last executing test programs: 17m2.760233059s ago: executing program 32 (id=783): prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='\xac\xed\x00\x00') r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x1, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 16m39.402094967s ago: executing program 33 (id=917): open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x24c01, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) alarm(0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000980)='./file0\x00', 0x8, &(0x7f0000000000)=ANY=[], 0x1, 0x94d, &(0x7f00000009c0)="$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") r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) 15m10.079984646s ago: executing program 34 (id=2641): perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0xbc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x2980, 0x2, 0x0, 0x4, 0x2, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x8000f28, 0x0) splice(r2, 0x0, r1, 0x0, 0x7f, 0xe) write(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a44000/0x4000)=nil, 0x4000, 0x0, 0xbc32038f2d035af6, 0xffffffffffffffff, 0x2882c000) r4 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') lseek(r4, 0x2004, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) 15m4.487949015s ago: executing program 35 (id=2843): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x17, 0x0) r2 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0x1064, 0x80, 0x200003, 0x1af}, &(0x7f00000001c0)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000200)=[{0x0}, {0x0}], 0x2}, 0x0, 0x3, 0x0, {0x2}}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffff9e, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_enter(r2, 0x47f8, 0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r6, 0x0, 0x20004004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000026001811", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r8, &(0x7f00000002c0), 0x40000000000009f, 0x0) connect$netlink(r8, &(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") r9 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) eventfd(0x8) sendfile(r9, r9, 0x0, 0x800000009) 14m57.291690734s ago: executing program 5 (id=2969): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xaf1}, 0x8) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback, 0x1}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000001680)='\t', 0x1}], 0x1}}], 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000480)=@routing={0x97, 0x8, 0x0, 0x9, 0x0, [@local, @private1={0xfc, 0x1, '\x00', 0x2}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2]}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000280), 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xffff, 0x4, [0x4, 0x7, 0x8, 0x5]}, 0x10) 14m56.326593851s ago: executing program 5 (id=2986): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480), 0x240000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00'}, 0x18) mmap(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb7000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x9afc23944a6be597, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r4, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f00000001c0), 0x4) sendmsg$tipc(r4, 0x0, 0x8010) close(r4) recvmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00'}, 0x10) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000300240248ff050005001200", 0x2e}], 0x1}, 0x50) 14m55.96904642s ago: executing program 5 (id=2988): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000f0000000000000c00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0xec25, 0x400, 0x1, 0x40000333}, 0x0, &(0x7f00000001c0)) io_uring_enter(r5, 0x847ba, 0x0, 0xe, 0x0, 0x0) 14m55.427763332s ago: executing program 36 (id=2992): unshare(0x26020480) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x33, @local, 0x0, 0x0, 'dh\x00', 0x10, 0x5, 0x2d}, 0x2c) 14m55.092851278s ago: executing program 5 (id=2998): syz_mount_image$ext4(&(0x7f0000000500)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[{}]}, 0x1, 0x453, &(0x7f0000001040)="$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") r0 = openat(0xffffffffffffff9c, 0x0, 0x143042, 0x100) open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x8005, 0x0, 0x0, 0x19, 0xd, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x8]}) write$UHID_INPUT2(r0, 0x0, 0x67) 14m54.924205784s ago: executing program 5 (id=2999): io_setup(0x7, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000140)={0x0, 0x4, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="01", 0x400000}]) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000938500000071000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r8, 0x0, 0x1ffffffffffffffd}, 0x18) r9 = add_key$keyring(&(0x7f0000000500), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r9, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', 0x0, 0x2}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r10, 0x0, 0x1, 0x4) vmsplice(r10, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r10, 0x541b, 0x0) write(r5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) symlink(&(0x7f0000000dc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') readlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001200)=""/4096, 0x1000) setxattr$incfs_metadata(&(0x7f0000000800)='./cgroup\x00', &(0x7f0000000840), 0x0, 0x0, 0x1) removexattr(&(0x7f0000000200)='./cgroup\x00', &(0x7f0000000240)=@known='user.incfs.metadata\x00') io_submit(0x0, 0x2, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x4e}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4, 0x6, r4, &(0x7f00000001c0)='m', 0x1, 0x1}]) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000048000000030a05020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a3000000000080007006e6174"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x0) 14m54.556973823s ago: executing program 5 (id=3000): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 14m54.530070775s ago: executing program 37 (id=3000): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 14m42.119311661s ago: executing program 6 (id=3187): sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a2, &(0x7f0000000000)='bridge0\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a300000000040000000030a01020000000000000000010000000900030073797a32000000001400048008000240326565a708000140000000000900010073797a300000000048000000060a010400000000000000000100000008000b40000000000900010073797a3000000000200004801c0001800b00010072656a65637400000c000280080001400000000114000000110001"], 0xd0}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000240)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x10}}}}}}, 0x0) 14m42.090377994s ago: executing program 6 (id=3188): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00'}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 14m41.178746687s ago: executing program 6 (id=3204): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0xff}]}) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x420000008b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000001c0)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_misc(r2, &(0x7f0000002380), 0x4) perf_event_open(&(0x7f0000000300)={0x8, 0x80, 0x0, 0x20, 0x4, 0x0, 0x2, 0xfe, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x100001, 0x9, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_clone(0x1000000, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) migrate_pages(r3, 0x7, 0x0, &(0x7f0000000240)=0x8000000000000001) 14m40.206072455s ago: executing program 6 (id=3220): syz_mount_image$ext4(&(0x7f0000000500)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[{}]}, 0x1, 0x453, &(0x7f0000001040)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x100) open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x8005, 0x0, 0x0, 0x19, 0xd, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x8]}) write$UHID_INPUT2(r0, 0x0, 0x67) 14m39.779177749s ago: executing program 6 (id=3223): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r0, 0x2007ffc) sendfile(r0, r0, 0x0, 0x800000009) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000005304"], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f085000000"], &(0x7f0000000200)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x20000001) fsetxattr(r3, &(0x7f0000000000)=@known='security.selinux\x00', &(0x7f0000000080)='@\x00', 0x3c8, 0x0) 14m39.695360046s ago: executing program 8 (id=3226): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x50}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002100)=ANY=[], 0x60}, 0x1, 0x0, 0x0, 0x10040003}, 0x8008880) 14m39.586506665s ago: executing program 8 (id=3227): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000340)={'wpan0\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) 14m39.553295357s ago: executing program 8 (id=3228): io_setup(0x7, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000140)={0x0, 0x4, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="01", 0x400000}]) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000938500000071000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r8, 0x0, 0x1ffffffffffffffd}, 0x18) r9 = add_key$keyring(&(0x7f0000000500), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r9, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', 0x0, 0x2}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r10, 0x0, 0x1, 0x4) vmsplice(r10, &(0x7f0000000880)=[{&(0x7f0000000180)="04", 0x1}, {&(0x7f0000000200)='\b', 0x1}, {&(0x7f0000001300)="da02e0", 0x3}, {&(0x7f00000002c0)='@', 0x1}, {&(0x7f0000000440)="15", 0x1}, {&(0x7f0000003040)="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", 0xfc1}, {&(0x7f0000000480)='7', 0x1}], 0x7, 0x0) ioctl$sock_inet_udp_SIOCINQ(r10, 0x541b, 0x0) write(r5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) symlink(&(0x7f0000000dc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') readlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001200)=""/4096, 0x1000) setxattr$incfs_metadata(&(0x7f0000000800)='./cgroup\x00', &(0x7f0000000840), 0x0, 0x0, 0x1) removexattr(&(0x7f0000000200)='./cgroup\x00', &(0x7f0000000240)=@known='user.incfs.metadata\x00') io_submit(0x0, 0x2, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x4e}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4, 0x6, r4, &(0x7f00000001c0)='m', 0x1, 0x1}]) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000048000000030a05020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a3000000000080007006e6174"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x0) 14m39.347731155s ago: executing program 6 (id=3230): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x7, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f00000004c0)={[{@acl}, {@barrier}, {@barrier_val}, {@nobarrier}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nodelalloc}, {@acl}, {@noinit_itable}]}, 0xf8, 0x587, &(0x7f0000002100)="$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") open(0x0, 0x80200, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}}], {0x14}}, 0x3c}}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x3}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r3, 0x1, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0xc01, 0x0) r4 = syz_io_uring_setup(0x234, &(0x7f0000000580)={0x0, 0x95f5, 0x10100, 0x0, 0x89}, &(0x7f0000000280)=0x0, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r4, 0x207a98, 0x363, 0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) timerfd_create(0x0, 