last executing test programs: 1m49.843835096s ago: executing program 32 (id=28): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000ec0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000e80)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0x8, {0x0, r1, 0x2}}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\b'], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = socket$xdp(0x2c, 0x3, 0x0) unshare(0x22020600) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, 0x0, 0x0) r5 = socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000004}, 0x100100, 0x5dd8, 0xa, 0x0, 0x0, 0x8, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r6, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r6, 0x84, 0x17, &(0x7f0000000f80)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000900f50afcecbf7e2030e1"], 0x11) sendto$inet6(r6, &(0x7f0000000100)="b8", 0xffe0, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000d00)=@newqdisc={0x2c, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r8, {0x0, 0xfffb}, {0xffff, 0xffff}, {0xfff3, 0xffff}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x401}]}, 0x2c}}, 0x44080) 1m40.523986331s ago: executing program 33 (id=197): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000340), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) r3 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r3, &(0x7f0000000600)="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", 0xfd1, 0x6, 0x0) mq_timedreceive(r3, &(0x7f0000004600)=""/102381, 0xfffffceb, 0x0, 0x0) 1m39.872651679s ago: executing program 4 (id=209): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}}, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e24, @empty}, 0x10) sendmmsg(r1, &(0x7f0000003a80)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e24, @loopback}, 0x80, &(0x7f0000000400)=[{0x0}], 0x1}}], 0x1, 0x2c000011) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'team0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000f00)=ANY=[@ANYRESDEC, @ANYBLOB="e154e7155b283e7ad7ba09e3390e27c21a7a1e89845203f898c16f2aa859b7bc37047ae412d539a5d87723540e0ecb2cb64c30ac236fcdc1c14bc555f9239641c915e9417bcb4338eb51f45c1b572f3c1c7927b15ee2ad725422ec6b9c0ca757aa1d57da79c2bb", @ANYRESHEX, @ANYRES16=r0, @ANYRES32=r2, @ANYRES64=0x0, @ANYRESOCT, @ANYRES64, @ANYRES64], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x2030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x100000, 0xfff, 0x0, 0x6, 0x3, 0xfffffffc, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0x3ab}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_ext={0x1c, 0x1b, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000006f7ff01000000000700000018110000a0400a877788baa3aa7091369e4ff4e70ad16562fca1621b73d0d20f93459d39ba5a595718a36cd340ab03a993a94077b764ba7a060df38151c54909e094957cf00ef83fbf", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001868000010000000000000000e000000850000005b0000008aa302000400000085100000ffffffff186b0000080000000000000001000100bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41100, 0x40, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0xe, 0x401, 0x8}, 0x10, 0x222bd, 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[0xffffffffffffffff], &(0x7f0000000d00)=[{0x1, 0x2, 0xa, 0x9}, {0x5, 0x3, 0x3, 0xb}, {0x3, 0x5, 0xc, 0xb}, {0x4, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x5, 0x6}, {0x2, 0x4, 0xc, 0x8}, {0x2, 0x3, 0xa, 0x7}, {0x5, 0x4, 0xc, 0x4}, {0x1, 0x1, 0xd, 0xb}, {0x4, 0x4, 0x4, 0x6}], 0x10, 0xff, @void, @value}, 0x94) 1m39.872413209s ago: executing program 34 (id=209): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}}, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e24, @empty}, 0x10) sendmmsg(r1, &(0x7f0000003a80)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e24, @loopback}, 0x80, &(0x7f0000000400)=[{0x0}], 0x1}}], 0x1, 0x2c000011) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'team0\x00', 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000f00)=ANY=[@ANYRESDEC, @ANYBLOB="e154e7155b283e7ad7ba09e3390e27c21a7a1e89845203f898c16f2aa859b7bc37047ae412d539a5d87723540e0ecb2cb64c30ac236fcdc1c14bc555f9239641c915e9417bcb4338eb51f45c1b572f3c1c7927b15ee2ad725422ec6b9c0ca757aa1d57da79c2bb", @ANYRESHEX, @ANYRES16=r0, @ANYRES32=r2, @ANYRES64=0x0, @ANYRESOCT, @ANYRES64, @ANYRES64], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x2030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x100000, 0xfff, 0x0, 0x6, 0x3, 0xfffffffc, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0x3ab}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_ext={0x1c, 0x1b, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000006f7ff01000000000700000018110000a0400a877788baa3aa7091369e4ff4e70ad16562fca1621b73d0d20f93459d39ba5a595718a36cd340ab03a993a94077b764ba7a060df38151c54909e094957cf00ef83fbf", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001868000010000000000000000e000000850000005b0000008aa302000400000085100000ffffffff186b0000080000000000000001000100bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41100, 0x40, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0xe, 0x401, 0x8}, 0x10, 0x222bd, 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[0xffffffffffffffff], &(0x7f0000000d00)=[{0x1, 0x2, 0xa, 0x9}, {0x5, 0x3, 0x3, 0xb}, {0x3, 0x5, 0xc, 0xb}, {0x4, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x5, 0x6}, {0x2, 0x4, 0xc, 0x8}, {0x2, 0x3, 0xa, 0x7}, {0x5, 0x4, 0xc, 0x4}, {0x1, 0x1, 0xd, 0xb}, {0x4, 0x4, 0x4, 0x6}], 0x10, 0xff, @void, @value}, 0x94) 1m34.69653068s ago: executing program 35 (id=306): r0 = epoll_create1(0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) ppoll(&(0x7f0000000500)=[{r1}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000400)={0xa}) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x80000000, 0x0, 0x0) 1m33.360058125s ago: executing program 36 (id=318): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r1, 0x0, 0x100000}, 0x18) syz_open_procfs(0xffffffffffffffff, &(0x7f0000006100)='cmdline\x00') bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="190000000400000008000000ff"], 0x50) setxattr$incfs_metadata(0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x2}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f0000000540)='P', &(0x7f0000000000)=""/7, 0x2}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r3}, &(0x7f0000000600), &(0x7f0000000640)=r5}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5}, 0x50) 1m33.334659545s ago: executing program 37 (id=319): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/26, 0x1a}}, {{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/47, 0x2f}, {&(0x7f0000000100)=""/224, 0xe0}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/124, 0x7c}, {&(0x7f0000001280)=""/60, 0x3c}], 0x5}}, {{&(0x7f0000001380)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000001840)=[{&(0x7f0000001400)=""/149, 0x95}, {&(0x7f0000001540)=""/188, 0xbc}, {&(0x7f0000001600)=""/57, 0x39}, {&(0x7f0000001640)=""/135, 0x87}, {&(0x7f00000014c0)=""/101, 0x65}, {&(0x7f0000001780)=""/171, 0xab}], 0x6, &(0x7f00000018c0)=""/176, 0xb0}}], 0x3, 0x0, 0x0) 1m30.795301696s ago: executing program 8 (id=334): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000340)=0x1, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r4, 0x4c80, 0x7000000) 1m30.767871215s ago: executing program 8 (id=335): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid}]}}) 1m30.717714875s ago: executing program 8 (id=336): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='timerslack_ns\x00') preadv(r0, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000040)=""/161, 0xa1}], 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/resume_offset', 0x102, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) sendfile(r1, r1, 0x0, 0x4) 1m30.690877965s ago: executing program 8 (id=337): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x161090, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) 1m30.675574045s ago: executing program 8 (id=338): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x101c088, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x6, 0x2c3, &(0x7f0000000900)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='K\x00\x00\x00q'], 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x21, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000200000000000b70800000000007b9a000700"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='erofs_fill_inode\x00', r1, 0x0, 0x6}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f00000008c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80000006}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@GTPA_VERSION={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x41) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r4}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="2c0000001400010000000000000000000a000000", @ANYRES32=r5, @ANYBLOB="140001"], 0x2c}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x9e46, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1m28.788938068s ago: executing program 8 (id=359): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000200), 0x4) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r2, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10, 0x0}}], 0x1, 0x20004000) 1m28.753029658s ago: executing program 38 (id=359): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000200), 0x4) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r2, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10, 0x0}}], 0x1, 0x20004000) 1m27.801180904s ago: executing program 6 (id=375): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) capset(0x0, &(0x7f0000000040)={0x200000, 0x200000}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001200)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@mcast1, 0x4e23, 0x8000, 0x4e1d, 0x3, 0x2, 0x20, 0x20, 0x33}, {0x80000000, 0x6, 0x8, 0x3, 0xc, 0x81, 0xff, 0x408}, {0x7, 0x4d, 0x3, 0x4}, 0x85, 0x0, 0x1, 0x0, 0x3}, {{@in=@local, 0x4d6, 0x3c}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0x0, 0x5, 0x8, 0x1000000}}, 0xe8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001280), 0x6) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xb, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000fdff000000000000000000c1f2f298002020702500000000002120207b1af8ff00000000bfa100000007010000f8ffffdfb702000008"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) syz_io_uring_setup(0x55fb, &(0x7f0000000180)={0x0, 0xdc9, 0xc6, 0x2, 0xe6}, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000000000004) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010700000000000000006700000008000100480000000800c300000000000800c4"], 0x2c}}, 0x8000) sendmsg$NL80211_CMD_SET_MAC_ACL(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000980)={&(0x7f0000000b40)={0x140, r3, 0x200, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x1c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa}]}, @NL80211_ATTR_MAC_ADDRS={0x28, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x4c, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x6, @device_b}, {0xa}, {0xa}, {0xa}, {0xa}]}, @NL80211_ATTR_MAC_ADDRS={0x28, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_ATTR_MAC_ADDRS={0x34, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x28, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x41}, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100ffffffff0000000017"], 0x5c}}, 0x4000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_DREG={0x8}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0xbb}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) 1m27.528564913s ago: executing program 6 (id=381): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8000003d) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000bc0)={0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x448}}, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000240)={r4, 0x1, r3}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000001040)={r4, 0x3, r0, 0xa, 0x80000}) dup(r0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000dc0)={0x68, 0x0, 0x1, 0x500, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x4}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0xc, 0x12, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @private}]}]}, 0x68}}, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x1c268b4fc7a4b26f) r8 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x127081) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1m26.54514704s ago: executing program 6 (id=396): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/19, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03000000000000140012800b00010067656e65766500000400028008000a00", @ANYRES32=r5], 0x3c}}, 0x0) 1m26.51030322s ago: executing program 6 (id=397): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x161090, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) open_tree(r0, &(0x7f0000000640)='\x00', 0x89901) 1m26.47707925s ago: executing program 6 (id=398): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="a8acb3e61604", @ANYRES32=0x1, @ANYBLOB="133c030000c4c8254f598dcf8f000000000000482ecbde00", @ANYRESDEC, @ANYBLOB="9cd75ee49d2ca650bc13e01bbb7b5100f58212c51a7eea4524a4f041668a3c7f5569904976756aa13e47e9aab22bfe4d3245264b686974b95b2de09766da22f3215c567767f66d1df10bff64bff5d8d99b63054c7dac595d106c09e199396875192c377a5dbe68deda3dcfe853f55259c94b7de478160523275b02368d5e7ae08e3c7b6aabf9eb094c89e81d9e8344d662c047c4163b4c0d823f22f86dbfb509b446ace9ff103e7a0268056dea2b0876b6c544c8f6cb8fa2d7e0f231c10b2313f5abd5d1b00604477b0f3d7522a580e5500b3d0d2fc55277592638e9315b78cdf7319dd8e7da565ab2eb", @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}}, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e24, @empty}, 0x10) sendmmsg(r4, &(0x7f0000003a80)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e24, @loopback}, 0x80, &(0x7f0000000400)=[{0x0}], 0x1}}], 0x1, 0x2c000011) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000f00)=ANY=[@ANYRESDEC, @ANYBLOB="e154e7155b283e7ad7ba09e3390e27c21a7a1e89845203f898c16f2aa859b7bc37047ae412d539a5d87723540e0ecb2cb64c30ac236fcdc1c14bc555f9239641c915e9417bcb4338eb51f45c1b572f3c1c7927b15ee2ad725422ec6b9c0ca757aa1d57da79c2bb", @ANYRESHEX, @ANYRES16=r0, @ANYRES32, @ANYRES64=0x0, @ANYRESOCT=r3, @ANYRES64=r1, @ANYRES64], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x2030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x100000, 0xfff, 0x0, 0x6, 0x3, 0xfffffffc, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81000) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7, 0x0, 0x3ab}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_ext={0x1c, 0x1b, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000006f7ff01000000000700000018110000a0400a877788baa3aa7091369e4ff4e70ad16562fca1621b73d0d20f93459d39ba5a595718a36cd340ab03a993a94077b764ba7a060df38151c54909e094957cf00ef83fbf", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001868000010000000000000000e000000850000005b0000008aa302000400000085100000ffffffff186b0000080000000000000001000100bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0xe, 0x401, 0x8}, 0x10, 0x222bd, 0xffffffffffffffff, 0xa, &(0x7f0000000980)=[0xffffffffffffffff], &(0x7f0000000d00)=[{0x1, 0x2, 0xa, 0x9}, {0x5, 0x3, 0x3, 0xb}, {0x3, 0x5, 0xc, 0xb}, {0x4, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x5, 0x6}, {0x2, 0x4, 0xc, 0x8}, {0x2, 0x3, 0xa, 0x7}, {0x5, 0x4, 0xc, 0x4}, {0x1, 0x1, 0xd, 0xb}, {0x4, 0x4, 0x4, 0x6}], 0x10, 0xff, @void, @value}, 0x94) 1m25.648481666s ago: executing program 6 (id=406): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/19, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03000000000000140012800b00010067656e65766500000400028008000a00", @ANYRES32=r5], 0x3c}}, 0x0) 1m25.611734066s ago: executing program 39 (id=406): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/19, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03000000000000140012800b00010067656e65766500000400028008000a00", @ANYRES32=r5], 0x3c}}, 0x0) 1m25.410426475s ago: executing program 0 (id=411): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) getrlimit(0x2, &(0x7f0000000440)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl_fd$Q_GETINFO(r0, 0xffffffff80000500, r1, &(0x7f0000000280)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="05d7e4a9b3f323d2be1b39c57ca80000000100000008000000080000000000000037d5f83b5e76651a39", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000397124c5d4a3f56b283959d02d76ff71e232e4fb8da9582edda495a4d7e6550f1730b046974e3f55a40e80d99149fd875671bf09b851d389333804eaaed378cad4dc2c3e731e4e483591885a03eb1585a55e66ce2882cc5146977ac459f4e3af80af98ecf5c360e756df4bdae5ce3388f8587901", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000140)="be38", 0xffe7}], 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaac14140000000b001400000000000000000000000700000007038b0100000000"], 0x38}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) r6 = signalfd(0xffffffffffffffff, &(0x7f0000000500)={[0x5]}, 0x8) name_to_handle_at(r6, &(0x7f0000000380)='\x00', 0x0, 0x0, 0x1200) 1m25.358477885s ago: executing program 0 (id=413): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) capset(0x0, &(0x7f0000000040)={0x200000, 0x200000}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001200)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@mcast1, 0x4e23, 0x8000, 0x4e1d, 0x3, 0x2, 0x20, 0x20, 0x33}, {0x80000000, 0x6, 0x8, 0x3, 0xc, 0x81, 0xff, 0x408}, {0x7, 0x4d, 0x3, 0x4}, 0x85, 0x0, 0x1, 0x0, 0x3}, {{@in=@local, 0x4d6, 0x3c}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0x0, 0x5, 0x8, 0x1000000}}, 0xe8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001280), 0x6) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xb, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000fdff000000000000000000c1f2f298002020702500000000002120207b1af8ff00000000bfa100000007010000f8ffffdfb702000008"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) syz_io_uring_setup(0x55fb, &(0x7f0000000180)={0x0, 0xdc9, 0xc6, 0x2, 0xe6}, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000000000004) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010700000000000000006700000008000100480000000800c300000000000800c4"], 0x2c}}, 0x8000) sendmsg$NL80211_CMD_SET_MAC_ACL(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000980)={&(0x7f0000000b40)={0x140, r3, 0x200, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x1c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa}]}, @NL80211_ATTR_MAC_ADDRS={0x28, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x4c, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x6, @device_b}, {0xa}, {0xa}, {0xa}, {0xa}]}, @NL80211_ATTR_MAC_ADDRS={0x28, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_ATTR_MAC_ADDRS={0x34, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x28, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @broadcast}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x41}, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100ffffffff0000000017"], 0x5c}}, 0x4000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_DREG={0x8}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0xbb}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) 1m25.281477175s ago: executing program 0 (id=414): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xcc}, 0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e21, 0xfffffff8, @mcast1, 0xbe}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={r1, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x3}]}, &(0x7f0000000400)=0x10) sendmmsg$inet6(r0, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000140)="03", 0x1}], 0x1}}], 0x1, 0x34000811) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYRES16], 0x1000f) 1m25.071870104s ago: executing program 0 (id=415): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e140602000000000e0003000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xfdef) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_emit_ethernet(0x2a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500001c0000fffd00119078000000000000000000004e20000890782c7206821af9945619eab9fbda64907d8cb7f212db99a379dfca1c842d35f380e072e4613a55649fc710b43fa4f1d1bb6ba47c60b8d75537fbf88d784c4c9be7ea954837bba7117f95254ff5d1806b640569982461e3c5b9505fa72a535bd2ec184e1ac3d82e1a66d76c"], 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x6, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000002c0)={'wlan1\x00'}) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x161090, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r5, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 1m24.834122183s ago: executing program 0 (id=416): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000100060000000077f2ab268500000023000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x1c, r2, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40010c0) 1m24.554991042s ago: executing program 0 (id=419): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x8}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r0, &(0x7f0000000300)="ab", 0x1a000, 0x0, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10) 1m24.516288032s ago: executing program 40 (id=419): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x8}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r0, &(0x7f0000000300)="ab", 0x1a000, 0x0, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10) 1m21.439820801s ago: executing program 2 (id=445): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000340)=0x1, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r4, 0x4c80, 0x7000000) 1m21.405960191s ago: executing program 2 (id=447): r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) (async) r4 = socket(0x1e, 0x4, 0x0) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) (async) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) (async) sendmmsg(r4, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) (async) close_range(r0, 0xffffffffffffffff, 0x0) (async) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@loopback, @multicast2, @remote}, 0xc) 1m21.31639621s ago: executing program 2 (id=449): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000340)=0x1c, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'ip_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x9) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f0000000000)="1c0000001a005f0214f9f407000901001c0000000400000300000000", 0x1c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'erspan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000600)={r2, r7, 0x25, 0x2, @val=@netfilter={0x1, 0x1, 0x1f3, 0x1}}, 0x20) getdents(0xffffffffffffffff, &(0x7f0000000340)=""/145, 0x91) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', r7, 0xffffffffffffffff, 0x3, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x600}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}, 0x1, 0x2}, 0x0) 1m21.18704972s ago: executing program 2 (id=451): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x161090, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000640)='\x00', 0x89901) 1m21.12177157s ago: executing program 2 (id=453): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) modify_ldt$read_default(0x2, &(0x7f0000000740)=""/116, 0x74) r1 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x800000001fd, 0x42) r2 = dup(r1) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000040)={0x23, 0x3, 0x17, 0x0, 0x0, 0x0, 0x0}) mkdirat(r2, &(0x7f0000000140)='./file0\x00', 0x66) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000, @void, @value}, 0x94) r4 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @empty}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}, 0xfc00) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r5}, 0x10) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@version_u}]}}) bind(r2, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x2, 0x4, 0x2, {0xa, 0x4e20, 0x16, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}}, 0x80) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/notes', 0x0, 0x0) getpid() sendfile(r0, r9, 0x0, 0x100) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@loopback, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0xee00, 0xee00}}, './file0\x00'}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r12 = socket(0x2b, 0x80801, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r12, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x3c1, 0x3, 0x288, 0x140, 0x5c, 0x160, 0x0, 0x3e0, 0x208, 0x228, 0x25a, 0x208, 0x228, 0x4, 0x0, {[{{@ipv6={@loopback, @dev={0xfe, 0x80, '\x00', 0x10}, [], [0xff000000, 0xff, 0x0, 0xffffffff], 'veth0_to_batadv\x00', 'wg1\x00', {}, {0x222cecdb0fb5a62a}, 0x3a, 0x40}, 0x5002, 0xa8, 0xf0, 0x52020000, {0x0, 0x6802000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}, {{@ipv6={@mcast1, @private2, [], [0xff], 'veth1_to_hsr\x00', 'dummy0\x00', {}, {0xff}, 0x6c}, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2e8) chown(&(0x7f0000000180)='./file0\x00', r10, r11) 1m21.024958349s ago: executing program 4 (id=407): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x8}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000380)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_vlan\x00', &(0x7f0000000080)=@ethtool_gstrings={0x1b, 0x6}}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000340)=@keyring) syz_io_uring_setup(0x10f, &(0x7f0000000140)={0x0, 0xfad9}, &(0x7f0000000240)=0x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x241}}) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x3}, 0x8) sendto$inet(r0, &(0x7f0000000300)="ab", 0x1a000, 0x0, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10) 1m20.832877439s ago: executing program 4 (id=458): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffd, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x8, 0x700, 0x2, 0x5, {{0xb, 0x4, 0x3, 0x5, 0x2c, 0x68, 0x0, 0xb2, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@lsrr={0x83, 0x17, 0xb3, [@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @local]}]}}}}}) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x1e, &(0x7f0000000380)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x0, 0x2, 0x3, 0x2, 0x6, 0xfffffffffffffff0, 0x4}], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x6, &(0x7f0000000040)=""/6, 0x40f00, 0x6e, '\x00', r2, 0x25, r3, 0x8, &(0x7f00000004c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0x8, 0x200000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000540)=[r0, r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0x4, 0xb}, {0x1, 0x3, 0xb}, {0x2, 0x2, 0x200, 0x2}, {0x3, 0x1, 0x2, 0x3}, {0x0, 0x1, 0x1, 0x3}, {0x2, 0x2, 0xe, 0x9}, {0x3, 0x5, 0x3, 0x2}, {0x2, 0x1, 0x4, 0x5}, {0x2, 0x6, 0x4, 0xe}], 0x10, 0x3, @void, @value}, 0x94) open(&(0x7f0000000740)='./bus\x00', 0x143c62, 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') 1m20.773255688s ago: executing program 2 (id=459): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) open_tree(r0, &(0x7f0000000640)='\x00', 0x89901) 1m20.744386388s ago: executing program 41 (id=459): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) open_tree(r0, &(0x7f0000000640)='\x00', 0x89901) 1m20.692862328s ago: executing program 4 (id=462): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x161090, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000640)='\x00', 0x89901) 1m20.615050408s ago: executing program 4 (id=463): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000008000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000018000900000000000000000002000000000000010000000008000500ac1414ff"], 0x24}}, 0x0) r3 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r3, 0x6b, 0x1, &(0x7f0000000640), 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000100)={0x1d, r4, 0x0, {0x0, 0x0, 0x4}, 0x1}, 0x18) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000400)="81b641f1f3843704b66e92c9626ce721b235916a8514f26036b630c635f5bd3ccd87a8871a32db7f5d42739ae097559c050924fe5067", 0x36}], 0x1}, 0x48005) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@newtfilter={0x24, 0x11, 0x1, 0x70bd2b, 0x0, {0x0, 0x0, 0x74, r6, {0xfff2, 0x4}, {0x0, 0x4}, {0xfff2, 0x8}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x840) 1m18.808755691s ago: executing program 4 (id=484): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe2(&(0x7f0000001cc0), 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, 0x0) 1m18.792736311s ago: executing program 42 (id=484): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe2(&(0x7f0000001cc0), 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, 0x0) 1.744079687s ago: executing program 7 (id=2244): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000040000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x60, 0x5, 0x1}, {0x6}]}) 1.680710866s ago: executing program 1 (id=2245): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000083850000002d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="001300"}) 1.645412497s ago: executing program 7 (id=2246): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4, 0x0, @void, @value, @void, @value}, 0x50) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000008c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b40)=0x14) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000b80), 0x400000, 0x0) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)=@o_path={&(0x7f0000000c40)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000cc0), &(0x7f0000000d00)}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=@base={0x1f, 0x5, 0x7, 0x80, 0x44001, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a000000020000000900000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x0, 0x21, &(0x7f0000000900)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x604}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x5, 0xf, 0x4, 0x5, 0x1}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @ldst={0x1, 0x2, 0x3, 0x2, 0xa, 0xfffffffffffffff8, 0x8}, @ldst={0x3, 0x3, 0x4, 0x6, 0x5, 0x80, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}}], {{}, {}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000a40)='GPL\x00', 0xfffffff7, 0x6f, &(0x7f0000000a80)=""/111, 0x41000, 0x4, '\x00', r4, @fallback=0xa, r5, 0x8, &(0x7f0000000bc0)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x1, 0x1ff, 0x62ee}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000e00)=[r6, r7, r8, r9], 0x0, 0x10, 0x4, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r10 = getpid() sched_setscheduler(r10, 0x2, &(0x7f0000000200)=0x7) r11 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r11, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r11, 0x40082102, &(0x7f0000000080)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) sched_setaffinity(r10, 0x8, &(0x7f0000000f00)=0x9) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r13, &(0x7f0000000340), 0x11000) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000001780), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r12}, 0x2c, {'wfdno', 0x3d, r13}}) vmsplice(r12, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000100)={[], [{@pcr={'pcr', 0x3d, 0x35}}, {@flag='silent'}]}, 0x2, 0x5ad, &(0x7f0000000180)="$eJzs3c1vVFUbAPDnzkwLpe9rKzEqLkyjIZAoLS1g8GMBe0LwY+fGSgtBho/QGi2aWBLcmBg3LkhcuRD/CyW6dWXiwoUbV4akGsNGY3TMnbkzDO1MOy0dbu39/ZLbOeeeOz3nQp85Z+49ZyaAwhpLf5Qi9kTE5SRipK2sElnhWOO4O7+/fzrdkqjVXv0tiSTb1zw+yR6Hsyf/PRLx/TdJ7C6vrHdu4er56Wp19kqWn5i/cHlibuHqgXMXps/Onp29OPXc1NEjh48cnTx4X+dXakufuP7WOyMfnXz9i8/+Sia//OlkEsfi1zONsvbz2CxjMRZ/1GofLN+f/rse3ezKclJu/Z3clSzfwZZVyWJkMCIei5Eot/1vjsSHL+faOKCvaklEDSioRPxDQTXHAc339r29Dy71eVQCPAhLx9OfAx3iv9K4NhijMRARe5c9r8MlvQ1J6/ju25PX0y36dB0O6Gzx2o4stTz+k3psjsbOem7XndI913nTEcCp7DHd/8oG6x9blhf/8OAsXouIxzuN/9eO/zfa4v/NDdYv/gEAAAAAAGDz3DoeEc92uv9Xyu7N7Yyn6vf/ksb9vx/urhA8tgn1r33/r3R7E6oBOlg6HvFSx/m/rTm+o+Us9//GbMDkzLnq7MGIeCgi9sfAjjQ/uUodBz7efaNbWfv8v3RL62/OBczacbuy497nzEzPT9/POQMNS9cinqh0n/+T9v9Je/+fSV8PLvdYx+69N091K1s7/oF+qX0esa9j/5+0jklW/3yOifp4YKI5Kljpyfc++apb/eIf8pP2/7tWj//RpP3zeubW9/sHI+LQQqXWrXyj4//B5LVy8/en3p2en78yGTGYnFi5f2p9bYbtqhkPzXhJ43//06tf/2uN/9vicCgiFnus89F/hn/uVqb/h/yk8T+zrv5//Ympm6Nfd6u/t/7/cL1P35/tcf0PVtdrgObdTgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4LypFxP8iKY230qXS+HjEcEQ8ErtK1Utz88+cufT2xZm0rP79/6XmN/2ONPJJ8/v/R9vyU8vyhyLi4Yj4tDxUz4+fvlSdyfvkAQAAAAAAAAAAAAAAAAAAYIsY7rL+P/VLOe/WAX1XyR7FOxRPJe8GALkR/1Bc4h+KS/xDcYl/KK4Nxr/bBbAN6P+hqAZ6O2xnv9sB5EH/DwAAAAAA28qtF5+/kUTE4gtD9S01mJW1bgwO5dU6oJ9KeTcAyI05vFBcpv5AcfU4+RfYxpJW6s9ap/Lus/+T/jQIAAAAAAAAAAAAAFhh355bP665/h/Ylqz/h+Ky/h+Ky/p/KC7v8YG1VvFb/w8AAAAAAAAAAAAA+ZtbuHp+ulqdvSIhsdUSAxGxBZqRQ2Iw//DM+YUJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABo+TcAAP//Swsk/Q==") 1.613786456s ago: executing program 1 (id=2247): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='host1x_channel_submitted\x00', r0}, 0x18) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000069113200116100008510000002000000850000008c00000095000000000000007d00a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r4 = socket$inet6(0xa, 0x2, 0x3a) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) preadv(r5, 0x0, 0x0, 0x4bd, 0x8) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0x2e4}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$GTP_CMD_ECHOREQ(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010029bd7000fedb090ec03fc9ce73", @ANYRES32=r0, @ANYBLOB="08000400ac1414bb"], 0x2c}, 0x1, 0x0, 0x0, 0x20000840}, 0x24008004) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x9}, 0x1016c7, 0x0, 0x0, 0x6, 0x3, 0x0, 0x83}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r7 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$bt_hci(r7, &(0x7f0000000040)={0x27}, 0x6) mkdir(0x0, 0x3b) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r8, &(0x7f0000002980)={&(0x7f0000000180)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000001800)='_', 0x1}], 0x1}, 0x4000000) setsockopt$sock_attach_bpf(r8, 0x84, 0x1e, &(0x7f0000000000), 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000000080)={'batadv_slave_1\x00', {0x2, 0x0, @remote}}) ioctl$sock_inet_SIOCSIFADDR(r9, 0x891c, &(0x7f0000000540)={'batadv_slave_1\x00', {0x2, 0x0, @private=0xfffffffe}}) 1.539476836s ago: executing program 1 (id=2248): unshare(0x22020400) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000100), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00 \x00\x00\x00\x00c,\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x24008850) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'macsec0\x00', 0x300}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000240)={'macsec0\x00', 0x1}) semop(0x0, 0x0, 0x0) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x210000000013, &(0x7f0000000580)=0x100000001, 0x4) getsockopt$inet_tcp_buf(r5, 0x6, 0x14, 0x0, &(0x7f0000000040)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={r6, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/xfrm_stat\x00') r8 = socket(0x18, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x8) write(r0, &(0x7f0000000080)="89ba41c97928dec7cec15a160d3dba257872aed129d4b5247c9834550448a4f46c37425b873ec95db3d757e8b2333a64d9abf416fd83f942661c47bcdf71f7d07ba2b2f051829a7f66952e57962614db0d03474a4a4bce636ea8d2b882b2b49ef18e76edbec7302a96e41f206d930eda2769c56e6d5e3d541ce9a21c3ce5cb5f", 0xfdef) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x4, &(0x7f0000000180)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x88}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) fcntl$setpipe(r9, 0x407, 0x0) 1.336597185s ago: executing program 1 (id=2249): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x0, 0x0, 0x20e, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="160000000000000004"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206010100000000000000000000000005000100070000000900020073797a300000000014000780050015000000000008001240000000000d000300686173683a6e657400000000050005000a000000050004"], 0x5c}}, 0x40000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2eec0a0009000070e2db620ba0", 0xd}], 0x1}, 0x20000000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000003444352e0ae0db000000009e0775bd446bdab6782c9f69ad5b25c7eec10209e907bdc0d946c419fed81700f481fd857b7790b521de160037ce1f451cc37a85af2f61b1cd0d898e5a19882a7aa3a19fad436c8977b19d6396c4"], 0x48) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000480)=@raw=[@exit, @exit, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0xfff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x9, 0x9, 0x6, 0xfffffffffffffffe, 0x4}], &(0x7f00000001c0)='syzkaller\x00', 0x5, 0x4e, &(0x7f0000000500)=""/78, 0x40f00, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x1, 0xc, 0x9, 0x4}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=[r5, r5], 0x0, 0x10, 0xd4a4, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000680)={0x0, r6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) 1.085634284s ago: executing program 3 (id=2256): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x100000, 0xe0, 0x0, 0x6, 0x3, 0x1, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="d800000018007b7be00212ba0d0505040a003f00000f040b067c55a1bc0009001e0006990300000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b3162700e06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5005ccca262f3d40fad95667e04adcdf63cc1f215ce3bb9ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd601edef3d93452a92307f00000e97031e9f05e9f16e0700000004000000", 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000fc0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd6012000800103afffe8000000000000000000000000000bbff0200000000000000000000000000018600907801000200000000000090aaa53f6fde4ba95f7955d15334649810af3a8f9da9989eff01fd62c2d5f149e998c3097ec3f66db518b8cc175acac8a8d3e338adfb1f2653ed414d4706c56575338552c4b63d6c0fd0029cb5eb866922c0efc6f5a909e2b87a1e9e05ae816099bb7934220d40ae1def8dd6639ac77cd25984c76bbec5126bffa1b758c83eff34372b4a7c4738a95591c2"], 0x0) syz_emit_ethernet(0x56, &(0x7f0000000a00)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2}, @void, {@canfd={0xd, {{0x4, 0x1}, 0xf, 0x2, 0x0, 0x0, "15e41e9b8b1cebdbd7303820e9a733859d7bb5b50a002bb5f1893dc285cbb48a2432b5f8f0abc03a0138833d0fa5528b44c86124d863f5bb24f728df9a42290b"}}}}, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000180)={&(0x7f0000000a80)=""/209, 0xd1, 0x10, 0x6}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000400699b000008001b"], 0x30}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x7, 0x2, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r6}, 0x10) getrandom(0x0, 0x0, 0x1) syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="120101e475ecbc406a051900400001020301090224000101e6800609040003010301000209210800fb0122b903090581030800090180"], &(0x7f0000000400)={0xa, &(0x7f0000000340)={0xa, 0x6, 0x300, 0x9, 0xc1, 0x9, 0xff}, 0x48, &(0x7f0000000680)=ANY=[@ANYBLOB="050f48000534ff03000200010306000a10030006000fd301001410040836b8b4ebe39c1a3fa300141004064aa3c622dc38a318b056b65b41a84974"], 0x3, [{0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x410}}, {0xd9, &(0x7f0000000700)=@string={0xd9, 0x3, "c86de1f961c30635e5e17ecd827eb0f725acb6546c7fecbc35e5f7ea2c7df0cbb77ff274e32668c27e339fae5a260355ca0cb2a2fcbf4b3b2a21009c1933545b872ea6e17524be1e19658019d144c6301e9880a65326cc1bdd6fd3658cd615644103744c4e4be926dafad11288932b803815338603e63d1aca495c89ff50da72d611715f13a94f3736d24e38f62facdfebff2e1bb99e7034d6e48763efe8f0bb3bb7ea032a0a610c2140ee2ebe5114734086a171c7e005cef73c44f8f7a6667e6f8f332977615fcd85f5a5bb272df46470a32056b255b1"}}, {0xcd, &(0x7f0000000800)=@string={0xcd, 0x3, "80f739464714981ac7276d99cfe2b90cc1673e84fc37db23f99e765485e0b499fd4063b1b408c515a0b21f3322bc9403638565dfc31b3123ff45d26f35e5f997b605070d777bac20f19f851b53056ec38f45de68781e195f81c15371682c0dbe4f4d411d5140e812c177e4c07759ab22e26396290fda8b607fa1b5bbe6aced1b25fe4fd45adf46fd3427b8a550efe34ab8d1d3e69aaa422ce8eed3bda541d23674e983e406bcce9fe6a1b9e11bf90d3c40b2083f15afdae8be16176e23bb0a6824a6e69c95927bf91b7491"}}]}) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c756e616d653dd0aedec1aa20ffd81d1bf89329217cb09aa796eda2ab40a26d93dd083c0074dcab6cab21aeb9e816c4cdf97bdc355f3b41d27b6502000000000000007953322d01beaa7257964fd30fe2d72f171da72e389f382dea3c8d91906aead5d5aeccc097ef1092ea987c2b00000000000000002c00"]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0x2e, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) futimesat(r8, &(0x7f0000000280)='./file0\x00', &(0x7f00000009c0)={{0x0, 0x2710}, {0x77359400}}) name_to_handle_at(r7, &(0x7f00000003c0)='./file2\x00', &(0x7f0000000980)=@FILEID_UDF_WITHOUT_PARENT={0xc, 0x51, {0x8000, 0x6, 0x0, 0x4}}, &(0x7f0000000b80), 0x200) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0xd8a88b3807bbf5cf, 0x0, 0x2000000, {0x0, 0x0, 0x7, 0x0, 0x40400}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r9}, @IFLA_HSR_SLAVE1={0x8, 0x1, r9}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x40044}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x18, 0x23, &(0x7f0000000bc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x9, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x9}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @call={0x85, 0x0, 0x0, 0xb1}, @ldst={0x2, 0x2, 0x4, 0x6, 0x3, 0x30}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000001}}, @jmp={0x5, 0x1, 0xa, 0x7, 0x5, 0x50, 0xfffffffffffffffc}, @generic={0x1, 0x5, 0x3, 0x3, 0xa}, @ldst={0x0, 0x0, 0x0, 0x4, 0x9, 0x1, 0xffffffffffffffff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000d00)='GPL\x00', 0x80000000, 0x4d, &(0x7f0000000d40)=""/77, 0x41100, 0x20, '\x00', r9, 0x0, r7, 0x8, &(0x7f0000000dc0)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000e00)=[r7, r5, r7, r10, r0], &(0x7f0000000e40)=[{0x1, 0x5, 0xb, 0x7}, {0x5, 0x4, 0x4}, {0x2, 0x4, 0xb, 0x1}, {0x0, 0x3, 0x9, 0x2}, {0x1, 0x2, 0x2, 0xb}, {0x2, 0x1, 0x4, 0x6}, {0x4, 0x1, 0xe, 0xc}, {0x3, 0x3, 0xd, 0xb}, {0x2, 0x1, 0x2, 0x1}, {0x2, 0x2}], 0x10, 0x4, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200010, &(0x7f0000000240)={[{@block_validity}, {@nombcache}, {@dioread_lock}, {@norecovery}, {@abort}, {@data_ordered}, {@nodelalloc}, {@usrquota}, {@noauto_da_alloc}]}, 0xfb, 0x54c, &(0x7f0000000400)="$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") 899.785084ms ago: executing program 5 (id=2259): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8000003d) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000c00000004000000010000840203000000000000030000000000000302000000000000010500000020000000000000000000000b02000000006100302e"], 