0a764f2a0866cec92237cae0a1bc20999cf9051f0436e932410f87b769a9339c757ffc12df7642610afb2ddd03b776286d776cd8506b7ef4c13aad3ebb4be5b38d4b3266b0951a2e2b0c28da357792e5dce4a2f0dfecd859fe1d7e998878ce7dc387ba142e9ccf56790c85c94ae0830300bbbc6120f0d71d7417a9251095f07d569b508971a53d0cb748f1ffb3b2732a3e1834dcbc5d246ab71505bb911bca58f4913ae5b201ed896a233d06f6d35da3cb207ec6738340c2cf82d7507d6edef5a8f1dece34afbdd6ee8255df7e3dcd3221670d37a5c"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800", @ANYRES16=r0, @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='attr/keycreate\x00') shmget$private(0x0, 0x4000, 0x100, &(0x7f0000ffb000/0x4000)=nil) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x20000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823000000000000000000040000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa240000000000007020000f8ffffffb703000008000000b70400000000000085000000030000a577443b1e33567690669ab7674f53a509abebf8347a4b6dfbf3a0e57bb55a0ab2b551c37765f4bc91b92e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xaf576debbf466693}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) r3 = msgget$private(0x0, 0x0) msgsnd(r3, &(0x7f0000000480)=ANY=[@ANYRESDEC], 0x2000, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x2}, &(0x7f0000bbdffc)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r1, &(0x7f0000001340)=[{&(0x7f0000000580)=""/148, 0x94}], 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000c2bbc8a988f5002020207b1af8ff000007010000f8ffffffb702000008000000b703000000000000850000001000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close(r7) readv(r4, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/215, 0xd7}], 0x1) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) remap_file_pages(&(0x7f000001a000/0x2000)=nil, 0x2000, 0x100000c, 0x9, 0x40) syz_clone(0x100e180, 0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(r3, &(0x7f0000001080), 0x8, 0x2, 0x3000) creat(&(0x7f00000000c0)='./file0\x00', 0xf4) 0s ago: executing program 4 (id=4982): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000340)='./file1\x00', 0x210000, &(0x7f0000002f40)={[{@nodelalloc}, {@dioread_lock}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@nolazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@errors_remount}, {@stripe={'stripe', 0x3d, 0x5}}, {@bh}, {@init_itable}]}, 0xfc, 0x56f, &(0x7f0000003780)="$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") socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x40000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8042, &(0x7f0000000500), 0x1, 0x4f8, &(0x7f0000001900)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00'}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) (fail_nth: 2) kernel console output (not intermixed with test programs): -fs error (device loop7): ext4_validate_block_bitmap:432: comm syz.7.3724: bg 0: block 3: invalid block bitmap [ 266.145694][T15895] EXT4-fs (loop7): Delayed block allocation failed for inode 15 at logical offset 16 with max blocks 52 with error 117 [ 266.145963][T15904] loop1: detected capacity change from 0 to 128 [ 266.158346][T15895] EXT4-fs (loop7): This should not happen!! Data will be lost [ 266.158346][T15895] [ 266.180338][T15897] SELinux: failed to load policy [ 266.192706][T15898] SELinux: failed to load policy [ 266.198375][T15910] FAULT_INJECTION: forcing a failure. [ 266.198375][T15910] name failslab, interval 1, probability 0, space 0, times 0 [ 266.211090][T15910] CPU: 0 UID: 0 PID: 15910 Comm: syz.3.3728 Not tainted syzkaller #0 PREEMPT(voluntary) [ 266.211149][T15910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 266.211162][T15910] Call Trace: [ 266.211172][T15910] [ 266.211181][T15910] __dump_stack+0x1d/0x30 [ 266.211209][T15910] dump_stack_lvl+0xe8/0x140 [ 266.211260][T15910] dump_stack+0x15/0x1b [ 266.211300][T15910] should_fail_ex+0x265/0x280 [ 266.211387][T15910] should_failslab+0x8c/0xb0 [ 266.211422][T15910] kmem_cache_alloc_node_noprof+0x57/0x320 [ 266.211501][T15910] ? __alloc_skb+0x101/0x320 [ 266.211530][T15910] __alloc_skb+0x101/0x320 [ 266.211586][T15910] ? __rcu_read_unlock+0x4f/0x70 [ 266.211656][T15910] alloc_skb_with_frags+0x7d/0x470 [ 266.211739][T15910] ? avc_has_perm_noaudit+0x1b1/0x200 [ 266.211776][T15910] sock_alloc_send_pskb+0x43a/0x4f0 [ 266.211824][T15910] hci_sock_sendmsg+0x129/0x910 [ 266.211924][T15910] ? __pfx_hci_sock_sendmsg+0x10/0x10 [ 266.211996][T15910] __sock_sendmsg+0x145/0x180 [ 266.212100][T15910] sock_write_iter+0x165/0x1b0 [ 266.212143][T15910] ? __pfx_sock_write_iter+0x10/0x10 [ 266.212203][T15910] vfs_write+0x527/0x960 [ 266.212280][T15910] ksys_write+0xda/0x1a0 [ 266.212353][T15910] __x64_sys_write+0x40/0x50 [ 266.212381][T15910] x64_sys_call+0x27fe/0x2ff0 [ 266.212412][T15910] do_syscall_64+0xd2/0x200 [ 266.212502][T15910] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 266.212537][T15910] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 266.212577][T15910] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 266.212607][T15910] RIP: 0033:0x7f1af375eba9 [ 266.212627][T15910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 266.212695][T15910] RSP: 002b:00007f1af21bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 266.212768][T15910] RAX: ffffffffffffffda RBX: 00007f1af39a5fa0 RCX: 00007f1af375eba9 [ 266.212781][T15910] RDX: 0000000000000006 RSI: 0000200000000200 RDI: 0000000000000006 [ 266.212797][T15910] RBP: 00007f1af21bf090 R08: 0000000000000000 R09: 0000000000000000 [ 266.212812][T15910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 266.212827][T15910] R13: 00007f1af39a6038 R14: 00007f1af39a5fa0 R15: 00007fff324e7288 [ 266.212874][T15910] [ 266.213416][T15904] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=a84ec018, mo2=0002] [ 266.449181][T15904] System zones: 1-3, 19-19, 35-36 [ 266.475538][T15928] loop7: detected capacity change from 0 to 2048 [ 266.559199][T15928] loop7: p1 < > p4 [ 266.567265][T15928] loop7: p4 size 8388608 extends beyond EOD, truncated [ 266.584932][ T29] kauditd_printk_skb: 312 callbacks suppressed [ 266.584948][ T29] audit: type=1400 audit(266.587:13988): avc: denied { map } for pid=15940 comm="syz.3.3742" path="socket:[47588]" dev="sockfs" ino=47588 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 266.712364][T15954] __nla_validate_parse: 2 callbacks suppressed [ 266.712433][T15954] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3748'. [ 266.813832][ T29] audit: type=1404 audit(266.817:13989): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 266.843236][ T29] audit: type=1400 audit(266.827:13990): avc: denied { read write } for pid=14023 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.867121][ T29] audit: type=1400 audit(266.837:13991): avc: denied { map_create } for pid=15951 comm="syz.3.3747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.885992][ T29] audit: type=1400 audit(266.837:13992): avc: denied { prog_load } for pid=15951 comm="syz.3.3747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.904642][ T29] audit: type=1400 audit(266.837:13993): avc: denied { prog_load } for pid=15951 comm="syz.3.3747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.923457][ T29] audit: type=1400 audit(266.847:13994): avc: denied { read write } for pid=11061 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.988656][ T29] audit: type=1400 audit(266.967:13995): avc: denied { map_create } for pid=15968 comm="syz.7.3752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.007524][ T29] audit: type=1400 audit(266.967:13996): avc: denied { prog_load } for pid=15968 comm="syz.7.3752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.026159][ T29] audit: type=1400 audit(266.967:13997): avc: denied { allowed } for pid=15968 comm="syz.7.3752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 267.219405][T15986] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3759'. [ 267.342532][T15980] netlink: 'syz.7.3757': attribute type 21 has an invalid length. [ 267.352031][T15980] netlink: 156 bytes leftover after parsing attributes in process `syz.7.3757'. [ 267.361253][T15980] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3757'. [ 267.833476][T16010] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 267.893909][T16014] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3772'. [ 268.337391][T16033] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3780'. [ 268.397562][T16036] FAULT_INJECTION: forcing a failure. [ 268.397562][T16036] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 268.410736][T16036] CPU: 1 UID: 0 PID: 16036 Comm: syz.2.3782 Not tainted syzkaller #0 PREEMPT(voluntary) [ 268.410766][T16036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 268.410845][T16036] Call Trace: [ 268.410854][T16036] [ 268.410865][T16036] __dump_stack+0x1d/0x30 [ 268.410887][T16036] dump_stack_lvl+0xe8/0x140 [ 268.411017][T16036] dump_stack+0x15/0x1b [ 268.411038][T16036] should_fail_ex+0x265/0x280 [ 268.411069][T16036] should_fail+0xb/0x20 [ 268.411209][T16036] should_fail_usercopy+0x1a/0x20 [ 268.411242][T16036] _copy_to_user+0x20/0xa0 [ 268.411312][T16036] simple_read_from_buffer+0xb5/0x130 [ 268.411345][T16036] proc_fail_nth_read+0x10e/0x150 [ 268.411381][T16036] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 268.411480][T16036] vfs_read+0x1a5/0x770 [ 268.411504][T16036] ? __rcu_read_unlock+0x4f/0x70 [ 268.411531][T16036] ? __fget_files+0x184/0x1c0 [ 268.411564][T16036] ksys_read+0xda/0x1a0 [ 268.411640][T16036] __x64_sys_read+0x40/0x50 [ 268.411680][T16036] x64_sys_call+0x27bc/0x2ff0 [ 268.411783][T16036] do_syscall_64+0xd2/0x200 [ 268.411815][T16036] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 268.411839][T16036] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 268.411877][T16036] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.411943][T16036] RIP: 0033:0x7f9f00f9d5bc [ 268.411959][T16036] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 268.411978][T16036] RSP: 002b:00007f9effa07030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 268.411997][T16036] RAX: ffffffffffffffda RBX: 00007f9f011e5fa0 RCX: 00007f9f00f9d5bc [ 268.412014][T16036] RDX: 000000000000000f RSI: 00007f9effa070a0 RDI: 0000000000000003 [ 268.412030][T16036] RBP: 00007f9effa07090 R08: 0000000000000000 R09: 0000000000000000 [ 268.412043][T16036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 268.412062][T16036] R13: 00007f9f011e6038 R14: 00007f9f011e5fa0 R15: 00007fffce18fe58 [ 268.412081][T16036] [ 268.922303][T16038] netlink: 'syz.2.3783': attribute type 21 has an invalid length. [ 268.941589][T16038] netlink: 156 bytes leftover after parsing attributes in process `syz.2.3783'. [ 268.950776][T16038] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3783'. [ 269.727425][T16134] FAULT_INJECTION: forcing a failure. [ 269.727425][T16134] name failslab, interval 1, probability 0, space 0, times 0 [ 269.740207][T16134] CPU: 1 UID: 0 PID: 16134 Comm: syz.1.3826 Not tainted syzkaller #0 PREEMPT(voluntary) [ 269.740243][T16134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 269.740260][T16134] Call Trace: [ 269.740268][T16134] [ 269.740277][T16134] __dump_stack+0x1d/0x30 [ 269.740316][T16134] dump_stack_lvl+0xe8/0x140 [ 269.740342][T16134] dump_stack+0x15/0x1b [ 269.740371][T16134] should_fail_ex+0x265/0x280 [ 269.740399][T16134] should_failslab+0x8c/0xb0 [ 269.740524][T16134] kmem_cache_alloc_noprof+0x50/0x310 [ 269.740558][T16134] ? getname_flags+0x80/0x3b0 [ 269.740596][T16134] getname_flags+0x80/0x3b0 [ 269.740689][T16134] __x64_sys_renameat2+0x5f/0x90 [ 269.740715][T16134] x64_sys_call+0x3f9/0x2ff0 [ 269.740739][T16134] do_syscall_64+0xd2/0x200 [ 269.740779][T16134] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 269.740824][T16134] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 269.740905][T16134] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 269.740926][T16134] RIP: 0033:0x7fb9b8edeba9 [ 269.740941][T16134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 269.740959][T16134] RSP: 002b:00007fb9b793f038 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 269.740979][T16134] RAX: ffffffffffffffda RBX: 00007fb9b9125fa0 RCX: 00007fb9b8edeba9 [ 269.740994][T16134] RDX: ffffffffffffff9c RSI: 0000200000000480 RDI: ffffffffffffff9c [ 269.741128][T16134] RBP: 00007fb9b793f090 R08: 0000000000000004 R09: 0000000000000000 [ 269.741145][T16134] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.741161][T16134] R13: 00007fb9b9126038 R14: 00007fb9b9125fa0 R15: 00007fffa6af9c58 [ 269.741236][T16134] [ 269.927349][T16129] netlink: 'syz.4.3823': attribute type 21 has an invalid length. [ 269.935350][T16129] netlink: 156 bytes leftover after parsing attributes in process `syz.4.3823'. [ 269.944601][T16129] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3823'. [ 270.358579][T16167] netlink: 'syz.2.3839': attribute type 10 has an invalid length. [ 270.455628][T16184] FAULT_INJECTION: forcing a failure. [ 270.455628][T16184] name failslab, interval 1, probability 0, space 0, times 0 [ 270.468426][T16184] CPU: 0 UID: 0 PID: 16184 Comm: syz.3.3846 Not tainted syzkaller #0 PREEMPT(voluntary) [ 270.468459][T16184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 270.468491][T16184] Call Trace: [ 270.468500][T16184] [ 270.468509][T16184] __dump_stack+0x1d/0x30 [ 270.468532][T16184] dump_stack_lvl+0xe8/0x140 [ 270.468570][T16184] dump_stack+0x15/0x1b [ 270.468594][T16184] should_fail_ex+0x265/0x280 [ 270.468715][T16184] should_failslab+0x8c/0xb0 [ 270.468743][T16184] kmem_cache_alloc_noprof+0x50/0x310 [ 270.468783][T16184] ? security_inode_alloc+0x37/0x100 [ 270.468823][T16184] security_inode_alloc+0x37/0x100 [ 270.468885][T16184] inode_init_always_gfp+0x4b7/0x500 [ 270.468927][T16184] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 270.468958][T16184] alloc_inode+0x58/0x170 [ 270.469060][T16184] new_inode+0x1d/0xe0 [ 270.469172][T16184] shmem_get_inode+0x244/0x750 [ 270.469204][T16184] __shmem_file_setup+0x113/0x210 [ 270.469250][T16184] shmem_file_setup+0x3b/0x50 [ 270.469283][T16184] __se_sys_memfd_create+0x2c3/0x590 [ 270.469347][T16184] __x64_sys_memfd_create+0x31/0x40 [ 270.469388][T16184] x64_sys_call+0x2abe/0x2ff0 [ 270.469418][T16184] do_syscall_64+0xd2/0x200 [ 270.469533][T16184] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 270.469566][T16184] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 270.469607][T16184] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 270.469677][T16184] RIP: 0033:0x7f1af375eba9 [ 270.469697][T16184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 270.469722][T16184] RSP: 002b:00007f1af21bee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 270.469748][T16184] RAX: ffffffffffffffda RBX: 0000000000000514 RCX: 00007f1af375eba9 [ 270.469765][T16184] RDX: 00007f1af21beef0 RSI: 0000000000000000 RDI: 00007f1af37e27e8 [ 270.469777][T16184] RBP: 0000200000000300 R08: 00007f1af21bebb7 R09: 00007f1af21bee40 [ 270.469792][T16184] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000080 [ 