0x800) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r7, &(0x7f0000000800)=[{{&(0x7f0000000240)={0xa, 0x4e22, 0x9, @mcast1, 0x6}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000280)='Q', 0x1}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x4e22, 0x3ff, @dev={0xfe, 0x80, '\x00', 0xb}, 0x414}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)}], 0x1}}], 0x2, 0x4000840) shutdown(r7, 0x1) setsockopt(r7, 0x84, 0x7f, &(0x7f00000001c0)="020000000980ffff", 0x8) 14m39.344116955s ago: executing program 38 (id=3230): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x7, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f00000004c0)={[{@acl}, {@barrier}, {@barrier_val}, {@nobarrier}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nodelalloc}, {@acl}, {@noinit_itable}]}, 0xf8, 0x587, &(0x7f0000002100)="$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") open(0x0, 0x80200, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}}], {0x14}}, 0x3c}}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x3}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r3, 0x1, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0xc01, 0x0) r4 = syz_io_uring_setup(0x234, &(0x7f0000000580)={0x0, 0x95f5, 0x10100, 0x0, 0x89}, &(0x7f0000000280)=0x0, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r4, 0x207a98, 0x363, 0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) timerfd_create(0x0, 0x800) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r7, &(0x7f0000000800)=[{{&(0x7f0000000240)={0xa, 0x4e22, 0x9, @mcast1, 0x6}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000280)='Q', 0x1}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x4e22, 0x3ff, @dev={0xfe, 0x80, '\x00', 0xb}, 0x414}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)}], 0x1}}], 0x2, 0x4000840) shutdown(r7, 0x1) setsockopt(r7, 0x84, 0x7f, &(0x7f00000001c0)="020000000980ffff", 0x8) 14m39.269816721s ago: executing program 9 (id=3233): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000f0000000000000c00000018110000", @ANYRES32=r3], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0xec25, 0x400, 0x1, 0x40000333}, &(0x7f00000006c0), &(0x7f00000001c0)) 14m39.265875461s ago: executing program 8 (id=3234): syz_mount_image$ext4(&(0x7f0000000500)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[{}]}, 0x1, 0x453, &(0x7f0000001040)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x100) open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x8005, 0x0, 0x0, 0x19, 0xd, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x8]}) write$UHID_INPUT2(r0, 0x0, 0x67) 14m39.107162593s ago: executing program 8 (id=3237): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB, @ANYRESHEX=r3]) creat(&(0x7f00000003c0)='./file0\x00', 0x36) 14m37.669653088s ago: executing program 9 (id=3244): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000340)={'wpan0\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) 14m37.637515981s ago: executing program 9 (id=3245): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000100)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$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") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r2, 0x0, 0xffff, 0x8009) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000240), &(0x7f00000001c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000201000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYRES64, @ANYRES32, @ANYRESDEC], &(0x7f0000000780)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x1e, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000240), 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r6, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x4030582b, &(0x7f0000000c00)={0x0, 0x1, 0x4, 0x4e1ee79f, 0x0, 0xf0}) write$cgroup_int(r3, &(0x7f0000000380)=0x3c, 0xfcb5) setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, &(0x7f0000000000), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r3, 0x18, 0x0, 0x2c21, 0xffffffffffff8001}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 14m37.416660099s ago: executing program 9 (id=3247): syz_mount_image$ext4(&(0x7f0000000500)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[{}]}, 0x1, 0x453, &(0x7f0000001040)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x100) open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x8005, 0x0, 0x0, 0x19, 0xd, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x8]}) write$UHID_INPUT2(r0, 0x0, 0x67) 14m37.175985888s ago: executing program 9 (id=3250): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000019200)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) close(0xffffffffffffffff) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) 14m36.856346954s ago: executing program 9 (id=3257): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r0, 0x2007ffc) sendfile(r0, r0, 0x0, 0x800000009) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) socket$nl_audit(0x10, 0x3, 0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x20000001) fsetxattr(r3, &(0x7f0000000000)=@known='security.selinux\x00', &(0x7f0000000080)='@\x00', 0x3c8, 0x0) 14m36.794711368s ago: executing program 39 (id=3257): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r0, 0x2007ffc) sendfile(r0, r0, 0x0, 0x800000009) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) socket$nl_audit(0x10, 0x3, 0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x20000001) fsetxattr(r3, &(0x7f0000000000)=@known='security.selinux\x00', &(0x7f0000000080)='@\x00', 0x3c8, 0x0) 14m34.092477594s ago: executing program 8 (id=3295): io_setup(0x7, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000140)={0x0, 0x4, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="01", 0x400000}]) socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000938500000071000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r8, 0x0, 0x1ffffffffffffffd}, 0x18) r9 = add_key$keyring(&(0x7f0000000500), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r9, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', 0x0, 0x2}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r10, 0x0, 0x1, 0x4) vmsplice(r10, &(0x7f0000000880)=[{&(0x7f0000000180)="04", 0x1}, {&(0x7f0000000200)='\b', 0x1}, {&(0x7f0000001300)="da02e0", 0x3}, {&(0x7f00000002c0)='@', 0x1}, {&(0x7f0000000440)="15", 0x1}, {&(0x7f0000003040)="162dd3cad75f87b473622140aca9f6be4377caaba76f08daaad767f134c2ffc2ba9c92a5971b01b71a225dababc99832633ea975d465532309695b29d56eb9befec5159067bffa2d17b24093b372ebaf5589d18a8905982d01ee2870aa096647d6afabca77e0f36a01481b10ed8f0a585ceb41bf50f0515c259bbbbee74db0e045a9fde3614d35c6f2dfa1e71dace811a410bdfb395dd7c54fa733c6f8111f24df309ad928c6462d0a53a3824f9af07b11cb0c05724c33acfad1f5f16bffaf6c58ab2b8c4626bd9d4d1cc4ab67c9838b1fc53fb4ce46d304a12fffc2110043381d08160f056e8d3908497a402dcc156ff69bbf5cb5e5443c06bc4e3c6e4f231aab0eb6fdd2bb0740ae88095360d8b247daa6628fc10edbf048d800625134022e1d5d0bcb5c50e567f50c1990b1a434caa57d210b6084c9424d37c7a71479613b69b67670baab82f13b0923a73786655cfceb0c70d511b94f992391cad9ce57c5c76675cae6a2712cb9ce6dc07bdd0118001f062a22943ca72742a0fe97c48b9b895515fc71145fac9dfd27118a70b71dd564f27e31e1112292864a7be45459524ad8fb03c1f4388bdba3d9e3882a9be894133b0deea92885d0276f268bad0396635036192da1a9788e7525b08de07b0f351147e0f2aaa239e197924a5fc6961dbfcc96ad4cae4cf59f7a812d0c7f8506216dfb7658f8f8545477f4b6c1a606554ee19621d85438014d5e569b0c467e67cf0bb046284f4145ee9f9601b950b0217d183d0266da78f83ed2cf8a83f1374295853d52cdd561a756f247598126cddc98416c42c47a5ad4fda1c419b6ce04f4b57efd2cecf7bfe1589aab05c33e397c8acfb5e4d05cc62db2ba633e74d08c9a3c92111d39ef7d1c0321bfa1827b9fbbb592c49d46244b57c985ee4cc830f7eeda32cae961c4386916f927fc7f442eb6e2eaf45a3d2b0f28d4d319fdedd003aedc1c6384085921397a041384edee7172973fddb3eee2132acdec385cb596055f82a41087097ffece144a340cfe3ec0c0b833f4a92d28709419827eb0f747d73a2e7cc7d00a24749b9dd340793e2ca36536bc47233c9e2602a7f7f94450b22117215be6086d0c0132d24350c19abcb3d713fa97f76ce6ec8f61b24bfecb3ddcd0e7bccd0c4839de19283e95e08bc629554aac9543c15b0f69f1d03374269796c477579d212708b760914bde3269d9e9b0036c7cd0e8f3376d6a62ed0cde76861423ec5f76f2ab4d0f05b21db57277feaaf8475e6e6d1e5672281db17046b7464439d69e25210f67998e912d02c5296c60a450a38495e3b6737339a05f83e5a02aa1ee5bca6bf67ba84c659ef3cc4495cb1551e749277a86db07e7c48f61ee0672919d6a00472a893b6c6eead02140318fb497a1819b692b9bcb3b5cbe7cb55b9524abb1268b3f4a031a64fe6305519a2212298089c443b0503e77b7c8a3da14387872ca35cd6524f629161d85f253498568587513aa16848fa8f8f3dea115cbe8e85bdb8aa20f20ce26f3fcaac4615a9b9d7d6919ba952f7e93a96ba26010cc4bc24622ed3bb9b063e0e686f41b2cece5a50d787676600a04bfe7e6eb78e740b8bcb4b3a51f2a39250d0163a75d8f97032c60efc5516ba48ce2d53da0a7aab99330369a2c44cfc6ac65707733971493de86a519629f7be4643a52abe3d0ca1e22dfa27d8f7c54c50e0e1f3f639dbc622afa56d22b2732232d62b0a312c359dfd25e266f2138a49689fcc789470b01aabc05563ab025938153c15abbb300192e0bc27f810246d4d24295f337db02aa6b3e801905ee519a681fd73462eb330800763f75ae88e3e57c2a5552fba4b6154cab775625b817e18ff1e26273d21bf8b3cb2a79df7e92a8e498dadc04f11c62d6841bdd0408b212a43951a4a4f4f29c9b8918644e743e2f30cc52d422a9ce03750307096a5f8b61bb585ada2ad7a63d440e418c16e6827792dd470fa980a72cbe53b354ab208b0cb99ad858ff2ee4395f7fbff96c38fe2f84ccca78b6c867d1ff0440c5795b875339b87d98e59dca2dd80b3624c7406b56dc76b0198514bdb97b228e5b726683b3c12f71fb2b1dda24d085175acdc5d7744129df8065168ac103d819bc95dd408e17bfa7ae37d0ff5145e393a37b5cc08c2c10e5ef5d80dd6c79d35c650417e6fc47467c3552bbc1a3d50d2cdce471e5cd43b48475272e30c9d415c826bed60369c1841219e15d93bd87de49e2566de3a01dfc60cd3295134c876863cbfb7be8be44b0d4369b81a778f8fb2fcd039048fd16bf9d4f08a9458dbeadb298ee12b7ee7f6f43099dc684e33bee75d23f37c5b058e56f785f1c2af0c2ad66b69fc1fc06073bd53bed4a967314a6af8ede4d2facdae08ed503c4903fd5fdfd291327cd2ead1876361a16d9341cc24a63b2b51538b7199e048c00cab7127d19ae9a3ea0755b9b5d9604fefcfe7237d641019291bcd9ce30d5a388ad7127fde6061f1e307c0024ff1c200dc04354340eb4e8daac073b7c2f1fe1cee49330cc89ac061bd8a5f1676391d22d4afc8e5875daf4806bac0b5565bb99f07723cdd063ff070ba409fba6642888ea88109b333c3748f77b99f3bd4b9b61ec5e3d798d3584937c0165f4df571b8132ae425849e7e5ce414fbb00d9a30c129e2c13b6791435bb552bb01cedf3003b3bb24503fe226121d1f83419d5c23fad54dbd08fb3449b8a561954a23b47e34b7b14ddbcec2745353269e19fe218da2d0aad6df73083b3979160d4e52c8532c9f6602bc8ee624b9d5157fefbffec98e0e91a4f3824ccb4c33e17d19011f4c8db333d0fc5530930951cb63353a3aa0617ab2aba52268b81628d9f4a56b227300488c10df1e7f7533e1e4db449cb9cb6e588debf4795f98810702de5bfb81414bdacfcbd9e66f051ec7272b41ba281e8a68fe7c61e1cb4e74077342ddb7c5191d9731448a9e42a30c4df80e533db26ca3e12ab8ce8b5f0d114888692589b6c836c603ea4210c31b0e053092d75d9ceb49c5e9e2815b5aeebfcb53e97017d0ff6c7d3410120e355f9a6a1226e64a1621a2e6c04865acb25e137243ab9b82beea39c411163afd8969b086df73751020879785ec79c451fb822c11df1ae927318b35bd583a56827fd8744df8e7693837b8ddb0e831fd97b87505d5540d76d3e09895e64cc563dadf60bec88ee70b6008a53e50523ffbd2c0aa9f19123bd6f28de9851ae1f3f6101b46acf9139792be4872bf494c8970aee100a7a0c4dfbccbf01b6ccbebdfa8291f8ab3e25a9e4ff5dbda11488630e3bb8158b8f8de8cd4f793885e7a28e5afdf45eb57ad1330dfc0c51f51986e53c458feb4a4ef55b810a32f847d7ff5500c0f769d9abc090c10f87ba4e5250f36e70abb838ccb8f9fa95d96ba1e2e75a2d808a8fa26b686149ed6738a8e63ef70ed284e25d044aaa1e14c8caea04b77c9fba96036dd8b3be2e7704c65090fa7e8bf0e45c291709d3eb16a81e8aac27a120e52c05866310d8f288367f2b5187e83a1f7d5cb9dc6f8faa648683b7c88d54871dfcdca822568959ac2f7eb7dd3a345b0a8149806105dc90abfee3d5cefae3dfece4723fdc5a73c3a087020ca2fe1b166fe5b54cfb2f661fa5b017502155bf91856c3aae5cd20a48fbb958e1a0e70df51e4e46bbea56f639f6f32698d45297