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001240)={0x6, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f00000006c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000b00)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10, @void, @value}, 0x94) 862.146614ms ago: executing program 5 (id=2260): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r2}, 0x4) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0xf507, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r4, 0x0, 0x178}, 0x18) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, 0x0, 0x0) getpid() mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='afs_folio_dirty\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) 861.692073ms ago: executing program 9 (id=2261): ioprio_set$pid(0x3, 0x0, 0x4004) 819.615214ms ago: executing program 9 (id=2262): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r4, 0x4c80, 0x7000000) 819.090253ms ago: executing program 9 (id=2263): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x101c088, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x6, 0x2c3, &(0x7f0000000900)="$eJzs3T+LHGUcB/Df7M3OrlrsFlYiOKCFVciltdlDEhCvMmyhFnqYC8jtItzBgX9wTWVrY2HhKxAEX4iN70CwFeyMEHhkZmeyu5dlcxuyJyafT5MnzzzfeX7Ps8PdXHHPffzq9OROGXfvffV79PtZdEYxivtZDKMTrW9ixei7AAD+z+6nFH+luW1yWUT0d1cWALBDl/v+ny+av1xJWQDADt1+/4N3Dw4Pb75Xlv24Nf32fFz9ZF/9O79+cDc+jUkcx/UYxIOI+kWhG/XbQtW8lVKa5WVlGG9MZ+fjKjn96Nfm/gd/RtT5/RjEsO56+LZR5985vLlfzi3lZ1UdLzbzj6r8jRjEyw/DK/kba/IxLuLN15fqvxaD+O2T+CwmcacuYpH/er8s307f//3lh1V5VT6bnY979biFtHfFHw0AAAAAAAAAAAAAAAAAAAAAAM+wa83ZOb2oz++puprzd/YeVP/pRtkarp7PM89n7Y2WzwdKKc1S/Nier3O9LMvUDFzk83glXz5YEAAAAAAAAAAAAAAAAAAAAJ5fZ59/cXI0mRyfPpVGexpAHhH/3I540vuMlnpei82De82cR5NJp2mujsmXe2KvHZNFbCyjWsST7kYeW639hUdqbho//bzt7P3Hj+mun+tpNtqn6+QoW7+HvWh7+s1G/VBELMYUccm5ios9aTC/T9rqIyjWXhpsvfbipbox2zAmsk2FvfXHfOeanuziKop6V9fGu01jKX7h2bjU8xz9efzRrxWZ0zoAAAAAAAAAAAAAAAAAAGCnFr/9u+bivY3RTurtrCwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuFKLv/+/RWPWhI9Pz/LHDC7i9Ow/XiIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADPgX8DAAD//x0KWZ8=") bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='K\x00\x00\x00q'], 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x21, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000200000000000b70800000000007b9a000700"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='erofs_fill_inode\x00', r1, 0x0, 0x6}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f00000008c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80000006}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@GTPA_VERSION={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x41) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r4}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="2c0000001400010000000000000000000a000000", @ANYRES32=r5, @ANYBLOB="140001"], 0x2c}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x9e46, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 722.135063ms ago: executing program 7 (id=2264): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000200), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) pidfd_send_signal(0xffffffffffffffff, 0x15, 0x0, 0x0) 676.763503ms ago: executing program 7 (id=2265): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./control\x00', 0x0, 0x2000, 0x0) 615.967163ms ago: executing program 7 (id=2266): bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x418, 0x0, 0x268, 0x311, 0x0, 0x268, 0x348, 0x460, 0x460, 0x348, 0x460, 0x9, 0x0, {[{{@uncond, 0x160, 0x230, 0x258, 0x0, {0x9401}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0x9}}}, @common=@unspec=@time={{0x38}, {0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x3}}]}, @common=@unspec=@NFQUEUE2={0x28}}, {{@ipv6={@local, @private1={0xfc, 0x1, '\x00', 0x1}, [0xffffffff, 0xff, 0xff000000, 0xffffffff], [0xffffff00, 0xffffffff, 0xff000000], 'nicvf0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x3a, 0x8, 0x0, 0x2}, 0x0, 0xd0, 0xf0, 0xe4030000, {}, [@common=@ipv6header={{0x28}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x478) 519.105862ms ago: executing program 7 (id=2267): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='host1x_channel_submitted\x00', r0}, 0x18) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000069113200116100008510000002000000850000008c00000095000000000000007d00a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r4 = socket$inet6(0xa, 0x2, 0x3a) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) preadv(r5, 0x0, 0x0, 0x4bd, 0x8) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0x2e4}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$GTP_CMD_ECHOREQ(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010029bd7000fedb090ec03fc9ce73", @ANYRES32=r0, @ANYBLOB="08000400ac1414bb"], 0x2c}, 0x1, 0x0, 0x0, 0x20000840}, 0x24008004) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x9}, 0x1016c7, 0x0, 0x0, 0x6, 0x3, 0x0, 0x83}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r7 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$bt_hci(r7, &(0x7f0000000040)={0x27}, 0x6) mkdir(0x0, 0x3b) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r8, &(0x7f0000002980)={&(0x7f0000000180)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000001800)='_', 0x1}], 0x1}, 0x4000000) setsockopt$sock_attach_bpf(r8, 0x84, 0x1e, &(0x7f0000000000), 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000000080)={'batadv_slave_1\x00', {0x2, 0x0, @remote}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020307025000000000064a7409bcce1471ee22020207b1af8ff00000000bfa100000300000000000000f8ffffffb702000008000100b703000000000000feff00002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3b, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) ioctl$sock_inet_SIOCSIFADDR(r9, 0x891c, &(0x7f0000000540)={'batadv_slave_1\x00', {0x2, 0x0, @private=0xfffffffe}}) 352.161771ms ago: executing program 3 (id=2268): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='sys_enter\x00', r1, 0x0, 0x2}, 0x18) readlinkat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/70, 0x46) 317.191542ms ago: executing program 1 (id=2269): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_mount_image$tmpfs(0x0, &(0x7f00000040c0)='./file0\x00', 0x810000, 0x0, 0x6, 0x0, &(0x7f0000000000)) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='nr_inodes=2']) chdir(&(0x7f0000001b80)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000040)='./file0\x00') 300.000041ms ago: executing program 9 (id=2270): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000600)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x47, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4cf68d79c8eac253, 0xffffffffffffffff, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket(0x10, 0x803, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 299.640702ms ago: executing program 5 (id=2271): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000c00000004000000010000840203000000000000030000000000000302000000000000010500000020000000000000000000000b02000000006100302e"], 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001240)={0x6, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f00000006c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000b00)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10, @void, @value}, 0x94) 275.517331ms ago: executing program 3 (id=2272): syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x286c188, 0x0, 0xff, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v2={0x2000000, [{0x4, 0x3}, {0x401, 0xfff}]}, 0x14, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) 274.911921ms ago: executing program 1 (id=2273): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = signalfd(r0, &(0x7f0000000340)={[0x2]}, 0x8) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="774e21000000000300007d628f4b8d7c000000"], 0x48}}, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000540)='./file2\x00', 0x0, 0x10, r1}, 0x18) poll(&(0x7f0000000600)=[{r1, 0x8000}, {r0}, {r1, 0x40ca}, {r1, 0xc001}, {r0, 0x40}, {r1, 0x24}, {r3}, {r1, 0x620}], 0x8, 0x6) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000300000006000000f4ffffff10800000", @ANYRES32=r1, @ANYBLOB="28ffffff00"/20, @ANYRES32=r4, @ANYRES32=r1, @ANYBLOB="030000062440484f422c5dc8fbb4dffcd69900020000000a00000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a"], 0x44}}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000)=0x4, 0x4) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x204092, &(0x7f0000000680), 0x6, 0x50d, &(0x7f00000006c0)="$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") r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000640)=ANY=[], 0xfb, 0x1208, &(0x7f0000001280)="$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") bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0x4) write$binfmt_aout(r10, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r10, 0x40045431, &(0x7f0000000100)) r11 = syz_open_pts(r10, 0x0) r12 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r12, 0x1, r11, &(0x7f0000000040)={0x80000002}) r13 = dup3(r11, r10, 0x0) ioctl$TCSETS(r13, 0x5402, &(0x7f00000003c0)={0x7, 0x8, 0xfffffffd, 0x400, 0x4, "18148b7284979e0a6ec193d10ab3457543f516"}) r14 = accept4$x25(0xffffffffffffffff, &(0x7f0000000100)={0x9, @remote}, &(0x7f0000000140)=0x12, 0xc0000) sendto$x25(r14, &(0x7f0000000180)="10b3b48a4fd66b1830e18efa65c2e6c8cb1ce264703714dcc709ee209b673cf6d6d8e91acfa83fdd661c417424ff2276cadb13b1897b7b7de815fa4ac1ce6c8b9b81df1bc7ebd3dea831bd46723c2ec1f1d4a1c79f300b345512cfe2212609627f9f", 0x62, 0x0, &(0x7f0000000200), 0x12) 232.759981ms ago: executing program 5 (id=2274): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x9, 0xa5, 0x80000001}]}, 0x10) bind$bt_hci(r0, 0x0, 0x0) 232.519091ms ago: executing program 9 (id=2275): r0 = gettid() r1 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0x1400c, &(0x7f0000000840)={[{@stripe={'stripe', 0x3d, 0x3d}}, {@init_itable}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x3, 0x44c, &(0x7f0000000340)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x141042, 0x0) pwritev2(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802, 0x0) pwrite64(r3, &(0x7f0000000140)='2', 0xff10, 0x8000c61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001880)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x80000001, 0xe4, 0x6, 0x2, 0x6}, 0xe, 0x0, 0x1, 0x800, 0x6, 0x6, 0x3, 0xc, 0x0, 0x100, {0xd0a7, 0x7ff, 0xb, 0x0, 0x33b7, 0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x48801}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x11, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d0000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='kmem_cache_free\x00', r6, 0x0, 0xfffffffffffffd}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_emit_ethernet(0xb4, &(0x7f0000000b00)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaa0086dd60003a04007e3a00fe8000000000000000000000000000bbff020000000000000000000000000001"], 0x0) 170.935661ms ago: executing program 3 (id=2276): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./control\x00', 0x0, 0x2000, 0x0) 162.708851ms ago: executing program 5 (id=2277): bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x418, 0x0, 0x268, 0x311, 0x0, 0x268, 0x348, 0x460, 0x460, 0x348, 0x460, 0x9, 0x0, {[{{@uncond, 0x160, 0x230, 0x258, 0x0, {0x9401}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0x9}}}, @common=@unspec=@time={{0x38}, {0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x3}}]}, @common=@unspec=@NFQUEUE2={0x28}}, {{@ipv6={@local, @private1={0xfc, 0x1, '\x00', 0x1}, [0xffffffff, 0xff, 0xff000000, 0xffffffff], [0xffffff00, 0xffffffff, 0xff000000], 'nicvf0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x3a, 0x8, 0x0, 0x2}, 0x0, 0xd0, 0xf0, 0xe4030000, {}, [@common=@ipv6header={{0x28}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x478) 103.307381ms ago: executing program 3 (id=2278): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0xb8, 0x7ffc0001}]}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) rmdir(&(0x7f00000000c0)='./cgroup/../file0\x00') 52.87878ms ago: executing program 5 (id=2279): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007208", 0x39}], 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000020000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = socket$inet6(0xa, 0x3, 0x3c) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000100), 0x4) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, &(0x7f0000000f00)=ANY=[@ANYBLOB="0002020100000008ff"], 0x18) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @dev, 0x9}, 0x1c) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x17, 0x7fdf, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000700), 0x20000000, 0x2}, 0x20) mq_open(0x0, 0x800, 0x0, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000318680907070000000f0000ff3f04000000170a001700000000040037000d00030001332564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 6.54235ms ago: executing program 3 (id=2280): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x101c088, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x6, 0x2c3, &(0x7f0000000900)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='K\x00\x00\x00q'], 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x21, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000200000000000b70800000000007b9a000700"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='erofs_fill_inode\x00', r1, 0x0, 0x6}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f00000008c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80000006}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@GTPA_VERSION={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x41) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r4}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="2c0000001400010000000000000000000a000000", @ANYRES32=r5, @ANYBLOB="140001"], 0x2c}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x9e46, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 0s ago: executing program 9 (id=2281): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0xd4) r2 = dup2(r1, r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1, 0x8}) ioctl$BLKTRACESETUP(r2, 0x1276, 0x0) kernel console output (not intermixed with test programs): [ 99.682323][ T6598] pim6reg1: entered promiscuous mode [ 99.687679][ T6598] pim6reg1: entered allmulticast mode [ 99.798721][ T6603] geneve0: entered allmulticast mode [ 99.855911][ T6609] netlink: 'syz.7.1069': attribute type 13 has an invalid length. [ 99.881851][ T6609] gretap0: refused to change device tx_queue_len [ 99.899569][ T6609] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 100.101521][ T6627] FAULT_INJECTION: forcing a failure. [ 100.101521][ T6627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.114788][ T6627] CPU: 0 UID: 0 PID: 6627 Comm: syz.7.1077 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 100.114820][ T6627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 100.114857][ T6627] Call Trace: [ 100.114865][ T6627] [ 100.114873][ T6627] dump_stack_lvl+0xf2/0x150 [ 100.114902][ T6627] dump_stack+0x15/0x1a [ 100.114922][ T6627] should_fail_ex+0x223/0x230 [ 100.114954][ T6627] should_fail+0xb/0x10 [ 100.114980][ T6627] should_fail_usercopy+0x1a/0x20 [ 100.115062][ T6627] _copy_from_user+0x1c/0xa0 [ 100.115095][ T6627] copy_msghdr_from_user+0x54/0x2a0 [ 100.115127][ T6627] ? __fget_files+0x17c/0x1c0 [ 100.115156][ T6627] __sys_sendmmsg+0x1e8/0x4b0 [ 100.115272][ T6627] __x64_sys_sendmmsg+0x57/0x70 [ 100.115298][ T6627] x64_sys_call+0x29aa/0x2dc0 [ 100.115390][ T6627] do_syscall_64+0xc9/0x1c0 [ 100.115429][ T6627] ? clear_bhb_loop+0x55/0xb0 [ 100.115448][ T6627] ? clear_bhb_loop+0x55/0xb0 [ 100.115501][ T6627] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.115539][ T6627] RIP: 0033:0x7f6925775d29 [ 100.115556][ T6627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.115578][ T6627] RSP: 002b:00007f6923de1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 100.115600][ T6627] RAX: ffffffffffffffda RBX: 00007f6925965fa0 RCX: 00007f6925775d29 [ 100.115616][ T6627] RDX: 0000000000000001 RSI: 0000000020005b40 RDI: 0000000000000004 [ 100.115642][ T6627] RBP: 00007f6923de1090 R08: 0000000000000000 R09: 0000000000000000 [ 100.115654][ T6627] R10: 000000000000c080 R11: 0000000000000246 R12: 0000000000000001 [ 100.115667][ T6627] R13: 0000000000000000 R14: 00007f6925965fa0 R15: 00007ffd1eb62ec8 [ 100.115689][ T6627] [ 100.355899][ T6634] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 100.400289][ T6643] batadv_slave_0: entered promiscuous mode [ 100.492657][ T6642] batadv_slave_0: left promiscuous mode [ 100.509243][ T6653] bpf_get_probe_write_proto: 10 callbacks suppressed [ 100.509262][ T6653] syz.3.1089[6653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.556204][ T6653] syz.3.1089[6653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.605548][ T6663] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 100.631047][ T6653] syz.3.1089[6653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.656831][ T6663] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 100.744849][ T6671] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.831105][ T6694] FAULT_INJECTION: forcing a failure. [ 100.831105][ T6694] name failslab, interval 1, probability 0, space 0, times 0 [ 100.843960][ T6694] CPU: 1 UID: 0 PID: 6694 Comm: syz.9.1103 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 100.844029][ T6694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 100.844053][ T6694] Call Trace: [ 100.844060][ T6694] [ 100.844069][ T6694] dump_stack_lvl+0xf2/0x150 [ 100.844096][ T6694] dump_stack+0x15/0x1a [ 100.844113][ T6694] should_fail_ex+0x223/0x230 [ 100.844165][ T6694] should_failslab+0x8f/0xb0 [ 100.844275][ T6694] kmem_cache_alloc_noprof+0x52/0x320 [ 100.844308][ T6694] ? getname_flags+0x81/0x3b0 [ 100.844337][ T6694] getname_flags+0x81/0x3b0 [ 100.844429][ T6694] __x64_sys_rename+0x33/0x70 [ 100.844468][ T6694] x64_sys_call+0x2b1c/0x2dc0 [ 100.844489][ T6694] do_syscall_64+0xc9/0x1c0 [ 100.844521][ T6694] ? clear_bhb_loop+0x55/0xb0 [ 100.844614][ T6694] ? clear_bhb_loop+0x55/0xb0 [ 100.844638][ T6694] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.844680][ T6694] RIP: 0033:0x7f3edc325d29 [ 100.844699][ T6694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.844720][ T6694] RSP: 002b:00007f3eda997038 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 100.844738][ T6694] RAX: ffffffffffffffda RBX: 00007f3edc515fa0 RCX: 00007f3edc325d29 [ 100.844825][ T6694] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000020000240 [ 100.844840][ T6694] RBP: 00007f3eda997090 R08: 0000000000000000 R09: 0000000000000000 [ 100.844854][ T6694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.844865][ T6694] R13: 0000000000000000 R14: 00007f3edc515fa0 R15: 00007ffeec388748 [ 100.844958][ T6694] [ 101.023506][ T6671] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 101.112965][ T6671] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 101.175159][ T6671] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 101.196885][ T6696] block device autoloading is deprecated and will be removed. [ 101.228955][ T6696] syz.5.1104: attempt to access beyond end of device [ 101.228955][ T6696] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 101.260838][ T6714] FAULT_INJECTION: forcing a failure. [ 101.260838][ T6714] name failslab, interval 1, probability 0, space 0, times 0 [ 101.273634][ T6714] CPU: 1 UID: 0 PID: 6714 Comm: syz.7.1112 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 101.273664][ T6714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 101.273715][ T6714] Call Trace: [ 101.273723][ T6714] [ 101.273732][ T6714] dump_stack_lvl+0xf2/0x150 [ 101.273757][ T6714] dump_stack+0x15/0x1a [ 101.273778][ T6714] should_fail_ex+0x223/0x230 [ 101.273811][ T6714] should_failslab+0x8f/0xb0 [ 101.273870][ T6714] kmem_cache_alloc_noprof+0x52/0x320 [ 101.273898][ T6714] ? audit_log_start+0x34c/0x6b0 [ 101.273926][ T6714] audit_log_start+0x34c/0x6b0 [ 101.273963][ T6714] audit_seccomp+0x4b/0x130 [ 101.273992][ T6714] __seccomp_filter+0x6fa/0x1180 [ 101.274064][ T6714] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 101.274107][ T6714] ? vfs_write+0x596/0x920 [ 101.274139][ T6714] ? __schedule+0x6fe/0x930 [ 101.274216][ T6714] __secure_computing+0x9f/0x1c0 [ 101.274252][ T6714] syscall_trace_enter+0xd1/0x1f0 [ 101.274301][ T6714] do_syscall_64+0xaa/0x1c0 [ 101.274375][ T6714] ? clear_bhb_loop+0x55/0xb0 [ 101.274399][ T6714] ? clear_bhb_loop+0x55/0xb0 [ 101.274421][ T6714] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.274459][ T6714] RIP: 0033:0x7f6925775d29 [ 101.274476][ T6714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.274554][ T6714] RSP: 002b:00007f6923de1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000022 [ 101.274577][ T6714] RAX: ffffffffffffffda RBX: 00007f6925965fa0 RCX: 00007f6925775d29 [ 101.274663][ T6714] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 101.274679][ T6714] RBP: 00007f6923de1090 R08: 0000000000000000 R09: 0000000000000000 [ 101.274694][ T6714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.274708][ T6714] R13: 0000000000000000 R14: 00007f6925965fa0 R15: 00007ffd1eb62ec8 [ 101.274725][ T6714] [ 101.579345][ T6671] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.616265][ T6671] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.638827][ T6671] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.664552][ T6671] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.683540][ T6729] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6gre0, syncid = 65540, id = 0 [ 101.687154][ T6728] pimreg: entered allmulticast mode [ 101.737334][ T6731] pimreg: left allmulticast mode [ 101.774233][ T6732] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 101.782868][ T6732] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 101.985525][ T6743] block device autoloading is deprecated and will be removed. [ 102.125637][ T6749] tipc: Enabling of bearer rejected, failed to enable media [ 102.250741][ T6759] __nla_validate_parse: 7 callbacks suppressed [ 102.250761][ T6759] netlink: 72 bytes leftover after parsing attributes in process `syz.7.1129'. [ 102.352681][ T6761] lo: entered allmulticast mode [ 102.367561][ T6761] lo: left allmulticast mode [ 102.524187][ T6775] block device autoloading is deprecated and will be removed. [ 102.790716][ T6792] bond_slave_1: entered promiscuous mode [ 102.830313][ T6792] bond_slave_1: left promiscuous mode [ 103.045355][ T6815] loop3: detected capacity change from 0 to 512 [ 103.053998][ T6818] lo: entered allmulticast mode [ 103.079380][ T6818] lo: left allmulticast mode [ 103.087943][ T6815] ext3: Unknown parameter 'euid' [ 103.205343][ T6829] netlink: 72 bytes leftover after parsing attributes in process `syz.1.1159'. [ 103.229818][ T6831] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 103.264270][ T6835] netlink: 'syz.1.1161': attribute type 2 has an invalid length. [ 103.272083][ T6835] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1161'. [ 103.296437][ T6837] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 103.303998][ T6837] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 103.338585][ T6837] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 103.346185][ T6837] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 103.466115][ T6849] lo: entered allmulticast mode [ 103.480605][ T6849] lo: left allmulticast mode [ 103.555964][ T29] kauditd_printk_skb: 485 callbacks suppressed [ 103.555982][ T29] audit: type=1400 audit(1737652928.175:3723): avc: denied { write } for pid=6851 comm="syz.1.