270.469816][T16184] R13: 00007f1af21beef0 R14: 00007f1af21beeb0 R15: 0000200000000040 [ 270.469840][T16184] [ 270.712837][T16186] netlink: 'syz.2.3847': attribute type 7 has an invalid length. [ 271.082760][T16214] netlink: 'syz.4.3859': attribute type 21 has an invalid length. [ 271.616589][ T29] kauditd_printk_skb: 934 callbacks suppressed [ 271.616605][ T29] audit: type=1400 audit(271.620:14932): avc: denied { read write } for pid=11061 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.651740][ T29] audit: type=1400 audit(271.650:14933): avc: denied { map_create } for pid=16237 comm="syz.4.3869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.682264][ T29] audit: type=1400 audit(271.650:14934): avc: denied { prog_load } for pid=16237 comm="syz.4.3869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.700990][ T29] audit: type=1326 audit(271.650:14935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16237 comm="syz.4.3869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f120ac4eba9 code=0x7ffc0000 [ 271.724074][ T29] audit: type=1326 audit(271.650:14936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16237 comm="syz.4.3869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f120ac4eba9 code=0x7ffc0000 [ 271.747263][ T29] audit: type=1326 audit(271.650:14937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16237 comm="syz.4.3869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=430 compat=0 ip=0x7f120ac4eba9 code=0x7ffc0000 [ 271.770382][ T29] audit: type=1326 audit(271.650:14938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16237 comm="syz.4.3869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f120ac4eba9 code=0x7ffc0000 [ 271.793470][ T29] audit: type=1326 audit(271.650:14939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16237 comm="syz.4.3869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f120ac4eba9 code=0x7ffc0000 [ 271.816545][ T29] audit: type=1326 audit(271.650:14940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16237 comm="syz.4.3869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f120ac4eba9 code=0x7ffc0000 [ 271.839454][ T29] audit: type=1326 audit(271.650:14941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16237 comm="syz.4.3869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f120ac4eba9 code=0x7ffc0000 [ 272.022943][T16283] __nla_validate_parse: 4 callbacks suppressed [ 272.022961][T16283] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3890'. [ 272.035369][T16275] lo speed is unknown, defaulting to 1000 [ 272.085049][T16293] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3894'. [ 272.239721][T16306] lo speed is unknown, defaulting to 1000 [ 272.274536][T16318] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3904'. [ 272.505656][T16338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16338 comm=syz.4.3913 [ 272.641022][T16348] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3918'. [ 273.170521][T16392] lo speed is unknown, defaulting to 1000 [ 273.226310][T16401] netlink: 'syz.2.3938': attribute type 4 has an invalid length. [ 274.404059][T16512] netem: incorrect ge model size [ 274.409125][T16512] netem: change failed [ 274.933566][T16570] FAULT_INJECTION: forcing a failure. [ 274.933566][T16570] name failslab, interval 1, probability 0, space 0, times 0 [ 274.946314][T16570] CPU: 1 UID: 0 PID: 16570 Comm: syz.4.4021 Not tainted syzkaller #0 PREEMPT(voluntary) [ 274.946342][T16570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 274.946359][T16570] Call Trace: [ 274.946380][T16570] [ 274.946390][T16570] __dump_stack+0x1d/0x30 [ 274.946457][T16570] dump_stack_lvl+0xe8/0x140 [ 274.946478][T16570] dump_stack+0x15/0x1b [ 274.946497][T16570] should_fail_ex+0x265/0x280 [ 274.946536][T16570] should_failslab+0x8c/0xb0 [ 274.946569][T16570] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 274.946603][T16570] ? scm_fp_dup+0x40/0x200 [ 274.946637][T16570] kmemdup_noprof+0x2b/0x70 [ 274.946688][T16570] scm_fp_dup+0x40/0x200 [ 274.946722][T16570] unix_stream_read_generic+0x703/0x1580 [ 274.946765][T16570] unix_stream_recvmsg+0xc3/0xf0 [ 274.946828][T16570] ? __pfx_unix_stream_read_actor+0x10/0x10 [ 274.946854][T16570] ? __pfx_unix_stream_recvmsg+0x10/0x10 [ 274.946923][T16570] sock_recvmsg_nosec+0x107/0x130 [ 274.946968][T16570] ____sys_recvmsg+0x26f/0x280 [ 274.947046][T16570] ___sys_recvmsg+0x11f/0x370 [ 274.947086][T16570] do_recvmmsg+0x1ef/0x540 [ 274.947126][T16570] ? fput+0x8f/0xc0 [ 274.947246][T16570] __x64_sys_recvmmsg+0xe5/0x170 [ 274.947292][T16570] x64_sys_call+0x27a6/0x2ff0 [ 274.947313][T16570] do_syscall_64+0xd2/0x200 [ 274.947394][T16570] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 274.947423][T16570] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 274.947500][T16570] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 274.947521][T16570] RIP: 0033:0x7f120ac4eba9 [ 274.947535][T16570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.947554][T16570] RSP: 002b:00007f12096b7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 274.947578][T16570] RAX: ffffffffffffffda RBX: 00007f120ae95fa0 RCX: 00007f120ac4eba9 [ 274.947594][T16570] RDX: 0000000000000700 RSI: 0000200000001140 RDI: 0000000000000004 [ 274.947676][T16570] RBP: 00007f12096b7090 R08: 0000000000000000 R09: 0000000000000000 [ 274.947689][T16570] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 274.947705][T16570] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 274.947728][T16570] [ 275.435549][T16609] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4039'. [ 275.504240][T16628] FAULT_INJECTION: forcing a failure. [ 275.504240][T16628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 275.517385][T16628] CPU: 0 UID: 0 PID: 16628 Comm: syz.4.4048 Not tainted syzkaller #0 PREEMPT(voluntary) [ 275.517463][T16628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 275.517476][T16628] Call Trace: [ 275.517484][T16628] [ 275.517493][T16628] __dump_stack+0x1d/0x30 [ 275.517518][T16628] dump_stack_lvl+0xe8/0x140 [ 275.517564][T16628] dump_stack+0x15/0x1b [ 275.517584][T16628] should_fail_ex+0x265/0x280 [ 275.517614][T16628] should_fail+0xb/0x20 [ 275.517638][T16628] should_fail_usercopy+0x1a/0x20 [ 275.517670][T16628] _copy_to_user+0x20/0xa0 [ 275.517841][T16628] simple_read_from_buffer+0xb5/0x130 [ 275.517868][T16628] proc_fail_nth_read+0x10e/0x150 [ 275.517903][T16628] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 275.517941][T16628] vfs_read+0x1a5/0x770 [ 275.517979][T16628] ? __rcu_read_unlock+0x4f/0x70 [ 275.518005][T16628] ? __fget_files+0x184/0x1c0 [ 275.518037][T16628] ksys_read+0xda/0x1a0 [ 275.518133][T16628] __x64_sys_read+0x40/0x50 [ 275.518160][T16628] x64_sys_call+0x27bc/0x2ff0 [ 275.518211][T16628] do_syscall_64+0xd2/0x200 [ 275.518264][T16628] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 275.518293][T16628] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 275.518335][T16628] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 275.518361][T16628] RIP: 0033:0x7f120ac4d5bc [ 275.518379][T16628] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 275.518478][T16628] RSP: 002b:00007f12096b7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 275.518503][T16628] RAX: ffffffffffffffda RBX: 00007f120ae95fa0 RCX: 00007f120ac4d5bc [ 275.518518][T16628] RDX: 000000000000000f RSI: 00007f12096b70a0 RDI: 0000000000000004 [ 275.518533][T16628] RBP: 00007f12096b7090 R08: 0000000000000000 R09: 0000000000000000 [ 275.518548][T16628] R10: 000000000000004a R11: 0000000000000246 R12: 0000000000000001 [ 275.518563][T16628] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 275.518636][T16628] [ 275.800817][T16645] netlink: 'syz.4.4055': attribute type 10 has an invalid length. [ 275.900124][T16659] lo speed is unknown, defaulting to 1000 [ 275.971734][T16669] lo speed is unknown, defaulting to 1000 [ 276.031694][T16684] FAULT_INJECTION: forcing a failure. [ 276.031694][T16684] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 276.044851][T16684] CPU: 1 UID: 0 PID: 16684 Comm: syz.1.4074 Not tainted syzkaller #0 PREEMPT(voluntary) [ 276.045052][T16684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 276.045069][T16684] Call Trace: [ 276.045078][T16684] [ 276.045088][T16684] __dump_stack+0x1d/0x30 [ 276.045171][T16684] dump_stack_lvl+0xe8/0x140 [ 276.045196][T16684] dump_stack+0x15/0x1b [ 276.045260][T16684] should_fail_ex+0x265/0x280 [ 276.045285][T16684] should_fail+0xb/0x20 [ 276.045332][T16684] should_fail_usercopy+0x1a/0x20 [ 276.045357][T16684] _copy_to_user+0x20/0xa0 [ 276.045388][T16684] simple_read_from_buffer+0xb5/0x130 [ 276.045491][T16684] proc_fail_nth_read+0x10e/0x150 [ 276.045520][T16684] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 276.045613][T16684] vfs_read+0x1a5/0x770 [ 276.045636][T16684] ? __rcu_read_unlock+0x4f/0x70 [ 276.045716][T16684] ? __fget_files+0x184/0x1c0 [ 276.045751][T16684] ksys_read+0xda/0x1a0 [ 276.045781][T16684] __x64_sys_read+0x40/0x50 [ 276.045834][T16684] x64_sys_call+0x27bc/0x2ff0 [ 276.045868][T16684] do_syscall_64+0xd2/0x200 [ 276.045943][T16684] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 276.045981][T16684] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 276.046061][T16684] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 276.046083][T16684] RIP: 0033:0x7fb9b8edd5bc [ 276.046153][T16684] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 276.046177][T16684] RSP: 002b:00007fb9b793f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 276.046244][T16684] RAX: ffffffffffffffda RBX: 00007fb9b9125fa0 RCX: 00007fb9b8edd5bc [ 276.046257][T16684] RDX: 000000000000000f RSI: 00007fb9b793f0a0 RDI: 0000000000000004 [ 276.046304][T16684] RBP: 00007fb9b793f090 R08: 0000000000000000 R09: 0000000000000014 [ 276.046319][T16684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.046333][T16684] R13: 00007fb9b9126038 R14: 00007fb9b9125fa0 R15: 00007fffa6af9c58 [ 276.046356][T16684] [ 276.320984][T16697] FAULT_INJECTION: forcing a failure. [ 276.320984][T16697] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 276.334200][T16697] CPU: 1 UID: 0 PID: 16697 Comm: syz.3.4081 Not tainted syzkaller #0 PREEMPT(voluntary) [ 276.334297][T16697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 276.334313][T16697] Call Trace: [ 276.334322][T16697] [ 276.334331][T16697] __dump_stack+0x1d/0x30 [ 276.334354][T16697] dump_stack_lvl+0xe8/0x140 [ 276.334423][T16697] dump_stack+0x15/0x1b [ 276.334440][T16697] should_fail_ex+0x265/0x280 [ 276.334464][T16697] should_fail+0xb/0x20 [ 276.334484][T16697] should_fail_usercopy+0x1a/0x20 [ 276.334592][T16697] _copy_to_user+0x20/0xa0 [ 276.334634][T16697] simple_read_from_buffer+0xb5/0x130 [ 276.334664][T16697] proc_fail_nth_read+0x10e/0x150 [ 276.334761][T16697] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 276.334795][T16697] vfs_read+0x1a5/0x770 [ 276.334895][T16697] ? __rcu_read_unlock+0x4f/0x70 [ 276.335000][T16697] ? __fget_files+0x184/0x1c0 [ 276.335031][T16697] ? __sys_bind+0xc3/0x2a0 [ 276.335058][T16697] ksys_read+0xda/0x1a0 [ 276.335107][T16697] __x64_sys_read+0x40/0x50 [ 276.335155][T16697] x64_sys_call+0x27bc/0x2ff0 [ 276.335200][T16697] do_syscall_64+0xd2/0x200 [ 276.335233][T16697] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 276.335257][T16697] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 276.335305][T16697] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 276.335332][T16697] RIP: 0033:0x7f1af375d5bc [ 276.335351][T16697] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 276.335374][T16697] RSP: 002b:00007f1af21bf030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 276.335409][T16697] RAX: ffffffffffffffda RBX: 00007f1af39a5fa0 RCX: 00007f1af375d5bc [ 276.335424][T16697] RDX: 000000000000000f RSI: 00007f1af21bf0a0 RDI: 0000000000000003 [ 276.335438][T16697] RBP: 00007f1af21bf090 R08: 0000000000000000 R09: 0000000000000000 [ 276.335453][T16697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.335467][T16697] R13: 00007f1af39a6038 R14: 00007f1af39a5fa0 R15: 00007fff324e7288 [ 276.335490][T16697] [ 276.626122][ T29] kauditd_printk_skb: 1551 callbacks suppressed [ 276.626144][ T29] audit: type=1400 audit(276.632:16493): avc: denied { read write } for pid=14276 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.686853][ T29] audit: type=1400 audit(276.672:16494): avc: denied { read write } for pid=11061 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.710853][ T29] audit: type=1400 audit(276.672:16495): avc: denied { read write } for pid=13475 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.734664][ T29] audit: type=1400 audit(276.672:16496): avc: denied { map_create } for pid=16717 comm="syz.3.4089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.753496][ T29] audit: type=1400 audit(276.672:16497): avc: denied { prog_load } for pid=16719 comm="syz.4.4090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.772199][ T29] audit: type=1400 audit(276.672:16498): avc: denied { create } for pid=16719 comm="syz.4.4090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 276.791357][ T29] audit: type=1400 audit(276.672:16499): avc: denied { map_create } for pid=16719 comm="syz.4.4090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.810173][ T29] audit: type=1400 audit(276.672:16500): avc: denied { prog_load } for pid=16719 comm="syz.4.4090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.829093][ T29] audit: type=1400 audit(276.672:16501): avc: denied { allowed } for pid=16719 comm="syz.4.4090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 276.848017][ T29] audit: type=1400 audit(276.672:16502): avc: denied { prog_load } for pid=16719 comm="syz.4.4090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.909652][T16744] FAULT_INJECTION: forcing a failure. [ 276.909652][T16744] name failslab, interval 1, probability 0, space 0, times 0 [ 276.922324][T16744] CPU: 1 UID: 0 PID: 16744 Comm: syz.2.4101 Not tainted syzkaller #0 PREEMPT(voluntary) [ 276.922361][T16744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 276.922377][T16744] Call Trace: [ 276.922384][T16744] [ 276.922393][T16744] __dump_stack+0x1d/0x30 [ 276.922421][T16744] dump_stack_lvl+0xe8/0x140 [ 276.922447][T16744] dump_stack+0x15/0x1b [ 276.922470][T16744] should_fail_ex+0x265/0x280 [ 276.922502][T16744] should_failslab+0x8c/0xb0 [ 276.922544][T16744] kmem_cache_alloc_noprof+0x50/0x310 [ 276.922580][T16744] ? vm_area_alloc+0x2c/0xb0 [ 276.922620][T16744] vm_area_alloc+0x2c/0xb0 [ 276.922656][T16744] mmap_region+0xaa2/0x1630 [ 276.922716][T16744] do_mmap+0x9b3/0xbe0 [ 276.922759][T16744] vm_mmap_pgoff+0x17a/0x2e0 [ 276.922799][T16744] ksys_mmap_pgoff+0xc2/0x310 [ 276.922821][T16744] ? __x64_sys_mmap+0x49/0x70 [ 276.922849][T16744] x64_sys_call+0x14a3/0x2ff0 [ 276.922876][T16744] do_syscall_64+0xd2/0x200 [ 276.922914][T16744] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 276.922945][T16744] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 276.922975][T16744] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 