296244e8aaa845c13b70fa7f4f31115de0808975c143191c89c0233c557ddb93d6233ce22a699ca9a54ca6e8ddcfb5bf9d95b9807a49d9a64f7a239c77fa4e0d92d561fca5aa3e6c149c16c11131c9ad78493572cf1a9f953cc63ef8121cfa86a0f3fdb5a73c8530ddf93a9308fcaf436455aa6817f65e4616c9e38733b1cf9fa09822953d7d203748c5e45cbbe84a4fb7d59318013ba2a7da6f972c47ff9289091d7476035affddf44cc7a0b223cd14af5243dd14cd5d0f42849bd31af8ef9de434a01c52ee583c2d93b4785c34969629ffa406335ccd090637b83a5ee126a4833e6d6cf92b8aa6f9a2213df25fa575980c0cbd98039ca978860442b7466c3d4aa215593243d9c7ad3980470c9ef85154566ceed93ccb0330634f92d1fe5050bfe135f345527c93476e474f31ea45729ec534475d36b69876644e5db59c8cb0412f8d65be9ff2bea5ac37c5b1ff5d5d484aebed8b33920bbc8ed59ba9b3bf24ab6da8ebeda14dad9148183411980136cc2fde47049c98063b0ff1816a0852af035cbe8313d88620559e8331d983a43e0f4b515a61f5761bcd2130853ea24377d042643684699ceb9441a73f1285f6a15c8e00d17b4e051df2bd16b1a5699f6dce4556b0b6c88b8b86464beb6415777a8ec890c9335cc14452d6b23e2483d5b77b56042a694435bf913cb6e48ce6ca60c3009b274869bb350a8026d80680b32c9394e9b5dfee8df555a705bb1ff17ac848ccec95bb37206a72ab1d56160682d83e38c8acca34b08fa3b8665b35d01967c0a49681ef74b89b39f785977187a9d6f70affe2a32f41fe942fbd30fd9da981cf8f75485015962cb598d3d09a039787bf8d339695d0f5cd7cb60d25cdba119fa435e3692e06bdd76db5856eb2ed2cd85a081209b0a1453d52e1f8cf5120c7f044bddc38cded7ed59a793bfb2b289137137147f704a0628bb8e3e342b6084fbcc105b5345023fed9b2d339b95b0d0c97945943a70e007fe2172c501fae54ad04c279ae6da7150ea25469ce7e9c33b51713b05dcd4753930a0a37326d276fd28c8c0f6e06660beb102e2868fee31f70d37d38769e824846b081d120d8fcd394627fd672fe823cfdcf7af07b20b40e8e5efce8e93e8414744efd2723798aad9dabd8e23efc08983db6c65cf3c43d5b759ca52d118fad7a1bb23e5b3578f616fc42e304c797e640d8b985987274766adbf424e4e9a78c29dc436636e0df6e9255ebdd2c7c0cd261d42631cc49df231d0bd080da2928bcab9a0546b404b658f75fca9d8e506f3f6639bca2a13eae6bded0081fd2239bd8c0ab2382d23eecfb8985da82fe5ed32a96ac1e198d7f8cf5752cfb296af0a2d59ed19022cb084b525d44d8c773a14743a706baf209aebb270104b16181fdc2462d356341d89ba8024171c462640abfc3bd6f602c3bbd710f6ae6a2cef146f27002f78051d6687b83dac0cc627e0af1ed8765396d9783c6429b4063a8d58728c60ec88416c5dbdf362b891d278db21c9a4558c724b06547fc5f641801dd0da8403e57cff37d407fab07bb389c40555af869af263265333bf8aa4290d7cdb9a78573362d608a549165f13323c0107aa4dfac934fef838cf6e5f06b9324a5d8474183f077de97287eaf3c85cb74165b189d7547d3fccc4c763d02ce57d59c70f39e8065cdeb5fd13c4c14609f98941b73b16fed60bc55a2d8ef92104568b595f4a31f6428d527b34c470715d1300cd41ea992763f46a739ba387f359ee1d97c51e889e5599cebd800dbeef1496e3dbacaafc403d0dc7cd3c7d193788536aa5b0f5f25482744107d74795f27a8a8832596166fdcaa548b90c48890715526a52518f16d697d65beb6321befa003dc56432e3dd4b01cede5447813eb429dce845bf9702e5063fe571d8cb6cfecf12870e373b42c4f86f75b7b249f1bdb397113dfd7a23f1930f8533e300e8d0dc1674acb3ce38342b01edcaa09a0f4502f0ba94efeb853fa917612fc16a3829b437663a1", 0xfc0}, {&(0x7f0000000480)="37c2", 0x2}], 0x7, 0x0) ioctl$sock_inet_udp_SIOCINQ(r10, 0x541b, 0x0) write(r5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0x4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) symlink(&(0x7f0000000dc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setxattr$incfs_metadata(&(0x7f0000000800)='./cgroup\x00', &(0x7f0000000840), 0x0, 0x0, 0x1) removexattr(&(0x7f0000000200)='./cgroup\x00', &(0x7f0000000240)=@known='user.incfs.metadata\x00') io_submit(0x0, 0x2, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x4e}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4, 0x6, r3, &(0x7f00000001c0)='m', 0x1, 0x1}]) 14m34.092121664s ago: executing program 40 (id=3295): io_setup(0x7, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000140)={0x0, 0x4, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="01", 0x400000}]) socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000938500000071000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r8, 0x0, 0x1ffffffffffffffd}, 0x18) r9 = add_key$keyring(&(0x7f0000000500), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r9, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', 0x0, 0x2}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r10, 0x0, 0x1, 0x4) vmsplice(r10, &(0x7f0000000880)=[{&(0x7f0000000180)="04", 0x1}, {&(0x7f0000000200)='\b', 0x1}, {&(0x7f0000001300)="da02e0", 0x3}, {&(0x7f00000002c0)='@', 0x1}, {&(0x7f0000000440)="15", 0x1}, {&(0x7f0000003040)="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", 0xfc0}, {&(0x7f0000000480)="37c2", 0x2}], 0x7, 0x0) ioctl$sock_inet_udp_SIOCINQ(r10, 0x541b, 0x0) write(r5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0x4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) symlink(&(0x7f0000000dc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setxattr$incfs_metadata(&(0x7f0000000800)='./cgroup\x00', &(0x7f0000000840), 0x0, 0x0, 0x1) removexattr(&(0x7f0000000200)='./cgroup\x00', &(0x7f0000000240)=@known='user.incfs.metadata\x00') io_submit(0x0, 0x2, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x4e}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4, 0x6, r3, &(0x7f00000001c0)='m', 0x1, 0x1}]) 4m40.306262502s ago: executing program 3 (id=11421): socket$nl_generic(0x11, 0x3, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}, @broadcast}, {0x17, 0x7c, 0x0, @loopback}}}}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xc, &(0x7f0000000680)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20008000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x38, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x85, &(0x7f0000000080)={0x0, 0xb, 0x0, 0x0, 0x7995}, 0xfcd6, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x802c550a, &(0x7f0000000000)=ANY=[]) 4m40.160177944s ago: executing program 3 (id=11427): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x24}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffff00f687000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000980)=@newqdisc={0x64, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0xffe0}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x34, 0x2, {{0x0, 0x5, 0x3, 0xb, 0xfffffff8, 0x8}, [@TCA_NETEM_CORR={0x10, 0x1, {0x8, 0x0, 0x7a1}}, @TCA_NETEM_DELAY_DIST={0x8, 0x2, "853761ae"}]}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x8810}, 0x4000080) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r0, &(0x7f0000000800)="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", 0xfc13, 0x880, 0x0, 0xfffffffffffffef0) 4m40.0866697s ago: executing program 3 (id=11432): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) close(0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r1) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r3) r4 = socket$unix(0x1, 0x2, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r7 = socket$unix(0x1, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {0x0, 0xb}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x28, 0x2, {{0x100, 0x7, 0x6361, 0x5, 0xffffffed, 0x6}, [@TCA_NETEM_LATENCY64={0xc, 0xa, 0x6}]}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x70b923, 0x80000, {0x0, 0x0, 0x0, r6, {}, {0xd, 0xb}, {0xa, 0xb}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x80, 0x0, 0x5, 0x1, 0xc}, 0xb, 0xfffffffe, 0x8, 0x5, 0x9, 0x2, 0x9, 0x6, 0x5, 0x1, {0xffff1c72, 0x3, 0x1000, 0x101, 0xfffffffe, 0x5}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x2001c061}, 0x4008000) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 4m39.895921795s ago: executing program 3 (id=11438): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) 4m39.385632457s ago: executing program 3 (id=11443): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0x504}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000200), 0xa7c, r0}, 0x38) 4m39.324518412s ago: executing program 3 (id=11444): bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000003a80)={{0x14}, [@NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x301, 0x0, 0x0, {0x5}}], {0x14}}, 0x3c}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x3, &(0x7f0000001680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x60}, 0x94) ptrace(0x10, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x72, 0x0, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000300)={0x1d, r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r4, {0x1}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 4m24.272391065s ago: executing program 41 (id=11444): bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000003a80)={{0x14}, [@NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x301, 0x0, 0x0, {0x5}}], {0x14}}, 0x3c}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x3, &(0x7f0000001680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x60}, 0x94) ptrace(0x10, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x72, 0x0, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000300)={0x1d, r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r4, {0x1}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 3.84586232s ago: executing program 1 (id=15422): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f0000000080)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_procfs(0x0, &(0x7f0000004600)='map_files\x00') fchdir(r8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r8, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000740)='%-5lx \x00'}, 0x20) getsockopt$inet_mreqn(r8, 0x0, 0x24, &(0x7f0000000a40)={@loopback, @multicast1, 0x0}, &(0x7f0000000a80)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r8, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2a, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x21, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe91b, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x0, 0x8, 0x6, 0x163, 0xfffffff8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffd}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @generic={0xf, 0x8, 0x0, 0x7, 0x4}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='syzkaller\x00', 0x59c, 0x2f, &(0x7f0000000980)=""/47, 0x41100, 0x42, '\x00', r10, @fallback=0x21, r8, 0x8, &(0x7f0000000ac0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0x4, 0xfffffffa, 0x9}, 0x10, r11, r8, 0x0, &(0x7f0000000e40)=[r8, r8], 0x0, 0x10, 0x5}, 0x94) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendmmsg$unix(r7, 0x0, 0x0, 0x40008004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000xffffffffffffffff}) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x2}, 0x2, r3}}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) r4 = io_uring_setup(0x54, &(0x7f0000000480)={0x0, 0xbaed, 0x20, 0x3, 0x2e8}) r5 = syz_io_uring_setup(0x10f, &(0x7f0000000300)={0x0, 0x8d2dc, 0x40, 0xffffffff, 0x0, 0x0, r4}, &(0x7f00000003c0)=0x0, &(0x7f0000000140)=0x0) r8 = socket$inet6(0xa, 0x400000000001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x20, &(0x7f0000000800)={&(0x7f00000037c0)=""/4096, 0x1000, 0x0, &(0x7f0000000780)=""/106, 0x6a}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)='%pB \x00'}, 0x20) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x401, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1f, 0x11, &(0x7f0000000500)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @ringbuf_query], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x2a, '\x00', 0x0, @fallback=0x2a, r9, 0x8, &(0x7f0000000700)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0x9, 0x1ff, 0xc56c}, 0x10, r10, r0, 0x0, &(0x7f0000000980)=[r11, r12], &(0x7f00000009c0), 0x10, 0x1}, 0x94) bind$inet6(r8, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r8, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000200)=0x3d10, 0x4) r13 = openat$incfs(0xffffffffffffffff, &(0x7f0000000100)='.pending_reads\x00', 0x101200, 0x80) accept4$phonet_pipe(r13, 0x0, &(0x7f0000000400), 0x80000) sendto$inet6(r8, &(0x7f0000000000)="8d", 0x1, 0x0, 0x0, 0x0) recvmmsg(r8, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/21, 0x15}, 0x81}, {{0x0, 0x0, 0x0}, 0x101}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=""/4096, 0x1000}, 0x81}], 0x3, 0x2123, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0xc0, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_LINKAT={0x27, 0x5c, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, 0x3000}) io_uring_enter(r5, 0x47f5, 0x0, 0x0, 0x0, 0x0) io_cancel(0x0, &(0x7f00000006c0)={0x0, 0x300, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x400}, 0x0) r14 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_group_source_req(r14, 0x0, 0x2e, &(0x7f0000000280)={0x1, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e23, @loopback}}}, 0x108) setsockopt$inet_msfilter(r14, 0x0, 0x29, &(0x7f0000000040)={@multicast1, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 3.493267278s ago: executing program 1 (id=15428): r0 = socket(0x2, 0x2, 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{0x1f, 0x1, 0x6, 0x800}, {0x7ff, 0x7c, 0x7, 0xfffff800}, {0xff, 0x3, 0xc9, 0x4f7}, {0x3, 0x6, 0x4, 0x3}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x762}) madvise(&(0x7f0000771000/0x1000)=nil, 0x1000, 0x13) syz_clone3(&(0x7f00000003c0)={0x385200080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r4}}, 0x58) bind$unix(r0, &(0x7f0000000000)=@abs, 0x6e) 2.60569152s ago: executing program 1 (id=15441): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="180200000000000000000000000d4ddd1dcfa2000000b7080000000000007b8af8ff00000000b7080000f43400007b8af0ff00000000bfa100001b00000007010000f8ffffffa1a400000000000007040000f0ffffffb70200000800", @ANYRES32=r0, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1, 0x0, 0x4}, 0x18) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x101201, 0x0) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000600)=0x14) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000080)=0x14) close(r2) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000bfc100000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r4}, 0x18) openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000600)='.\x00', &(0x7f0000000640), 0x2008000, &(0x7f0000000000)={[{@favordynmods}]}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r5, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) sendmsg$tipc(r5, &(0x7f00000005c0)={&(0x7f0000000000), 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="f7", 0x101d0}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f00000006c0)=@newtaction={0x4c, 0x30, 0x9, 0xf00, 0x0, {}, [{0x38, 0x1, [@m_bpf={0x34, 0x1, 0x0, 0x0, {{0x8}, {0xc, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x40040c0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.340995011s ago: executing program 7 (id=15434): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) mount$nfs(&(0x7f0000000080)='/dev/mISDNtimer\x00', &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000200), 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x235fd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x20085, 0x4, 0x0, 0xf, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='contention_end\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000200), &(0x7f0000000240)=r3}, 0x20) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="44000000100003050000002000", @ANYRES32=0x0, @ANYBLOB="1546010000000000140012800b0001006d616373656300000400028008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n', @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) pwrite64(r6, &(0x7f0000000080)='3', 0x1, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x10) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) close(r8) 2.264728817s ago: executing program 7 (id=15439): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x40404) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x6000)=nil, 0x3000) shmdt(r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r5, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) io_getevents(r3, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x0) write$char_usb(r2, 0x0, 0x0) r8 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x1, 0x410000) capset(&(0x7f0000000200)={0x19980330, r4}, &(0x7f00000004c0)={0x1ff, 0x1, 0x3, 0x7f, 0x7, 0x2}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00800000000008000000000200000000000000", @ANYRES32=0x1, @ANYBLOB="ffffff7f00"/20, @ANYRES32=r8, @ANYBLOB="00000000000000000300"/28], 0x50) keyctl$clear(0x3, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='q\xa9', 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, &(0x7f0000000040)) io_pgetevents(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 2.245405589s ago: executing program 2 (id=15440): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) rt_sigprocmask(0x2, &(0x7f0000000200)={[0xffffffff]}, 0x0, 0x8) r1 = gettid() tkill(r1, 0x11) rt_sigaction(0x11, &(0x7f0000000480)={0x0, 0x0, 0x0, {[0x400000000009]}}, 0x0, 0x8, &(0x7f0000000080)) 2.203093172s ago: executing program 2 (id=15442): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f0000000080)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_procfs(0x0, &(0x7f0000004600)='map_files\x00') fchdir(r8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r8, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000740)='%-5lx \x00'}, 0x20) getsockopt$inet_mreqn(r8, 0x0, 0x24, &(0x7f0000000a40)={@loopback, @multicast1, 0x0}, &(0x7f0000000a80)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r8, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2a, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x20, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe91b, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x0, 0x8, 0x6, 0x163, 0xfffffff8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffd}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='syzkaller\x00', 0x59c, 0x2f, &(0x7f0000000980)=""/47, 0x41100, 0x42, '\x00', r10, @fallback=0x21, r8, 0x8, &(0x7f0000000ac0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0x4, 0xfffffffa, 0x9}, 0x10, r11, r8, 0x0, &(0x7f0000000e40)=[r8, r8], 0x0, 0x10, 0x5}, 0x94) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendmmsg$unix(r7, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, {{&(0x7f0000000080)=@abs={0x1, 0x30, 0x4e21}, 0x6e, 0x0}}], 0x2, 0x40008004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, 0x36) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 2.081396572s ago: executing program 2 (id=15443): syz_emit_ethernet(0x56, &(0x7f0000000000)=ANY=[], 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001000)={&(0x7f0000000140)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) sysinfo(&(0x7f0000000540)=""/145) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0xf}, 0x1c) syz_open_dev$tty1(0xc, 0x4, 0x2) r8 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="080000000f8ba466aabe98d6c437a570690771ffdd8564b60220d89f9d3de34fda", @ANYRES32=r4, @ANYRESDEC=r0, @ANYRES64=r5, @ANYRES32, @ANYBLOB="000000000400"/28], 0x48) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000001080)={0x6, @dev={0xac, 0x14, 0x14, 0x3d}, 0x0, 0x2, 'lc\x00', 0x0, 0x0, 0x4000}, 0x2c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x48f, &(0x7f0000000000)={0x11, @private=0xa010102, 0x1fd, 0x0, 'lc\x00', 0x4c, 0x2, 0x3f}, 0x2c) syz_open_dev$loop(&(0x7f0000001040), 0x5, 0x101000) 1.313656134s ago: executing program 7 (id=15457): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) dup(r0) 1.293962096s ago: executing program 7 (id=15459): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000078000000030a01030000000000000000050000000900010073797a300000000008000540000000001c0008800c00024000000000000000000c00014000000000000000000900030073797a3200000000280004800800024000000000140003007465616d5f736c6176655f3000000000080001400000000114"], 0xd4}}, 0x8818) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 1.258344778s ago: executing program 4 (id=15462): r0 = socket(0x2, 0x2, 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{0x1f, 0x1, 0x6, 0x800}, {0x7ff, 0x7c, 0x7, 0xfffff800}, {0xff, 0x3, 0xc9, 0x4f7}, {0x3, 0x6, 0x4, 0x3}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x762}) madvise(&(0x7f0000771000/0x1000)=nil, 0x1000, 0x13) syz_clone3(&(0x7f00000003c0)={0x385200080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r4}}, 0x58) bind$unix(r0, &(0x7f0000000000)=@abs, 0x6e) 1.179617915s ago: executing program 2 (id=15463): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x40404) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x6000)=nil, 0x3000) shmdt(r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r5, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) io_getevents(r3, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x0) write$char_usb(r2, &(0x7f00000003c0)="1638ed960905d217f5ab342a1a194c82a932b5b3104fa55c1e04cd34f9a9381630d5e6f1063c44f16f29b7b10e354749212d2ffc8db92f85b6c0ad4ccce2a1cfa8b5030bb9cab112cb7c600b5956d39d45b45a441eec6446c2d110799f7d63107554d95f5135225f7eaef8fa2b0b8714aa6d6bf04d6b24461ddba3a3546fcbf50f563c69909416f5c4de", 0x8a) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00800000000008000000000200000000000000", @ANYRES32=0x1, @ANYBLOB="ffffff7f000000000000", @ANYRES32=r7, @ANYRES32, @ANYBLOB="00000000000000000300"/28], 0x50) keyctl$clear(0x3, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='q\xa9', 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) getsockopt$inet6_tcp_buf(r8, 0x6, 0x1a, 0x0, &(0x7f0000000040)) io_pgetevents(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 867.48594ms ago: executing program 0 (id=15466): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x20008004) r3 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}, 0x1, 0x0, 0x0, 0x24000804}, 0x8000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000380)='N', 0x1}], 0x1, 0x0, 0x0, 0x804c040}, 0xc851) 775.268817ms ago: executing program 4 (id=15467): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f0000000080)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_procfs(0x0, &(0x7f0000004600)='map_files\x00') fchdir(r8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r8, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000740)='%-5lx \x00'}, 0x20) getsockopt$inet_mreqn(r8, 0x0, 0x24, &(0x7f0000000a40)={@loopback, @multicast1, 0x0}, &(0x7f0000000a80)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r8, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2a, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x21, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe91b, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x0, 0x8, 0x6, 0x163, 0xfffffff8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffd}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @generic={0xf, 0x8, 0x0, 0x7, 0x4}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='syzkaller\x00', 0x59c, 0x2f, &(0x7f0000000980)=""/47, 0x41100, 0x42, '\x00', r10, @fallback=0x21, r8, 0x8, &(0x7f0000000ac0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0x4, 0xfffffffa, 0x9}, 0x10, r11, r8, 0x0, &(0x7f0000000e40)=[r8, r8], 0x0, 0x10, 0x5}, 0x94) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendmmsg$unix(r7, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40008004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000x0}) sendto$packet(r8, &(0x7f0000000180)="10030600e0ff020004004788aa96a13bb100001100007fca1a00", 