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 103.716577][ T6858] syz.1.1170[6858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.716646][ T6858] syz.1.1170[6858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.736382][ T6858] syz.1.1170[6858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.759547][ T6858] lo speed is unknown, defaulting to 1000 [ 103.783433][ T6858] lo speed is unknown, defaulting to 1000 [ 103.792981][ T6858] lo speed is unknown, defaulting to 1000 [ 103.802787][ T6858] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 103.823355][ T6859] netlink: 'syz.1.1170': attribute type 30 has an invalid length. [ 103.831254][ T6859] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1170'. [ 103.858002][ T6858] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 103.906343][ T6858] lo speed is unknown, defaulting to 1000 [ 103.926401][ T6858] lo speed is unknown, defaulting to 1000 [ 103.933831][ T6858] lo speed is unknown, defaulting to 1000 [ 103.940094][ T6858] lo speed is unknown, defaulting to 1000 [ 103.946374][ T6858] lo speed is unknown, defaulting to 1000 [ 104.043635][ T29] audit: type=1326 audit(1737652928.636:3724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6870 comm="syz.1.1175" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 104.067172][ T29] audit: type=1326 audit(1737652928.636:3725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6870 comm="syz.1.1175" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 104.090588][ T29] audit: type=1326 audit(1737652928.636:3726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6870 comm="syz.1.1175" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 104.114068][ T29] audit: type=1326 audit(1737652928.636:3727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6870 comm="syz.1.1175" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 104.137582][ T29] audit: type=1326 audit(1737652928.636:3728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6870 comm="syz.1.1175" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 104.167919][ T29] audit: type=1326 audit(1737652928.636:3729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6870 comm="syz.1.1175" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 104.191285][ T29] audit: type=1326 audit(1737652928.702:3730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6873 comm="syz.5.1176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 104.214816][ T29] audit: type=1326 audit(1737652928.702:3731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6873 comm="syz.5.1176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 104.238412][ T29] audit: type=1326 audit(1737652928.702:3732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6873 comm="syz.5.1176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 104.547439][ T6884] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 104.609203][ T6889] A link change request failed with some changes committed already. Interface batadv_slave_0 may have been left with an inconsistent configuration, please check. [ 104.721325][ T6901] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.774868][ T6905] syz.9.1186[6905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.774975][ T6905] syz.9.1186[6905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.794985][ T6901] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.819092][ T6905] syz.9.1186[6905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.900739][ T6901] netdevsim netdevsim9 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.942755][ T6910] netlink: 12 bytes leftover after parsing attributes in process `syz.7.1190'. [ 104.990506][ T6912] usb usb8: usbfs: process 6912 (syz.1.1189) did not claim interface 0 before use [ 104.999957][ T6912] FAULT_INJECTION: forcing a failure. [ 104.999957][ T6912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 105.013187][ T6912] CPU: 1 UID: 0 PID: 6912 Comm: syz.1.1189 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 105.013232][ T6912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 105.013247][ T6912] Call Trace: [ 105.013256][ T6912] [ 105.013265][ T6912] dump_stack_lvl+0xf2/0x150 [ 105.013296][ T6912] dump_stack+0x15/0x1a [ 105.013316][ T6912] should_fail_ex+0x223/0x230 [ 105.013349][ T6912] should_fail+0xb/0x10 [ 105.013445][ T6912] should_fail_usercopy+0x1a/0x20 [ 105.013477][ T6912] _copy_from_user+0x1c/0xa0 [ 105.013536][ T6912] kstrtouint_from_user+0x76/0xe0 [ 105.013567][ T6912] ? 0xffffffff81000000 [ 105.013583][ T6912] ? selinux_file_permission+0x22a/0x360 [ 105.013622][ T6912] proc_fail_nth_write+0x4f/0x150 [ 105.013702][ T6912] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 105.013744][ T6912] vfs_write+0x281/0x920 [ 105.013779][ T6912] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 105.013821][ T6912] ? __fget_files+0x17c/0x1c0 [ 105.013985][ T6912] ksys_write+0xe8/0x1b0 [ 105.014025][ T6912] __x64_sys_write+0x42/0x50 [ 105.014062][ T6912] x64_sys_call+0x287e/0x2dc0 [ 105.014100][ T6912] do_syscall_64+0xc9/0x1c0 [ 105.014137][ T6912] ? clear_bhb_loop+0x55/0xb0 [ 105.014161][ T6912] ? clear_bhb_loop+0x55/0xb0 [ 105.014184][ T6912] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 105.014288][ T6912] RIP: 0033:0x7f7f0aeb47df [ 105.014302][ T6912] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 105.014325][ T6912] RSP: 002b:00007f7f09527030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 105.014348][ T6912] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7f0aeb47df [ 105.014362][ T6912] RDX: 0000000000000001 RSI: 00007f7f095270a0 RDI: 0000000000000006 [ 105.014377][ T6912] RBP: 00007f7f09527090 R08: 0000000000000000 R09: 0000000000000000 [ 105.014447][ T6912] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 105.014537][ T6912] R13: 0000000000000000 R14: 00007f7f0b0a5fa0 R15: 00007ffd6f762b58 [ 105.014555][ T6912] [ 105.229036][ T6901] netdevsim netdevsim9 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 105.264746][ T6910] Falling back ldisc for ttyS3. [ 105.298591][ T6901] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.322259][ T6901] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.348268][ T6901] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.370454][ T6901] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.507004][ T6934] netlink: 72 bytes leftover after parsing attributes in process `syz.9.1198'. [ 105.634138][ T6938] loop7: detected capacity change from 0 to 128 [ 105.802509][ T6944] siw: device registration error -23 [ 105.867567][ T6948] syz.5.1204 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 106.109121][ T6953] lo speed is unknown, defaulting to 1000 [ 106.366683][ T6973] netlink: 'syz.7.1213': attribute type 27 has an invalid length. [ 106.442746][ T6973] geneve0: left allmulticast mode [ 106.535176][ T6994] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.536907][ T7001] loop3: detected capacity change from 0 to 512 [ 106.552546][ T7001] EXT4-fs: Ignoring removed nobh option [ 106.575201][ T7001] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 106.587991][ T7005] syz.9.1220[7005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.588058][ T7005] syz.9.1220[7005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.616852][ T7001] ext4 filesystem being mounted at /101/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 106.666941][ T7005] syz.9.1220[7005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.668255][ T7001] FAULT_INJECTION: forcing a failure. [ 106.668255][ T7001] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 106.692852][ T7001] CPU: 1 UID: 0 PID: 7001 Comm: syz.3.1222 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 106.692878][ T7001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 106.692921][ T7001] Call Trace: [ 106.692928][ T7001] [ 106.692935][ T7001] dump_stack_lvl+0xf2/0x150 [ 106.692961][ T7001] dump_stack+0x15/0x1a [ 106.692980][ T7001] should_fail_ex+0x223/0x230 [ 106.693010][ T7001] should_fail+0xb/0x10 [ 106.693035][ T7001] should_fail_usercopy+0x1a/0x20 [ 106.693074][ T7001] strncpy_from_user+0x25/0x210 [ 106.693137][ T7001] ? kstrtouint_from_user+0xb0/0xe0 [ 106.693167][ T7001] path_setxattrat+0xed/0x310 [ 106.693212][ T7001] __x64_sys_lsetxattr+0x71/0x90 [ 106.693297][ T7001] x64_sys_call+0x29c8/0x2dc0 [ 106.693324][ T7001] do_syscall_64+0xc9/0x1c0 [ 106.693362][ T7001] ? clear_bhb_loop+0x55/0xb0 [ 106.693382][ T7001] ? clear_bhb_loop+0x55/0xb0 [ 106.693400][ T7001] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 106.693444][ T7001] RIP: 0033:0x7f9c6bec5d29 [ 106.693463][ T7001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.693514][ T7001] RSP: 002b:00007f9c6a531038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 106.693538][ T7001] RAX: ffffffffffffffda RBX: 00007f9c6c0b5fa0 RCX: 00007f9c6bec5d29 [ 106.693553][ T7001] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000020000200 [ 106.693567][ T7001] RBP: 00007f9c6a531090 R08: 0000000000000000 R09: 0000000000000000 [ 106.693580][ T7001] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000001 [ 106.693594][ T7001] R13: 0000000000000000 R14: 00007f9c6c0b5fa0 R15: 00007ffef50bdf28 [ 106.693623][ T7001] [ 106.694912][ T6994] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.706034][ T7011] loop7: detected capacity change from 0 to 512 [ 106.748556][ T7013] IPVS: length: 68 != 8 [ 106.860092][ T7011] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 106.881745][ T7015] netlink: 436 bytes leftover after parsing attributes in process `syz.1.1228'. [ 106.905897][ T5059] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 106.916639][ T7011] EXT4-fs error (device loop7): ext4_orphan_get:1415: comm syz.7.1225: bad orphan inode 131083 [ 106.928640][ T6994] netdevsim netdevsim9 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.958864][ T7020] FAULT_INJECTION: forcing a failure. [ 106.958864][ T7020] name failslab, interval 1, probability 0, space 0, times 0 [ 106.971667][ T7020] CPU: 1 UID: 0 PID: 7020 Comm: syz.3.1227 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 106.971694][ T7020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 106.971709][ T7020] Call Trace: [ 106.971718][ T7020] [ 106.971727][ T7020] dump_stack_lvl+0xf2/0x150 [ 106.971751][ T7020] dump_stack+0x15/0x1a [ 106.971768][ T7020] should_fail_ex+0x223/0x230 [ 106.971854][ T7020] should_failslab+0x8f/0xb0 [ 106.971898][ T7020] kmem_cache_alloc_node_noprof+0x59/0x320 [ 106.971971][ T7020] ? __alloc_skb+0x10b/0x310 [ 106.972006][ T7020] __alloc_skb+0x10b/0x310 [ 106.972046][ T7020] netlink_alloc_large_skb+0xad/0xe0 [ 106.972071][ T7020] netlink_sendmsg+0x3b4/0x6e0 [ 106.972138][ T7020] ? __pfx_netlink_sendmsg+0x10/0x10 [ 106.972168][ T7020] __sock_sendmsg+0x140/0x180 [ 106.972201][ T7020] ____sys_sendmsg+0x312/0x410 [ 106.972228][ T7020] __sys_sendmsg+0x19d/0x230 [ 106.972269][ T7020] __x64_sys_sendmsg+0x46/0x50 [ 106.972366][ T7020] x64_sys_call+0x2734/0x2dc0 [ 106.972439][ T7020] do_syscall_64+0xc9/0x1c0 [ 106.972482][ T7020] ? clear_bhb_loop+0x55/0xb0 [ 106.972503][ T7020] ? clear_bhb_loop+0x55/0xb0 [ 106.972533][ T7020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 106.972615][ T7020] RIP: 0033:0x7f9c6bec5d29 [ 106.972633][ T7020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.972656][ T7020] RSP: 002b:00007f9c6a531038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 106.972678][ T7020] RAX: ffffffffffffffda RBX: 00007f9c6c0b5fa0 RCX: 00007f9c6bec5d29 [ 106.972693][ T7020] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 106.972708][ T7020] RBP: 00007f9c6a531090 R08: 0000000000000000 R09: 0000000000000000 [ 106.972803][ T7020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.972816][ T7020] R13: 0000000000000000 R14: 00007f9c6c0b5fa0 R15: 00007ffef50bdf28 [ 106.972833][ T7020] [ 106.993865][ T7011] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 107.042993][ T7024] FAULT_INJECTION: forcing a failure. [ 107.042993][ T7024] name failslab, interval 1, probability 0, space 0, times 0 [ 107.196218][ T7024] CPU: 1 UID: 0 PID: 7024 Comm: syz.1.1231 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 107.196275][ T7024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 107.196290][ T7024] Call Trace: [ 107.196299][ T7024] [ 107.196363][ T7024] dump_stack_lvl+0xf2/0x150 [ 107.196495][ T7024] dump_stack+0x15/0x1a [ 107.196515][ T7024] should_fail_ex+0x223/0x230 [ 107.196544][ T7024] should_failslab+0x8f/0xb0 [ 107.196593][ T7024] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 107.196681][ T7024] ? __feat_register_sp+0x34b/0x470 [ 107.196713][ T7024] kmemdup_noprof+0x2a/0x60 [ 107.196744][ T7024] __feat_register_sp+0x34b/0x470 [ 107.196873][ T7024] dccp_feat_register_sp+0x114/0x130 [ 107.196911][ T7024] dccp_setsockopt+0x365/0xc40 [ 107.197043][ T7024] sock_common_setsockopt+0x64/0x80 [ 107.197112][ T7024] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 107.197142][ T7024] __sys_setsockopt+0x187/0x200 [ 107.197180][ T7024] __x64_sys_setsockopt+0x66/0x80 [ 107.197244][ T7024] x64_sys_call+0x282e/0x2dc0 [ 107.197269][ T7024] do_syscall_64+0xc9/0x1c0 [ 107.197304][ T7024] ? clear_bhb_loop+0x55/0xb0 [ 107.197325][ T7024] ? clear_bhb_loop+0x55/0xb0 [ 107.197345][ T7024] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.197402][ T7024] RIP: 0033:0x7f7f0aeb5d29 [ 107.197420][ T7024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.197442][ T7024] RSP: 002b:00007f7f09527038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 107.197464][ T7024] RAX: ffffffffffffffda RBX: 00007f7f0b0a5fa0 RCX: 00007f7f0aeb5d29 [ 107.197479][ T7024] RDX: 000000800000000d RSI: 000000000000010d RDI: 0000000000000003 [ 107.197525][ T7024] RBP: 00007f7f09527090 R08: 0000000000000001 R09: 0000000000000000 [ 107.197540][ T7024] R10: 00000000201c9fff R11: 0000000000000246 R12: 0000000000000001 [ 107.197622][ T7024] R13: 0000000000000000 R14: 00007f7f0b0a5fa0 R15: 00007ffd6f762b58 [ 107.197642][ T7024] [ 107.198695][ T6994] netdevsim netdevsim9 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.275935][ T7026] program syz.3.1232 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 107.463690][ T4979] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 107.554453][ T7037] ebtables: ebtables: counters copy to user failed while replacing table [ 107.586031][ T7043] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 107.623044][ T7047] loop7: detected capacity change from 0 to 512 [ 107.631408][ T7047] journal_path: Non-blockdev passed as './bus' [ 107.637674][ T7047] EXT4-fs: error: could not find journal device path [ 107.645215][ T7049] FAULT_INJECTION: forcing a failure. [ 107.645215][ T7049] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 107.658356][ T7049] CPU: 0 UID: 0 PID: 7049 Comm: syz.1.1242 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 107.658382][ T7049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 107.658395][ T7049] Call Trace: [ 107.658400][ T7049] [ 107.658406][ T7049] dump_stack_lvl+0xf2/0x150 [ 107.658456][ T7049] dump_stack+0x15/0x1a [ 107.658472][ T7049] should_fail_ex+0x223/0x230 [ 107.658527][ T7049] should_fail+0xb/0x10 [ 107.658549][ T7049] should_fail_usercopy+0x1a/0x20 [ 107.658579][ T7049] _copy_from_user+0x1c/0xa0 [ 107.658610][ T7049] copy_msghdr_from_user+0x54/0x2a0 [ 107.658637][ T7049] ? __fget_files+0x17c/0x1c0 [ 107.658661][ T7049] __sys_sendmsg+0x13e/0x230 [ 107.658705][ T7049] __x64_sys_sendmsg+0x46/0x50 [ 107.658725][ T7049] x64_sys_call+0x2734/0x2dc0 [ 107.658746][ T7049] do_syscall_64+0xc9/0x1c0 [ 107.658825][ T7049] ? clear_bhb_loop+0x55/0xb0 [ 107.658843][ T7049] ? clear_bhb_loop+0x55/0xb0 [ 107.658914][ T7049] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.658947][ T7049] RIP: 0033:0x7f7f0aeb5d29 [ 107.658962][ T7049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.658979][ T7049] RSP: 002b:00007f7f09527038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 107.658997][ T7049] RAX: ffffffffffffffda RBX: 00007f7f0b0a5fa0 RCX: 00007f7f0aeb5d29 [ 107.659084][ T7049] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 107.659096][ T7049] RBP: 00007f7f09527090 R08: 0000000000000000 R09: 0000000000000000 [ 107.659107][ T7049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.659118][ T7049] R13: 0000000000000000 R14: 00007f7f0b0a5fa0 R15: 00007ffd6f762b58 [ 107.659136][ T7049] [ 107.870235][ T7050] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 [ 107.901121][ T7055] netlink: 72 bytes leftover after parsing attributes in process `syz.1.1244'. [ 108.027890][ T7071] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1250'. [ 108.217240][ T7090] loop7: detected capacity change from 0 to 512 [ 108.228504][ T7090] EXT4-fs error (device loop7): ext4_xattr_ibody_find:2240: inode #15: comm syz.7.1258: corrupted in-inode xattr: invalid ea_ino [ 108.268158][ T7090] EXT4-fs error (device loop7): ext4_orphan_get:1394: comm syz.7.1258: couldn't read orphan inode 15 (err -117) [ 108.308660][ T7090] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 108.344375][ T7098] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 108.459352][ T7090] netlink: 165 bytes leftover after parsing attributes in process `syz.7.1258'. [ 108.474470][ T7108] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 108.498236][ T4979] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 108.567123][ T7115] geneve0: entered allmulticast mode [ 108.601121][ T7121] netlink: 72 bytes leftover after parsing attributes in process `syz.1.1269'. [ 108.620137][ T7124] loop7: detected capacity change from 0 to 256 [ 108.629682][ T7125] ip6gre1: entered allmulticast mode [ 108.682141][ T7127] netlink: 72 bytes leftover after parsing attributes in process `syz.1.1272'. [ 108.698965][ T7124] netlink: 20 bytes leftover after parsing attributes in process `syz.7.1271'. [ 108.723519][ T7125] loop3: detected capacity change from 0 to 512 [ 108.766417][ T7125] EXT4-fs: Ignoring removed nobh option [ 108.787872][ T7125] EXT4-fs error (device loop3): ext4_map_blocks:671: inode #2: block 3: comm syz.3.1270: lblock 0 mapped to illegal pblock 3 (length 1) [ 108.811340][ T7125] EXT4-fs warning (device loop3): dx_probe:823: inode #2: lblock 0: comm syz.3.1270: error -117 reading directory block [ 108.856687][ T7125] EXT4-fs (loop3): Cannot turn on journaled quota: type 1: error -117 [ 108.868136][ T7125] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 108.892096][ T29] kauditd_printk_skb: 368 callbacks suppressed [ 108.892188][ T29] audit: type=1326 audit(1737652933.187:4101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7132 comm="syz.1.1274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 108.958272][ T5059] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 108.968759][ T29] audit: type=1326 audit(1737652933.187:4102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7132 comm="syz.1.1274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=28 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 108.992321][ T29] audit: type=1326 audit(1737652933.187:4103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7132 comm="syz.1.1274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 109.015882][ T29] audit: type=1326 audit(1737652933.196:4104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7132 comm="syz.1.1274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 109.039370][ T29] audit: type=1326 audit(1737652933.196:4105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7132 comm="syz.1.1274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 109.062922][ T29] audit: type=1326 audit(1737652933.196:4106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7132 comm="syz.1.1274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 109.085872][ T7142] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1278'. [ 109.095330][ T7142] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1278'. [ 109.150873][ T29] audit: type=1326 audit(1737652933.421:4107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.1.1279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 109.202837][ T29] audit: type=1326 audit(1737652933.449:4108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.1.1279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 109.226628][ T29] audit: type=1326 audit(1737652933.449:4109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.1.1279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 109.250084][ T29] audit: type=1326 audit(1737652933.449:4110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.1.1279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 109.310764][ T7156] netlink: 72 bytes leftover after parsing attributes in process `syz.3.1283'. [ 109.327706][ T7158] loop7: detected capacity change from 0 to 512 [ 109.340044][ T7158] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 109.355454][ T7158] EXT4-fs error (device loop7): ext4_orphan_get:1415: comm syz.7.1284: bad orphan inode 131083 [ 109.396573][ T7158] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 109.645473][ T7185] loop3: detected capacity change from 0 to 512 [ 109.670308][ T7185] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 109.692863][ T7185] EXT4-fs error (device loop3): ext4_orphan_get:1415: comm syz.3.1294: bad orphan inode 131083 [ 109.720170][ T7185] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 109.721904][ T4979] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 109.759920][ T7196] netlink: 72 bytes leftover after parsing attributes in process `syz.7.1297'. [ 109.779381][ T6994] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.791097][ T6994] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.806421][ T6994] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.818908][ T6994] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.859513][ T5059] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 109.890784][ T7206] block device autoloading is deprecated and will be removed. [ 109.934389][ T7211] FAULT_INJECTION: forcing a failure. [ 109.934389][ T7211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 109.947578][ T7211] CPU: 1 UID: 0 PID: 7211 Comm: syz.7.1305 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 109.947623][ T7211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 109.947635][ T7211] Call Trace: [ 109.947642][ T7211] [ 109.947651][ T7211] dump_stack_lvl+0xf2/0x150 [ 109.947679][ T7211] dump_stack+0x15/0x1a [ 109.947699][ T7211] should_fail_ex+0x223/0x230 [ 109.947797][ T7211] should_fail+0xb/0x10 [ 109.947819][ T7211] should_fail_usercopy+0x1a/0x20 [ 109.947845][ T7211] strncpy_from_user+0x25/0x210 [ 109.947863][ T7211] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 109.947930][ T7211] ? getname_flags+0x81/0x3b0 [ 109.948004][ T7211] getname_flags+0xb0/0x3b0 [ 109.948026][ T7211] user_path_at+0x26/0x120 [ 109.948119][ T7211] __se_sys_open_tree+0x15a/0x700 [ 109.948158][ T7211] ? fput+0x1c4/0x200 [ 109.948183][ T7211] ? ksys_write+0x176/0x1b0 [ 109.948232][ T7211] __x64_sys_open_tree+0x43/0x50 [ 109.948274][ T7211] x64_sys_call+0x2011/0x2dc0 [ 109.948340][ T7211] do_syscall_64+0xc9/0x1c0 [ 109.948375][ T7211] ? clear_bhb_loop+0x55/0xb0 [ 109.948398][ T7211] ? clear_bhb_loop+0x55/0xb0 [ 109.948420][ T7211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 109.948501][ T7211] RIP: 0033:0x7f6925775d29 [ 109.948529][ T7211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.948600][ T7211] RSP: 002b:00007f6923de1038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ac [ 109.948639][ T7211] RAX: ffffffffffffffda RBX: 00007f6925965fa0 RCX: 00007f6925775d29 [ 109.948654][ T7211] RDX: 0000000000089901 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 109.948669][ T7211] RBP: 00007f6923de1090 R08: 0000000000000000 R09: 0000000000000000 [ 109.948684][ T7211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.948698][ T7211] R13: 0000000000000000 R14: 00007f6925965fa0 R15: 00007ffd1eb62ec8 [ 109.948715][ T7211] [ 110.152466][ T7213] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 110.170070][ T7213] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 110.223108][ T7213] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 110.248508][ T7213] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 110.431646][ T7228] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.483451][ T7229] syz.1.1311[7229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.483585][ T7229] syz.1.1311[7229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.496348][ T7229] syz.1.1311[7229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.540146][ T7228] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.684261][ T7228] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.757860][ T7228] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.836770][ T7242] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 110.867063][ T7228] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.915402][ T7228] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.951231][ T7253] FAULT_INJECTION: forcing a failure. [ 110.951231][ T7253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.964326][ T7228] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.972645][ T7253] CPU: 1 UID: 0 PID: 7253 Comm: syz.3.1320 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 110.972670][ T7253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 110.972686][ T7253] Call Trace: [ 110.972692][ T7253] [ 110.972701][ T7253] dump_stack_lvl+0xf2/0x150 [ 110.972742][ T7253] dump_stack+0x15/0x1a [ 110.972758][ T7253] should_fail_ex+0x223/0x230 [ 110.972784][ T7253] should_fail+0xb/0x10 [ 110.972805][ T7253] should_fail_usercopy+0x1a/0x20 [ 110.972835][ T7253] _copy_from_iter+0xd5/0xd00 [ 110.972868][ T7253] ? kmalloc_reserve+0x16e/0x190 [ 110.972903][ T7253] ? __build_skb_around+0x196/0x1f0 [ 110.972981][ T7253] ? __alloc_skb+0x21f/0x310 [ 110.973073][ T7253] ? __virt_addr_valid+0x1ed/0x250 [ 110.973091][ T7253] ? __check_object_size+0x364/0x520 [ 110.973122][ T7253] netlink_sendmsg+0x460/0x6e0 [ 110.973149][ T7253] ? __pfx_netlink_sendmsg+0x10/0x10 [ 110.973196][ T7253] __sock_sendmsg+0x140/0x180 [ 110.973301][ T7253] ____sys_sendmsg+0x312/0x410 [ 110.973324][ T7253] __sys_sendmsg+0x19d/0x230 [ 110.973360][ T7253] __x64_sys_sendmsg+0x46/0x50 [ 110.973426][ T7253] x64_sys_call+0x2734/0x2dc0 [ 110.973450][ T7253] do_syscall_64+0xc9/0x1c0 [ 110.973488][ T7253] ? clear_bhb_loop+0x55/0xb0 [ 110.973510][ T7253] ? clear_bhb_loop+0x55/0xb0 [ 110.973532][ T7253] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.973623][ T7253] RIP: 0033:0x7f9c6bec5d29 [ 110.973638][ T7253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.973655][ T7253] RSP: 002b:00007f9c6a531038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 110.973673][ T7253] RAX: ffffffffffffffda RBX: 00007f9c6c0b5fa0 RCX: 00007f9c6bec5d29 [ 110.973687][ T7253] RDX: 0000000000000000 RSI: 0000000020006280 RDI: 0000000000000003 [ 110.973701][ T7253] RBP: 00007f9c6a531090 R08: 0000000000000000 R09: 0000000000000000 [ 110.973714][ T7253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.973787][ T7253] R13: 0000000000000000 R14: 00007f9c6c0b5fa0 R15: 00007ffef50bdf28 [ 110.973804][ T7253] [ 110.975643][ T7228] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.058376][ T7262] syz.7.1323[7262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.216253][ T7262] syz.7.1323[7262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.232740][ T7262] syz.7.1323[7262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.911526][ T7319] syz.9.1349[7319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.964789][ T7319] syz.9.1349[7319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.023576][ T7319] syz.9.1349[7319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.159568][ T7341] siw: device registration error -23 [ 112.400077][ T7358] syz.7.1366[7358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.400213][ T7358] syz.7.1366[7358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.443150][ T7358] syz.7.1366[7358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.643321][ T7376] batadv0: entered promiscuous mode [ 112.670287][ T7377] block device autoloading is deprecated and will be removed. [ 113.161218][ T7387] FAULT_INJECTION: forcing a failure. [ 113.161218][ T7387] name failslab, interval 1, probability 0, space 0, times 0 [ 113.174161][ T7387] CPU: 0 UID: 0 PID: 7387 Comm: syz.3.1378 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 113.174190][ T7387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 113.174204][ T7387] Call Trace: [ 113.174210][ T7387] [ 113.174218][ T7387] dump_stack_lvl+0xf2/0x150 [ 113.174297][ T7387] dump_stack+0x15/0x1a [ 113.174316][ T7387] should_fail_ex+0x223/0x230 [ 113.174347][ T7387] should_failslab+0x8f/0xb0 [ 113.174456][ T7387] kmem_cache_alloc_node_noprof+0x59/0x320 [ 113.174485][ T7387] ? alloc_vmap_area+0x1e1/0x1830 [ 113.174522][ T7387] alloc_vmap_area+0x1e1/0x1830 [ 113.174604][ T7387] ? should_fail_ex+0x31/0x230 [ 113.174628][ T7387] ? should_fail_ex+0xd7/0x230 [ 113.174652][ T7387] ? should_failslab+0x8f/0xb0 [ 113.174684][ T7387] ? __kmalloc_cache_node_noprof+0x18c/0x320 [ 113.174737][ T7387] __get_vm_area_node+0x162/0x1c0 [ 113.174776][ T7387] __vmalloc_node_range_noprof+0x280/0xe80 [ 113.174815][ T7387] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 113.174838][ T7387] ? mntput_no_expire+0x70/0x3d0 [ 113.174931][ T7387] ? mntput+0x49/0x70 [ 113.174966][ T7387] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 113.175038][ T7387] __vmalloc_noprof+0x5e/0x70 [ 113.175077][ T7387] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 113.175101][ T7387] bpf_prog_alloc_no_stats+0x49/0x380 [ 113.175179][ T7387] ? bpf_prog_alloc+0x28/0x150 [ 113.175205][ T7387] bpf_prog_alloc+0x3a/0x150 [ 113.175291][ T7387] bpf_prog_load+0x4d1/0x1070 [ 113.175317][ T7387] ? __rcu_read_unlock+0x4e/0x70 [ 113.175358][ T7387] __sys_bpf+0x463/0x7a0 [ 113.175396][ T7387] __x64_sys_bpf+0x43/0x50 [ 113.175414][ T7387] x64_sys_call+0x2914/0x2dc0 [ 113.175470][ T7387] do_syscall_64+0xc9/0x1c0 [ 113.175570][ T7387] ? clear_bhb_loop+0x55/0xb0 [ 113.175588][ T7387] ? clear_bhb_loop+0x55/0xb0 [ 113.175605][ T7387] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.175644][ T7387] RIP: 0033:0x7f9c6bec5d29 [ 113.175662][ T7387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.175709][ T7387] RSP: 002b:00007f9c6a531038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 113.175731][ T7387] RAX: ffffffffffffffda RBX: 00007f9c6c0b5fa0 RCX: 00007f9c6bec5d29 [ 113.175825][ T7387] RDX: 0000000000000094 RSI: 0000000020000880 RDI: 0000000000000005 [ 113.175840][ T7387] RBP: 00007f9c6a531090 R08: 0000000000000000 R09: 0000000000000000 [ 113.175854][ T7387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.175868][ T7387] R13: 0000000000000000 R14: 00007f9c6c0b5fa0 R15: 00007ffef50bdf28 [ 113.175889][ T7387] [ 113.175900][ T7387] syz.3.1378: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0 [ 113.453145][ T7387] CPU: 0 UID: 0 PID: 7387 Comm: syz.3.1378 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 113.453176][ T7387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 113.453198][ T7387] Call Trace: [ 113.453206][ T7387] [ 113.453214][ T7387] dump_stack_lvl+0xf2/0x150 [ 113.453250][ T7387] dump_stack+0x15/0x1a [ 113.453269][ T7387] warn_alloc+0x145/0x1b0 [ 113.453332][ T7387] __vmalloc_node_range_noprof+0x2a5/0xe80 [ 113.453375][ T7387] ? mntput_no_expire+0x70/0x3d0 [ 113.453410][ T7387] ? mntput+0x49/0x70 [ 113.453443][ T7387] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 113.453469][ T7387] __vmalloc_noprof+0x5e/0x70 [ 113.453509][ T7387] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 113.453538][ T7387] bpf_prog_alloc_no_stats+0x49/0x380 [ 113.453558][ T7387] ? bpf_prog_alloc+0x28/0x150 [ 113.453578][ T7387] bpf_prog_alloc+0x3a/0x150 [ 113.453600][ T7387] bpf_prog_load+0x4d1/0x1070 [ 113.453627][ T7387] ? __rcu_read_unlock+0x4e/0x70 [ 113.453752][ T7387] __sys_bpf+0x463/0x7a0 [ 113.453783][ T7387] __x64_sys_bpf+0x43/0x50 [ 113.453805][ T7387] x64_sys_call+0x2914/0x2dc0 [ 113.453875][ T7387] do_syscall_64+0xc9/0x1c0 [ 113.453906][ T7387] ? clear_bhb_loop+0x55/0xb0 [ 113.453926][ T7387] ? clear_bhb_loop+0x55/0xb0 [ 113.453949][ T7387] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.454017][ T7387] RIP: 0033:0x7f9c6bec5d29 [ 113.454034][ T7387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.454051][ T7387] RSP: 002b:00007f9c6a531038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 113.454074][ T7387] RAX: ffffffffffffffda RBX: 00007f9c6c0b5fa0 RCX: 00007f9c6bec5d29 [ 113.454162][ T7387] RDX: 0000000000000094 RSI: 0000000020000880 RDI: 0000000000000005 [ 113.454174][ T7387] RBP: 00007f9c6a531090 R08: 0000000000000000 R09: 0000000000000000 [ 113.454185][ T7387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.454270][ T7387] R13: 0000000000000000 R14: 00007f9c6c0b5fa0 R15: 00007ffef50bdf28 [ 113.454287][ T7387] [ 113.454293][ T7387] Mem-Info: [ 113.663039][ T7387] active_anon:6077 inactive_anon:4 isolated_anon:28 [ 113.663039][ T7387] active_file:7463 inactive_file:10967 isolated_file:0 [ 113.663039][ T7387] unevictable:0 dirty:88 writeback:0 [ 113.663039][ T7387] slab_reclaimable:2966 slab_unreclaimable:16475 [ 113.663039][ T7387] mapped:32128 shmem:3114 pagetables:888 [ 113.663039][ T7387] sec_pagetables:0 bounce:0 [ 113.663039][ T7387] kernel_misc_reclaimable:0 [ 113.663039][ T7387] free:1887237 free_pcp:12404 free_cma:0 [ 113.707993][ T7387] Node 0 active_anon:24308kB inactive_anon:16kB active_file:29852kB inactive_file:43868kB unevictable:0kB isolated(anon):112kB isolated(file):0kB mapped:128512kB dirty:352kB writeback:0kB shmem:12456kB writeback_tmp:0kB kernel_stack:3088kB pagetables:3552kB sec_pagetables:0kB all_unreclaimable? no [ 113.736173][ T7387] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 113.763018][ T7387] lowmem_reserve[]: 0 2884 7863 0 [ 113.768098][ T7387] Node 0 DMA32 free:2950280kB boost:0kB min:4136kB low:7068kB high:10000kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953912kB mlocked:0kB bounce:0kB free_pcp:3632kB local_pcp:100kB free_cma:0kB [ 113.796649][ T7387] lowmem_reserve[]: 0 0 4978 0 [ 113.801451][ T7387] Node 0 Normal free:4583308kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:24308kB inactive_anon:16kB active_file:29852kB inactive_file:43868kB unevictable:0kB writepending:352kB present:5242880kB managed:5098208kB mlocked:0kB bounce:0kB free_pcp:45984kB local_pcp:2072kB free_cma:0kB [ 113.832071][ T7387] lowmem_reserve[]: 0 0 0 0 [ 113.836615][ T7387] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 113.849440][ T7387] Node 0 DMA32: 2*4kB (M) 0*8kB 2*16kB (M) 3*32kB (M) 2*64kB (M) 3*128kB (M) 2*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 718*4096kB (M) = 2950280kB [ 113.865316][ T7387] Node 0 Normal: 404*4kB (UME) 324*8kB (UE) 247*16kB (UME) 606*32kB (UM) 296*64kB (UM) 111*128kB (UME) 44*256kB (UM) 7*512kB (UME) 42*1024kB (UME) 20*2048kB (UE) 1080*4096kB (UM) = 4583200kB [ 113.884312][ T7387] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 113.893649][ T7387] 21528 total pagecache pages [ 113.898338][ T7387] 4 pages in swap cache [ 113.902488][ T7387] Free swap = 124492kB [ 113.906760][ T7387] Total swap = 124996kB [ 113.910989][ T7387] 2097051 pages RAM [ 113.914798][ T7387] 0 pages HighMem/MovableOnly [ 113.919564][ T7387] 80181 pages reserved [ 114.126408][ T7415] __nla_validate_parse: 8 callbacks suppressed [ 114.126424][ T7415] netlink: 72 bytes leftover after parsing attributes in process `syz.5.1391'. [ 114.252725][ T29] kauditd_printk_skb: 422 callbacks suppressed [ 114.252742][ T29] audit: type=1400 audit(1737652938.204:4533): avc: denied { accept } for pid=7420 comm="syz.3.1394" lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 114.350298][ T7446] netlink: 161700 bytes leftover after parsing attributes in process `syz.7.1404'. [ 114.362160][ T7448] syz.1.1401[7448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.362279][ T7448] syz.1.1401[7448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.381104][ T7446] FAULT_INJECTION: forcing a failure. [ 114.381104][ T7446] name failslab, interval 1, probability 0, space 0, times 0 [ 114.404509][ T7448] syz.1.1401[7448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.405312][ T7446] CPU: 0 UID: 0 PID: 7446 Comm: syz.7.1404 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 114.405399][ T7446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 114.405413][ T7446] Call Trace: [ 114.405420][ T7446] [ 114.405429][ T7446] dump_stack_lvl+0xf2/0x150 [ 114.405454][ T7446] dump_stack+0x15/0x1a [ 114.405471][ T7446] should_fail_ex+0x223/0x230 [ 114.405537][ T7446] should_failslab+0x8f/0xb0 [ 114.405578][ T7446] kmem_cache_alloc_node_noprof+0x59/0x320 [ 114.405612][ T7446] ? __alloc_skb+0x10b/0x310 [ 114.405651][ T7446] __alloc_skb+0x10b/0x310 [ 114.405712][ T7446] ovs_ct_limit_cmd_get+0xd1/0x7a0 [ 114.405750][ T7446] ? __nla_parse+0x40/0x60 [ 114.405785][ T7446] ? genl_family_rcv_msg_attrs_parse+0x148/0x1a0 [ 114.405838][ T7446] ? genl_family_rcv_msg_attrs_parse+0x182/0x1a0 [ 114.405882][ T7446] genl_rcv_msg+0x61b/0x6c0 [ 114.405917][ T7446] ? __pfx_ovs_ct_limit_cmd_get+0x10/0x10 [ 114.406034][ T7446] netlink_rcv_skb+0x12c/0x230 [ 114.406056][ T7446] ? __pfx_genl_rcv_msg+0x10/0x10 [ 114.406093][ T7446] genl_rcv+0x28/0x40 [ 114.406166][ T7446] netlink_unicast+0x599/0x670 [ 114.406189][ T7446] netlink_sendmsg+0x5cc/0x6e0 [ 114.406217][ T7446] ? __pfx_netlink_sendmsg+0x10/0x10 [ 114.406250][ T7446] __sock_sendmsg+0x140/0x180 [ 114.406292][ T7446] ____sys_sendmsg+0x312/0x410 [ 114.406319][ T7446] __sys_sendmsg+0x19d/0x230 [ 114.406358][ T7446] __x64_sys_sendmsg+0x46/0x50 [ 114.406380][ T7446] x64_sys_call+0x2734/0x2dc0 [ 114.406404][ T7446] do_syscall_64+0xc9/0x1c0 [ 114.406439][ T7446] ? clear_bhb_loop+0x55/0xb0 [ 114.406531][ T7446] ? clear_bhb_loop+0x55/0xb0 [ 114.406552][ T7446] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.406589][ T7446] RIP: 0033:0x7f6925775d29 [ 114.406606][ T7446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.406656][ T7446] RSP: 002b:00007f6923de1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 114.406677][ T7446] RAX: ffffffffffffffda RBX: 00007f6925965fa0 RCX: 00007f6925775d29 [ 114.406692][ T7446] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 114.406705][ T7446] RBP: 00007f6923de1090 R08: 0000000000000000 R09: 0000000000000000 [ 114.406718][ T7446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.406840][ T7446] R13: 0000000000000000 R14: 00007f6925965fa0 R15: 00007ffd1eb62ec8 [ 114.406862][ T7446] [ 114.759917][ T7462] netlink: 72 bytes leftover after parsing attributes in process `syz.9.1411'. [ 114.786578][ T29] audit: type=1326 audit(1737652938.700:4534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7469 comm="syz.7.1415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6925775d29 code=0x7ffc0000 [ 114.810112][ T29] audit: type=1326 audit(1737652938.700:4535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7469 comm="syz.7.1415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6925775d29 code=0x7ffc0000 [ 114.852313][ T7470] FAULT_INJECTION: forcing a failure. [ 114.852313][ T7470] name failslab, interval 1, probability 0, space 0, times 0 [ 114.865074][ T7470] CPU: 0 UID: 0 PID: 7470 Comm: syz.7.1415 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 114.865103][ T7470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 114.865133][ T7470] Call Trace: [ 114.865140][ T7470] [ 114.865148][ T7470] dump_stack_lvl+0xf2/0x150 [ 114.865174][ T7470] dump_stack+0x15/0x1a [ 114.865192][ T7470] should_fail_ex+0x223/0x230 [ 114.865221][ T7470] should_failslab+0x8f/0xb0 [ 114.865277][ T7470] kmem_cache_alloc_node_noprof+0x59/0x320 [ 114.865367][ T7470] ? __alloc_skb+0x10b/0x310 [ 114.865404][ T7470] __alloc_skb+0x10b/0x310 [ 114.865437][ T7470] ? audit_log_start+0x34c/0x6b0 [ 114.865469][ T7470] audit_log_start+0x368/0x6b0 [ 114.865559][ T7470] audit_seccomp+0x4b/0x130 [ 114.865591][ T7470] __seccomp_filter+0x6fa/0x1180 [ 114.865628][ T7470] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 114.865668][ T7470] ? vfs_write+0x596/0x920 [ 114.865734][ T7470] __secure_computing+0x9f/0x1c0 [ 114.865774][ T7470] syscall_trace_enter+0xd1/0x1f0 [ 114.865867][ T7470] ? fpregs_assert_state_consistent+0x83/0xa0 [ 114.865910][ T7470] do_syscall_64+0xaa/0x1c0 [ 114.865949][ T7470] ? clear_bhb_loop+0x55/0xb0 [ 114.865972][ T7470] ? clear_bhb_loop+0x55/0xb0 [ 114.865995][ T7470] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.866104][ T7470] RIP: 0033:0x7f6925775d29 [ 114.866122][ T7470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.866143][ T7470] RSP: 002b:00007f6923de1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e6 [ 114.866243][ T7470] RAX: ffffffffffffffda RBX: 00007f6925965fa0 RCX: 00007f6925775d29 [ 114.866258][ T7470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 114.866272][ T7470] RBP: 00007f6923de1090 R08: 0000000000000000 R09: 0000000000000000 [ 114.866287][ T7470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.866301][ T7470] R13: 0000000000000000 R14: 00007f6925965fa0 R15: 00007ffd1eb62ec8 [ 114.866323][ T7470] [ 114.866379][ T7470] audit: audit_lost=11 audit_rate_limit=0 audit_backlog_limit=64 [ 114.868875][ T29] audit: type=1326 audit(1737652938.747:4536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7469 comm="syz.7.1415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6925775d29 code=0x7ffc0000 [ 114.876877][ T7470] audit: out of memory in audit_log_start [ 114.886960][ T29] audit: type=1326 audit(1737652938.747:4537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7469 comm="syz.7.1415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6925775d29 code=0x7ffc0000 [ 115.128197][ T29] audit: type=1326 audit(1737652938.747:4538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7469 comm="syz.7.1415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6925775d29 code=0x7ffc0000 [ 115.152068][ T29] audit: type=1326 audit(1737652938.747:4539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7469 comm="syz.7.1415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6925775d29 code=0x7ffc0000 [ 115.175857][ T29] audit: type=1326 audit(1737652938.747:4540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7469 comm="syz.7.1415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6925775d29 code=0x7ffc0000 [ 115.340670][ T7491] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 115.368841][ T7495] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 115.397676][ T7491] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 115.457733][ T7491] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 115.465126][ T7495] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 [ 115.510298][ T7513] FAULT_INJECTION: forcing a failure. [ 115.510298][ T7513] name failslab, interval 1, probability 0, space 0, times 0 [ 115.523024][ T7513] CPU: 1 UID: 0 PID: 7513 Comm: syz.1.1432 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 115.523054][ T7513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 115.523128][ T7513] Call Trace: [ 115.523136][ T7513] [ 115.523146][ T7513] dump_stack_lvl+0xf2/0x150 [ 115.523174][ T7513] dump_stack+0x15/0x1a [ 115.523264][ T7513] should_fail_ex+0x223/0x230 [ 115.523293][ T7513] ? tty_open+0x80/0xb00 [ 115.523382][ T7513] should_failslab+0x8f/0xb0 [ 115.523424][ T7513] __kmalloc_cache_noprof+0x4e/0x320 [ 115.523478][ T7513] tty_open+0x80/0xb00 [ 115.523501][ T7513] ? selinux_file_open+0x34a/0x3b0 [ 115.523539][ T7513] chrdev_open+0x2f9/0x370 [ 115.523564][ T7513] ? __pfx_chrdev_open+0x10/0x10 [ 115.523589][ T7513] do_dentry_open+0x621/0xa20 [ 115.523677][ T7513] vfs_open+0x38/0x1f0 [ 115.523704][ T7513] path_openat+0x1ac2/0x1fa0 [ 115.523739][ T7513] ? _parse_integer_limit+0x167/0x180 [ 115.523774][ T7513] ? kstrtouint_from_user+0xb0/0xe0 [ 115.523854][ T7513] do_filp_open+0x107/0x230 [ 115.523934][ T7513] do_sys_openat2+0xab/0x120 [ 115.524025][ T7513] __x64_sys_openat+0xf3/0x120 [ 115.524081][ T7513] x64_sys_call+0x2b30/0x2dc0 [ 115.524108][ T7513] do_syscall_64+0xc9/0x1c0 [ 115.524171][ T7513] ? clear_bhb_loop+0x55/0xb0 [ 115.524194][ T7513] ? clear_bhb_loop+0x55/0xb0 [ 115.524248][ T7513] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.524285][ T7513] RIP: 0033:0x7f7f0aeb5d29 [ 115.524300][ T7513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.524319][ T7513] RSP: 002b:00007f7f09527038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 115.524337][ T7513] RAX: ffffffffffffffda RBX: 00007f7f0b0a5fa0 RCX: 00007f7f0aeb5d29 [ 115.524348][ T7513] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 115.524360][ T7513] RBP: 00007f7f09527090 R08: 0000000000000000 R09: 0000000000000000 [ 115.524371][ T7513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.524472][ T7513] R13: 0000000000000000 R14: 00007f7f0b0a5fa0 R15: 00007ffd6f762b58 [ 115.524489][ T7513] [ 115.748083][ T7491] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 115.849788][ T7491] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.859647][ T7528] netlink: 72 bytes leftover after parsing attributes in process `syz.1.1440'. [ 115.886710][ T7491] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.907166][ T7491] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.946985][ T7530] lo: entered allmulticast mode [ 115.965258][ T7491] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.975220][ T7530] lo: left allmulticast mode [ 116.204925][ T7562] netlink: 72 bytes leftover after parsing attributes in process `syz.5.1455'. [ 116.340690][ T7567] lo: entered allmulticast mode [ 116.346603][ T7567] lo: left allmulticast mode [ 116.437467][ T7580] block device autoloading is deprecated and will be removed. [ 116.608980][ T7593] netlink: 72 bytes leftover after parsing attributes in process `syz.1.1469'. [ 116.725343][ T7597] lo: entered allmulticast mode [ 116.731049][ T7597] lo: left allmulticast mode [ 116.929639][ T7620] netlink: 72 bytes leftover after parsing attributes in process `syz.1.1482'. [ 116.968538][ T7622] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 117.025303][ T7622] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 [ 117.082461][ T7630] lo: entered allmulticast mode [ 117.088512][ T7630] lo: left allmulticast mode [ 117.122929][ T7636] netlink: 72 bytes leftover after parsing attributes in process `syz.3.1490'. [ 117.231212][ T7650] netlink: 72 bytes leftover after parsing attributes in process `syz.9.1495'. [ 117.266531][ T7648] loop7: detected capacity change from 0 to 1024 [ 117.316947][ T7648] netlink: 40 bytes leftover after parsing attributes in process `syz.7.1494'. [ 117.522140][ T7680] FAULT_INJECTION: forcing a failure. [ 117.522140][ T7680] name failslab, interval 1, probability 0, space 0, times 0 [ 117.534888][ T7680] CPU: 0 UID: 0 PID: 7680 Comm: syz.1.1509 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 117.534944][ T7680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 117.534959][ T7680] Call Trace: [ 117.534966][ T7680] [ 117.534975][ T7680] dump_stack_lvl+0xf2/0x150 [ 117.535001][ T7680] dump_stack+0x15/0x1a [ 117.535018][ T7680] should_fail_ex+0x223/0x230 [ 117.535042][ T7680] ? rtm_new_nexthop+0x1464/0x4ad0 [ 117.535150][ T7680] should_failslab+0x8f/0xb0 [ 117.535187][ T7680] __kmalloc_cache_noprof+0x4e/0x320 [ 117.535228][ T7680] rtm_new_nexthop+0x1464/0x4ad0 [ 117.535259][ T7680] ? __memcg_slab_free_hook+0xc9/0x1e0 [ 117.535295][ T7680] ? security_capable+0x81/0x90 [ 117.535328][ T7680] ? ns_capable+0x7d/0xb0 [ 117.535379][ T7680] ? __pfx_rtm_new_nexthop+0x10/0x10 [ 117.535406][ T7680] rtnetlink_rcv_msg+0x6aa/0x710 [ 117.535431][ T7680] ? ref_tracker_free+0x3a5/0x410 [ 117.535459][ T7680] ? __dev_queue_xmit+0x186/0x2090 [ 117.535567][ T7680] netlink_rcv_skb+0x12c/0x230 [ 117.535594][ T7680] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 117.535626][ T7680] rtnetlink_rcv+0x1c/0x30 [ 117.535690][ T7680] netlink_unicast+0x599/0x670 [ 117.535717][ T7680] netlink_sendmsg+0x5cc/0x6e0 [ 117.535750][ T7680] ? __pfx_netlink_sendmsg+0x10/0x10 [ 117.535780][ T7680] __sock_sendmsg+0x140/0x180 [ 117.535826][ T7680] ____sys_sendmsg+0x312/0x410 [ 117.535853][ T7680] __sys_sendmsg+0x19d/0x230 [ 117.535961][ T7680] __x64_sys_sendmsg+0x46/0x50 [ 117.535981][ T7680] x64_sys_call+0x2734/0x2dc0 [ 117.536044][ T7680] do_syscall_64+0xc9/0x1c0 [ 117.536084][ T7680] ? clear_bhb_loop+0x55/0xb0 [ 117.536104][ T7680] ? clear_bhb_loop+0x55/0xb0 [ 117.536121][ T7680] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 117.536154][ T7680] RIP: 0033:0x7f7f0aeb5d29 [ 117.536232][ T7680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.536251][ T7680] RSP: 002b:00007f7f09527038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 117.536273][ T7680] RAX: ffffffffffffffda RBX: 00007f7f0b0a5fa0 RCX: 00007f7f0aeb5d29 [ 117.536286][ T7680] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 117.536297][ T7680] RBP: 00007f7f09527090 R08: 0000000000000000 R09: 0000000000000000 [ 117.536315][ T7680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.536329][ T7680] R13: 0000000000000000 R14: 00007f7f0b0a5fa0 R15: 00007ffd6f762b58 [ 117.536350][ T7680] [ 117.562243][ T7684] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 117.631971][ T7687] loop3: detected capacity change from 0 to 1024 [ 118.320005][ T7735] lo: entered allmulticast mode [ 118.320673][ T7735] lo: left allmulticast mode [ 118.608471][ T7754] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 118.787741][ T7772] syz.9.1552[7772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.787816][ T7772] syz.9.1552[7772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.816875][ T7772] syz.9.1552[7772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.206224][ T7800] netlink: 'syz.9.1565': attribute type 10 has an invalid length. [ 119.253490][ T7800] team0: Port device geneve1 added [ 119.329193][ T7815] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 119.429009][ T7825] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 119.642521][ T29] kauditd_printk_skb: 384 callbacks suppressed [ 119.642572][ T29] audit: type=1326 audit(1737652943.247:4925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7848 comm="syz.9.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3edc325d29 code=0x7ffc0000 [ 119.721470][ T29] audit: type=1326 audit(1737652943.256:4926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7846 comm="syz.5.1589" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f8f051b5d29 code=0x0 [ 119.744453][ T29] audit: type=1326 audit(1737652943.256:4927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7848 comm="syz.9.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3edc325d29 code=0x7ffc0000 [ 119.767937][ T29] audit: type=1326 audit(1737652943.256:4928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7848 comm="syz.9.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3edc325d29 code=0x7ffc0000 [ 119.791585][ T29] audit: type=1326 audit(1737652943.256:4929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7848 comm="syz.9.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3edc325d29 code=0x7ffc0000 [ 119.818198][ T29] audit: type=1326 audit(1737652943.256:4930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7848 comm="syz.9.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3edc325d29 code=0x7ffc0000 [ 119.842038][ T29] audit: type=1326 audit(1737652943.256:4931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7848 comm="syz.9.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3edc325d29 code=0x7ffc0000 [ 119.865527][ T29] audit: type=1326 audit(1737652943.256:4932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7848 comm="syz.9.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3edc325d29 code=0x7ffc0000 [ 119.889028][ T29] audit: type=1326 audit(1737652943.256:4933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7848 comm="syz.9.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3edc325d29 code=0x7ffc0000 [ 119.912468][ T29] audit: type=1326 audit(1737652943.256:4934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7848 comm="syz.9.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3edc325d29 code=0x7ffc0000 [ 120.282826][ T7876] lo: entered allmulticast mode [ 120.310866][ T7876] lo: left allmulticast mode [ 120.563326][ T7894] FAULT_INJECTION: forcing a failure. [ 120.563326][ T7894] name failslab, interval 1, probability 0, space 0, times 0 [ 120.576067][ T7894] CPU: 1 UID: 0 PID: 7894 Comm: syz.7.1608 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 120.576106][ T7894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 120.576121][ T7894] Call Trace: [ 120.576129][ T7894] [ 120.576138][ T7894] dump_stack_lvl+0xf2/0x150 [ 120.576163][ T7894] dump_stack+0x15/0x1a [ 120.576242][ T7894] should_fail_ex+0x223/0x230 [ 120.576268][ T7894] ? fsnotify_alloc_group+0x5b/0x170 [ 120.576295][ T7894] should_failslab+0x8f/0xb0 [ 120.576383][ T7894] __kmalloc_cache_noprof+0x4e/0x320 [ 120.576439][ T7894] fsnotify_alloc_group+0x5b/0x170 [ 120.576474][ T7894] do_inotify_init+0x5a/0x270 [ 120.576514][ T7894] __x64_sys_inotify_init1+0x1e/0x30 [ 120.576554][ T7894] x64_sys_call+0x1434/0x2dc0 [ 120.576597][ T7894] do_syscall_64+0xc9/0x1c0 [ 120.576713][ T7894] ? clear_bhb_loop+0x55/0xb0 [ 120.576737][ T7894] ? clear_bhb_loop+0x55/0xb0 [ 120.576760][ T7894] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 120.576803][ T7894] RIP: 0033:0x7f6925775d29 [ 120.576829][ T7894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.576846][ T7894] RSP: 002b:00007f6923de1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000126 [ 120.576867][ T7894] RAX: ffffffffffffffda RBX: 00007f6925965fa0 RCX: 00007f6925775d29 [ 120.576883][ T7894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 120.576897][ T7894] RBP: 00007f6923de1090 R08: 0000000000000000 R09: 0000000000000000 [ 120.576912][ T7894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.576926][ T7894] R13: 0000000000000000 R14: 00007f6925965fa0 R15: 00007ffd1eb62ec8 [ 120.576956][ T7894] [ 120.994486][ T7907] lo: entered allmulticast mode [ 121.000534][ T7913] hub 2-0:1.0: USB hub found [ 121.006782][ T7913] hub 2-0:1.0: 8 ports detected [ 121.010447][ T7907] lo: left allmulticast mode [ 121.112498][ T7929] loop7: detected capacity change from 0 to 128 [ 121.244341][ T7922] wireguard0: entered promiscuous mode [ 121.249915][ T7922] wireguard0: entered allmulticast mode [ 121.451110][ T7958] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 121.454815][ T7950] lo: entered allmulticast mode [ 121.482947][ T7950] lo: left allmulticast mode [ 121.796270][ T7986] batadv_slave_1: entered promiscuous mode [ 121.805632][ T7984] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7984 comm=syz.5.1646 [ 122.011682][ T8014] netlink: 'syz.1.1654': attribute type 1 has an invalid length. [ 122.019532][ T8014] __nla_validate_parse: 7 callbacks suppressed [ 122.019545][ T8014] netlink: 220 bytes leftover after parsing attributes in process `syz.1.1654'. [ 122.146866][ T8027] FAULT_INJECTION: forcing a failure. [ 122.146866][ T8027] name failslab, interval 1, probability 0, space 0, times 0 [ 122.146959][ T8025] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1664'. [ 122.159619][ T8027] CPU: 1 UID: 0 PID: 8027 Comm: syz.3.1665 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 122.159652][ T8027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 122.159674][ T8027] Call Trace: [ 122.159683][ T8027] [ 122.159694][ T8027] dump_stack_lvl+0xf2/0x150 [ 122.159722][ T8027] dump_stack+0x15/0x1a [ 122.159742][ T8027] should_fail_ex+0x223/0x230 [ 122.159775][ T8027] should_failslab+0x8f/0xb0 [ 122.159829][ T8027] __kmalloc_noprof+0xab/0x3f0 [ 122.159862][ T8027] ? nla_strdup+0x7a/0xc0 [ 122.159948][ T8027] nla_strdup+0x7a/0xc0 [ 122.159981][ T8027] nf_tables_newtable+0x3e7/0xee0 [ 122.160016][ T8027] nfnetlink_rcv+0xb3e/0x15d0 [ 122.160049][ T8027] ? kmem_cache_free+0xdc/0x2d0 [ 122.160122][ T8027] netlink_unicast+0x599/0x670 [ 122.160151][ T8027] netlink_sendmsg+0x5cc/0x6e0 [ 122.160185][ T8027] ? __pfx_netlink_sendmsg+0x10/0x10 [ 122.160215][ T8027] __sock_sendmsg+0x140/0x180 [ 122.160247][ T8027] ____sys_sendmsg+0x312/0x410 [ 122.160348][ T8027] __sys_sendmsg+0x19d/0x230 [ 122.160459][ T8027] __x64_sys_sendmsg+0x46/0x50 [ 122.160483][ T8027] x64_sys_call+0x2734/0x2dc0 [ 122.160518][ T8027] do_syscall_64+0xc9/0x1c0 [ 122.160655][ T8027] ? clear_bhb_loop+0x55/0xb0 [ 122.160678][ T8027] ? clear_bhb_loop+0x55/0xb0 [ 122.160701][ T8027] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 122.160810][ T8027] RIP: 0033:0x7f9c6bec5d29 [ 122.160830][ T8027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.160862][ T8027] RSP: 002b:00007f9c6a531038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 122.160885][ T8027] RAX: ffffffffffffffda RBX: 00007f9c6c0b5fa0 RCX: 00007f9c6bec5d29 [ 122.160947][ T8027] RDX: 0000000000000040 RSI: 0000000020000200 RDI: 0000000000000003 [ 122.160961][ T8027] RBP: 00007f9c6a531090 R08: 0000000000000000 R09: 0000000000000000 [ 122.160976][ T8027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 122.160996][ T8027] R13: 0000000000000000 R14: 00007f9c6c0b5fa0 R15: 00007ffef50bdf28 [ 122.161018][ T8027] [ 122.162449][ T8022] team0: Device gtp0 is of different type [ 122.479058][ T8030] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8030 comm=syz.9.1666 [ 122.604599][ T8046] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 122.641584][ T8047] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 122.807355][ T8056] block device autoloading is deprecated and will be removed. [ 123.043542][ T8077] lo: entered allmulticast mode [ 123.048708][ T8077] lo: left allmulticast mode [ 123.207125][ T8097] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 123.240136][ T8101] syz.3.1697[8101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.242578][ T8101] syz.3.1697[8101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.258848][ T8103] syz.5.1699[8103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.270308][ T8101] syz.3.1697[8101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.304430][ T8103] syz.5.1699[8103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.372290][ T8103] syz.5.1699[8103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.415726][ T8114] lo: entered allmulticast mode [ 123.432537][ T8114] lo: left allmulticast mode [ 123.583278][ T8123] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1707'. [ 123.656346][ T8137] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 123.667481][ T8135] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 123.687961][ T8139] usb usb8: usbfs: process 8139 (syz.7.1715) did not claim interface 0 before use [ 123.724883][ T8141] lo: entered allmulticast mode [ 123.760639][ T8141] lo: left allmulticast mode [ 124.061884][ T8171] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 124.073701][ T8174] lo: entered allmulticast mode [ 124.103531][ T8174] lo: left allmulticast mode [ 124.297480][ T8195] FAULT_INJECTION: forcing a failure. [ 124.297480][ T8195] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 124.310618][ T8195] CPU: 0 UID: 0 PID: 8195 Comm: syz.1.1741 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 124.310647][ T8195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 124.310660][ T8195] Call Trace: [ 124.310667][ T8195] [ 124.310675][ T8195] dump_stack_lvl+0xf2/0x150 [ 124.310702][ T8195] dump_stack+0x15/0x1a [ 124.310739][ T8195] should_fail_ex+0x223/0x230 [ 124.310771][ T8195] should_fail+0xb/0x10 [ 124.310798][ T8195] should_fail_usercopy+0x1a/0x20 [ 124.310871][ T8195] _copy_from_user+0x1c/0xa0 [ 124.310907][ T8195] inet6_ioctl+0xf2/0x190 [ 124.310990][ T8195] sock_do_ioctl+0x81/0x260 [ 124.311020][ T8195] sock_ioctl+0x40f/0x600 [ 124.311044][ T8195] ? __pfx_sock_ioctl+0x10/0x10 [ 124.311124][ T8195] __se_sys_ioctl+0xc9/0x140 [ 124.311153][ T8195] __x64_sys_ioctl+0x43/0x50 [ 124.311180][ T8195] x64_sys_call+0x1690/0x2dc0 [ 124.311203][ T8195] do_syscall_64+0xc9/0x1c0 [ 124.311298][ T8195] ? clear_bhb_loop+0x55/0xb0 [ 124.311322][ T8195] ? clear_bhb_loop+0x55/0xb0 [ 124.311344][ T8195] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 124.311385][ T8195] RIP: 0033:0x7f7f0aeb5d29 [ 124.311466][ T8195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.311487][ T8195] RSP: 002b:00007f7f09527038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 124.311508][ T8195] RAX: ffffffffffffffda RBX: 00007f7f0b0a5fa0 RCX: 00007f7f0aeb5d29 [ 124.311523][ T8195] RDX: 00000000200002c0 RSI: 000000000000890b RDI: 0000000000000003 [ 124.311537][ T8195] RBP: 00007f7f09527090 R08: 0000000000000000 R09: 0000000000000000 [ 124.311551][ T8195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 124.311570][ T8195] R13: 0000000000000000 R14: 00007f7f0b0a5fa0 R15: 00007ffd6f762b58 [ 124.311592][ T8195] [ 124.578705][ T8202] lo: entered allmulticast