276.922999][T16744] RIP: 0033:0x7f9f00f9eba9 [ 276.923018][T16744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 276.923039][T16744] RSP: 002b:00007f9effa07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 276.923059][T16744] RAX: ffffffffffffffda RBX: 00007f9f011e5fa0 RCX: 00007f9f00f9eba9 [ 276.923074][T16744] RDX: 0000000000000003 RSI: 0000000000b36000 RDI: 0000200000000000 [ 276.923090][T16744] RBP: 00007f9effa07090 R08: ffffffffffffffff R09: 0000000000000000 [ 276.923106][T16744] R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000001 [ 276.923121][T16744] R13: 00007f9f011e6038 R14: 00007f9f011e5fa0 R15: 00007fffce18fe58 [ 276.923145][T16744] [ 278.385008][T16871] FAULT_INJECTION: forcing a failure. [ 278.385008][T16871] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 278.398343][T16871] CPU: 1 UID: 0 PID: 16871 Comm: syz.1.4157 Not tainted syzkaller #0 PREEMPT(voluntary) [ 278.398380][T16871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 278.398393][T16871] Call Trace: [ 278.398399][T16871] [ 278.398405][T16871] __dump_stack+0x1d/0x30 [ 278.398427][T16871] dump_stack_lvl+0xe8/0x140 [ 278.398531][T16871] dump_stack+0x15/0x1b [ 278.398554][T16871] should_fail_ex+0x265/0x280 [ 278.398583][T16871] should_fail_alloc_page+0xf2/0x100 [ 278.398618][T16871] __alloc_frozen_pages_noprof+0xff/0x360 [ 278.398666][T16871] alloc_pages_mpol+0xb3/0x250 [ 278.398710][T16871] vma_alloc_folio_noprof+0x1aa/0x300 [ 278.398744][T16871] do_wp_page+0x5db/0x24e0 [ 278.398798][T16871] ? enqueue_task_fair+0x35e/0x980 [ 278.398827][T16871] ? css_rstat_updated+0xb7/0x240 [ 278.398858][T16871] ? __rcu_read_lock+0x37/0x50 [ 278.398962][T16871] handle_mm_fault+0x77d/0x2c20 [ 278.398993][T16871] do_user_addr_fault+0x636/0x1090 [ 278.399032][T16871] ? arch_exit_work+0x30/0x40 [ 278.399059][T16871] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 278.399107][T16871] exc_page_fault+0x62/0xa0 [ 278.399164][T16871] asm_exc_page_fault+0x26/0x30 [ 278.399187][T16871] RIP: 0033:0x7fb9b8da0ba3 [ 278.399206][T16871] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 278.399227][T16871] RSP: 002b:00007fb9b793e3f0 EFLAGS: 00010206 [ 278.399243][T16871] RAX: 00000000000fbe00 RBX: 00007fb9b793e490 RCX: 00007fb9af51f000 [ 278.399255][T16871] RDX: 00007fb9b793e630 RSI: 000000000000000d RDI: 00007fb9b793e530 [ 278.399268][T16871] RBP: 0000000000000056 R08: 0000000000000009 R09: 00000000000001a4 [ 278.399281][T16871] R10: 00000000000001b8 R11: 00007fb9b793e490 R12: 0000000000000001 [ 278.399296][T16871] R13: 00007fb9b8f7da00 R14: 00000000000000af R15: 00007fb9b793e530 [ 278.399319][T16871] [ 278.399330][T16871] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 278.745382][T16898] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4170'. [ 279.008268][T16932] FAULT_INJECTION: forcing a failure. [ 279.008268][T16932] name failslab, interval 1, probability 0, space 0, times 0 [ 279.021023][T16932] CPU: 0 UID: 0 PID: 16932 Comm: syz.3.4185 Not tainted syzkaller #0 PREEMPT(voluntary) [ 279.021051][T16932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 279.021066][T16932] Call Trace: [ 279.021074][T16932] [ 279.021088][T16932] __dump_stack+0x1d/0x30 [ 279.021114][T16932] dump_stack_lvl+0xe8/0x140 [ 279.021138][T16932] dump_stack+0x15/0x1b [ 279.021160][T16932] should_fail_ex+0x265/0x280 [ 279.021190][T16932] should_failslab+0x8c/0xb0 [ 279.021223][T16932] kmem_cache_alloc_noprof+0x50/0x310 [ 279.021259][T16932] ? mas_alloc_nodes+0x265/0x520 [ 279.021303][T16932] mas_alloc_nodes+0x265/0x520 [ 279.021347][T16932] mas_preallocate+0x33e/0x520 [ 279.021391][T16932] __split_vma+0x240/0x650 [ 279.021427][T16932] ? mas_find+0x5d5/0x700 [ 279.021467][T16932] vms_gather_munmap_vmas+0x2b2/0x7b0 [ 279.021505][T16932] mmap_region+0x53f/0x1630 [ 279.021539][T16932] ? sidtab_context_to_sid+0x5d/0x5e0 [ 279.021564][T16932] ? try_charge_memcg+0x200/0x9e0 [ 279.021584][T16932] ? mls_compute_sid+0x139/0x560 [ 279.021622][T16932] ? mls_context_isvalid+0x85/0x1f0 [ 279.021679][T16932] do_mmap+0x9b3/0xbe0 [ 279.021726][T16932] vm_mmap_pgoff+0x17a/0x2e0 [ 279.021761][T16932] ksys_mmap_pgoff+0x2d0/0x310 [ 279.021780][T16932] x64_sys_call+0x14a3/0x2ff0 [ 279.021801][T16932] do_syscall_64+0xd2/0x200 [ 279.021834][T16932] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 279.021858][T16932] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 279.021888][T16932] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.021915][T16932] RIP: 0033:0x7f1af375eba9 [ 279.021935][T16932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.021957][T16932] RSP: 002b:00007f1af21bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 279.021980][T16932] RAX: ffffffffffffffda RBX: 00007f1af39a5fa0 RCX: 00007f1af375eba9 [ 279.021996][T16932] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: 0000200000000000 [ 279.022012][T16932] RBP: 00007f1af21bf090 R08: ffffffffffffffff R09: 0000000000000000 [ 279.022028][T16932] R10: 0000000000042073 R11: 0000000000000246 R12: 0000000000000002 [ 279.022044][T16932] R13: 00007f1af39a6038 R14: 00007f1af39a5fa0 R15: 00007fff324e7288 [ 279.022068][T16932] [ 279.105193][T16949] FAULT_INJECTION: forcing a failure. [ 279.105193][T16949] name failslab, interval 1, probability 0, space 0, times 0 [ 279.258715][T16949] CPU: 1 UID: 0 PID: 16949 Comm: syz.4.4191 Not tainted syzkaller #0 PREEMPT(voluntary) [ 279.258744][T16949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 279.258756][T16949] Call Trace: [ 279.258764][T16949] [ 279.258844][T16949] __dump_stack+0x1d/0x30 [ 279.258876][T16949] dump_stack_lvl+0xe8/0x140 [ 279.258906][T16949] dump_stack+0x15/0x1b [ 279.258929][T16949] should_fail_ex+0x265/0x280 [ 279.258963][T16949] ? audit_log_d_path+0x8d/0x150 [ 279.259019][T16949] should_failslab+0x8c/0xb0 [ 279.259055][T16949] __kmalloc_cache_noprof+0x4c/0x320 [ 279.259100][T16949] audit_log_d_path+0x8d/0x150 [ 279.259144][T16949] audit_log_d_path_exe+0x42/0x70 [ 279.259298][T16949] audit_log_task+0x1e9/0x250 [ 279.259350][T16949] audit_seccomp+0x61/0x100 [ 279.259432][T16949] ? __seccomp_filter+0x68c/0x10d0 [ 279.259464][T16949] __seccomp_filter+0x69d/0x10d0 [ 279.259502][T16949] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 279.259570][T16949] ? vfs_write+0x7e8/0x960 [ 279.259607][T16949] __secure_computing+0x82/0x150 [ 279.259687][T16949] syscall_trace_enter+0xcf/0x1e0 [ 279.259746][T16949] do_syscall_64+0xac/0x200 [ 279.259792][T16949] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 279.259827][T16949] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 279.259882][T16949] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.259912][T16949] RIP: 0033:0x7f120ac4eba9 [ 279.259934][T16949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.259959][T16949] RSP: 002b:00007f1209696038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 279.260047][T16949] RAX: ffffffffffffffda RBX: 00007f120ae96090 RCX: 00007f120ac4eba9 [ 279.260065][T16949] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 279.260082][T16949] RBP: 00007f1209696090 R08: 0000000000000000 R09: 0000000000000000 [ 279.260100][T16949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.260115][T16949] R13: 00007f120ae96128 R14: 00007f120ae96090 R15: 00007ffd92255368 [ 279.260141][T16949] [ 279.261341][T16947] netlink: 'syz.2.4192': attribute type 21 has an invalid length. [ 279.474864][T16947] netlink: 156 bytes leftover after parsing attributes in process `syz.2.4192'. [ 279.474886][T16947] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4192'. [ 280.136961][T16996] netlink: 48 bytes leftover after parsing attributes in process `syz.2.4210'. [ 280.207811][T17002] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4213'. [ 280.547504][T17018] lo speed is unknown, defaulting to 1000 [ 280.573532][T17024] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4224'. [ 280.585652][T17025] FAULT_INJECTION: forcing a failure. [ 280.585652][T17025] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.598881][T17025] CPU: 1 UID: 0 PID: 17025 Comm: syz.3.4222 Not tainted syzkaller #0 PREEMPT(voluntary) [ 280.598915][T17025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 280.598930][T17025] Call Trace: [ 280.598936][T17025] [ 280.598985][T17025] __dump_stack+0x1d/0x30 [ 280.599012][T17025] dump_stack_lvl+0xe8/0x140 [ 280.599037][T17025] dump_stack+0x15/0x1b [ 280.599058][T17025] should_fail_ex+0x265/0x280 [ 280.599089][T17025] should_fail+0xb/0x20 [ 280.599114][T17025] should_fail_usercopy+0x1a/0x20 [ 280.599216][T17025] _copy_to_user+0x20/0xa0 [ 280.599323][T17025] simple_read_from_buffer+0xb5/0x130 [ 280.599423][T17025] proc_fail_nth_read+0x10e/0x150 [ 280.599455][T17025] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 280.599488][T17025] vfs_read+0x1a5/0x770 [ 280.599545][T17025] ? __fget_files+0x184/0x1c0 [ 280.599574][T17025] ? __rcu_read_unlock+0x4f/0x70 [ 280.599599][T17025] ? __fget_files+0x184/0x1c0 [ 280.599625][T17025] ksys_read+0xda/0x1a0 [ 280.599649][T17025] __x64_sys_read+0x40/0x50 [ 280.599778][T17025] x64_sys_call+0x27bc/0x2ff0 [ 280.599806][T17025] do_syscall_64+0xd2/0x200 [ 280.599922][T17025] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 280.600024][T17025] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 280.600063][T17025] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.600091][T17025] RIP: 0033:0x7f1af375d5bc [ 280.600110][T17025] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 280.600168][T17025] RSP: 002b:00007f1af219e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 280.600192][T17025] RAX: ffffffffffffffda RBX: 00007f1af39a6090 RCX: 00007f1af375d5bc [ 280.600208][T17025] RDX: 000000000000000f RSI: 00007f1af219e0a0 RDI: 0000000000000003 [ 280.600223][T17025] RBP: 00007f1af219e090 R08: 0000000000000000 R09: 0000000000000000 [ 280.600238][T17025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.600253][T17025] R13: 00007f1af39a6128 R14: 00007f1af39a6090 R15: 00007fff324e7288 [ 280.600314][T17025] [ 280.873028][T17040] FAULT_INJECTION: forcing a failure. [ 280.873028][T17040] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.886194][T17040] CPU: 0 UID: 0 PID: 17040 Comm: syz.1.4232 Not tainted syzkaller #0 PREEMPT(voluntary) [ 280.886230][T17040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 280.886244][T17040] Call Trace: [ 280.886252][T17040] [ 280.886261][T17040] __dump_stack+0x1d/0x30 [ 280.886286][T17040] dump_stack_lvl+0xe8/0x140 [ 280.886308][T17040] dump_stack+0x15/0x1b [ 280.886397][T17040] should_fail_ex+0x265/0x280 [ 280.886425][T17040] should_fail+0xb/0x20 [ 280.886446][T17040] should_fail_usercopy+0x1a/0x20 [ 280.886471][T17040] _copy_from_user+0x1c/0xb0 [ 280.886588][T17040] memdup_user+0x5e/0xd0 [ 280.886622][T17040] sctp_getsockopt_connectx3+0x173/0x300 [ 280.886668][T17040] sctp_getsockopt+0x910/0xaa0 [ 280.886731][T17040] sock_common_getsockopt+0x5d/0x70 [ 280.886774][T17040] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 280.886819][T17040] do_sock_getsockopt+0x1fd/0x240 [ 280.886865][T17040] __x64_sys_getsockopt+0x11e/0x1a0 [ 280.886949][T17040] x64_sys_call+0x2bc6/0x2ff0 [ 280.886998][T17040] do_syscall_64+0xd2/0x200 [ 280.887067][T17040] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 280.887162][T17040] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 280.887204][T17040] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.887233][T17040] RIP: 0033:0x7fb9b8edeba9 [ 280.887254][T17040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.887298][T17040] RSP: 002b:00007fb9b793f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 280.887325][T17040] RAX: ffffffffffffffda RBX: 00007fb9b9125fa0 RCX: 00007fb9b8edeba9 [ 280.887342][T17040] RDX: 000000000000006f RSI: 0000000000000084 RDI: 0000000000000003 [ 280.887419][T17040] RBP: 00007fb9b793f090 R08: 0000200000000100 R09: 0000000000000000 [ 280.887437][T17040] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 280.887454][T17040] R13: 00007fb9b9126038 R14: 00007fb9b9125fa0 R15: 00007fffa6af9c58 [ 280.887481][T17040] [ 281.262646][T17057] syzkaller0: entered promiscuous mode [ 281.268237][T17057] syzkaller0: entered allmulticast mode [ 281.397316][T17085] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4251'. [ 281.583824][T17083] FAULT_INJECTION: forcing a failure. [ 281.583824][T17083] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.597044][T17083] CPU: 0 UID: 0 PID: 17083 Comm: syz.1.4250 Not tainted syzkaller #0 PREEMPT(voluntary) [ 281.597161][T17083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 281.597179][T17083] Call Trace: [ 281.597189][T17083] [ 281.597197][T17083] __dump_stack+0x1d/0x30 [ 281.597223][T17083] dump_stack_lvl+0xe8/0x140 [ 281.597249][T17083] dump_stack+0x15/0x1b [ 281.597271][T17083] should_fail_ex+0x265/0x280 [ 281.597326][T17083] should_fail+0xb/0x20 [ 281.597355][T17083] should_fail_usercopy+0x1a/0x20 [ 281.597390][T17083] _copy_from_user+0x1c/0xb0 [ 281.597433][T17083] memdup_user+0x5e/0xd0 [ 281.597469][T17083] strndup_user+0x68/0xb0 [ 281.597501][T17083] __se_sys_mount+0x8e/0x2e0 [ 281.597533][T17083] ? fput+0x8f/0xc0 [ 281.597572][T17083] ? ksys_write+0x192/0x1a0 [ 281.597638][T17083] __x64_sys_mount+0x67/0x80 [ 281.597670][T17083] x64_sys_call+0x2b4d/0x2ff0 [ 281.597747][T17083] do_syscall_64+0xd2/0x200 [ 281.597813][T17083] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 281.597861][T17083] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 281.597896][T17083] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 281.597917][T17083] RIP: 0033:0x7fb9b8edeba9 [ 281.598000][T17083] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.598068][T17083] RSP: 002b:00007fb9b793f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 281.598095][T17083] RAX: ffffffffffffffda RBX: 00007fb9b9125fa0 RCX: 00007fb9b8edeba9 [ 281.598151][T17083] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 281.598254][T17083] RBP: 00007fb9b793f090 R08: 0000200000000300 R09: 0000000000000000 [ 281.598267][T17083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.598314][T17083] R13: 00007fb9b9126038 R14: 00007fb9b9125fa0 R15: 00007fffa6af9c58 [ 281.598339][T17083] [ 281.654514][ T29] kauditd_printk_skb: 1579 callbacks suppressed [ 281.654534][ T29] audit: type=1400 audit(281.665:18082): avc: denied { prog_load } for pid=17112 comm="syz.4.4264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.687115][T17113] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4264'. [ 281.690976][ T29] audit: type=1400 audit(281.665:18083): avc: denied { create } for pid=17112 comm="syz.4.4264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 281.740202][T17111] FAULT_INJECTION: forcing a failure. [ 281.740202][T17111] name failslab, interval 1, probability 0, space 0, times 0 [ 281.743571][ T29] audit: type=1400 audit(281.675:18084): avc: denied { read write } for pid=17108 comm="syz.2.4262" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 281.751587][T17111] CPU: 0 UID: 0 PID: 17111 Comm: syz.7.4263 Not