0x10608, 0x0, &(0x7f0000000140)={0x11, 0x0, r9}, 0x14) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x1159e4047a6348de, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='afs_server\x00', r12}, 0x18) (async) getdents64(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r10}, 0x10) r14 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r5) sendmsg$ETHTOOL_MSG_TSINFO_GET(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="01002dbd7000fedbdf2531000000180001801400020064756d6d7930"], 0x2c}, 0x1, 0x0, 0x0, 0x2004c890}, 0x2000c800) 704.400583ms ago: executing program 0 (id=15469): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f0000000080)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = syz_open_procfs(0x0, &(0x7f0000004600)='map_files\x00') fchdir(r7) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r7}, &(0x7f0000000100), &(0x7f0000000740)='%-5lx \x00'}, 0x20) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f0000000a40)={@loopback, @multicast1, 0x0}, &(0x7f0000000a80)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r7, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2a, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x0, 0x0, &(0x7f0000000900)='syzkaller\x00', 0x59c, 0x2f, &(0x7f0000000980)=""/47, 0x41100, 0x42, '\x00', r8, @fallback=0x21, r7, 0x8, &(0x7f0000000ac0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0x4, 0xfffffffa, 0x9}, 0x10, r9, r7, 0x0, &(0x7f0000000e40)=[r7, r7], 0x0, 0x10, 0x5}, 0x94) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, {{&(0x7f0000000080)=@abs={0x1, 0x30, 0x4e21}, 0x6e, 0x0}}], 0x2, 0x40008004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001000)={&(0x7f0000000140)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) sysinfo(&(0x7f0000000540)=""/145) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0xf}, 0x1c) syz_open_dev$tty1(0xc, 0x4, 0x2) r8 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="080000000f8ba466aabe98d6c437a570690771ffdd8564b60220d89f9d3de34fda", @ANYRES32=r4, @ANYRESDEC=r0, @ANYRES64=r5, @ANYRES32, @ANYBLOB="000000000400"/28], 0x48) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000001080)={0x6, @dev={0xac, 0x14, 0x14, 0x3d}, 0x0, 0x2, 'lc\x00', 0x0, 0x0, 0x4000}, 0x2c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x48f, &(0x7f0000000000)={0x11, @private=0xa010102, 0x1fd, 0x0, 'lc\x00', 0x4c, 0x2, 0x3f}, 0x2c) syz_open_dev$loop(&(0x7f0000001040), 0x5, 0x101000) 613.19741ms ago: executing program 4 (id=15474): socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x40000000015, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f0000000080)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r5 = syz_open_procfs(0x0, &(0x7f0000004600)='map_files\x00') fchdir(r5) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r5, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000740)='%-5lx \x00'}, 0x20) getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000000a40)={@loopback, @multicast1, 0x0}, &(0x7f0000000a80)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r5, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], 0x0, 0x2a, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x21, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe91b, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x0, 0x8, 0x6, 0x163, 0xfffffff8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffd}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @generic={0xf, 0x8, 0x0, 0x7, 0x4}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='syzkaller\x00', 0x59c, 0x2f, &(0x7f0000000980)=""/47, 0x41100, 0x42, '\x00', r7, @fallback=0x21, r5, 0x8, &(0x7f0000000ac0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0x4, 0xfffffffa, 0x9}, 0x10, r8, r5, 0x0, &(0x7f0000000e40)=[r5, r5], 0x0, 0x10, 0x5}, 0x94) mkdirat(0xffffffffffffffff, 0x0, 0x0) 524.161868ms ago: executing program 4 (id=15475): bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendmsg$inet6(r0, 0x0, 0x4000000) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x50) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, 0x0, 0x4084) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000400)='rxrpc_call\x00', r1}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01020000000000"], 0x64}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000640)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r2) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000080)={0x34, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) 419.838346ms ago: executing program 7 (id=15476): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef409000000b466f7108ea142f8cc89bca3611fb791643a5ee4b116027ba10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd68493e4edef3d93452a92307f00000e970300000000", 0xd8}], 0x1}, 0x48002) 408.475847ms ago: executing program 7 (id=15477): prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x2000000000000005, &(0x7f0000000200)=[{0x200000000006, 0x2, 0x0, 0x7}, {0x5, 0xf6, 0x7e, 0x7}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) io_setup(0x8f0, &(0x7f0000002400)) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 250.435299ms ago: executing program 2 (id=15478): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000540)=0x710, 0x4) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x80, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x80, &(0x7f0000000000)={0xa, 0x4e23, 0x40000004, @ipv4={'\x00', '\xff\xff', @empty}, 0x4}, 0x1c) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x2063) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x1) r3 = syz_io_uring_setup(0x4e3, &(0x7f0000000480)={0x0, 0x938c, 0x10100, 0x2}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x0}}, './file1\x00'}) quotactl_fd$Q_QUOTAON(r3, 0xffffffff80000202, r6, &(0x7f0000000280)='./file1\x00') syz_io_uring_submit(r4, r5, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {}, 0x1}) io_uring_enter(r3, 0x708, 0x41e3, 0x0, 0x0, 0x0) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x10, 0x7fff0000}]}) splice(r1, 0x0, r7, 0x0, 0x25a5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r8, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x6, @local}, 0x1c, {0x2, 0x0, @dev}}) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0xfffffffc) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000080), 0x1, 0x561, &(0x7f0000000f80)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000380)='./file1\x00', &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) sync() lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000400)=ANY=[], 0xfe37, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/arp\x00') preadv(r9, &(0x7f0000000600)=[{&(0x7f00000004c0)=""/26, 0x1a}], 0x1, 0x4000ffe, 0xfffffffc) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r12}, 0x10) syz_clone3(&(0x7f0000000b40)={0x100, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, &(0x7f0000000700)=[0xffffffffffffffff], 0x1}, 0x58) 236.500401ms ago: executing program 4 (id=15479): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x40404) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x6000)=nil, 0x3000) shmdt(r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r5, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) io_getevents(r3, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x0) write$char_usb(r2, &(0x7f00000003c0)="1638ed960905d217f5ab342a1a194c82a932b5b3104fa55c1e04cd34f9a9381630d5e6f1063c44f16f29b7b10e354749212d2ffc8db92f85b6c0ad4ccce2a1cfa8b5030bb9cab112cb7c600b5956d39d45b45a441eec6446c2d110799f7d63107554d95f5135225f7eaef8fa2b0b8714aa6d6bf04d6b24461ddba3a3546fcbf50f56", 0x82) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00800000000008000000000200000000000000", @ANYRES32=0x1, @ANYBLOB="ffffff7f00"/20, @ANYRES32=r6, @ANYRES32, @ANYBLOB="00000000000000000300"/28], 0x50) keyctl$clear(0x3, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='q\xa9', 0x0) r7 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_buf(r7, 0x6, 0x1a, 0x0, &(0x7f0000000040)) io_pgetevents(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 2 (id=15480): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000006000000000000000100000d030000000000000003000000000000000000000604000000040000000000001202000000000000005f"], 0x0, 0x4a, 0x0, 0x1}, 0x28) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x47, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x47, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='mm_page_free\x00', r3}, 0x18) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r4, 0x0, 0x9}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r4, 0x0, 0x9}, 0x18) syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') (async) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') readv(r5, &(0x7f0000001440)=[{&(0x7f0000000040)=""/20, 0x5}, {0x0, 0x2}], 0x2) (async) readv(r5, &(0x7f0000001440)=[{&(0x7f0000000040)=""/20, 0x5}, {0x0, 0x2}], 0x2) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x2082) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x400c0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x20000000000003da, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r10}, 0x10) rmdir(0x0) ioctl$PPPIOCSDEBUG(r7, 0x40047440, &(0x7f0000000080)=0x9) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x66960000) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000a00", @ANYRES32, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x17, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r11, @ANYBLOB="0000000000000000b702000014000000b7030000000700008500000086000000bf090000000000005509010000050000950000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000008500000006000000bf91000000000000b702000003000000850000002a000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x7, 0x1000, &(0x7f0000000cc0)=""/4096, 0x41000, 0x2f}, 0x94) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r6, 0xc0a85320, &(0x7f00000005c0)={{0x80, 0x7}, 'port0\x00', 0x44, 0xa04f2, 0x10000000, 0x8000008, 0x3, 0x4, 0x80000001}) (async) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r6, 0xc0a85320, &(0x7f00000005c0)={{0x80, 0x7}, 'port0\x00', 0x44, 0xa04f2, 0x10000000, 0x8000008, 0x3, 0x4, 0x80000001}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r6, 0x40505330, &(0x7f00000001c0)={0x800100, 0xffffffff, 0x22, 0xe1d9, 0x1101, 0xff}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r6, 0x40505330, &(0x7f00000004c0)={0x800100, 0xfffffffd, 0x0, 0x4, 0x9, 0x6}) (async) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r6, 0x40505330, &(0x7f00000004c0)={0x800100, 0xfffffffd, 0x0, 0x4, 0x9, 0x6}) kernel console output (not intermixed with test programs): Google 07/12/2025 [ 1035.450359][T12765] Call Trace: [ 1035.450367][T12765] [ 1035.450375][T12765] __dump_stack+0x1d/0x30 [ 1035.450405][T12765] dump_stack_lvl+0xe8/0x140 [ 1035.450424][T12765] dump_stack+0x15/0x1b [ 1035.450443][T12765] should_fail_ex+0x265/0x280 [ 1035.450522][T12765] should_failslab+0x8c/0xb0 [ 1035.450545][T12765] kmem_cache_alloc_noprof+0x50/0x310 [ 1035.450575][T12765] ? skb_clone+0x151/0x1f0 [ 1035.450599][T12765] skb_clone+0x151/0x1f0 [ 1035.450619][T12765] __netlink_deliver_tap+0x2c9/0x500 [ 1035.450690][T12765] netlink_unicast+0x66b/0x690 [ 1035.450806][T12765] netlink_sendmsg+0x58b/0x6b0 [ 1035.450832][T12765] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1035.450855][T12765] __sock_sendmsg+0x145/0x180 [ 1035.450880][T12765] ____sys_sendmsg+0x31e/0x4e0 [ 1035.450952][T12765] ___sys_sendmsg+0x17b/0x1d0 [ 1035.451054][T12765] __x64_sys_sendmsg+0xd4/0x160 [ 1035.451081][T12765] x64_sys_call+0x191e/0x2ff0 [ 1035.451287][T12765] do_syscall_64+0xd2/0x200 [ 1035.451315][T12765] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1035.451342][T12765] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1035.451370][T12765] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1035.451455][T12765] RIP: 0033:0x7f3e01f7ebe9 [ 1035.451471][T12765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1035.451493][T12765] RSP: 002b:00007f3e009e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1035.451514][T12765] RAX: ffffffffffffffda RBX: 00007f3e021a5fa0 RCX: 00007f3e01f7ebe9 [ 1035.451526][T12765] RDX: 0000000004000800 RSI: 0000200000000000 RDI: 0000000000000003 [ 1035.451538][T12765] RBP: 00007f3e009e7090 R08: 0000000000000000 R09: 0000000000000000 [ 1035.451549][T12765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1035.451560][T12765] R13: 00007f3e021a6038 R14: 00007f3e021a5fa0 R15: 00007ffdb5b068f8 [ 1035.451653][T12765] [ 1035.465319][T12768] netlink: 'syz.1.14746': attribute type 1 has an invalid length. [ 1035.678971][T12768] 8021q: adding VLAN 0 to HW filter on device bond9 [ 1035.694349][T12769] macvlan2: entered promiscuous mode [ 1035.699726][T12769] macvlan2: entered allmulticast mode [ 1035.707300][T12769] bond9: entered promiscuous mode [ 1035.712968][T12769] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1035.721392][T12769] bond9: left promiscuous mode [ 1035.783449][T12782] IPv6: Can't replace route, no match found [ 1036.108165][T12795] pim6reg1: entered promiscuous mode [ 1036.113540][T12795] pim6reg1: entered allmulticast mode [ 1036.177925][T12797] syzkaller0: entered promiscuous mode [ 1036.183547][T12797] syzkaller0: entered allmulticast mode [ 1036.720920][T12810] FAULT_INJECTION: forcing a failure. [ 1036.720920][T12810] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1036.734457][T12810] CPU: 1 UID: 0 PID: 12810 Comm: syz.4.14761 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1036.734529][T12810] Tainted: [W]=WARN [ 1036.734537][T12810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1036.734550][T12810] Call Trace: [ 1036.734557][T12810] [ 1036.734565][T12810] __dump_stack+0x1d/0x30 [ 1036.734591][T12810] dump_stack_lvl+0xe8/0x140 [ 1036.734656][T12810] dump_stack+0x15/0x1b [ 1036.734672][T12810] should_fail_ex+0x265/0x280 [ 1036.734692][T12810] should_fail_alloc_page+0xf2/0x100 [ 1036.734715][T12810] __alloc_frozen_pages_noprof+0xff/0x360 [ 1036.734827][T12810] alloc_pages_mpol+0xb3/0x250 [ 1036.734860][T12810] vma_alloc_folio_noprof+0x1aa/0x300 [ 1036.734889][T12810] handle_mm_fault+0xec2/0x2c20 [ 1036.734995][T12810] ? __rcu_read_unlock+0x4f/0x70 [ 1036.735023][T12810] do_user_addr_fault+0x3fe/0x1090 [ 1036.735053][T12810] exc_page_fault+0x62/0xa0 [ 1036.735121][T12810] asm_exc_page_fault+0x26/0x30 [ 1036.735139][T12810] RIP: 0010:put_cmsg+0x177/0x400 [ 1036.735282][T12810] Code: 89 f6 e8 bc 9c 09 fd 48 89 df 4c 89 ee e8 b1 9c 09 fd 4c 39 eb 0f 82 16 02 00 00 4c 39 f3 0f 87 0d 02 00 00 0f 01 cb 0f ae e8 <4d> 89 7d 00 8b 04 24 41 89 45 08 48 8b 5c 24 10 8b 44 24 04 41 89 [ 1036.735299][T12810] RSP: 0018:ffffc90009823978 EFLAGS: 00050283 [ 1036.735327][T12810] RAX: ffffffff844e5f7f RBX: 0000200000001e10 RCX: ffff88811a1d8000 [ 1036.735342][T12810] RDX: 0000000000000000 RSI: 0000200000001e00 RDI: 0000200000001e10 [ 1036.735357][T12810] RBP: 0000000000000000 R08: 0001c90009823e47 R09: 0000000000000000 [ 1036.735499][T12810] R10: ffffc900098239e4 R11: 0001c900098239e4 R12: ffffc900098239e4 [ 1036.735513][T12810] R13: 0000200000001e00 R14: 00007ffffffff000 R15: 0000000000000010 [ 1036.735529][T12810] ? put_cmsg+0x15f/0x400 [ 1036.735558][T12810] ? put_cmsg+0x15f/0x400 [ 1036.735586][T12810] ip6_datagram_recv_common_ctl+0x184/0x1c0 [ 1036.735662][T12810] udpv6_recvmsg+0xa0e/0xc30 [ 1036.735742][T12810] ? __pfx_udpv6_recvmsg+0x10/0x10 [ 1036.735772][T12810] inet6_recvmsg+0x143/0x290 [ 1036.735810][T12810] sock_recvmsg+0x95/0x170 [ 1036.735840][T12810] ____sys_recvmsg+0xf5/0x280 [ 1036.735912][T12810] ___sys_recvmsg+0x11f/0x370 [ 1036.735946][T12810] do_recvmmsg+0x1ef/0x540 [ 1036.735975][T12810] ? fput+0x8f/0xc0 [ 1036.736039][T12810] __x64_sys_recvmmsg+0xe5/0x170 [ 1036.736101][T12810] x64_sys_call+0x27a6/0x2ff0 [ 1036.736121][T12810] do_syscall_64+0xd2/0x200 [ 1036.736145][T12810] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1036.736168][T12810] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1036.736272][T12810] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1036.736320][T12810] RIP: 0033:0x7f970b1eebe9 [ 1036.736337][T12810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1036.736356][T12810] RSP: 002b:00007f9709c4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1036.736378][T12810] RAX: ffffffffffffffda RBX: 00007f970b415fa0 RCX: 00007f970b1eebe9 [ 1036.736464][T12810] RDX: 0000000000000001 RSI: 0000200000008340 RDI: 0000000000000005 [ 1036.736477][T12810] RBP: 00007f9709c4f090 R08: 0000000000000000 R09: 0000000000000000 [ 1036.736491][T12810] R10: 0000000000010003 R11: 0000000000000246 R12: 0000000000000001 [ 1036.736582][T12810] R13: 00007f970b416038 R14: 00007f970b415fa0 R15: 00007fffbd968fd8 [ 1036.736600][T12810] [ 1036.740958][T12814] netlink: 'syz.1.14763': attribute type 1 has an invalid length. [ 1036.779160][T12812] __nla_validate_parse: 9 callbacks suppressed [ 1036.779177][T12812] netlink: 8 bytes leftover after parsing attributes in process `syz.0.14762'. [ 1036.787637][T12814] 8021q: adding VLAN 0 to HW filter on device bond10 [ 1036.877841][T12820] IPv6: Can't replace route, no match found [ 1036.911806][T12812] veth0_to_bond: entered allmulticast mode [ 1037.111864][T12818] macvlan2: entered promiscuous mode [ 1037.117184][T12818] macvlan2: entered allmulticast mode [ 1037.123704][T12818] bond10: entered promiscuous mode [ 1037.129343][T12818] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1037.137337][T12818] bond10: left promiscuous mode [ 1037.153252][T12824] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14765'. [ 1037.172874][T12824] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14765'. [ 1037.215557][T12826] netlink: 830 bytes leftover after parsing attributes in process `syz.0.14766'. [ 1037.375644][T12855] IPv6: Can't replace route, no match found [ 1037.396388][T12857] netlink: 'syz.2.14778': attribute type 1 has an invalid length. [ 1037.412344][T12857] 8021q: adding VLAN 0 to HW filter on device bond12 [ 1037.427512][T12857] macvlan2: entered promiscuous mode [ 1037.432882][T12857] macvlan2: entered allmulticast mode [ 1037.439474][T12857] bond12: entered promiscuous mode [ 1037.447735][T12857] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1037.455345][T12857] bond12: left promiscuous mode [ 1037.618261][ T29] kauditd_printk_skb: 427 callbacks suppressed [ 1037.618277][ T29] audit: type=1400 audit(1037.592:55506): avc: denied { getopt } for pid=12860 comm="syz.7.14779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1037.661420][T12866] netlink: 830 bytes leftover after parsing attributes in process `syz.2.14781'. [ 1037.867383][T12878] netlink: 132 bytes leftover after parsing attributes in process `syz.0.14785'. [ 1037.905521][T12876] 9pnet: Could not find request transport: fd0x0000000000000009 [ 1037.919884][ T29] audit: type=1400 audit(1037.782:55507): avc: denied { create } for pid=12872 comm="syz.2.14784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1037.939210][ T29] audit: type=1400 audit(1037.782:55508): avc: denied { read append } for pid=12872 comm="syz.2.14784" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1037.962709][ T29] audit: type=1400 audit(1037.832:55509): avc: denied { mounton } for pid=12872 comm="syz.2.14784" path="/520/file0" dev="tmpfs" ino=2640 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1037.985359][ T29] audit: type=1400 audit(1037.832:55510): avc: denied { module_request } for pid=12872 comm="syz.2.14784" kmod="9p-fd0x0000000000000009" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1038.072049][ T29] audit: type=1400 audit(1038.052:55511): avc: denied { listen } for pid=12877 comm="syz.0.14785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1038.091381][ T29] audit: type=1400 audit(1038.052:55512): avc: denied { getopt } for pid=12877 comm="syz.0.14785" lport=35439 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1038.116824][ T29] audit: type=1400 audit(1038.092:55513): avc: denied { ioctl } for pid=12885 comm="syz.2.14787" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1038.154931][ T29] audit: type=1400 audit(1038.122:55514): avc: denied { write } for pid=12888 comm="syz.1.14788" name="ip_vs" dev="proc" ino=4026534179 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1038.165064][T12891] IPv6: Can't replace route, no match found [ 1038.177560][ T29] audit: type=1400 audit(1038.122:55515): avc: denied { create } for pid=12888 comm="syz.1.14788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1038.226244][T12894] netlink: 96 bytes leftover after parsing attributes in process `syz.4.14791'. [ 1038.238676][T12898] netlink: 'syz.2.14792': attribute type 1 has an invalid length. [ 1038.256825][T12898] 8021q: adding VLAN 0 to HW filter on device bond13 [ 1038.273247][T12898] macvlan2: entered promiscuous mode [ 1038.278659][T12898] macvlan2: entered allmulticast mode [ 1038.287266][T12898] bond13: entered promiscuous mode [ 1038.292769][T12898] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1038.302730][T12898] bond13: left promiscuous mode [ 1038.427077][T12903] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1039.582168][T12922] netlink: 40 bytes leftover after parsing attributes in process `syz.2.14798'. [ 1039.593030][T12922] FAULT_INJECTION: forcing a failure. [ 1039.593030][T12922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1039.606131][T12922] CPU: 0 UID: 0 PID: 12922 Comm: syz.2.14798 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1039.606224][T12922] Tainted: [W]=WARN [ 1039.606231][T12922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1039.606246][T12922] Call Trace: [ 1039.606255][T12922] [ 1039.606266][T12922] __dump_stack+0x1d/0x30 [ 1039.606403][T12922] dump_stack_lvl+0xe8/0x140 [ 1039.606427][T12922] dump_stack+0x15/0x1b [ 1039.606447][T12922] should_fail_ex+0x265/0x280 [ 1039.606470][T12922] should_fail+0xb/0x20 [ 1039.606486][T12922] should_fail_usercopy+0x1a/0x20 [ 1039.606543][T12922] _copy_from_user+0x1c/0xb0 [ 1039.606671][T12922] ___sys_sendmsg+0xc1/0x1d0 [ 1039.606788][T12922] __x64_sys_sendmsg+0xd4/0x160 [ 1039.606862][T12922] x64_sys_call+0x191e/0x2ff0 [ 1039.606910][T12922] do_syscall_64+0xd2/0x200 [ 1039.606995][T12922] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1039.607102][T12922] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1039.607205][T12922] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1039.607225][T12922] RIP: 0033:0x7f136127ebe9 [ 1039.607282][T12922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1039.607301][T12922] RSP: 002b:00007f135fce7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1039.607326][T12922] RAX: ffffffffffffffda RBX: 00007f13614a5fa0 RCX: 00007f136127ebe9 [ 1039.607342][T12922] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000006 [ 1039.607358][T12922] RBP: 00007f135fce7090 R08: 0000000000000000 R09: 0000000000000000 [ 1039.607384][T12922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1039.607401][T12922] R13: 