mode [ 124.595077][ T8202] lo: left allmulticast mode [ 124.631207][ T8206] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 124.981000][ T8231] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1756'. [ 124.991353][ T8233] lo: entered allmulticast mode [ 124.996796][ T8233] lo: left allmulticast mode [ 125.075911][ T8237] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 125.198989][ T29] kauditd_printk_skb: 524 callbacks suppressed [ 125.199007][ T29] audit: type=1326 audit(1737652948.439:5459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.1.1766" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 125.275034][ T29] audit: type=1326 audit(1737652948.476:5460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.1.1766" exe="/root/syz-executor" sig=0 arch=c000003e syscall=28 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 125.298529][ T29] audit: type=1326 audit(1737652948.476:5461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.1.1766" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 125.322061][ T29] audit: type=1326 audit(1737652948.476:5462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.1.1766" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 125.345626][ T29] audit: type=1326 audit(1737652948.476:5463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.1.1766" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 125.369327][ T29] audit: type=1326 audit(1737652948.486:5464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.1.1766" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 125.392653][ T29] audit: type=1326 audit(1737652948.486:5465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.1.1766" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 125.416111][ T29] audit: type=1326 audit(1737652948.486:5466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.1.1766" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 125.439538][ T29] audit: type=1326 audit(1737652948.486:5467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.1.1766" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 125.463363][ T29] audit: type=1326 audit(1737652948.486:5468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.1.1766" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 125.492541][ T8259] lo: entered allmulticast mode [ 125.499245][ T8259] lo: left allmulticast mode [ 125.801505][ T8285] lo: entered allmulticast mode [ 125.815074][ T8285] lo: left allmulticast mode [ 125.930678][ T8294] syz.9.1786[8294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.930734][ T8294] syz.9.1786[8294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.942996][ T8294] syz.9.1786[8294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.197253][ T8313] lo: entered allmulticast mode [ 126.250507][ T8313] lo: left allmulticast mode [ 126.701634][ T8341] lo: entered allmulticast mode [ 126.706797][ T8341] lo: left allmulticast mode [ 127.092579][ T8371] lo: entered allmulticast mode [ 127.121384][ T8371] lo: left allmulticast mode [ 127.417437][ T8385] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 127.719362][ T8405] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 127.810968][ T8408] block device autoloading is deprecated and will be removed. [ 127.984828][ T8427] 9pnet_fd: Insufficient options for proto=fd [ 128.006047][ T8427] GUP no longer grows the stack in syz.1.1847 (8427): 20004000-20008000 (20002000) [ 128.015485][ T8427] CPU: 1 UID: 0 PID: 8427 Comm: syz.1.1847 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 128.015513][ T8427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 128.015528][ T8427] Call Trace: [ 128.015562][ T8427] [ 128.015571][ T8427] dump_stack_lvl+0xf2/0x150 [ 128.015598][ T8427] dump_stack+0x15/0x1a [ 128.015616][ T8427] __get_user_pages+0x209b/0x2670 [ 128.015682][ T8427] ? __rcu_read_unlock+0x4e/0x70 [ 128.015759][ T8427] get_user_pages_remote+0x1df/0x790 [ 128.015805][ T8427] __access_remote_vm+0x15b/0x580 [ 128.015836][ T8427] access_remote_vm+0x34/0x50 [ 128.015862][ T8427] proc_pid_cmdline_read+0x3e6/0x660 [ 128.015973][ T8427] vfs_readv+0x3e2/0x660 [ 128.015998][ T8427] ? __pfx_proc_pid_cmdline_read+0x10/0x10 [ 128.016053][ T8427] __x64_sys_preadv+0xf4/0x1c0 [ 128.016140][ T8427] x64_sys_call+0x2680/0x2dc0 [ 128.016162][ T8427] do_syscall_64+0xc9/0x1c0 [ 128.016196][ T8427] ? clear_bhb_loop+0x55/0xb0 [ 128.016215][ T8427] ? clear_bhb_loop+0x55/0xb0 [ 128.016285][ T8427] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 128.016325][ T8427] RIP: 0033:0x7f7f0aeb5d29 [ 128.016342][ T8427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.016362][ T8427] RSP: 002b:00007f7f09527038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 128.016383][ T8427] RAX: ffffffffffffffda RBX: 00007f7f0b0a5fa0 RCX: 00007f7f0aeb5d29 [ 128.016395][ T8427] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000006 [ 128.016436][ T8427] RBP: 00007f7f0af31b08 R08: 0000000000000000 R09: 0000000000000000 [ 128.016448][ T8427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 128.016459][ T8427] R13: 0000000000000000 R14: 00007f7f0b0a5fa0 R15: 00007ffd6f762b58 [ 128.016479][ T8427] [ 128.272329][ T8437] netlink: 40 bytes leftover after parsing attributes in process `syz.5.1851'. [ 128.349333][ T8431] netlink: 'syz.1.1847': attribute type 5 has an invalid length. [ 128.406147][ T8448] netlink: 12 bytes leftover after parsing attributes in process `syz.9.1855'. [ 128.660001][ T8462] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 128.795141][ T8470] FAULT_INJECTION: forcing a failure. [ 128.795141][ T8470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.808363][ T8470] CPU: 0 UID: 0 PID: 8470 Comm: syz.7.1864 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 128.808465][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 128.808477][ T8470] Call Trace: [ 128.808482][ T8470] [ 128.808488][ T8470] dump_stack_lvl+0xf2/0x150 [ 128.808512][ T8470] dump_stack+0x15/0x1a [ 128.808529][ T8470] should_fail_ex+0x223/0x230 [ 128.808573][ T8470] should_fail+0xb/0x10 [ 128.808599][ T8470] should_fail_usercopy+0x1a/0x20 [ 128.808624][ T8470] _copy_from_user+0x1c/0xa0 [ 128.808656][ T8470] bpf_test_init+0x105/0x170 [ 128.808690][ T8470] bpf_prog_test_run_skb+0x153/0xc00 [ 128.808714][ T8470] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 128.808741][ T8470] bpf_prog_test_run+0x20f/0x3a0 [ 128.808771][ T8470] __sys_bpf+0x400/0x7a0 [ 128.808844][ T8470] __x64_sys_bpf+0x43/0x50 [ 128.808861][ T8470] x64_sys_call+0x2914/0x2dc0 [ 128.808884][ T8470] do_syscall_64+0xc9/0x1c0 [ 128.808961][ T8470] ? clear_bhb_loop+0x55/0xb0 [ 128.808979][ T8470] ? clear_bhb_loop+0x55/0xb0 [ 128.808996][ T8470] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 128.809029][ T8470] RIP: 0033:0x7f6925775d29 [ 128.809121][ T8470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.809142][ T8470] RSP: 002b:00007f6923de1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 128.809161][ T8470] RAX: ffffffffffffffda RBX: 00007f6925965fa0 RCX: 00007f6925775d29 [ 128.809171][ T8470] RDX: 0000000000000048 RSI: 0000000020000040 RDI: 000000000000000a [ 128.809182][ T8470] RBP: 00007f6923de1090 R08: 0000000000000000 R09: 0000000000000000 [ 128.809193][ T8470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.809205][ T8470] R13: 0000000000000000 R14: 00007f6925965fa0 R15: 00007ffd1eb62ec8 [ 128.809221][ T8470] [ 129.128009][ T8485] Invalid ELF header magic: != ELF [ 129.244192][ T8493] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 129.539307][ T8520] netlink: 12 bytes leftover after parsing attributes in process `syz.7.1887'. [ 129.984987][ T8569] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 130.117385][ T8577] netlink: 12 bytes leftover after parsing attributes in process `syz.9.1914'. [ 130.170797][ T8579] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 130.215508][ T8589] block device autoloading is deprecated and will be removed. [ 130.232388][ T8589] syz.3.1919: attempt to access beyond end of device [ 130.232388][ T8589] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 130.275823][ T8594] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1921'. [ 130.285423][ T8594] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1921'. [ 130.549819][ T8613] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1928'. [ 130.609969][ T29] kauditd_printk_skb: 448 callbacks suppressed [ 130.609985][ T29] audit: type=1326 audit(1737652953.499:5917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8618 comm="syz.5.1931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 130.667675][ T8624] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 130.688040][ T29] audit: type=1326 audit(1737652953.537:5918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8618 comm="syz.5.1931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 130.711578][ T29] audit: type=1326 audit(1737652953.537:5919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8618 comm="syz.5.1931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 130.735185][ T29] audit: type=1326 audit(1737652953.537:5920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8618 comm="syz.5.1931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 130.758870][ T29] audit: type=1326 audit(1737652953.537:5921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8618 comm="syz.5.1931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 130.782534][ T29] audit: type=1326 audit(1737652953.537:5922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8618 comm="syz.5.1931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 130.806076][ T29] audit: type=1326 audit(1737652953.537:5923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8618 comm="syz.5.1931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 130.819876][ T8620] netlink: 296 bytes leftover after parsing attributes in process `syz.7.1932'. [ 130.829500][ T29] audit: type=1326 audit(1737652953.537:5924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8618 comm="syz.5.1931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 130.829535][ T29] audit: type=1326 audit(1737652953.537:5925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8618 comm="syz.5.1931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 130.838584][ T8620] unsupported nlmsg_type 40 [ 130.862062][ T29] audit: type=1326 audit(1737652953.537:5926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8618 comm="syz.5.1931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 130.959423][ T8632] block device autoloading is deprecated and will be removed. [ 130.959672][ T8634] FAULT_INJECTION: forcing a failure. [ 130.959672][ T8634] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 130.980027][ T8634] CPU: 1 UID: 0 PID: 8634 Comm: syz.9.1938 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 130.980055][ T8634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 130.980068][ T8634] Call Trace: [ 130.980075][ T8634] [ 130.980084][ T8634] dump_stack_lvl+0xf2/0x150 [ 130.980110][ T8634] dump_stack+0x15/0x1a [ 130.980165][ T8634] should_fail_ex+0x223/0x230 [ 130.980251][ T8634] should_fail+0xb/0x10 [ 130.980279][ T8634] should_fail_usercopy+0x1a/0x20 [ 130.980332][ T8634] _copy_from_user+0x1c/0xa0 [ 130.980372][ T8634] copy_msghdr_from_user+0x54/0x2a0 [ 130.980435][ T8634] ? __fget_files+0x17c/0x1c0 [ 130.980465][ T8634] __sys_sendmsg+0x13e/0x230 [ 130.980525][ T8634] __x64_sys_sendmsg+0x46/0x50 [ 130.980551][ T8634] x64_sys_call+0x2734/0x2dc0 [ 130.980578][ T8634] do_syscall_64+0xc9/0x1c0 [ 130.980678][ T8634] ? clear_bhb_loop+0x55/0xb0 [ 130.980702][ T8634] ? clear_bhb_loop+0x55/0xb0 [ 130.980725][ T8634] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 130.980912][ T8634] RIP: 0033:0x7f3edc325d29 [ 130.980932][ T8634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.981026][ T8634] RSP: 002b:00007f3eda997038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 130.981049][ T8634] RAX: ffffffffffffffda RBX: 00007f3edc515fa0 RCX: 00007f3edc325d29 [ 130.981065][ T8634] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000003 [ 130.981079][ T8634] RBP: 00007f3eda997090 R08: 0000000000000000 R09: 0000000000000000 [ 130.981091][ T8634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.981105][ T8634] R13: 0000000000000000 R14: 00007f3edc515fa0 R15: 00007ffeec388748 [ 130.981126][ T8634] [ 131.238640][ T8643] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1943'. [ 131.250140][ T8638] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. [ 131.377342][ T8659] FAULT_INJECTION: forcing a failure. [ 131.377342][ T8659] name failslab, interval 1, probability 0, space 0, times 0 [ 131.390114][ T8659] CPU: 1 UID: 0 PID: 8659 Comm: syz.5.1950 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 131.390139][ T8659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 131.390153][ T8659] Call Trace: [ 131.390161][ T8659] [ 131.390172][ T8659] dump_stack_lvl+0xf2/0x150 [ 131.390269][ T8659] dump_stack+0x15/0x1a [ 131.390284][ T8659] should_fail_ex+0x223/0x230 [ 131.390310][ T8659] should_failslab+0x8f/0xb0 [ 131.390365][ T8659] kmem_cache_alloc_node_noprof+0x59/0x320 [ 131.390401][ T8659] ? __alloc_skb+0x10b/0x310 [ 131.390439][ T8659] ? security_capable+0x81/0x90 [ 131.390493][ T8659] __alloc_skb+0x10b/0x310 [ 131.390589][ T8659] netlink_ack+0xef/0x4f0 [ 131.390663][ T8659] ? avc_has_perm_noaudit+0x1cc/0x210 [ 131.390708][ T8659] netlink_rcv_skb+0x19c/0x230 [ 131.390735][ T8659] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 131.390833][ T8659] rtnetlink_rcv+0x1c/0x30 [ 131.390912][ T8659] netlink_unicast+0x599/0x670 [ 131.390940][ T8659] netlink_sendmsg+0x5cc/0x6e0 [ 131.391044][ T8659] ? __pfx_netlink_sendmsg+0x10/0x10 [ 131.391071][ T8659] __sock_sendmsg+0x140/0x180 [ 131.391100][ T8659] ____sys_sendmsg+0x312/0x410 [ 131.391132][ T8659] __sys_sendmsg+0x19d/0x230 [ 131.391170][ T8659] __x64_sys_sendmsg+0x46/0x50 [ 131.391196][ T8659] x64_sys_call+0x2734/0x2dc0 [ 131.391227][ T8659] do_syscall_64+0xc9/0x1c0 [ 131.391258][ T8659] ? clear_bhb_loop+0x55/0xb0 [ 131.391276][ T8659] ? clear_bhb_loop+0x55/0xb0 [ 131.391313][ T8659] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 131.391405][ T8659] RIP: 0033:0x7f8f051b5d29 [ 131.391422][ T8659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.391445][ T8659] RSP: 002b:00007f8f03821038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 131.391468][ T8659] RAX: ffffffffffffffda RBX: 00007f8f053a5fa0 RCX: 00007f8f051b5d29 [ 131.391483][ T8659] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 131.391525][ T8659] RBP: 00007f8f03821090 R08: 0000000000000000 R09: 0000000000000000 [ 131.391540][ T8659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.391553][ T8659] R13: 0000000000000000 R14: 00007f8f053a5fa0 R15: 00007fffdeb90c98 [ 131.391572][ T8659] [ 131.767862][ T8667] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 131.815782][ T8677] tipc: Enabling of bearer rejected, media not registered [ 131.848579][ T8683] bridge0: entered promiscuous mode [ 131.869098][ T8677] loop7: detected capacity change from 0 to 512 [ 131.876170][ T8683] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1961'. [ 131.887007][ T8677] SELinux: security_context_str_to_sid (unconfined_u,errors=continue) failed with errno=-22 [ 131.898923][ T8683] bridge_slave_1: left allmulticast mode [ 131.904597][ T8683] bridge_slave_1: left promiscuous mode [ 131.910406][ T8683] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.978099][ T8683] bridge_slave_0: left allmulticast mode [ 131.983861][ T8683] bridge_slave_0: left promiscuous mode [ 131.989627][ T8683] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.068854][ T8683] bridge0 (unregistering): left promiscuous mode [ 132.159558][ T8701] loop7: detected capacity change from 0 to 1024 [ 132.186223][ T8701] EXT4-fs: Ignoring removed orlov option [ 132.192003][ T8701] EXT4-fs: Ignoring removed orlov option [ 132.197744][ T8701] EXT4-fs: Ignoring removed oldalloc option [ 132.275073][ T8701] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 132.286052][ T8701] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (12914!=20869) [ 132.305623][ T8707] FAULT_INJECTION: forcing a failure. [ 132.305623][ T8707] name failslab, interval 1, probability 0, space 0, times 0 [ 132.318405][ T8707] CPU: 0 UID: 0 PID: 8707 Comm: syz.1.1968 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 132.318435][ T8707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 132.318543][ T8707] Call Trace: [ 132.318550][ T8707] [ 132.318559][ T8707] dump_stack_lvl+0xf2/0x150 [ 132.318588][ T8707] dump_stack+0x15/0x1a [ 132.318608][ T8707] should_fail_ex+0x223/0x230 [ 132.318639][ T8707] ? syslog_print_all+0x80/0x5c0 [ 132.318697][ T8707] should_failslab+0x8f/0xb0 [ 132.318739][ T8707] __kmalloc_cache_noprof+0x4e/0x320 [ 132.318775][ T8707] syslog_print_all+0x80/0x5c0 [ 132.318810][ T8707] ? kstrtouint+0x77/0xc0 [ 132.318835][ T8707] ? __rcu_read_unlock+0x4e/0x70 [ 132.318936][ T8707] ? avc_has_perm_noaudit+0x1cc/0x210 [ 132.318989][ T8707] ? selinux_syslog+0xec/0x100 [ 132.319014][ T8707] do_syslog+0x431/0x7f0 [ 132.319042][ T8707] ? __fget_files+0x17c/0x1c0 [ 132.319070][ T8707] ? ksys_write+0x176/0x1b0 [ 132.319108][ T8707] __x64_sys_syslog+0x43/0x50 [ 132.319216][ T8707] x64_sys_call+0x29be/0x2dc0 [ 132.319241][ T8707] do_syscall_64+0xc9/0x1c0 [ 132.319272][ T8707] ? clear_bhb_loop+0x55/0xb0 [ 132.319294][ T8707] ? clear_bhb_loop+0x55/0xb0 [ 132.319395][ T8707] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 132.319437][ T8707] RIP: 0033:0x7f7f0aeb5d29 [ 132.319455][ T8707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.319477][ T8707] RSP: 002b:00007f7f09506038 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 132.319499][ T8707] RAX: ffffffffffffffda RBX: 00007f7f0b0a6080 RCX: 00007f7f0aeb5d29 [ 132.319514][ T8707] RDX: 00000000000000b7 RSI: 0000000020002180 RDI: 0000000000000003 [ 132.319529][ T8707] RBP: 00007f7f09506090 R08: 0000000000000000 R09: 0000000000000000 [ 132.319544][ T8707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.319610][ T8707] R13: 0000000000000000 R14: 00007f7f0b0a6080 R15: 00007ffd6f762b58 [ 132.319629][ T8707] [ 132.534152][ T8701] EXT4-fs (loop7): invalid journal inode [ 132.558791][ T8701] EXT4-fs (loop7): can't get journal size [ 132.587186][ T8701] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 132.895804][ T4979] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 133.187277][ T8769] x_tables: eb_tables: nflog.0 target: invalid size 80 (kernel) != (user) 0 [ 133.377854][ T8792] x_tables: eb_tables: nflog.0 target: invalid size 80 (kernel) != (user) 0 [ 133.666708][ T8819] FAULT_INJECTION: forcing a failure. [ 133.666708][ T8819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.684105][ T8819] CPU: 0 UID: 0 PID: 8819 Comm: syz.5.2017 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 133.684135][ T8819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 133.684209][ T8819] Call Trace: [ 133.684217][ T8819] [ 133.684226][ T8819] dump_stack_lvl+0xf2/0x150 [ 133.684254][ T8819] dump_stack+0x15/0x1a [ 133.684274][ T8819] should_fail_ex+0x223/0x230 [ 133.684306][ T8819] should_fail+0xb/0x10 [ 133.684334][ T8819] should_fail_usercopy+0x1a/0x20 [ 133.684379][ T8819] _copy_to_user+0x20/0xa0 [ 133.684415][ T8819] simple_read_from_buffer+0xa0/0x110 [ 133.684446][ T8819] proc_fail_nth_read+0xf9/0x140 [ 133.684482][ T8819] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 133.684584][ T8819] vfs_read+0x1a2/0x700 [ 133.684618][ T8819] ? __rcu_read_unlock+0x4e/0x70 [ 133.684655][ T8819] ? __fget_files+0x17c/0x1c0 [ 133.684700][ T8819] ksys_read+0xe8/0x1b0 [ 133.684733][ T8819] __x64_sys_read+0x42/0x50 [ 133.684782][ T8819] x64_sys_call+0x2874/0x2dc0 [ 133.684808][ T8819] do_syscall_64+0xc9/0x1c0 [ 133.684909][ T8819] ? clear_bhb_loop+0x55/0xb0 [ 133.684928][ T8819] ? clear_bhb_loop+0x55/0xb0 [ 133.684949][ T8819] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 133.684986][ T8819] RIP: 0033:0x7f8f051b473c [ 133.685083][ T8819] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 133.685105][ T8819] RSP: 002b:00007f8f03821030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 133.685127][ T8819] RAX: ffffffffffffffda RBX: 00007f8f053a5fa0 RCX: 00007f8f051b473c [ 133.685142][ T8819] RDX: 000000000000000f RSI: 00007f8f038210a0 RDI: 0000000000000005 [ 133.685154][ T8819] RBP: 00007f8f03821090 R08: 0000000000000000 R09: 0000000000000000 [ 133.685165][ T8819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.685176][ T8819] R13: 0000000000000000 R14: 00007f8f053a5fa0 R15: 00007fffdeb90c98 [ 133.685228][ T8819] [ 134.068034][ T8837] xt_CT: You must specify a L4 protocol and not use inversions on it [ 134.095711][ T8845] __nla_validate_parse: 2 callbacks suppressed [ 134.095731][ T8845] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2027'. [ 134.682753][ T8882] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2044'. [ 134.718373][ T8885] xt_connbytes: Forcing CT accounting to be enabled [ 134.741176][ T8885] Cannot find set identified by id 0 to match [ 134.953790][ T8899] FAULT_INJECTION: forcing a failure. [ 134.953790][ T8899] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.966979][ T8899] CPU: 0 UID: 0 PID: 8899 Comm: syz.5.2053 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 134.967008][ T8899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 134.967023][ T8899] Call Trace: [ 134.967031][ T8899] [ 134.967041][ T8899] dump_stack_lvl+0xf2/0x150 [ 134.967068][ T8899] dump_stack+0x15/0x1a [ 134.967226][ T8899] should_fail_ex+0x223/0x230 [ 134.967255][ T8899] should_fail+0xb/0x10 [ 134.967277][ T8899] should_fail_usercopy+0x1a/0x20 [ 134.967332][ T8899] strncpy_from_user+0x25/0x210 [ 134.967356][ T8899] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 134.967467][ T8899] ? getname_flags+0x81/0x3b0 [ 134.967495][ T8899] getname_flags+0xb0/0x3b0 [ 134.967523][ T8899] user_path_at+0x26/0x120 [ 134.967553][ T8899] __se_sys_mount_setattr+0x49c/0x1320 [ 134.967647][ T8899] ? fput+0x1c4/0x200 [ 134.967678][ T8899] __x64_sys_mount_setattr+0x67/0x80 [ 134.967701][ T8899] x64_sys_call+0x2c0c/0x2dc0 [ 134.967726][ T8899] do_syscall_64+0xc9/0x1c0 [ 134.967808][ T8899] ? clear_bhb_loop+0x55/0xb0 [ 134.967825][ T8899] ? clear_bhb_loop+0x55/0xb0 [ 134.967859][ T8899] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 134.967979][ T8899] RIP: 0033:0x7f8f051b5d29 [ 134.967997][ T8899] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.968030][ T8899] RSP: 002b:00007f8f03821038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ba [ 134.968090][ T8899] RAX: ffffffffffffffda RBX: 00007f8f053a5fa0 RCX: 00007f8f051b5d29 [ 134.968101][ T8899] RDX: 0000000000000000 RSI: 0000000020001d80 RDI: ffffffffffffffff [ 134.968115][ T8899] RBP: 00007f8f03821090 R08: 0000000000000020 R09: 0000000000000000 [ 134.968130][ T8899] R10: 0000000020001dc0 R11: 0000000000000246 R12: 0000000000000001 [ 134.968144][ T8899] R13: 0000000000000000 R14: 00007f8f053a5fa0 R15: 00007fffdeb90c98 [ 134.968166][ T8899] [ 134.971341][ T8900] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 135.390910][ T8929] bond1: entered promiscuous mode [ 135.396244][ T8929] bond1: entered allmulticast mode [ 135.402520][ T8929] 8021q: adding VLAN 0 to HW filter on device bond1 [ 135.415582][ T8929] bond1 (unregistering): Released all slaves [ 135.528676][ T8945] syz.9.2073[8945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.528865][ T8945] syz.9.2073[8945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.549113][ T8940] vhci_hcd: invalid port number 15 [ 135.565686][ T8940] vhci_hcd: USB_PORT_FEAT_LINK_STATE req not supported for USB 2.0 roothub [ 135.587245][ T8945] syz.9.2073[8945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.601482][ T8945] netlink: 8 bytes leftover after parsing attributes in process `syz.9.2073'. [ 135.621877][ T8945] netlink: 24 bytes leftover after parsing attributes in process `syz.9.2073'. [ 135.672605][ T8950] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2077'. [ 135.681532][ T8950] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2077'. [ 135.710744][ T8950] netdevsim netdevsim3 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 135.719194][ T8950] netdevsim netdevsim3 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 135.727808][ T8950] netdevsim netdevsim3 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 135.736298][ T8950] netdevsim netdevsim3 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 135.897518][ T8962] bond1: entered promiscuous mode [ 135.902691][ T8962] bond1: entered allmulticast mode [ 135.928188][ T8962] 8021q: adding VLAN 0 to HW filter on device bond1 [ 135.950171][ T8962] bond1 (unregistering): Released all slaves [ 136.075627][ T29] kauditd_printk_skb: 313 callbacks suppressed [ 136.075643][ T29] audit: type=1326 audit(1737652958.616:6240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8968 comm="syz.1.2084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 136.182969][ T29] audit: type=1326 audit(1737652958.616:6241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8968 comm="syz.1.2084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 136.206822][ T29] audit: type=1326 audit(1737652958.616:6242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8968 comm="syz.1.2084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 136.230379][ T29] audit: type=1326 audit(1737652958.616:6243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8968 comm="syz.1.2084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 136.254097][ T29] audit: type=1326 audit(1737652958.616:6244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8968 comm="syz.1.2084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 136.277597][ T29] audit: type=1326 audit(1737652958.616:6245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8968 comm="syz.1.2084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 136.301200][ T29] audit: type=1326 audit(1737652958.616:6246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8968 comm="syz.1.2084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 136.324902][ T29] audit: type=1326 audit(1737652958.616:6247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8968 comm="syz.1.2084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 136.348436][ T29] audit: type=1326 audit(1737652958.616:6248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8968 comm="syz.1.2084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 136.372173][ T29] audit: type=1326 audit(1737652958.616:6249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8968 comm="syz.1.2084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f0aeb5d29 code=0x7ffc0000 [ 136.400199][ T8985] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 136.451040][ T8989] xt_connbytes: Forcing CT accounting to be enabled [ 136.567142][ T8998] netlink: 108 bytes leftover after parsing attributes in process `syz.5.2096'. [ 136.576416][ T8998] netlink: 24 bytes leftover after parsing attributes in process `syz.5.2096'. [ 137.140431][ T9030] pim6reg1: entered promiscuous mode [ 137.145799][ T9030] pim6reg1: entered allmulticast mode [ 137.232520][ T9033] bond2: entered promiscuous mode [ 137.237695][ T9033] bond2: entered allmulticast mode [ 137.255449][ T9033] 8021q: adding VLAN 0 to HW filter on device bond2 [ 137.285650][ T9033] bond2 (unregistering): Released all slaves [ 137.501922][ T9038] netlink: 8 bytes leftover after parsing attributes in process `syz.9.2112'. [ 137.649823][ T9046] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 137.694663][ T9051] xt_CT: You must specify a L4 protocol and not use inversions on it [ 137.756411][ T9060] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2120'. [ 137.857851][ T9069] syz.7.2125 (9069): attempted to duplicate a private mapping with mremap. This is not supported. [ 138.270914][ T9107] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 139.641398][ T9164] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2169'. [ 139.724261][ T9166] block device autoloading is deprecated and will be removed. [ 140.061807][ T9173] netlink: 12 bytes leftover after parsing attributes in process `syz.9.2172'. [ 140.266766][ T9189] netlink: 40 bytes leftover after parsing attributes in process `syz.5.2180'. [ 140.340165][ T9200] FAULT_INJECTION: forcing a failure. [ 140.340165][ T9200] name failslab, interval 1, probability 0, space 0, times 0 [ 140.352937][ T9200] CPU: 0 UID: 0 PID: 9200 Comm: syz.9.2185 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 140.352967][ T9200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 140.352983][ T9200] Call Trace: [ 140.353024][ T9200] [ 140.353032][ T9200] dump_stack_lvl+0xf2/0x150 [ 140.353056][ T9200] dump_stack+0x15/0x1a [ 140.353077][ T9200] should_fail_ex+0x223/0x230 [ 140.353120][ T9200] should_failslab+0x8f/0xb0 [ 140.353154][ T9200] kmem_cache_alloc_node_noprof+0x59/0x320 [ 140.353207][ T9200] ? __alloc_skb+0x10b/0x310 [ 140.353245][ T9200] __alloc_skb+0x10b/0x310 [ 140.353280][ T9200] ? memcg_list_lru_alloc+0xce/0x4e0 [ 140.353370][ T9200] alloc_skb_with_frags+0x80/0x450 [ 140.353406][ T9200] ? xas_load+0x3ae/0x3d0 [ 140.353436][ T9200] ? xas_load+0x3ae/0x3d0 [ 140.353537][ T9200] ? ref_tracker_alloc+0x1f5/0x2f0 [ 140.353589][ T9200] sock_alloc_send_pskb+0x435/0x4f0 [ 140.353656][ T9200] ? __rcu_read_unlock+0x4e/0x70 [ 140.353694][ T9200] packet_sendmsg+0x2452/0x3690 [ 140.353747][ T9200] ? avc_has_perm+0xd4/0x160 [ 140.353835][ T9200] ? selinux_socket_sendmsg+0x185/0x1c0 [ 140.353861][ T9200] ? __pfx_packet_sendmsg+0x10/0x10 [ 140.353892][ T9200] __sock_sendmsg+0x140/0x180 [ 140.353925][ T9200] ____sys_sendmsg+0x312/0x410 [ 140.354001][ T9200] __sys_sendmmsg+0x227/0x4b0 [ 140.354109][ T9200] __x64_sys_sendmmsg+0x57/0x70 [ 140.354130][ T9200] x64_sys_call+0x29aa/0x2dc0 [ 140.354152][ T9200] do_syscall_64+0xc9/0x1c0 [ 140.354235][ T9200] ? clear_bhb_loop+0x55/0xb0 [ 140.354256][ T9200] ? clear_bhb_loop+0x55/0xb0 [ 140.354274][ T9200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.354366][ T9200] RIP: 0033:0x7f3edc325d29 [ 140.354382][ T9200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.354403][ T9200] RSP: 002b:00007f3eda997038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 140.354424][ T9200] RAX: ffffffffffffffda RBX: 00007f3edc515fa0 RCX: 00007f3edc325d29 [ 140.354436][ T9200] RDX: 0000000000000001 RSI: 0000000020000440 RDI: 0000000000000009 [ 140.354471][ T9200] RBP: 00007f3eda997090 R08: 0000000000000000 R09: 0000000000000000 [ 140.354505][ T9200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.354519][ T9200] R13: 0000000000000000 R14: 00007f3edc515fa0 R15: 00007ffeec388748 [ 140.354545][ T9200] [ 140.930291][ T9236] FAULT_INJECTION: forcing a failure. [ 140.930291][ T9236] name failslab, interval 1, probability 0, space 0, times 0 [ 140.943063][ T9236] CPU: 1 UID: 0 PID: 9236 Comm: syz.9.2201 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 140.943162][ T9236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 140.943179][ T9236] Call Trace: [ 140.943187][ T9236] [ 140.943194][ T9236] dump_stack_lvl+0xf2/0x150 [ 140.943217][ T9236] dump_stack+0x15/0x1a [ 140.943233][ T9236] should_fail_ex+0x223/0x230 [ 140.943290][ T9236] should_failslab+0x8f/0xb0 [ 140.943434][ T9236] kmem_cache_alloc_noprof+0x52/0x320 [ 140.943463][ T9236] ? audit_log_start+0x34c/0x6b0 [ 140.943497][ T9236] audit_log_start+0x34c/0x6b0 [ 140.943528][ T9236] ? _parse_integer_limit+0x167/0x180 [ 140.943630][ T9236] ? __rcu_read_unlock+0x4e/0x70 [ 140.943717][ T9236] audit_log+0x5f/0xe0 [ 140.943754][ T9236] sel_write_enforce+0x277/0x2e0 [ 140.943790][ T9236] vfs_writev+0x3fb/0x880 [ 140.943813][ T9236] ? __pfx_sel_write_enforce+0x10/0x10 [ 140.943967][ T9236] ? mutex_lock+0xd/0x40 [ 140.943994][ T9236] do_writev+0xf4/0x220 [ 140.944022][ T9236] __x64_sys_writev+0x45/0x50 [ 140.944061][ T9236] x64_sys_call+0x1fab/0x2dc0 [ 140.944146][ T9236] do_syscall_64+0xc9/0x1c0 [ 140.944179][ T9236] ? clear_bhb_loop+0x55/0xb0 [ 140.944198][ T9236] ? clear_bhb_loop+0x55/0xb0 [ 140.944217][ T9236] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.944281][ T9236] RIP: 0033:0x7f3edc325d29 [ 140.944299][ T9236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.944320][ T9236] RSP: 002b:00007f3eda997038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 140.944341][ T9236] RAX: ffffffffffffffda RBX: 00007f3edc515fa0 RCX: 00007f3edc325d29 [ 140.944357][ T9236] RDX: 0000000000000002 RSI: 0000000020000040 RDI: 0000000000000003 [ 140.944370][ T9236] RBP: 00007f3eda997090 R08: 0000000000000000 R09: 0000000000000000 [ 140.944381][ T9236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.944392][ T9236] R13: 0000000000000000 R14: 00007f3edc515fa0 R15: 00007ffeec388748 [ 140.944409][ T9236] [ 141.258006][ T9245] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 141.338658][ T9245] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 141.381665][ T9245] netdevsim netdevsim9 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 141.413870][ T9245] netdevsim netdevsim9 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 141.441634][ T29] kauditd_printk_skb: 421 callbacks suppressed [ 141.441652][ T29] audit: type=1326 audit(1737652963.630:6669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9253 comm="syz.5.2209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 141.509288][ T9245] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 141.540385][ T9245] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 141.558861][ T29] audit: type=1326 audit(1737652963.677:6670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9253 comm="syz.5.2209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 141.582415][ T29] audit: type=1326 audit(1737652963.677:6671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9253 comm="syz.5.2209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 141.586589][ T9245] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 141.606013][ T29] audit: type=1326 audit(1737652963.677:6672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9253 comm="syz.5.2209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 141.637647][ T29] audit: type=1326 audit(1737652963.677:6673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9253 comm="syz.5.2209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 141.661103][ T29] audit: type=1326 audit(1737652963.677:6674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9253 comm="syz.5.2209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 141.684608][ T29] audit: type=1326 audit(1737652963.677:6675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9253 comm="syz.5.2209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 141.707996][ T29] audit: type=1326 audit(1737652963.677:6676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9253 comm="syz.5.2209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 141.731534][ T29] audit: type=1326 audit(1737652963.677:6677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9253 comm="syz.5.2209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8f051b5d29 code=0x7ffc0000 [ 141.738917][ T9245] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 141.754998][ T29] audit: type=1326 audit(1737652963.677:6678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9255 comm="syz.5.2209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8f051e85e5 code=0x7ffc0000 [ 141.819990][ T9261] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2211'. [ 142.092384][ T9280] netlink: 40 bytes leftover after parsing attributes in process `syz.9.2220'. [ 142.216190][ T9286] rdma_op ffff888127193980 conn xmit_rdma 0000000000000000 [ 142.256633][ T9286] netlink: 'syz.9.2222': attribute type 9 has an invalid length. [ 142.484342][ T9298] FAULT_INJECTION: forcing a failure. [ 142.484342][ T9298] name failslab, interval 1, probability 0, space 0, times 0 [ 142.497053][ T9298] CPU: 0 UID: 0 PID: 9298 Comm: syz.7.2226 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 142.497097][ T9298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 142.497140][ T9298] Call Trace: [ 142.497146][ T9298] [ 142.497154][ T9298] dump_stack_lvl+0xf2/0x150 [ 142.497177][ T9298] dump_stack+0x15/0x1a [ 142.497193][ T9298] should_fail_ex+0x223/0x230 [ 142.497219][ T9298] should_failslab+0x8f/0xb0 [ 142.497329][ T9298] kmem_cache_alloc_node_noprof+0x59/0x320 [ 142.497356][ T9298] ? __alloc_skb+0x10b/0x310 [ 142.497399][ T9298] __alloc_skb+0x10b/0x310 [ 142.497429][ T9298] tipc_msg_create+0x45/0x220 [ 142.497456][ T9298] tipc_group_proto_xmit+0xbd/0x320 [ 142.497495][ T9298] tipc_group_delete+0x9e/0x290 [ 142.497521][ T9298] ? selinux_netlbl_socket_setsockopt+0xe5/0x2d0 [ 142.497549][ T9298] tipc_sk_leave+0xac/0x270 [ 142.497568][ T9298] ? lock_sock_nested+0x10f/0x140 [ 142.497675][ T9298] tipc_setsockopt+0x52e/0x660 [ 142.497719][ T9298] ? __pfx_tipc_setsockopt+0x10/0x10 [ 142.497740][ T9298] __sys_setsockopt+0x187/0x200 [ 142.497775][ T9298] __x64_sys_setsockopt+0x66/0x80 [ 142.497808][ T9298] x64_sys_call+0x282e/0x2dc0 [ 142.497833][ T9298] do_syscall_64+0xc9/0x1c0 [ 142.497898][ T9298] ? clear_bhb_loop+0x55/0xb0 [ 142.497996][ T9298] ? clear_bhb_loop+0x55/0xb0 [ 142.498013][ T9298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 142.498045][ T9298] RIP: 0033:0x7f6925775d29 [ 142.498105][ T9298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.498122][ T9298] RSP: 002b:00007f6923de1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 142.498139][ T9298] RAX: ffffffffffffffda RBX: 00007f6925965fa0 RCX: 00007f6925775d29 [ 142.498150][ T9298] RDX: 0000000000000088 RSI: 000000000000010f RDI: 0000000000000008 [ 142.498161][ T9298] RBP: 00007f6923de1090 R08: 0000000000000000 R09: 0000000000000000 [ 142.498248][ T9298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.498259][ T9298] R13: 0000000000000000 R14: 00007f6925965fa0 R15: 00007ffd1eb62ec8 [ 142.498275][ T9298] [ 142.824152][ T9306] netlink: 'syz.7.2231': attribute type 10 has an invalid length. [ 142.832019][ T9306] netlink: 40 bytes leftover after parsing attributes in process `syz.7.2231'. [ 142.867479][ T9306] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.875782][ T9306] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.884061][ T9306] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.892303][ T9306] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.927085][ T9306] team0: Port device geneve1 added [ 142.937663][ T9313] netlink: 72 bytes leftover after parsing attributes in process `syz.9.2233'. [ 142.945626][ T9311] netlink: 40 bytes leftover after parsing attributes in process `syz.5.2232'. [ 143.403211][ T9349] veth1_macvtap: left promiscuous mode [ 143.417000][ T9349] macsec0: entered promiscuous mode [ 143.422346][ T9349] macsec0: entered allmulticast mode [ 143.446625][ T9349] veth1_macvtap: entered promiscuous mode [ 143.452423][ T9349] veth1_macvtap: entered allmulticast mode [ 143.476262][ T9349] macsec0: left promiscuous mode [ 143.481385][ T9349] macsec0: left allmulticast mode [ 143.486611][ T9349] veth1_macvtap: left allmulticast mode [ 143.801610][ T9369] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 143.832405][ T9371] IPv6: Can't replace route, no match found [ 143.871731][ T9371] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 143.880429][ T9371] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 143.943989][ T9371] loop3: detected capacity change from 0 to 1024 [ 143.956857][ T9371] EXT4-fs (loop3): can't mount with data=, fs mounted w/o journal [ 144.319150][ T9392] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 144.686766][ T9408] bond2: entered promiscuous mode [ 144.691917][ T9408] bond2: entered allmulticast mode [ 144.757378][ T9408] 8021q: adding VLAN 0 to HW filter on device bond2 [ 144.772647][ T9419] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 144.829924][ T9408] bond2 (unregistering): Released all slaves [ 144.887003][ T9424] netlink: 9 bytes leftover after parsing attributes in process `syz.5.2279'. [ 144.896194][ T9424] gretap0: entered promiscuous mode [ 144.919880][ T9426] loop3: detected capacity change from 0 to 256 [ 144.947904][ T9429] netlink: 5 bytes leftover after parsing attributes in process `syz.5.2279'. [ 144.994910][ T9429] 0ªX¹¦D: renamed from gretap0 [ 145.013298][ T9429] 0ªX¹¦D: left promiscuous mode [ 145.018370][ T9429] 0ªX¹¦D: entered allmulticast mode [ 145.067721][ T9429] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 145.094983][ T11] ================================================================== [ 145.103111][ T11] BUG: KCSAN: data-race in n_tty_receive_char_flow_ctrl / tty_set_termios [ 145.111660][ T11] [ 145.113997][ T11] write to 0xffff888115ab5121 of 1 bytes by task 9417 on cpu 0: [ 145.121630][ T11] tty_set_termios+0x480/0x8b0 [ 145.126410][ T11] set_termios+0x365/0x4e0 [ 145.130840][ T11] tty_mode_ioctl+0x391/0x5d0 [ 145.135541][ T11] n_tty_ioctl_helper+0x8d/0x240 [ 145.140499][ T11] n_tty_ioctl+0xfd/0x200 [ 145.144839][ T11] tty_ioctl+0x87a/0xbe0 [ 145.149084][ T11] __se_sys_ioctl+0xc9/0x140 [ 145.153687][ T11] __x64_sys_ioctl+0x43/0x50 [ 145.158291][ T11] x64_sys_call+0x1690/0x2dc0 [ 145.162983][ T11] do_syscall_64+0xc9/0x1c0 [ 145.167542][ T11] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.173497][ T11] [ 145.175833][ T11] read to 0xffff888115ab5121 of 1 bytes by task 11 on cpu 1: [ 145.183212][ T11] n_tty_receive_char_flow_ctrl+0x22/0x1a0 [ 145.189035][ T11] n_tty_lookahead_flow_ctrl+0xee/0x130 [ 145.194592][ T11] tty_port_default_lookahead_buf+0x8a/0xc0 [ 145.200498][ T11] flush_to_ldisc+0x31c/0x410 [ 145.205189][ T11] process_scheduled_works+0x483/0x9a0 [ 145.210667][ T11] worker_thread+0x51d/0x6f0 [ 145.215275][ T11] kthread+0x4ae/0x520 [ 145.219353][ T11] ret_from_fork+0x4b/0x60 [ 145.223775][ T11] ret_from_fork_asm+0x1a/0x30 [ 145.228552][ T11] [ 145.230892][ T11] value changed: 0x11 -> 0x6e [ 145.235570][ T11] [ 145.237891][ T11] Reported by Kernel Concurrency Sanitizer on: [ 145.244044][ T11] CPU: 1 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.13.0-syzkaller-04858-g21266b8df522 #0 [ 145.254381][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 145.264446][ T11] Workqueue: events_unbound flush_to_ldisc [ 145.270273][ T11] ==================================================================