tainted syzkaller #0 PREEMPT(voluntary) [ 281.751648][T17111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 281.751666][T17111] Call Trace: [ 281.751676][T17111] [ 281.751687][T17111] __dump_stack+0x1d/0x30 [ 281.751718][T17111] dump_stack_lvl+0xe8/0x140 [ 281.751822][T17111] dump_stack+0x15/0x1b [ 281.751846][T17111] should_fail_ex+0x265/0x280 [ 281.751879][T17111] should_failslab+0x8c/0xb0 [ 281.751915][T17111] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 281.751960][T17111] ? sidtab_sid2str_get+0xa0/0x130 [ 281.751997][T17111] kmemdup_noprof+0x2b/0x70 [ 281.752036][T17111] sidtab_sid2str_get+0xa0/0x130 [ 281.752074][T17111] security_sid_to_context_core+0x1eb/0x2e0 [ 281.752108][T17111] security_sid_to_context+0x27/0x40 [ 281.752241][T17111] selinux_lsmprop_to_secctx+0x67/0xf0 [ 281.752274][T17111] security_lsmprop_to_secctx+0x43/0x80 [ 281.752385][T17111] audit_log_task_context+0x77/0x190 [ 281.752508][T17111] audit_log_task+0xf4/0x250 [ 281.752550][T17111] audit_seccomp+0x61/0x100 [ 281.752586][T17111] ? __seccomp_filter+0x68c/0x10d0 [ 281.752619][T17111] __seccomp_filter+0x69d/0x10d0 [ 281.752650][T17111] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 281.752689][T17111] ? vfs_write+0x7e8/0x960 [ 281.752745][T17111] ? __rcu_read_unlock+0x4f/0x70 [ 281.752775][T17111] ? __fget_files+0x184/0x1c0 [ 281.752943][T17111] __secure_computing+0x82/0x150 [ 281.753031][T17111] syscall_trace_enter+0xcf/0x1e0 [ 281.753073][T17111] do_syscall_64+0xac/0x200 [ 281.753150][T17111] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 281.753184][T17111] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 281.753263][T17111] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 281.753294][T17111] RIP: 0033:0x7fa2a0c7eba9 [ 281.753314][T17111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.753400][T17111] RSP: 002b:00007fa29f6df038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c1 [ 281.753460][T17111] RAX: ffffffffffffffda RBX: 00007fa2a0ec5fa0 RCX: 00007fa2a0c7eba9 [ 281.753477][T17111] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000003 [ 281.753552][T17111] RBP: 00007fa29f6df090 R08: 0000000000000000 R09: 0000000000000000 [ 281.753614][T17111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.753632][T17111] R13: 00007fa2a0ec6038 R14: 00007fa2a0ec5fa0 R15: 00007fff3fea4c78 [ 281.753657][T17111] [ 281.753668][T17111] audit: error in audit_log_task_context [ 281.759517][ T29] audit: type=1400 audit(281.685:18085): avc: denied { prog_load } for pid=17112 comm="syz.4.4264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.935423][T17122] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.936090][ T29] audit: type=1400 audit(281.685:18086): avc: denied { create } for pid=17112 comm="syz.4.4264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 281.940639][T17122] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 281.940654][T17122] audit: backlog limit exceeded [ 281.956804][T14276] audit: audit_backlog=65 > audit_backlog_limit=64 [ 282.219764][T17148] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4278'. [ 282.431381][T17180] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4292'. [ 282.450519][T17173] futex_wake_op: syz.7.4288 tries to shift op by 144; fix this program [ 282.467747][T17173] netlink: 'syz.7.4288': attribute type 39 has an invalid length. [ 282.618759][T17199] sctp: [Deprecated]: syz.3.4301 (pid 17199) Use of int in max_burst socket option. [ 282.618759][T17199] Use struct sctp_assoc_value instead [ 282.770335][T17246] FAULT_INJECTION: forcing a failure. [ 282.770335][T17246] name failslab, interval 1, probability 0, space 0, times 0 [ 282.783060][T17246] CPU: 1 UID: 0 PID: 17246 Comm: syz.1.4321 Not tainted syzkaller #0 PREEMPT(voluntary) [ 282.783089][T17246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 282.783105][T17246] Call Trace: [ 282.783114][T17246] [ 282.783124][T17246] __dump_stack+0x1d/0x30 [ 282.783150][T17246] dump_stack_lvl+0xe8/0x140 [ 282.783232][T17246] dump_stack+0x15/0x1b [ 282.783248][T17246] should_fail_ex+0x265/0x280 [ 282.783277][T17246] should_failslab+0x8c/0xb0 [ 282.783345][T17246] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 282.783418][T17246] ? sidtab_sid2str_get+0xa0/0x130 [ 282.783444][T17246] kmemdup_noprof+0x2b/0x70 [ 282.783472][T17246] sidtab_sid2str_get+0xa0/0x130 [ 282.783521][T17246] security_sid_to_context_core+0x1eb/0x2e0 [ 282.783551][T17246] security_sid_to_context+0x27/0x40 [ 282.783576][T17246] selinux_lsmprop_to_secctx+0x67/0xf0 [ 282.783599][T17246] security_lsmprop_to_secctx+0x43/0x80 [ 282.783629][T17246] audit_log_task_context+0x77/0x190 [ 282.783684][T17246] audit_log_task+0xf4/0x250 [ 282.783722][T17246] audit_seccomp+0x61/0x100 [ 282.783754][T17246] ? __seccomp_filter+0x68c/0x10d0 [ 282.783803][T17246] __seccomp_filter+0x69d/0x10d0 [ 282.783827][T17246] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 282.783854][T17246] ? vfs_write+0x7e8/0x960 [ 282.783955][T17246] ? __rcu_read_unlock+0x4f/0x70 [ 282.783982][T17246] ? __fget_files+0x184/0x1c0 [ 282.784076][T17246] __secure_computing+0x82/0x150 [ 282.784099][T17246] syscall_trace_enter+0xcf/0x1e0 [ 282.784131][T17246] do_syscall_64+0xac/0x200 [ 282.784173][T17246] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 282.784257][T17246] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 282.784295][T17246] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.784397][T17246] RIP: 0033:0x7fb9b8edeba9 [ 282.784413][T17246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 282.784430][T17246] RSP: 002b:00007fb9b793f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 282.784489][T17246] RAX: ffffffffffffffda RBX: 00007fb9b9125fa0 RCX: 00007fb9b8edeba9 [ 282.784504][T17246] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000000 [ 282.784519][T17246] RBP: 00007fb9b793f090 R08: 0000000000000000 R09: 0000000000000000 [ 282.784606][T17246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.784618][T17246] R13: 00007fb9b9126038 R14: 00007fb9b9125fa0 R15: 00007fffa6af9c58 [ 282.784641][T17246] [ 283.050286][T17257] FAULT_INJECTION: forcing a failure. [ 283.050286][T17257] name failslab, interval 1, probability 0, space 0, times 0 [ 283.063034][T17257] CPU: 0 UID: 0 PID: 17257 Comm: syz.1.4324 Not tainted syzkaller #0 PREEMPT(voluntary) [ 283.063068][T17257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 283.063133][T17257] Call Trace: [ 283.063141][T17257] [ 283.063150][T17257] __dump_stack+0x1d/0x30 [ 283.063171][T17257] dump_stack_lvl+0xe8/0x140 [ 283.063191][T17257] dump_stack+0x15/0x1b [ 283.063208][T17257] should_fail_ex+0x265/0x280 [ 283.063286][T17257] should_failslab+0x8c/0xb0 [ 283.063320][T17257] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 283.063414][T17257] ? sidtab_sid2str_get+0xa0/0x130 [ 283.063479][T17257] ? skb_put+0xa9/0xf0 [ 283.063507][T17257] kmemdup_noprof+0x2b/0x70 [ 283.063539][T17257] sidtab_sid2str_get+0xa0/0x130 [ 283.063561][T17257] security_sid_to_context_core+0x1eb/0x2e0 [ 283.063642][T17257] security_sid_to_context+0x27/0x40 [ 283.063668][T17257] avc_audit_post_callback+0x9d/0x520 [ 283.063702][T17257] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 283.063737][T17257] common_lsm_audit+0x1bb/0x230 [ 283.063813][T17257] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 283.063879][T17257] slow_avc_audit+0x104/0x140 [ 283.063914][T17257] avc_has_perm+0x13a/0x180 [ 283.063945][T17257] sel_write_validatetrans+0xe3/0x370 [ 283.063978][T17257] ? __pfx_sel_write_validatetrans+0x10/0x10 [ 283.064025][T17257] vfs_write+0x266/0x960 [ 283.064049][T17257] ? __rcu_read_unlock+0x4f/0x70 [ 283.064071][T17257] ? __fget_files+0x184/0x1c0 [ 283.064100][T17257] ksys_write+0xda/0x1a0 [ 283.064202][T17257] __x64_sys_write+0x40/0x50 [ 283.064226][T17257] x64_sys_call+0x27fe/0x2ff0 [ 283.064249][T17257] do_syscall_64+0xd2/0x200 [ 283.064283][T17257] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 283.064435][T17257] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 283.064466][T17257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.064489][T17257] RIP: 0033:0x7fb9b8edeba9 [ 283.064504][T17257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.064565][T17257] RSP: 002b:00007fb9b793f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 283.064619][T17257] RAX: ffffffffffffffda RBX: 00007fb9b9125fa0 RCX: 00007fb9b8edeba9 [ 283.064631][T17257] RDX: 0000000000000079 RSI: 0000200000001cc0 RDI: 0000000000000003 [ 283.064644][T17257] RBP: 00007fb9b793f090 R08: 0000000000000000 R09: 0000000000000000 [ 283.064656][T17257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.064668][T17257] R13: 00007fb9b9126038 R14: 00007fb9b9125fa0 R15: 00007fffa6af9c58 [ 283.064687][T17257] [ 283.385394][T17272] FAULT_INJECTION: forcing a failure. [ 283.385394][T17272] name failslab, interval 1, probability 0, space 0, times 0 [ 283.398135][T17272] CPU: 0 UID: 0 PID: 17272 Comm: syz.7.4334 Not tainted syzkaller #0 PREEMPT(voluntary) [ 283.398174][T17272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 283.398188][T17272] Call Trace: [ 283.398195][T17272] [ 283.398202][T17272] __dump_stack+0x1d/0x30 [ 283.398292][T17272] dump_stack_lvl+0xe8/0x140 [ 283.398367][T17272] dump_stack+0x15/0x1b [ 283.398388][T17272] should_fail_ex+0x265/0x280 [ 283.398413][T17272] should_failslab+0x8c/0xb0 [ 283.398485][T17272] kmem_cache_alloc_noprof+0x50/0x310 [ 283.398515][T17272] ? security_inode_alloc+0x37/0x100 [ 283.398549][T17272] security_inode_alloc+0x37/0x100 [ 283.398584][T17272] inode_init_always_gfp+0x4b7/0x500 [ 283.398648][T17272] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 283.398678][T17272] alloc_inode+0x58/0x170 [ 283.398707][T17272] new_inode+0x1d/0xe0 [ 283.398738][T17272] shmem_get_inode+0x244/0x750 [ 283.398807][T17272] __shmem_file_setup+0x113/0x210 [ 283.398853][T17272] shmem_file_setup+0x3b/0x50 [ 283.398878][T17272] __se_sys_memfd_create+0x2c3/0x590 [ 283.398907][T17272] __x64_sys_memfd_create+0x31/0x40 [ 283.398984][T17272] x64_sys_call+0x2abe/0x2ff0 [ 283.399013][T17272] do_syscall_64+0xd2/0x200 [ 283.399065][T17272] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 283.399145][T17272] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 283.399179][T17272] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.399200][T17272] RIP: 0033:0x7fa2a0c7eba9 [ 283.399267][T17272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.399292][T17272] RSP: 002b:00007fa29f6dee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 283.399316][T17272] RAX: ffffffffffffffda RBX: 0000000000000556 RCX: 00007fa2a0c7eba9 [ 283.399332][T17272] RDX: 00007fa29f6deef0 RSI: 0000000000000000 RDI: 00007fa2a0d027e8 [ 283.399366][T17272] RBP: 0000200000000fc0 R08: 00007fa29f6debb7 R09: 00007fa29f6dee40 [ 283.399383][T17272] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000040 [ 283.399399][T17272] R13: 00007fa29f6deef0 R14: 00007fa29f6deeb0 R15: 0000200000000200 [ 283.399423][T17272] [ 283.873120][T17315] $Hÿ: left promiscuous mode [ 283.878184][T17315] bond_slave_0: left promiscuous mode [ 283.883845][T17315] bond_slave_1: left promiscuous mode [ 283.909390][T17321] FAULT_INJECTION: forcing a failure. [ 283.909390][T17321] name failslab, interval 1, probability 0, space 0, times 0 [ 283.922079][T17321] CPU: 1 UID: 0 PID: 17321 Comm: syz.4.4356 Not tainted syzkaller #0 PREEMPT(voluntary) [ 283.922120][T17321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 283.922167][T17321] Call Trace: [ 283.922177][T17321] [ 283.922256][T17321] __dump_stack+0x1d/0x30 [ 283.922282][T17321] dump_stack_lvl+0xe8/0x140 [ 283.922383][T17321] dump_stack+0x15/0x1b [ 283.922458][T17321] should_fail_ex+0x265/0x280 [ 283.922537][T17321] should_failslab+0x8c/0xb0 [ 283.922647][T17321] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 283.922693][T17321] ? sidtab_sid2str_get+0xa0/0x130 [ 283.922725][T17321] kmemdup_noprof+0x2b/0x70 [ 283.922869][T17321] sidtab_sid2str_get+0xa0/0x130 [ 283.922900][T17321] security_sid_to_context_core+0x1eb/0x2e0 [ 283.922931][T17321] security_sid_to_context+0x27/0x40 [ 283.922962][T17321] avc_audit_post_callback+0x9d/0x520 [ 283.923040][T17321] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 283.923075][T17321] common_lsm_audit+0x1bb/0x230 [ 283.923248][T17321] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 283.923327][T17321] slow_avc_audit+0x104/0x140 [ 283.923412][T17321] avc_has_perm+0x13a/0x180 [ 283.923503][T17321] file_has_perm+0x324/0x370 [ 283.923530][T17321] file_map_prot_check+0x110/0x210 [ 283.923559][T17321] selinux_mmap_file+0x190/0x1d0 [ 283.923591][T17321] security_mmap_file+0x175/0x1c0 [ 283.923732][T17321] vm_mmap_pgoff+0x90/0x2e0 [ 283.923828][T17321] ksys_mmap_pgoff+0x268/0x310 [ 283.923936][T17321] x64_sys_call+0x14a3/0x2ff0 [ 283.923970][T17321] do_syscall_64+0xd2/0x200 [ 283.924022][T17321] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 283.924056][T17321] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 283.924152][T17321] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.924174][T17321] RIP: 0033:0x7f120ac4eba9 [ 283.924190][T17321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.924273][T17321] RSP: 002b:00007f12096b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 283.924292][T17321] RAX: ffffffffffffffda RBX: 00007f120ae95fa0 RCX: 00007f120ac4eba9 [ 283.924306][T17321] RDX: 0000000000000005 RSI: 0000000000003000 RDI: 0000200000000000 [ 283.924321][T17321] RBP: 00007f12096b7090 R08: 0000000000000003 R09: 0000000000000000 [ 283.924336][T17321] R10: 0000000000000012 R11: 0000000000000246 R12: 0000000000000001 [ 283.924350][T17321] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 283.924408][T17321] [ 284.591753][T17349] netlink: 'syz.2.4369': attribute type 21 has an invalid length. [ 284.604407][T17349] __nla_validate_parse: 4 callbacks suppressed [ 284.604427][T17349] netlink: 156 bytes leftover after parsing attributes in process `syz.2.4369'. [ 284.620020][T17349] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4369'. [ 285.250021][T17429] lo speed is unknown, defaulting to 1000 [ 285.591828][T17445] netlink: 'syz.2.4410': attribute type 21 has an invalid length. [ 285.606369][T17445] netlink: 156 bytes leftover after parsing attributes in process `syz.2.4410'. [ 285.615646][T17445] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4410'. [ 286.045595][T17515] FAULT_INJECTION: forcing a failure. [ 286.045595][T17515] name failslab, interval 1, probability 0, space 0, times 0 [ 286.058328][T17515] CPU: 0 UID: 0 PID: 17515 Comm: syz.4.4443 Not tainted syzkaller #0 PREEMPT(voluntary) [ 286.058396][T17515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 286.058413][T17515] Call Trace: [ 286.058489][T17515] [ 286.058498][T17515] __dump_stack+0x1d/0x30 [ 286.058523][T17515] dump_stack_lvl+0xe8/0x140 [ 286.058550][T17515] dump_stack+0x15/0x1b [ 286.058571][T17515] should_fail_ex+0x265/0x280 [ 286.058682][T17515] ? proc_cgroup_show+0x3f/0x600 [ 286.058710][T17515] should_failslab+0x8c/0xb0 [ 286.058744][T17515] __kmalloc_cache_noprof+0x4c/0x320 [ 286.058802][T17515] proc_cgroup_show+0x3f/0x600 [ 286.058829][T17515] ? __rcu_read_unlock+0x4f/0x70 [ 286.058871][T17515] proc_single_show+0x8c/0x120 [ 286.058905][T17515] traverse+0x144/0x3a0 [ 286.058941][T17515] seq_read_iter+0x853/0x940 [ 286.058972][T17515] ? _parse_integer+0x27/0x40 [ 286.059073][T17515] seq_read+0x270/0x2b0 [ 286.059120][T17515] ? __pfx_seq_read+0x10/0x10 [ 286.059233][T17515] vfs_readv+0x3f8/0x690 [ 286.059283][T17515] __x64_sys_preadv+0xfd/0x1c0 [ 286.059390][T17515] x64_sys_call+0x282a/0x2ff0 [ 286.059419][T17515] do_syscall_64+0xd2/0x200 [ 286.059531][T17515] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 286.059587][T17515] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 286.059638][T17515] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 286.059668][T17515] RIP: 0033:0x7f120ac4eba9 [ 286.059690][T17515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.059794][T17515] RSP: 002b:00007f12096b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 286.059819][T17515] RAX: ffffffffffffffda RBX: 00007f120ae95fa0 RCX: 00007f120ac4eba9 [ 286.059837][T17515] RDX: 0000000000000001 RSI: 00002000000000c0 RDI: 0000000000000003 [ 286.059961][T17515] RBP: 00007f12096b7090 R08: 00000000000008b4 R09: 0000000000000000 [ 286.059978][T17515] R10: 0000000000001131 R11: 0000000000000246 R12: 0000000000000001 [ 286.059995][T17515] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 286.060019][T17515] [ 286.409428][T17533] FAULT_INJECTION: forcing a failure. [ 286.409428][T17533] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.422674][T17533] CPU: 0 UID: 0 PID: 17533 Comm: syz.4.4452 Not tainted syzkaller #0 PREEMPT(voluntary) [ 286.422776][T17533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 286.422794][T17533] Call Trace: [ 286.422802][T17533] [ 286.422812][T17533] __dump_stack+0x1d/0x30 [ 286.422835][T17533] dump_stack_lvl+0xe8/0x140 [ 286.422862][T17533] dump_stack+0x15/0x1b [ 286.422901][T17533] should_fail_ex+0x265/0x280 [ 286.422931][T17533] should_fail+0xb/0x20 [ 286.423028][T17533] should_fail_usercopy+0x1a/0x20 [ 286.423057][T17533] _copy_from_user+0x1c/0xb0 [ 286.423139][T17533] kstrtouint_from_user+0x69/0xf0 [ 286.423232][T17533] ? 0xffffffff81000000 [ 286.423249][T17533] ? selinux_file_permission+0x1e4/0x320 [ 286.423324][T17533] proc_fail_nth_write+0x50/0x160 [ 286.423421][T17533] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 286.423464][T17533] vfs_write+0x266/0x960 [ 286.423486][T17533] ? vfs_read+0x4e6/0x770 [ 286.423518][T17533] ksys_write+0xda/0x1a0 [ 286.423545][T17533] __x64_sys_write+0x40/0x50 [ 286.423574][T17533] x64_sys_call+0x27fe/0x2ff0 [ 286.423648][T17533] do_syscall_64+0xd2/0x200 [ 286.423688][T17533] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 286.423713][T17533] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 286.423800][T17533] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 286.423822][T17533] RIP: 0033:0x7f120ac4d65f [ 286.423838][T17533] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 286.423867][T17533] RSP: 002b:00007f12096b7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 286.423892][T17533] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f120ac4d65f [ 286.423928][T17533] RDX: 0000000000000001 RSI: 00007f12096b70a0 RDI: 0000000000000004 [ 286.423942][T17533] RBP: 00007f12096b7090 R08: 0000000000000000 R09: 0000000000000000 [ 286.423958][T17533] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 286.423974][T17533] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 286.424078][T17533] [ 286.659315][ T29] kauditd_printk_skb: 1420 callbacks suppressed [ 286.659333][ T29] audit: type=1400 audit(286.677:19471): avc: denied { prog_load } for pid=17543 comm="syz.3.4457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.686732][T17539] netlink: 'syz.1.4456': attribute type 21 has an invalid length. [ 286.695792][T17539] netlink: 156 bytes leftover after parsing attributes in process `syz.1.4456'. [ 286.705013][T17539] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4456'. [ 286.715728][ T29] audit: type=1400 audit(286.677:19472): avc: denied { read write } for pid=13270 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 286.739635][ T29] audit: type=1400 audit(286.687:19473): avc: denied { read write } for pid=17545 comm="syz.7.4458" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 286.763329][ T29] audit: type=1400 audit(286.697:19474): avc: denied { prog_load } for pid=17545 comm="syz.7.4458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.782062][ T29] audit: type=1400 audit(286.697:19475): avc: denied { map_create } for pid=17545 comm="syz.7.4458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.800819][ T29] audit: type=1400 audit(286.697:19476): avc: denied { create } for pid=17545 comm="syz.7.4458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 286.820962][ T29] audit: type=1400 audit(286.697:19477): avc: denied { prog_load } for pid=17545 comm="syz.7.4458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.831629][T17558] netem: incorrect ge model size [ 286.839732][ T29] audit: type=1400 audit(286.697:19478): avc: denied { block_suspend } for pid=17545 comm="syz.7.4458" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 286.844732][T17558] netem: change failed [ 286.865776][ T29] audit: type=1400 audit(286.697:19479): avc: denied { prog_load } for pid=17545 comm="syz.7.4458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.888501][ T29] audit: type=1400 audit(286.697:19480): avc: denied { prog_load } for pid=17545 comm="syz.7.4458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.944136][T17562] netlink: 'syz.7.4465': attribute type 10 has an invalid length. [ 287.132849][T17598] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4480'. [ 287.161157][T17598] netlink: 4 bytes leftover after parsing attributes in process `gtp'. [ 287.337324][T17619] FAULT_INJECTION: forcing a failure. [ 287.337324][T17619] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 287.350689][T17619] CPU: 0 UID: 0 PID: 17619 Comm: syz.2.4488 Not tainted syzkaller #0 PREEMPT(voluntary) [ 287.350724][T17619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 287.350740][T17619] Call Trace: [ 287.350749][T17619] [ 287.350758][T17619] __dump_stack+0x1d/0x30 [ 287.350836][T17619] dump_stack_lvl+0xe8/0x140 [ 287.350862][T17619] dump_stack+0x15/0x1b [ 287.350881][T17619] should_fail_ex+0x265/0x280 [ 287.350906][T17619] should_fail_alloc_page+0xf2/0x100 [ 287.351019][T17619] __alloc_frozen_pages_noprof+0xff/0x360 [ 287.351142][T17619] alloc_pages_mpol+0xb3/0x250 [ 287.351186][T17619] vma_alloc_folio_noprof+0x1aa/0x300 [ 287.351285][T17619] handle_mm_fault+0xec2/0x2c20 [ 287.351392][T17619] do_user_addr_fault+0x636/0x1090 [ 287.351501][T17619] ? arch_exit_work+0x30/0x40 [ 287.351579][T17619] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 287.351726][T17619] exc_page_fault+0x62/0xa0 [ 287.351763][T17619] asm_exc_page_fault+0x26/0x30 [ 287.351802][T17619] RIP: 0033:0x7f9f00e60ba3 [ 287.351821][T17619] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 287.351844][T17619] RSP: 002b:00007f9effa064a0 EFLAGS: 00010202 [ 287.351863][T17619] RAX: 0000000000010000 RBX: 00007f9effa06540 RCX: 00007f9ef75e7000 [ 287.351879][T17619] RDX: 00007f9effa066e0 RSI: 000000000000001d RDI: 00007f9effa065e0 [ 287.351894][T17619] RBP: 0000000000000087 R08: 0000000000000008 R09: 00000000000000a7 [ 287.351906][T17619] R10: 00000000000000c0 R11: 00007f9effa06540 R12: 0000000000000001 [ 287.351918][T17619] R13: 00007f9f0103da00 R14: 000000000000000b R15: 00007f9effa065e0 [ 287.351993][T17619] [ 287.352004][T17619] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 287.707598][T17654] FAULT_INJECTION: forcing a failure. [ 287.707598][T17654] name failslab, interval 1, probability 0, space 0, times 0 [ 287.720324][T17654] CPU: 1 UID: 0 PID: 17654 Comm: syz.4.4503 Not tainted syzkaller #0 PREEMPT(voluntary) [ 287.720451][T17654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 287.720464][T17654] Call Trace: [ 287.720532][T17654] [ 287.720539][T17654] __dump_stack+0x1d/0x30 [ 287.720564][T17654] dump_stack_lvl+0xe8/0x140 [ 287.720590][T17654] dump_stack+0x15/0x1b [ 287.720617][T17654] should_fail_ex+0x265/0x280 [ 287.720656][T17654] ? audit_log_d_path+0x8d/0x150 [ 287.720719][T17654] should_failslab+0x8c/0xb0 [ 287.720744][T17654] __kmalloc_cache_noprof+0x4c/0x320 [ 287.720799][T17654] audit_log_d_path+0x8d/0x150 [ 287.720836][T17654] audit_log_d_path_exe+0x42/0x70 [ 287.720867][T17654] audit_log_task+0x1e9/0x250 [ 287.720903][T17654] audit_seccomp+0x61/0x100 [ 287.720936][T17654] ? __seccomp_filter+0x68c/0x10d0 [ 287.720961][T17654] __seccomp_filter+0x69d/0x10d0 [ 287.720984][T17654] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 287.721082][T17654] ? vfs_write+0x7e8/0x960 [ 287.721124][T17654] __secure_computing+0x82/0x150 [ 287.721181][T17654] syscall_trace_enter+0xcf/0x1e0 [ 287.721210][T17654] do_syscall_64+0xac/0x200 [ 287.721242][T17654] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 287.721266][T17654] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 287.721339][T17654] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 287.721368][T17654] RIP: 0033:0x7f120ac4eba9 [ 287.721426][T17654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 287.721450][T17654] RSP: 002b:00007f12096b7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 287.721474][T17654] RAX: ffffffffffffffda RBX: 00007f120ae95fa0 RCX: 00007f120ac4eba9 [ 287.721489][T17654] RDX: 0000000000000969 RSI: 0000000000003498 RDI: ffffffffffffffff [ 287.721505][T17654] RBP: 00007f12096b7090 R08: 0000000000000000 R09: 0000000000000000 [ 287.721520][T17654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.721583][T17654] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 287.721605][T17654] [ 287.736394][T17661] netlink: 44 bytes leftover after parsing attributes in process `syz.7.4507'. [ 287.986028][T17661] netlink: 48 bytes leftover after parsing attributes in process `syz.7.4507'. [ 289.056552][T17746] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(6) [ 289.063171][T17746] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 289.070864][T17746] vhci_hcd vhci_hcd.0: Device attached [ 289.157718][T17756] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 289.164319][T17756] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 289.172028][T17756] vhci_hcd vhci_hcd.0: Device attached [ 289.182981][T17757] vhci_hcd: connection closed [ 289.183541][T12345] vhci_hcd: stop threads [ 289.192687][T12345] vhci_hcd: release socket [ 289.197209][T12345] vhci_hcd: disconnect device [ 289.316005][ T4372] usb 15-1: new low-speed USB device number 2 using vhci_hcd [ 289.563552][T17790] netlink: 'syz.4.4558': attribute type 10 has an invalid length. [ 289.571782][T17790] FAULT_INJECTION: forcing a failure. [ 289.571782][T17790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.579691][T17747] vhci_hcd: connection reset by peer [ 289.584992][T17790] CPU: 1 UID: 0 PID: 17790 Comm: syz.4.4558 Not tainted syzkaller #0 PREEMPT(voluntary) [ 289.585081][T17790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 289.585099][T17790] Call Trace: [ 289.585110][T17790] [ 289.585120][T17790] __dump_stack+0x1d/0x30 [ 289.585149][T17790] dump_stack_lvl+0xe8/0x140 [ 289.585176][T17790] dump_stack+0x15/0x1b [ 289.585200][T17790] should_fail_ex+0x265/0x280 [ 289.585320][T17790] should_fail+0xb/0x20 [ 289.585350][T17790] should_fail_usercopy+0x1a/0x20 [ 289.585387][T17790] _copy_to_user+0x20/0xa0 [ 289.585432][T17790] simple_read_from_buffer+0xb5/0x130 [ 289.585550][T17790] proc_fail_nth_read+0x10e/0x150 [ 289.585589][T17790] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 289.585657][T17790] vfs_read+0x1a5/0x770 [ 289.585685][T17790] ? __rcu_read_unlock+0x4f/0x70 [ 289.585785][T17790] ? __fget_files+0x184/0x1c0 [ 289.585825][T17790] ksys_read+0xda/0x1a0 [ 289.585871][T17790] __x64_sys_read+0x40/0x50 [ 289.585900][T17790] x64_sys_call+0x27bc/0x2ff0 [ 289.585931][T17790] do_syscall_64+0xd2/0x200 [ 289.585975][T17790] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 289.586010][T17790] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 289.586104][T17790] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 289.586162][T17790] RIP: 0033:0x7f120ac4d5bc [ 289.586183][T17790] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 289.586208][T17790] RSP: 002b:00007f12096b7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 289.586244][T17790] RAX: ffffffffffffffda RBX: 00007f120ae95fa0 RCX: 00007f120ac4d5bc [ 289.586263][T17790] RDX: 000000000000000f RSI: 00007f12096b70a0 RDI: 0000000000000004 [ 289.586278][T17790] RBP: 00007f12096b7090 R08: 0000000000000000 R09: 0000000000000000 [ 289.586364][T17790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.586379][T17790] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 289.586406][T17790] [ 289.618360][T17794] FAULT_INJECTION: forcing a failure. [ 289.618360][T17794] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.621953][ T51] vhci_hcd: stop threads [ 289.626249][T17794] CPU: 1 UID: 0 PID: 17794 Comm: syz.4.4560 Not tainted syzkaller #0 PREEMPT(voluntary) [ 289.626333][T17794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 289.626350][T17794] Call Trace: [ 289.626362][T17794] [ 289.626372][T17794] __dump_stack+0x1d/0x30 [ 289.626402][T17794] dump_stack_lvl+0xe8/0x140 [ 289.626429][T17794] dump_stack+0x15/0x1b [ 289.626453][T17794] should_fail_ex+0x265/0x280 [ 289.626486][T17794] should_fail+0xb/0x20 [ 289.626575][T17794] should_fail_usercopy+0x1a/0x20 [ 289.626611][T17794] _copy_from_user+0x1c/0xb0 [ 289.626722][T17794] kstrtouint_from_user+0x69/0xf0 [ 289.626758][T17794] ? 