00007f13614a6038 R14: 00007f13614a5fa0 R15: 00007fff330e69a8 [ 1039.607422][T12922] [ 1039.801022][T12926] IPv6: Can't replace route, no match found [ 1039.851712][T12917] syzkaller0: entered promiscuous mode [ 1039.857297][T12917] syzkaller0: entered allmulticast mode [ 1039.901897][T12929] netlink: 'syz.7.14803': attribute type 13 has an invalid length. [ 1039.949187][T12929] bridge0: port 2(bridge_slave_1) entered disabled state [ 1039.956418][T12929] bridge0: port 1(bridge_slave_0) entered disabled state [ 1039.982141][T12935] netlink: 148 bytes leftover after parsing attributes in process `syz.7.14803'. [ 1040.051567][T12941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12941 comm=syz.7.14803 [ 1040.147103][T12929] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1040.159101][T12941] netlink: 360 bytes leftover after parsing attributes in process `syz.7.14803'. [ 1040.180434][T12929] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1041.126336][T12946] pim6reg1: entered promiscuous mode [ 1041.131859][T12946] pim6reg1: entered allmulticast mode [ 1041.166137][ T12] netdevsim netdevsim7 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1041.274162][ T12] netdevsim netdevsim7 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1041.413924][ T12] netdevsim netdevsim7 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1041.425880][ T12] netdevsim netdevsim7 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1041.436905][T12978] netlink: 'syz.0.14816': attribute type 1 has an invalid length. [ 1041.474344][T12978] 8021q: adding VLAN 0 to HW filter on device bond11 [ 1041.510931][T12978] macvlan2: entered promiscuous mode [ 1041.516277][T12978] macvlan2: entered allmulticast mode [ 1041.533187][T12978] bond11: entered promiscuous mode [ 1041.539606][T12978] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1041.549307][T12978] bond11: left promiscuous mode [ 1041.888362][T13003] __nla_validate_parse: 6 callbacks suppressed [ 1041.888398][T13003] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14825'. [ 1041.909584][T13003] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14825'. [ 1042.262268][T13016] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1042.286403][T13022] sd 0:0:1:0: device reset [ 1042.622744][ T29] kauditd_printk_skb: 1584 callbacks suppressed [ 1042.622763][ T29] audit: type=1326 audit(1042.592:57098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13034 comm="syz.1.14840" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7614b95ba7 code=0x7ffc0000 [ 1042.652217][ T29] audit: type=1326 audit(1042.602:57099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13034 comm="syz.1.14840" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f7614b3ade9 code=0x7ffc0000 [ 1042.675441][ T29] audit: type=1326 audit(1042.602:57100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13034 comm="syz.1.14840" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7614b9ebe9 code=0x7ffc0000 [ 1042.698687][ T29] audit: type=1326 audit(1042.602:57101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13034 comm="syz.1.14840" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7614b9ebe9 code=0x7ffc0000 [ 1042.722162][ T29] audit: type=1326 audit(1042.602:57102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13034 comm="syz.1.14840" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7614b95ba7 code=0x7ffc0000 [ 1042.745232][ T29] audit: type=1326 audit(1042.602:57103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13034 comm="syz.1.14840" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f7614b3ade9 code=0x7ffc0000 [ 1042.768295][ T29] audit: type=1326 audit(1042.602:57104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13034 comm="syz.1.14840" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7614b95ba7 code=0x7ffc0000 [ 1042.791369][ T29] audit: type=1326 audit(1042.602:57105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13034 comm="syz.1.14840" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f7614b3ade9 code=0x7ffc0000 [ 1042.814544][ T29] audit: type=1326 audit(1042.602:57106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13034 comm="syz.1.14840" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7614b9ebe9 code=0x7ffc0000 [ 1042.841300][ T29] audit: type=1326 audit(1042.662:57107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13034 comm="syz.1.14840" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7614b95ba7 code=0x7ffc0000 [ 1042.869013][T13041] sd 0:0:1:0: device reset [ 1043.444052][T13057] netlink: 830 bytes leftover after parsing attributes in process `syz.4.14849'. [ 1043.681809][T13062] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14851'. [ 1043.753273][T13062] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14851'. [ 1043.792325][T13066] netlink: 4 bytes leftover after parsing attributes in process `syz.1.14853'. [ 1043.802581][T13066] netlink: 4 bytes leftover after parsing attributes in process `syz.1.14853'. [ 1043.933286][T13071] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1044.057362][T13077] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1044.412174][T13088] netlink: 84 bytes leftover after parsing attributes in process `syz.2.14861'. [ 1045.013047][T13108] IPv6: Can't replace route, no match found [ 1045.188251][T13114] pim6reg1: entered promiscuous mode [ 1045.193666][T13114] pim6reg1: entered allmulticast mode [ 1045.349599][T13119] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14874'. [ 1045.439509][T13121] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14874'. [ 1046.293101][T13140] netlink: 'syz.4.14879': attribute type 1 has an invalid length. [ 1046.305741][T13140] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1046.317639][T13140] macvlan2: entered promiscuous mode [ 1046.323130][T13140] macvlan2: entered allmulticast mode [ 1046.329967][T13140] bond1: entered promiscuous mode [ 1046.335302][T13140] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1046.343553][T13140] bond1: left promiscuous mode [ 1046.371598][T13146] netlink: 'syz.7.14881': attribute type 1 has an invalid length. [ 1046.384738][T13146] 8021q: adding VLAN 0 to HW filter on device bond18 [ 1046.408674][T13146] macvlan2: entered promiscuous mode [ 1046.414184][T13146] macvlan2: entered allmulticast mode [ 1046.420912][T13146] bond18: entered promiscuous mode [ 1046.426263][T13146] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1046.475480][T13146] bond18: left promiscuous mode [ 1046.577291][T13161] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1046.822696][T13161] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1046.914446][T13161] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1046.992533][T13161] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1047.092284][ T31] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1047.108419][T13170] __nla_validate_parse: 9 callbacks suppressed [ 1047.108447][T13170] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14890'. [ 1047.114316][ T31] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1047.116244][T13170] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14890'. [ 1047.145982][ T31] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1047.161911][ T31] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1047.219148][T13178] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1047.257254][T13191] netlink: 4 bytes leftover after parsing attributes in process `syz.1.14899'. [ 1047.267748][T13191] netlink: 4 bytes leftover after parsing attributes in process `syz.1.14899'. [ 1047.289146][T13186] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1047.380093][T13204] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1047.442077][T13204] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1047.456148][T13206] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14906'. [ 1047.466206][T13206] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14906'. [ 1047.491608][T13204] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1047.551714][T13204] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1047.616129][ T31] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1047.628893][ T2593] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1047.640086][ T9100] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1047.651634][ T31] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1047.746371][ T29] kauditd_printk_skb: 1823 callbacks suppressed [ 1047.746389][ T29] audit: type=1326 audit(1047.722:58931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13210 comm="syz.0.14908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1047.777520][ T29] audit: type=1326 audit(1047.722:58932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13210 comm="syz.0.14908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1047.800740][ T29] audit: type=1326 audit(1047.722:58933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13210 comm="syz.0.14908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1047.823978][ T29] audit: type=1326 audit(1047.722:58934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13210 comm="syz.0.14908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1047.847222][ T29] audit: type=1326 audit(1047.722:58935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13210 comm="syz.0.14908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1047.858809][T13212] netlink: 8 bytes leftover after parsing attributes in process `syz.0.14908'. [ 1047.879499][ T29] audit: type=1326 audit(1047.812:58936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13210 comm="syz.0.14908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1047.902807][ T29] audit: type=1326 audit(1047.812:58937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13210 comm="syz.0.14908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1047.926001][ T29] audit: type=1326 audit(1047.832:58938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13210 comm="syz.0.14908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=447 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1047.949277][ T29] audit: type=1326 audit(1047.832:58939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13210 comm="syz.0.14908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1047.972485][ T29] audit: type=1326 audit(1047.832:58940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13210 comm="syz.0.14908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1048.027804][T13214] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1048.121884][T13218] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1048.153064][T13220] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1048.170055][T13224] pim6reg1: entered promiscuous mode [ 1048.175608][T13224] pim6reg1: entered allmulticast mode [ 1048.201570][T13230] netlink: 84 bytes leftover after parsing attributes in process `syz.1.14916'. [ 1048.221142][T13229] netlink: 830 bytes leftover after parsing attributes in process `syz.4.14917'. [ 1048.284351][T13236] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14920'. [ 1048.383752][T13244] netlink: 'syz.7.14923': attribute type 1 has an invalid length. [ 1048.396623][T13244] 8021q: adding VLAN 0 to HW filter on device bond19 [ 1048.409282][T13244] macvlan2: entered promiscuous mode [ 1048.414629][T13244] macvlan2: entered allmulticast mode [ 1048.421108][T13244] bond19: entered promiscuous mode [ 