0xffffffff81000000 [ 289.626777][T17794] ? selinux_file_permission+0x1e4/0x320 [ 289.626834][T17794] proc_fail_nth_write+0x50/0x160 [ 289.626904][T17794] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 289.626942][T17794] vfs_write+0x266/0x960 [ 289.626972][T17794] ? vfs_read+0x4e6/0x770 [ 289.627000][T17794] ? __rcu_read_unlock+0x4f/0x70 [ 289.627092][T17794] ? fdget_pos+0xed/0x1d0 [ 289.627131][T17794] ksys_write+0xda/0x1a0 [ 289.627178][T17794] __x64_sys_write+0x40/0x50 [ 289.627211][T17794] x64_sys_call+0x27fe/0x2ff0 [ 289.627241][T17794] do_syscall_64+0xd2/0x200 [ 289.627286][T17794] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 289.627373][T17794] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 289.627443][T17794] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 289.627474][T17794] RIP: 0033:0x7f120ac4d65f [ 289.627495][T17794] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 289.627577][T17794] RSP: 002b:00007f12096b7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 289.627604][T17794] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f120ac4d65f [ 289.627679][T17794] RDX: 0000000000000001 RSI: 00007f12096b70a0 RDI: 0000000000000003 [ 289.627697][T17794] RBP: 00007f12096b7090 R08: 0000000000000000 R09: 0000000000000000 [ 289.627715][T17794] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 289.627733][T17794] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 289.627759][T17794] [ 289.675673][T17771] netlink: 'syz.3.4549': attribute type 21 has an invalid length. [ 289.678873][ T51] vhci_hcd: release socket [ 289.678890][ T51] vhci_hcd: disconnect device [ 289.683262][T17771] __nla_validate_parse: 6 callbacks suppressed [ 289.683280][T17771] netlink: 156 bytes leftover after parsing attributes in process `syz.3.4549'. [ 289.691781][T17798] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4562'. [ 289.692284][T17771] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4549'. [ 289.794196][T17802] netlink: 'syz.4.4562': attribute type 10 has an invalid length. [ 290.084203][T17807] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4565'. [ 290.101865][T17809] netlink: 'syz.1.4566': attribute type 46 has an invalid length. [ 290.434048][T17848] lo speed is unknown, defaulting to 1000 [ 290.519375][T17857] FAULT_INJECTION: forcing a failure. [ 290.519375][T17857] name failslab, interval 1, probability 0, space 0, times 0 [ 290.532214][T17857] CPU: 1 UID: 0 PID: 17857 Comm: syz.3.4586 Not tainted syzkaller #0 PREEMPT(voluntary) [ 290.532242][T17857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 290.532267][T17857] Call Trace: [ 290.532274][T17857] [ 290.532283][T17857] __dump_stack+0x1d/0x30 [ 290.532309][T17857] dump_stack_lvl+0xe8/0x140 [ 290.532376][T17857] dump_stack+0x15/0x1b [ 290.532405][T17857] should_fail_ex+0x265/0x280 [ 290.532433][T17857] should_failslab+0x8c/0xb0 [ 290.532458][T17857] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 290.532532][T17857] ? __d_alloc+0x3d/0x340 [ 290.532585][T17857] __d_alloc+0x3d/0x340 [ 290.532621][T17857] ? should_fail_ex+0x30/0x280 [ 290.532650][T17857] d_alloc_parallel+0x53/0xc60 [ 290.532690][T17857] ? avc_has_perm_noaudit+0x1b1/0x200 [ 290.532723][T17857] ? lockref_get_not_dead+0x120/0x1c0 [ 290.532800][T17857] ? __rcu_read_unlock+0x4f/0x70 [ 290.532829][T17857] __lookup_slow+0x8c/0x250 [ 290.532866][T17857] lookup_slow+0x3c/0x60 [ 290.532982][T17857] link_path_walk+0x753/0x900 [ 290.533013][T17857] __filename_parentat+0x15c/0x3f0 [ 290.533058][T17857] do_renameat2+0x197/0xa10 [ 290.533105][T17857] ? strncpy_from_user+0x177/0x230 [ 290.533151][T17857] __x64_sys_renameat2+0x7e/0x90 [ 290.533178][T17857] x64_sys_call+0x3f9/0x2ff0 [ 290.533282][T17857] do_syscall_64+0xd2/0x200 [ 290.533365][T17857] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 290.533403][T17857] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 290.533500][T17857] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.533546][T17857] RIP: 0033:0x7f1af375eba9 [ 290.533637][T17857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 290.533660][T17857] RSP: 002b:00007f1af21bf038 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 290.533684][T17857] RAX: ffffffffffffffda RBX: 00007f1af39a5fa0 RCX: 00007f1af375eba9 [ 290.533699][T17857] RDX: ffffffffffffff9c RSI: 0000200000000400 RDI: ffffffffffffff9c [ 290.533714][T17857] RBP: 00007f1af21bf090 R08: 0000000000000000 R09: 0000000000000000 [ 290.533728][T17857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.533803][T17857] R13: 00007f1af39a6038 R14: 00007f1af39a5fa0 R15: 00007fff324e7288 [ 290.533822][T17857] [ 290.579762][T17859] lo speed is unknown, defaulting to 1000 [ 291.169875][T17899] netdevsim netdevsim7: Direct firmware load for ./file0/file1 failed with error -2 [ 291.500615][T17926] lo speed is unknown, defaulting to 1000 [ 291.597117][T17931] FAULT_INJECTION: forcing a failure. [ 291.597117][T17931] name failslab, interval 1, probability 0, space 0, times 0 [ 291.609891][T17931] CPU: 1 UID: 0 PID: 17931 Comm: syz.7.4617 Not tainted syzkaller #0 PREEMPT(voluntary) [ 291.609920][T17931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 291.609934][T17931] Call Trace: [ 291.609942][T17931] [ 291.609975][T17931] __dump_stack+0x1d/0x30 [ 291.609996][T17931] dump_stack_lvl+0xe8/0x140 [ 291.610018][T17931] dump_stack+0x15/0x1b [ 291.610041][T17931] should_fail_ex+0x265/0x280 [ 291.610070][T17931] ? audit_log_d_path+0x8d/0x150 [ 291.610165][T17931] should_failslab+0x8c/0xb0 [ 291.610199][T17931] __kmalloc_cache_noprof+0x4c/0x320 [ 291.610240][T17931] audit_log_d_path+0x8d/0x150 [ 291.610281][T17931] audit_log_d_path_exe+0x42/0x70 [ 291.610347][T17931] audit_log_task+0x1e9/0x250 [ 291.610382][T17931] audit_seccomp+0x61/0x100 [ 291.610416][T17931] ? __seccomp_filter+0x68c/0x10d0 [ 291.610445][T17931] __seccomp_filter+0x69d/0x10d0 [ 291.610477][T17931] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 291.610506][T17931] ? vfs_write+0x7e8/0x960 [ 291.610534][T17931] ? __rcu_read_unlock+0x4f/0x70 [ 291.610558][T17931] ? __fget_files+0x184/0x1c0 [ 291.610619][T17931] __secure_computing+0x82/0x150 [ 291.610647][T17931] syscall_trace_enter+0xcf/0x1e0 [ 291.610676][T17931] do_syscall_64+0xac/0x200 [ 291.610708][T17931] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 291.610819][T17931] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 291.610849][T17931] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.610872][T17931] RIP: 0033:0x7fa2a0c7eba9 [ 291.610892][T17931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.610916][T17931] RSP: 002b:00007fa29f6df038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 291.610970][T17931] RAX: ffffffffffffffda RBX: 00007fa2a0ec5fa0 RCX: 00007fa2a0c7eba9 [ 291.610982][T17931] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000004 [ 291.610994][T17931] RBP: 00007fa29f6df090 R08: 0000000000000000 R09: 0000000000000000 [ 291.611040][T17931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.611056][T17931] R13: 00007fa2a0ec6038 R14: 00007fa2a0ec5fa0 R15: 00007fff3fea4c78 [ 291.611079][T17931] [ 291.831139][ T29] kauditd_printk_skb: 1984 callbacks suppressed [ 291.831154][ T29] audit: type=1326 audit(291.840:21463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17930 comm="syz.7.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7fa2a0c7d5bc code=0x7ffc0000 [ 291.860285][ T29] audit: type=1326 audit(291.840:21464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17930 comm="syz.7.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fa2a0c7d65f code=0x7ffc0000 [ 291.883172][ T29] audit: type=1326 audit(291.840:21465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17930 comm="syz.7.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fa2a0c7d80a code=0x7ffc0000 [ 291.911619][ T29] audit: type=1326 audit(291.840:21466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17930 comm="syz.7.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2a0c7eba9 code=0x7ffc0000 [ 291.934713][ T29] audit: type=1326 audit(291.840:21467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17930 comm="syz.7.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2a0c7eba9 code=0x7ffc0000 [ 291.957800][ T29] audit: type=1400 audit(291.880:21468): avc: denied { read write } for pid=14023 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 292.014292][ T29] audit: type=1400 audit(291.950:21469): avc: denied { map_create } for pid=17932 comm="syz.7.4618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 292.033049][ T29] audit: type=1400 audit(291.950:21470): avc: denied { prog_load } for pid=17932 comm="syz.7.4618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 292.051736][ T29] audit: type=1400 audit(292.000:21471): avc: denied { prog_load } for pid=17932 comm="syz.7.4618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 292.070577][ T29] audit: type=1400 audit(292.010:21472): avc: denied { read write } for pid=13270 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 292.109966][T17940] FAULT_INJECTION: forcing a failure. [ 292.109966][T17940] name failslab, interval 1, probability 0, space 0, times 0 [ 292.122791][T17940] CPU: 0 UID: 0 PID: 17940 Comm: syz.2.4619 Not tainted syzkaller #0 PREEMPT(voluntary) [ 292.122823][T17940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 292.122840][T17940] Call Trace: [ 292.122848][T17940] [ 292.122858][T17940] __dump_stack+0x1d/0x30 [ 292.122911][T17940] dump_stack_lvl+0xe8/0x140 [ 292.122934][T17940] dump_stack+0x15/0x1b [ 292.123011][T17940] should_fail_ex+0x265/0x280 [ 292.123049][T17940] should_failslab+0x8c/0xb0 [ 292.123079][T17940] kmem_cache_alloc_noprof+0x50/0x310 [ 292.123138][T17940] ? security_inode_alloc+0x37/0x100 [ 292.123178][T17940] security_inode_alloc+0x37/0x100 [ 292.123262][T17940] inode_init_always_gfp+0x4b7/0x500 [ 292.123299][T17940] alloc_inode+0x58/0x170 [ 292.123327][T17940] alloc_anon_inode+0x1e/0x170 [ 292.123352][T17940] aio_setup_ring+0x91/0x760 [ 292.123387][T17940] ioctx_alloc+0x2c4/0x4e0 [ 292.123468][T17940] __se_sys_io_setup+0x6b/0x1b0 [ 292.123525][T17940] __x64_sys_io_setup+0x31/0x40 [ 292.123547][T17940] x64_sys_call+0x2eff/0x2ff0 [ 292.123571][T17940] do_syscall_64+0xd2/0x200 [ 292.123671][T17940] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 292.123696][T17940] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 292.123734][T17940] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.123787][T17940] RIP: 0033:0x7f9f00f9eba9 [ 292.123806][T17940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.123825][T17940] RSP: 002b:00007f9effa07038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 292.123844][T17940] RAX: ffffffffffffffda RBX: 00007f9f011e5fa0 RCX: 00007f9f00f9eba9 [ 292.123969][T17940] RDX: 0000000000000000 RSI: 0000200000002400 RDI: 00000000000008f0 [ 292.123982][T17940] RBP: 00007f9effa07090 R08: 0000000000000000 R09: 0000000000000000 [ 292.123994][T17940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.124005][T17940] R13: 00007f9f011e6038 R14: 00007f9f011e5fa0 R15: 00007fffce18fe58 [ 292.124026][T17940] [ 292.345752][T17944] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17944 comm=syz.3.4621 [ 292.470621][T17958] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4627'. [ 292.618501][T17971] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4634'. [ 292.623530][T17976] FAULT_INJECTION: forcing a failure. [ 292.623530][T17976] name failslab, interval 1, probability 0, space 0, times 0 [ 292.640275][T17976] CPU: 0 UID: 0 PID: 17976 Comm: syz.3.4635 Not tainted syzkaller #0 PREEMPT(voluntary) [ 292.640347][T17976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 292.640360][T17976] Call Trace: [ 292.640367][T17976] [ 292.640375][T17976] __dump_stack+0x1d/0x30 [ 292.640395][T17976] dump_stack_lvl+0xe8/0x140 [ 292.640450][T17976] dump_stack+0x15/0x1b [ 292.640467][T17976] should_fail_ex+0x265/0x280 [ 292.640572][T17976] ? __se_sys_memfd_create+0x1cc/0x590 [ 292.640597][T17976] should_failslab+0x8c/0xb0 [ 292.640642][T17976] __kmalloc_cache_noprof+0x4c/0x320 [ 292.640748][T17976] ? fput+0x8f/0xc0 [ 292.640787][T17976] __se_sys_memfd_create+0x1cc/0x590 [ 292.640817][T17976] __x64_sys_memfd_create+0x31/0x40 [ 292.640840][T17976] x64_sys_call+0x2abe/0x2ff0 [ 292.640889][T17976] do_syscall_64+0xd2/0x200 [ 292.640930][T17976] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 292.641002][T17976] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 292.641039][T17976] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.641159][T17976] RIP: 0033:0x7f1af375eba9 [ 292.641178][T17976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.641256][T17976] RSP: 002b:00007f1af21bee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 292.641281][T17976] RAX: ffffffffffffffda RBX: 00000000000005ad RCX: 00007f1af375eba9 [ 292.641297][T17976] RDX: 00007f1af21beef0 RSI: 0000000000000000 RDI: 00007f1af37e27e8 [ 292.641311][T17976] RBP: 0000200000000180 R08: 00007f1af21bebb7 R09: 00007f1af21bee40 [ 292.641339][T17976] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000040 [ 292.641355][T17976] R13: 00007f1af21beef0 R14: 00007f1af21beeb0 R15: 0000200000000940 [ 292.641377][T17976] [ 292.883640][T17983] lo speed is unknown, defaulting to 1000 [ 293.003987][T18002] FAULT_INJECTION: forcing a failure. [ 293.003987][T18002] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 293.017237][T18002] CPU: 0 UID: 0 PID: 18002 Comm: syz.1.4646 Not tainted syzkaller #0 PREEMPT(voluntary) [ 293.017317][T18002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 293.017333][T18002] Call Trace: [ 293.017342][T18002] [ 293.017350][T18002] __dump_stack+0x1d/0x30 [ 293.017373][T18002] dump_stack_lvl+0xe8/0x140 [ 293.017396][T18002] dump_stack+0x15/0x1b [ 293.017412][T18002] should_fail_ex+0x265/0x280 [ 293.017479][T18002] should_fail+0xb/0x20 [ 293.017505][T18002] should_fail_usercopy+0x1a/0x20 [ 293.017535][T18002] _copy_to_user+0x20/0xa0 [ 293.017615][T18002] simple_read_from_buffer+0xb5/0x130 [ 293.017638][T18002] proc_fail_nth_read+0x10e/0x150 [ 293.017762][T18002] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 293.017789][T18002] vfs_read+0x1a5/0x770 [ 293.017811][T18002] ? n_tty_ioctl_helper+0x91/0x210 [ 293.017861][T18002] ? __rcu_read_unlock+0x4f/0x70 [ 293.017889][T18002] ? __fget_files+0x184/0x1c0 [ 293.017922][T18002] ? ldsem_up_read+0x8a/0xd0 [ 293.017952][T18002] ksys_read+0xda/0x1a0 [ 293.017976][T18002] __x64_sys_read+0x40/0x50 [ 293.017999][T18002] x64_sys_call+0x27bc/0x2ff0 [ 293.018024][T18002] do_syscall_64+0xd2/0x200 [ 293.018101][T18002] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 293.018127][T18002] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 293.018191][T18002] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 293.018214][T18002] RIP: 0033:0x7fb9b8edd5bc [ 293.018232][T18002] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 293.018254][T18002] RSP: 002b:00007fb9b793f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 293.018280][T18002] RAX: ffffffffffffffda RBX: 00007fb9b9125fa0 RCX: 00007fb9b8edd5bc [ 293.018292][T18002] RDX: 000000000000000f RSI: 00007fb9b793f0a0 RDI: 0000000000000005 [ 293.018307][T18002] RBP: 00007fb9b793f090 R08: 0000000000000000 R09: 0000000000000000 [ 293.018321][T18002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.018332][T18002] R13: 00007fb9b9126038 R14: 00007fb9b9125fa0 R15: 00007fffa6af9c58 [ 293.018350][T18002] [ 293.481846][T18043] FAULT_INJECTION: forcing a failure. [ 293.481846][T18043] name failslab, interval 1, probability 0, space 0, times 0 [ 293.494611][T18043] CPU: 0 UID: 0 PID: 18043 Comm: syz.4.4665 Not tainted syzkaller #0 PREEMPT(voluntary) [ 293.494646][T18043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 293.494663][T18043] Call Trace: [ 293.494670][T18043] [ 293.494727][T18043] __dump_stack+0x1d/0x30 [ 293.494754][T18043] dump_stack_lvl+0xe8/0x140 [ 293.494779][T18043] dump_stack+0x15/0x1b [ 293.494795][T18043] should_fail_ex+0x265/0x280 [ 293.494895][T18043] ? allocate_cgrp_cset_links+0x7e/0x1f0 [ 293.494992][T18043] should_failslab+0x8c/0xb0 [ 293.495021][T18043] __kmalloc_cache_noprof+0x4c/0x320 [ 293.495060][T18043] allocate_cgrp_cset_links+0x7e/0x1f0 [ 293.495109][T18043] find_css_set+0x596/0xd20 [ 293.495228][T18043] ? __pfx_autoremove_wake_function+0x10/0x10 [ 293.495273][T18043] cgroup_migrate_prepare_dst+0x75/0x3f0 [ 293.495372][T18043] cgroup_attach_task+0x1bd/0x450 [ 293.495411][T18043] __cgroup1_procs_write+0x1c5/0x230 [ 293.495438][T18043] ? __pfx_cgroup1_procs_write+0x10/0x10 [ 293.495519][T18043] cgroup1_procs_write+0x2a/0x40 [ 293.495602][T18043] cgroup_file_write+0x194/0x350 [ 293.495635][T18043] ? __pfx_cgroup_file_write+0x10/0x10 [ 293.495659][T18043] kernfs_fop_write_iter+0x1e8/0x300 [ 293.495709][T18043] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 293.495772][T18043] vfs_write+0x527/0x960 [ 293.495806][T18043] ksys_write+0xda/0x1a0 [ 293.495830][T18043] __x64_sys_write+0x40/0x50 [ 293.495860][T18043] x64_sys_call+0x27fe/0x2ff0 [ 293.495911][T18043] do_syscall_64+0xd2/0x200 [ 293.495944][T18043] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 293.495975][T18043] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 293.496111][T18043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 293.496139][T18043] RIP: 0033:0x7f120ac4eba9 [ 293.496155][T18043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.496173][T18043] RSP: 002b:00007f12096b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 293.496191][T18043] RAX: ffffffffffffffda RBX: 00007f120ae95fa0 RCX: 00007f120ac4eba9 [ 293.496260][T18043] RDX: 0000000000000012 RSI: 00002000000000c0 RDI: 0000000000000004 [ 293.496276][T18043] RBP: 00007f12096b7090 R08: 0000000000000000 R09: 0000000000000000 [ 293.496292][T18043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.496307][T18043] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 293.496331][T18043] [ 294.060014][T18099] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4691'. [ 294.230887][T18130] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4704'. [ 294.373705][ T4372] usb 15-1: enqueue for inactive port 0 [ 294.396342][ T4372] usb 15-1: enqueue for inactive port 0 [ 294.466807][T18166] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4719'. [ 294.483466][ T4372] vhci_hcd: vhci_device speed not set [ 294.493174][T18164] lo speed is unknown, defaulting to 1000 [ 294.547543][T18173] FAULT_INJECTION: forcing a failure. [ 294.547543][T18173] name failslab, interval 1, probability 0, space 0, times 0 [ 294.560295][T18173] CPU: 0 UID: 0 PID: 18173 Comm: syz.3.4722 Not tainted syzkaller #0 PREEMPT(voluntary) [ 294.560322][T18173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 294.560338][T18173] Call Trace: [ 294.560345][T18173] [ 294.560354][T18173] __dump_stack+0x1d/0x30 [ 294.560401][T18173] dump_stack_lvl+0xe8/0x140 [ 294.560421][T18173] dump_stack+0x15/0x1b [ 294.560442][T18173] should_fail_ex+0x265/0x280 [ 294.560473][T18173] should_failslab+0x8c/0xb0 [ 294.560503][T18173] kmem_cache_alloc_noprof+0x50/0x310 [ 294.560615][T18173] ? copy_signal+0x53/0x340 [ 294.560645][T18173] copy_signal+0x53/0x340 [ 294.560728][T18173] copy_process+0xcde/0x2000 [ 294.560766][T18173] kernel_clone+0x16c/0x5c0 [ 294.560801][T18173] ? vfs_write+0x7e8/0x960 [ 294.560832][T18173] __x64_sys_clone+0xe6/0x120 [ 294.560913][T18173] x64_sys_call+0x119c/0x2ff0 [ 294.560935][T18173] do_syscall_64+0xd2/0x200 [ 294.560975][T18173] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 294.561006][T18173] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 294.561071][T18173] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 294.561102][T18173] RIP: 0033:0x7f1af375eba9 [ 294.561119][T18173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 294.561141][T18173] RSP: 002b:00007f1af21befe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 294.561242][T18173] RAX: ffffffffffffffda RBX: 00007f1af39a5fa0 RCX: 00007f1af375eba9 [ 294.561258][T18173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 294.561271][T18173] RBP: 00007f1af21bf090 R08: 0000000000000000 R09: 0000000000000000 [ 294.561284][T18173] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 294.561296][T18173] R13: 00007f1af39a6038 R14: 00007f1af39a5fa0 R15: 00007fff324e7288 [ 294.561314][T18173] [ 294.884632][T18177] (unnamed net_device) (uninitialized): option fail_over_mac: invalid value (15) [ 295.341304][T18241] FAULT_INJECTION: forcing a failure. [ 295.341304][T18241] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 295.354512][T18241] CPU: 1 UID: 0 PID: 18241 Comm: syz.7.4753 Not tainted syzkaller #0 PREEMPT(voluntary) [ 295.354540][T18241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 295.354553][T18241] Call Trace: [ 295.354560][T18241] [ 295.354570][T18241] __dump_stack+0x1d/0x30 [ 295.354597][T18241] dump_stack_lvl+0xe8/0x140 [ 295.354670][T18241] dump_stack+0x15/0x1b [ 295.354690][T18241] should_fail_ex+0x265/0x280 [ 295.354736][T18241] should_fail+0xb/0x20 [ 295.354775][T18241] should_fail_usercopy+0x1a/0x20 [ 295.354808][T18241] strncpy_from_user+0x25/0x230 [ 295.354871][T18241] ? kmem_cache_alloc_noprof+0x186/0x310 [ 295.354908][T18241] ? getname_flags+0x80/0x3b0 [ 295.354941][T18241] getname_flags+0xae/0x3b0 [ 295.355002][T18241] __se_sys_newstat+0x4b/0x280 [ 295.355088][T18241] ? fput+0x8f/0xc0 [ 295.355123][T18241] ? ksys_write+0x192/0x1a0 [ 295.355155][T18241] __x64_sys_newstat+0x31/0x40 [ 295.355193][T18241] x64_sys_call+0x73e/0x2ff0 [ 295.355221][T18241] do_syscall_64+0xd2/0x200 [ 295.355282][T18241] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 295.355314][T18241] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 295.355398][T18241] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 295.355420][T18241] RIP: 0033:0x7fa2a0c7eba9 [ 295.355435][T18241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.355458][T18241] RSP: 002b:00007fa29f6df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 295.355482][T18241] RAX: ffffffffffffffda RBX: 00007fa2a0ec5fa0 RCX: 00007fa2a0c7eba9 [ 295.355529][T18241] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 295.355545][T18241] RBP: 00007fa29f6df090 R08: 0000000000000000 R09: 0000000000000000 [ 295.355560][T18241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 295.355576][T18241] R13: 00007fa2a0ec6038 R14: 00007fa2a0ec5fa0 R15: 00007fff3fea4c78 [ 295.355600][T18241] [ 296.279924][T18302] netlink: 'syz.1.4779': attribute type 1 has an invalid length. [ 296.328042][T18302] 8021q: adding VLAN 0 to HW filter on device bond2 [ 296.394618][T18306] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 296.441912][T18306] bond2: (slave batadv1): making interface the new active one [ 296.488438][T18306] bond2: (slave batadv1): Enslaving as an active interface with an up link [ 296.629371][T18318] FAULT_INJECTION: forcing a failure. [ 296.629371][T18318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 296.642592][T18318] CPU: 0 UID: 0 PID: 18318 Comm: syz.4.4781 Not tainted syzkaller #0 PREEMPT(voluntary) [ 296.642659][T18318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 296.642672][T18318] Call Trace: [ 296.642760][T18318] [ 296.642770][T18318] __dump_stack+0x1d/0x30 [ 296.642797][T18318] dump_stack_lvl+0xe8/0x140 [ 296.642867][T18318] dump_stack+0x15/0x1b [ 296.642888][T18318] should_fail_ex+0x265/0x280 [ 296.642964][T18318] should_fail+0xb/0x20 [ 296.642991][T18318] should_fail_usercopy+0x1a/0x20 [ 296.643016][T18318] strncpy_from_user+0x25/0x230 [ 296.643113][T18318] path_setxattrat+0xeb/0x310 [ 296.643166][T18318] __x64_sys_fsetxattr+0x6b/0x80 [ 296.643199][T18318] x64_sys_call+0x1ced/0x2ff0 [ 296.643283][T18318] do_syscall_64+0xd2/0x200 [ 296.643326][T18318] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 296.643354][T18318] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 296.643383][T18318] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.643521][T18318] RIP: 0033:0x7f120ac4eba9 [ 296.643536][T18318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 296.643557][T18318] RSP: 002b:00007f12096b7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 296.643581][T18318] RAX: ffffffffffffffda RBX: 00007f120ae95fa0 RCX: 00007f120ac4eba9 [ 296.643597][T18318] RDX: 00002000000004c0 RSI: 0000200000000480 RDI: 0000000000000003 [ 296.643610][T18318] RBP: 00007f12096b7090 R08: 0000000000000000 R09: 0000000000000000 [ 296.643673][T18318] R10: 000000000000001a R11: 0000000000000246 R12: 0000000000000001 [ 296.643704][T18318] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 296.643728][T18318] [ 296.832690][ T29] kauditd_printk_skb: 1513 callbacks suppressed [ 296.832742][ T29] audit: type=1326 audit(296.852:22986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18317 comm="syz.4.4781" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f120ac45b67 code=0x7ffc0000 [ 296.942469][ T29] audit: type=1326 audit(296.852:22987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18317 comm="syz.4.4781" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f120abeada9 code=0x7ffc0000 [ 296.965469][ T29] audit: type=1326 audit(296.852:22988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18317 comm="syz.4.4781" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f120ac4eba9 code=0x7ffc0000 [ 296.988542][ T29] audit: type=1326 audit(296.852:22989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18317 comm="syz.4.4781" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f120ac45b67 code=0x7ffc0000 [ 297.011010][T18324] audit: audit_backlog=65 > audit_backlog_limit=64 [ 297.011614][ T29] audit: type=1326 audit(296.852:22990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18317 comm="syz.4.4781" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f120abeada9 code=0x7ffc0000 [ 297.018186][T18324] audit: audit_lost=18 audit_rate_limit=0 audit_backlog_limit=64 [ 297.041116][ T29] audit: type=1326 audit(296.852:22991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18317 comm="syz.4.4781" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f120ac4eba9 code=0x7ffc0000 [ 297.048995][T18324] audit: backlog limit exceeded [ 297.076880][ T29] audit: type=1326 audit(296.852:22992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18317 comm="syz.4.4781" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f120ac45b67 code=0x7ffc0000 [ 297.272821][T18338] netlink: 32 bytes leftover after parsing attributes in process `syz.3.4793'. [ 297.356376][T18353] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4799'. [ 297.405683][T18360] FAULT_INJECTION: forcing a failure. [ 297.405683][T18360] name failslab, interval 1, probability 0, space 0, times 0 [ 297.418430][T18360] CPU: 1 UID: 0 PID: 18360 Comm: syz.7.4803 Not tainted syzkaller #0 PREEMPT(voluntary) [ 297.418465][T18360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 297.418477][T18360] Call Trace: [ 297.418485][T18360] [ 297.418503][T18360] __dump_stack+0x1d/0x30 [ 297.418530][T18360] dump_stack_lvl+0xe8/0x140 [ 297.418554][T18360] dump_stack+0x15/0x1b [ 297.418576][T18360] should_fail_ex+0x265/0x280 [ 297.418600][T18360] should_failslab+0x8c/0xb0 [ 297.418627][T18360] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 297.418681][T18360] ? sidtab_sid2str_get+0xa0/0x130 [ 297.418711][T18360] kmemdup_noprof+0x2b/0x70 [ 297.418746][T18360] sidtab_sid2str_get+0xa0/0x130 [ 297.418830][T18360] security_sid_to_context_core+0x1eb/0x2e0 [ 297.418860][T18360] security_sid_to_context+0x27/0x40 [ 297.418886][T18360] selinux_lsmprop_to_secctx+0x67/0xf0 [ 297.418963][T18360] security_lsmprop_to_secctx+0x43/0x80 [ 297.419001][T18360] audit_log_task_context+0x77/0x190 [ 297.419036][T18360] audit_log_task+0xf4/0x250 [ 297.419075][T18360] audit_seccomp+0x61/0x100 [ 297.419167][T18360] ? __seccomp_filter+0x68c/0x10d0 [ 297.419195][T18360] __seccomp_filter+0x69d/0x10d0 [ 297.419217][T18360] ? prepend+0xec/0x140 [ 297.419283][T18360] ? should_fail_ex+0xdb/0x280 [ 297.419311][T18360] ? __se_sys_getcwd+0x253/0x300 [ 297.419342][T18360] ? kmem_cache_free+0xdf/0x300 [ 297.419381][T18360] __secure_computing+0x82/0x150 [ 297.419485][T18360] syscall_trace_enter+0xcf/0x1e0 [ 297.419531][T18360] do_syscall_64+0xac/0x200 [ 297.419572][T18360] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 297.419602][T18360] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 297.419681][T18360] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 297.419705][T18360] RIP: 0033:0x7fa2a0c7d5bc [ 297.419722][T18360] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 297.419744][T18360] RSP: 002b:00007fa29f6df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 297.419768][T18360] RAX: ffffffffffffffda RBX: 00007fa2a0ec5fa0 RCX: 00007fa2a0c7d5bc [ 297.419784][T18360] RDX: 000000000000000f RSI: 00007fa29f6df0a0 RDI: 0000000000000003 [ 297.419815][T18360] RBP: 00007fa29f6df090 R08: 0000000000000000 R09: 0000000000000000 [ 297.419830][T18360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 297.419842][T18360] R13: 00007fa2a0ec6038 R14: 00007fa2a0ec5fa0 R15: 00007fff3fea4c78 [ 297.419860][T18360] [ 297.694689][T18360] lo speed is unknown, defaulting to 1000 [ 297.789569][T18383] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(6) [ 297.796147][T18383] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 297.803786][T18383] vhci_hcd vhci_hcd.0: Device attached [ 297.813118][T18383] vhci_hcd vhci_hcd.0: pdev(7) rhport(1) sockfd(8) [ 297.819682][T18383] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 297.827213][T18383] vhci_hcd vhci_hcd.0: Device attached [ 297.827781][T18367] netlink: 'syz.3.4807': attribute type 21 has an invalid length. [ 297.850356][T18383] vhci_hcd vhci_hcd.0: pdev(7) rhport(2) sockfd(10) [ 297.857010][T18383] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 297.864749][T18383] vhci_hcd vhci_hcd.0: Device attached [ 297.872300][T18383] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 297.880961][T18383] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 297.889887][T18383] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 297.899114][T18387] vhci_hcd: connection closed [ 297.899372][ T51] vhci_hcd: stop threads [ 297.901475][T18392] vhci_hcd: connection closed [ 297.904133][ T51] vhci_hcd: release socket [ 297.904146][ T51] vhci_hcd: disconnect device [ 297.905180][T18385] vhci_hcd: connection closed [ 297.919873][T12335] vhci_hcd: stop threads [ 297.931680][T12335] vhci_hcd: release socket [ 297.936115][T12335] vhci_hcd: disconnect device [ 297.945769][T12335] vhci_hcd: stop threads [ 297.950183][T12335] vhci_hcd: release socket [ 297.954746][T12335] vhci_hcd: disconnect device [ 298.001687][ T3467] vhci_hcd: vhci_device speed not set [ 298.588417][T18470] netlink: 'syz.7.4848': attribute type 10 has an invalid length. [ 298.606151][T18470] netlink: 'syz.7.4848': attribute type 10 has an invalid length. [ 298.631741][T18470] $Hÿ: (slave dummy0): Enslaving as an active interface with an up link [ 298.764684][T18493] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4859'. [ 298.785828][T18495] FAULT_INJECTION: forcing a failure. [ 298.785828][T18495] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 298.799132][T18495] CPU: 1 UID: 0 PID: 18495 Comm: syz.4.4860 Not tainted syzkaller #0 PREEMPT(voluntary) [ 298.799167][T18495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 298.799184][T18495] Call Trace: [ 298.799193][T18495] [ 298.799203][T18495] __dump_stack+0x1d/0x30 [ 298.799225][T18495] dump_stack_lvl+0xe8/0x140 [ 298.799244][T18495] dump_stack+0x15/0x1b [ 298.799304][T18495] should_fail_ex+0x265/0x280 [ 298.799328][T18495] should_fail_alloc_page+0xf2/0x100 [ 298.799360][T18495] alloc_pages_bulk_noprof+0xef/0x540 [ 298.799403][T18495] copy_splice_read+0xf3/0x660 [ 298.799611][T18495] ? __pfx_copy_splice_read+0x10/0x10 [ 298.799635][T18495] splice_direct_to_actor+0x26c/0x680 [ 298.799656][T18495] ? __pfx_direct_splice_actor+0x10/0x10 [ 298.799681][T18495] do_splice_direct+0xda/0x150 [ 298.799706][T18495] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 298.799772][T18495] do_sendfile+0x380/0x650 [ 298.799812][T18495] __x64_sys_sendfile64+0x105/0x150 [ 298.799903][T18495] x64_sys_call+0x2bb0/0x2ff0 [ 298.799925][T18495] do_syscall_64+0xd2/0x200 [ 298.800059][T18495] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 298.800193][T18495] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 298.800225][T18495] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 298.800252][T18495] RIP: 0033:0x7f120ac4eba9 [ 298.800271][T18495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.800348][T18495] RSP: 002b:00007f12096b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 298.800367][T18495] RAX: ffffffffffffffda RBX: 00007f120ae95fa0 RCX: 00007f120ac4eba9 [ 298.800379][T18495] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 298.800391][T18495] RBP: 00007f12096b7090 R08: 0000000000000000 R09: 0000000000000000 [ 298.800402][T18495] R10: 000000007ffff088 R11: 0000000000000246 R12: 0000000000000001 [ 298.800415][T18495] R13: 00007f120ae96038 R14: 00007f120ae95fa0 R15: 00007ffd92255368 [ 298.800434][T18495] [ 299.034461][T18507] netlink: 'syz.4.4865': attribute type 6 has an invalid length. [ 299.129272][T18523] netlink: 4216 bytes leftover after parsing attributes in process `syz.3.4872'. [ 299.146344][T18521] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4873'. [ 299.331300][T18537] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4881'. [ 299.625524][T18554] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4886'. [ 300.417887][T18614] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4914'. [ 300.424364][T18615] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.4910'. [ 300.447901][T18605] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.4910'. [ 300.567400][T18637] FAULT_INJECTION: forcing a failure. [ 300.567400][T18637] name failslab, interval 1, probability 0, space 0, times 0 [ 300.580205][T18637] CPU: 0 UID: 0 PID: 18637 Comm: syz.2.4924 Not tainted syzkaller #0 PREEMPT(voluntary) [ 300.580301][T18637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 300.580318][T18637] Call Trace: [ 300.580326][T18637] [ 300.580336][T18637] __dump_stack+0x1d/0x30 [ 300.580360][T18637] dump_stack_lvl+0xe8/0x140 [ 300.580445][T18637] dump_stack+0x15/0x1b [ 300.580465][T18637] should_fail_ex+0x265/0x280 [ 300.580496][T18637] should_failslab+0x8c/0xb0 [ 300.580576][T18637] kmem_cache_alloc_node_noprof+0x57/0x320 [ 300.580616][T18637] ? __alloc_skb+0x101/0x320 [ 300.580646][T18637] __alloc_skb+0x101/0x320 [ 300.580737][T18637] inet_netconf_notify_devconf+0x173/0x230 [ 300.580762][T18637] inetdev_event+0x743/0xc10 [ 300.580847][T18637] ? __pfx_ib_netdevice_event+0x10/0x10 [ 300.580885][T18637] ? ib_netdevice_event+0x186/0x5f0 [ 300.580919][T18637] ? __pfx_arp_netdev_event+0x10/0x10 [ 300.581010][T18637] ? __pfx_inetdev_event+0x10/0x10 [ 300.581033][T18637] raw_notifier_call_chain+0x6f/0x1b0 [ 300.581059][T18637] ? call_netdevice_notifiers_info+0x9c/0x100 [ 300.581100][T18637] call_netdevice_notifiers_info+0xae/0x100 [ 300.581282][T18637] unregister_netdevice_many_notify+0xda9/0x15d0 [ 300.581319][T18637] unregister_netdevice_queue+0x1f5/0x220 [ 300.581351][T18637] unregister_netdev+0xb3/0xe0 [ 300.581461][T18637] slip_close+0xe4/0x100 [ 300.581499][T18637] ? __pfx_slip_hangup+0x10/0x10 [ 300.581524][T18637] slip_hangup+0x15/0x20 [ 300.581544][T18637] tty_ldisc_hangup+0x132/0x370 [ 300.581564][T18637] __tty_hangup+0x3c2/0x540 [ 300.581647][T18637] tty_ioctl+0x601/0xb80 [ 300.581667][T18637] ? __pfx_tty_ioctl+0x10/0x10 [ 300.581687][T18637] __se_sys_ioctl+0xce/0x140 [ 300.581755][T18637] __x64_sys_ioctl+0x43/0x50 [ 300.581775][T18637] x64_sys_call+0x1816/0x2ff0 [ 300.581827][T18637] do_syscall_64+0xd2/0x200 [ 300.581864][T18637] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 300.581892][T18637] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 300.582001][T18637] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 300.582026][T18637] RIP: 0033:0x7f9f00f9eba9 [ 300.582044][T18637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 300.582066][T18637] RSP: 002b:00007f9effa07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 300.582089][T18637] RAX: ffffffffffffffda RBX: 00007f9f011e5fa0 RCX: 00007f9f00f9eba9 [ 300.582112][T18637] RDX: 0000000000000000 RSI: 0000000000005437 RDI: 0000000000000003 [ 300.582126][T18637] RBP: 00007f9effa07090 R08: 0000000000000000 R09: 0000000000000000 [ 300.582141][T18637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.582156][T18637] R13: 00007f9f011e6038 R14: 00007f9f011e5fa0 R15: 00007fffce18fe58 [ 300.582247][T18637] [ 300.934776][T18668] FAULT_INJECTION: forcing a failure. [ 300.934776][T18668] name failslab, interval 1, probability 0, space 0, times 0 [ 300.947596][T18668] CPU: 1 UID: 0 PID: 18668 Comm: syz.1.4937 Not tainted syzkaller #0 PREEMPT(voluntary) [ 300.947633][T18668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 300.947648][T18668] Call Trace: [ 300.947655][T18668] [ 300.947663][T18668] __dump_stack+0x1d/0x30 [ 300.947727][T18668] dump_stack_lvl+0xe8/0x140 [ 300.947745][T18668] dump_stack+0x15/0x1b [ 300.947803][T18668] should_fail_ex+0x265/0x280 [ 300.947833][T18668] should_failslab+0x8c/0xb0 [ 300.947902][T18668] kmem_cache_alloc_node_noprof+0x57/0x320 [ 300.947940][T18668] ? __alloc_skb+0x101/0x320 [ 300.947965][T18668] __alloc_skb+0x101/0x320 [ 300.948053][T18668] ? audit_log_start+0x365/0x6c0 [ 300.948098][T18668] audit_log_start+0x380/0x6c0 [ 300.948184][T18668] audit_seccomp+0x48/0x100 [ 300.948209][T18668] ? __seccomp_filter+0x68c/0x10d0 [ 300.948234][T18668] __seccomp_filter+0x69d/0x10d0 [ 300.948259][T18668] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 300.948369][T18668] ? vfs_write+0x7e8/0x960 [ 300.948390][T18668] ? __rcu_read_unlock+0x4f/0x70 [ 300.948411][T18668] ? __fget_files+0x184/0x1c0 [ 300.948445][T18668] __secure_computing+0x82/0x150 [ 300.948487][T18668] syscall_trace_enter+0xcf/0x1e0 [ 300.948514][T18668] do_syscall_64+0xac/0x200 [ 300.948687][T18668] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 300.948718][T18668] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 300.948752][T18668] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 300.948774][T18668] RIP: 0033:0x7fb9b8edeba9 [ 300.948789][T18668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 300.948864][T18668] RSP: 002b:00007fb9b793f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 300.948888][T18668] RAX: ffffffffffffffda RBX: 00007fb9b9125fa0 RCX: 00007fb9b8edeba9 [ 300.948958][T18668] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 300.948973][T18668] RBP: 00007fb9b793f090 R08: 0000000000000000 R09: 0000000000000000 [ 300.948989][T18668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.949004][T18668] R13: 00007fb9b9126038 R14: 00007fb9b9125fa0 R15: 00007fffa6af9c58 [ 300.949027][T18668] [ 300.957878][T18665] Process accounting resumed [ 301.012275][T18670] lo speed is unknown, defaulting to 1000 [ 301.812607][T18719] netlink: 'syz.4.4957': attribute type 12 has an invalid length. [ 301.840123][ T29] kauditd_printk_skb: 2061 callbacks suppressed [ 301.840142][ T29] audit: type=1326 audit(301.865:25049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18681 comm="syz.7.4943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa2a0c75b67 code=0x7ffc0000 [ 301.872158][ T29] audit: type=1326 audit(301.895:25050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18681 comm="syz.7.4943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa2a0c1ada9 code=0x7ffc0000 [ 301.895131][ T29] audit: type=1326 audit(301.895:25051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18681 comm="syz.7.4943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa2a0c75b67 code=0x7ffc0000 [ 301.918158][ T29] audit: type=1326 audit(301.895:25052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18681 comm="syz.7.4943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa2a0c1ada9 code=0x7ffc0000 [ 301.941147][ T29] audit: type=1326 audit(301.895:25053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18681 comm="syz.7.4943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7fa2a0c7eba9 code=0x7ffc0000 [ 301.964975][ T29] audit: type=1400 audit(301.955:25054): avc: denied { prog_load } for pid=18720 comm="syz.2.4961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 301.983643][ T29] audit: type=1400 audit(301.955:25055): avc: denied { prog_load } for pid=18720 comm="syz.2.4961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 302.002286][ T29] audit: type=1400 audit(301.965:25056): avc: denied { read write } for pid=18720 comm="syz.2.4961" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 302.025951][ T29] audit: type=1400 audit(301.965:25057): avc: denied { prog_load } for pid=18720 comm="syz.2.4961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 302.044660][ T29] audit: type=1326 audit(301.985:25058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18681 comm="syz.7.4943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa2a0c75b67 code=0x7ffc0000 [ 302.121513][T18727] lo speed is unknown, defaulting to 1000 [ 302.355665][T18747] bridge0: port 3(team0) entered blocking state [ 302.362118][T18747] FAULT_INJECTION: forcing a failure. [ 302.362118][T18747] name failslab, interval 1, probability 0, space 0, times 0 [ 302.374947][T18747] CPU: 1 UID: 0 PID: 18747 Comm: syz.3.4973 Not tainted syzkaller #0 PREEMPT(voluntary) [ 302.374977][T18747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 302.375068][T18747] Call Trace: [ 302.375075][T18747] [ 302.375083][T18747] __dump_stack+0x1d/0x30 [ 302.375105][T18747] dump_stack_lvl+0xe8/0x140 [ 302.375181][T18747] dump_stack+0x15/0x1b [ 302.375202][T18747] should_fail_ex+0x265/0x280 [ 302.375234][T18747] should_failslab+0x8c/0xb0 [ 302.375305][T18747] __kmalloc_noprof+0xa5/0x3e0 [ 302.375342][T18747] ? switchdev_deferred_enqueue+0x2d/0x1c0 [ 302.375380][T18747] ? __pfx_switchdev_port_attr_set_deferred+0x10/0x10 [ 302.375409][T18747] switchdev_deferred_enqueue+0x2d/0x1c0 [ 302.375482][T18747] switchdev_port_attr_set+0x6c/0xe0 [ 302.375609][T18747] br_set_state+0x205/0x390 [ 302.375675][T18747] new_nbp+0x235/0x300 [ 302.375708][T18747] br_add_if+0x1e7/0xa60 [ 302.375741][T18747] ? security_capable+0x83/0x90 [ 302.375775][T18747] br_ioctl_stub+0x521/0x860 [ 302.375837][T18747] ? ioctl_has_perm+0x257/0x2a0 [ 302.375869][T18747] ? do_vfs_ioctl+0x866/0xe10 [ 302.375890][T18747] ? __pfx_br_ioctl_stub+0x10/0x10 [ 302.375993][T18747] sock_ioctl+0x399/0x610 [ 302.376026][T18747] ? __pfx_sock_ioctl+0x10/0x10 [ 302.376063][T18747] __se_sys_ioctl+0xce/0x140 [ 302.376126][T18747] __x64_sys_ioctl+0x43/0x50 [ 302.376145][T18747] x64_sys_call+0x1816/0x2ff0 [ 302.376179][T18747] do_syscall_64+0xd2/0x200 [ 302.376220][T18747] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 302.376292][T18747] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 302.376328][T18747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 302.376350][T18747] RIP: 0033:0x7f1af375eba9 [ 302.376388][T18747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 302.376478][T18747] RSP: 002b:00007f1af21bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.376501][T18747] RAX: ffffffffffffffda RBX: 00007f1af39a5fa0 RCX: 00007f1af375eba9 [ 302.376516][T18747] RDX: 0000200000000080 RSI: 00000000000089a2 RDI: 0000000000000007 [ 302.376564][T18747] RBP: 00007f1af21bf090 R08: 0000000000000000 R09: 0000000000000000 [ 302.376639][T18747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.376654][T18747] R13: 00007f1af39a6038 R14: 00007f1af39a5fa0 R15: 00007fff324e7288 [ 302.376678][T18747] [ 302.376702][T18747] bridge0: error setting offload STP state on port 3(team0) [ 302.623333][T18747] team0: entered allmulticast mode [ 302.628523][T18747] team_slave_0: entered allmulticast mode [ 302.634317][T18747] team_slave_1: entered allmulticast mode [ 302.641118][T18747] team0: entered promiscuous mode [ 302.646198][T18747] team_slave_0: entered promiscuous mode [ 302.652048][T18747] team_slave_1: entered promiscuous mode [ 303.023742][T14023] ================================================================== [ 303.031960][T14023] BUG: KCSAN: data-race in shmem_getattr / shmem_recalc_inode [ 303.039467][T14023] [ 303.041813][T14023] read-write to 0xffff88811c361180 of 8 bytes by task 18735 on cpu 1: [ 303.049975][T14023] shmem_recalc_inode+0x3b/0x200 [ 303.054968][T14023] shmem_get_folio_gfp+0x7a3/0xd60 [ 303.060133][T14023] shmem_write_begin+0xa8/0x190 [ 303.065021][T14023] generic_perform_write+0x184/0x490 [ 303.070335][T14023] shmem_file_write_iter+0xc5/0xf0 [ 303.075490][T14023] __kernel_write_iter+0x2d3/0x540 [ 303.080735][T14023] dump_user_range+0x61e/0x8f0 [ 303.085528][T14023] elf_core_dump+0x1e00/0x1f90 [ 303.090348][T14023] coredump_write+0xb0a/0xe30 [ 303.095184][T14023] vfs_coredump+0x142f/0x20c0 [ 303.099903][T14023] get_signal+0xd85/0xf70 [ 303.104303][T14023] arch_do_signal_or_restart+0x96/0x480 [ 303.109879][T14023] irqentry_exit_to_user_mode+0x5e/0xa0 [ 303.115475][T14023] irqentry_exit+0x12/0x50 [ 303.119932][T14023] asm_exc_page_fault+0x26/0x30 [ 303.124896][T14023] [ 303.127243][T14023] read to 0xffff88811c361180 of 8 bytes by task 14023 on cpu 0: [ 303.135332][T14023] shmem_getattr+0x41/0x200 [ 303.139872][T14023] vfs_getattr_nosec+0x146/0x1e0 [ 303.144857][T14023] vfs_statx+0x113/0x390 [ 303.149138][T14023] vfs_fstatat+0x115/0x170 [ 303.153591][T14023] __se_sys_newfstatat+0x55/0x260 [ 303.158684][T14023] __x64_sys_newfstatat+0x55/0x70 [ 303.163752][T14023] x64_sys_call+0x135a/0x2ff0 [ 303.168456][T14023] do_syscall_64+0xd2/0x200 [ 303.172997][T14023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.178900][T14023] [ 303.181228][T14023] value changed: 0x0000000000002c39 -> 0x0000000000002c3a [ 303.188335][T14023] [ 303.190672][T14023] Reported by Kernel Concurrency Sanitizer on: [ 303.196828][T14023] CPU: 0 UID: 0 PID: 14023 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 303.206819][T14023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 303.216895][T14023] ==================================================================