1048.426445][T13244] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1048.435189][T13244] bond19: left promiscuous mode [ 1048.570059][T13256] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1048.645982][T13265] pim6reg1: entered promiscuous mode [ 1048.651422][T13265] pim6reg1: entered allmulticast mode [ 1049.569350][T13282] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1049.820462][T13290] chnl_net:caif_netlink_parms(): no params data found [ 1049.854737][T13290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1049.861897][T13290] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.869037][T13290] bridge_slave_0: entered allmulticast mode [ 1049.875572][T13290] bridge_slave_0: entered promiscuous mode [ 1049.882247][T13290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.889436][T13290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.896745][T13290] bridge_slave_1: entered allmulticast mode [ 1049.903251][T13290] bridge_slave_1: entered promiscuous mode [ 1049.920539][T13290] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1049.931016][T13290] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1049.949452][T13290] team0: Port device team_slave_0 added [ 1049.956128][T13290] team0: Port device team_slave_1 added [ 1049.971150][T13290] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1049.978111][T13290] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1050.004229][T13290] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1050.015682][T13290] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1050.022648][T13290] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1050.048700][T13290] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1050.076638][T13290] hsr_slave_0: entered promiscuous mode [ 1050.082925][T13290] hsr_slave_1: entered promiscuous mode [ 1050.088846][T13290] debugfs: 'hsr0' already exists in 'hsr' [ 1050.094670][T13290] Cannot create hsr debugfs directory [ 1050.173334][T13306] bond14: entered promiscuous mode [ 1050.178495][T13306] bond14: entered allmulticast mode [ 1050.183886][T13306] 8021q: adding VLAN 0 to HW filter on device bond14 [ 1050.193914][T13306] bond14 (unregistering): Released all slaves [ 1050.475759][T13290] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1050.484538][T13290] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1050.496282][T13290] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1050.505149][T13290] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1050.539494][T13290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1050.552240][T13290] 8021q: adding VLAN 0 to HW filter on device team0 [ 1050.564675][T29115] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.571844][T29115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1050.581169][T29115] bridge0: port 2(bridge_slave_1) entered blocking state [ 1050.588252][T29115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1050.648808][T13290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1050.754318][T13290] veth0_vlan: entered promiscuous mode [ 1050.762682][T13290] veth1_vlan: entered promiscuous mode [ 1050.778356][T13290] veth0_macvtap: entered promiscuous mode [ 1050.786301][T13290] veth1_macvtap: entered promiscuous mode [ 1050.796821][T13290] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1050.808109][T13290] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1050.818812][ T58] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1050.827810][ T58] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1050.838281][ T58] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1050.847379][ T58] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1051.039400][T13350] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1051.117659][T13352] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1051.314234][ T8028] IPVS: starting estimator thread 0... [ 1051.410711][T13364] IPVS: using max 3840 ests per chain, 192000 per kthread [ 1052.005096][T13370] pim6reg1: entered promiscuous mode [ 1052.010561][T13370] pim6reg1: entered allmulticast mode [ 1052.045812][T13374] bond11: entered promiscuous mode [ 1052.051083][T13374] bond11: entered allmulticast mode [ 1052.057126][T13374] 8021q: adding VLAN 0 to HW filter on device bond11 [ 1052.068286][T13374] bond11 (unregistering): Released all slaves [ 1052.101855][T13383] netlink: 'syz.4.14961': attribute type 1 has an invalid length. [ 1052.121722][T13381] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1052.145898][T13383] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1052.163941][T13389] macvlan2: entered promiscuous mode [ 1052.169285][T13389] macvlan2: entered allmulticast mode [ 1052.178140][T13389] bond2: entered promiscuous mode [ 1052.196270][T13389] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1052.223552][T13389] bond2: left promiscuous mode [ 1052.243468][T13392] __nla_validate_parse: 16 callbacks suppressed [ 1052.243485][T13392] netlink: 830 bytes leftover after parsing attributes in process `syz.2.14965'. [ 1052.748144][T13405] netlink: 4 bytes leftover after parsing attributes in process `syz.1.14970'. [ 1052.758758][ T29] kauditd_printk_skb: 1151 callbacks suppressed [ 1052.758774][ T29] audit: type=1326 audit(1052.732:60092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13398 comm="syz.4.14967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1052.759653][T13405] netlink: 4 bytes leftover after parsing attributes in process `syz.1.14970'. [ 1052.765120][ T29] audit: type=1326 audit(1052.732:60093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13398 comm="syz.4.14967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1052.765149][ T29] audit: type=1326 audit(1052.732:60094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13398 comm="syz.4.14967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1052.765172][ T29] audit: type=1326 audit(1052.732:60095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13404 comm="syz.1.14970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7614b9ebe9 code=0x7ffc0000 [ 1052.765196][ T29] audit: type=1326 audit(1052.732:60096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13398 comm="syz.4.14967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1052.765249][ T29] audit: type=1326 audit(1052.732:60097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13398 comm="syz.4.14967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1052.765276][ T29] audit: type=1326 audit(1052.732:60098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13398 comm="syz.4.14967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f970b1e5ba7 code=0x7ffc0000 [ 1052.938169][ T29] audit: type=1326 audit(1052.732:60099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13398 comm="syz.4.14967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f970b18ade9 code=0x7ffc0000 [ 1052.961404][ T29] audit: type=1326 audit(1052.732:60100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13398 comm="syz.4.14967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f970b1e5ba7 code=0x7ffc0000 [ 1052.984545][ T29] audit: type=1326 audit(1052.732:60101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13398 comm="syz.4.14967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f970b18ade9 code=0x7ffc0000 [ 1053.249773][T13419] pim6reg1: entered promiscuous mode [ 1053.255271][T13419] pim6reg1: entered allmulticast mode [ 1053.413255][T13423] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1053.460940][T13427] netlink: 52 bytes leftover after parsing attributes in process `syz.2.14977'. [ 1053.529886][T13429] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14978'. [ 1053.595036][T13430] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14978'. [ 1053.746362][T13432] netlink: 'syz.1.14979': attribute type 29 has an invalid length. [ 1053.938962][T13447] IPv6: Can't replace route, no match found [ 1053.977060][T13450] pim6reg1: entered promiscuous mode [ 1053.982472][T13450] pim6reg1: entered allmulticast mode [ 1054.429212][T13456] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14989'. [ 1054.497996][T13457] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14989'. [ 1054.507500][T13454] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1054.556583][T13459] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1054.875561][T13479] pim6reg1: entered promiscuous mode [ 1054.881036][T13479] pim6reg1: entered allmulticast mode [ 1054.888303][T13482] netlink: 52 bytes leftover after parsing attributes in process `syz.0.14998'. [ 1054.958970][T13484] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1055.006630][T13490] pim6reg1: entered promiscuous mode [ 1055.012065][T13490] pim6reg1: entered allmulticast mode [ 1055.041273][T13488] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1055.065130][T13459] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1055.109078][T13459] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1055.119932][T13497] netlink: 80 bytes leftover after parsing attributes in process `syz.2.15005'. [ 1055.147728][T13499] FAULT_INJECTION: forcing a failure. [ 1055.147728][T13499] name failslab, interval 1, probability 0, space 0, times 0 [ 1055.160643][T13499] CPU: 0 UID: 0 PID: 13499 Comm: syz.1.15008 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1055.160676][T13499] Tainted: [W]=WARN [ 1055.160684][T13499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1055.160697][T13499] Call Trace: [ 1055.160703][T13499] [ 1055.160710][T13499] __dump_stack+0x1d/0x30 [ 1055.160760][T13499] dump_stack_lvl+0xe8/0x140 [ 1055.160780][T13499] dump_stack+0x15/0x1b [ 1055.160798][T13499] should_fail_ex+0x265/0x280 [ 1055.160820][T13499] should_failslab+0x8c/0xb0 [ 1055.160846][T13499] kmem_cache_alloc_node_noprof+0x57/0x320 [ 1055.160878][T13499] ? __alloc_skb+0x101/0x320 [ 1055.160897][T13499] __alloc_skb+0x101/0x320 [ 1055.160942][T13499] netlink_alloc_large_skb+0xba/0xf0 [ 1055.160978][T13499] netlink_sendmsg+0x3cf/0x6b0 [ 1055.161002][T13499] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1055.161070][T13499] __sock_sendmsg+0x145/0x180 [ 1055.161103][T13499] ____sys_sendmsg+0x31e/0x4e0 [ 1055.161184][T13499] ___sys_sendmsg+0x17b/0x1d0 [ 1055.161212][T13499] __x64_sys_sendmsg+0xd4/0x160 [ 1055.161237][T13499] x64_sys_call+0x191e/0x2ff0 [ 1055.161260][T13499] do_syscall_64+0xd2/0x200 [ 1055.161289][T13499] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1055.161314][T13499] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1055.161338][T13499] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1055.161415][T13499] RIP: 0033:0x7f7614b9ebe9 [ 1055.161432][T13499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1055.161452][T13499] RSP: 002b:00007f7613607038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1055.161474][T13499] RAX: ffffffffffffffda RBX: 00007f7614dc5fa0 RCX: 00007f7614b9ebe9 [ 1055.161566][T13499] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000003 [ 1055.161579][T13499] RBP: 00007f7613607090 R08: 0000000000000000 R09: 0000000000000000 [ 1055.161593][T13499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1055.161604][T13499] R13: 00007f7614dc6038 R14: 00007f7614dc5fa0 R15: 00007ffd3d03d148 [ 1055.161620][T13499] [ 1055.402748][T13459] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1055.501025][T13508] pim6reg1: entered promiscuous mode [ 1055.506380][T13508] pim6reg1: entered allmulticast mode [ 1055.541514][ T58] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1055.551807][ T58] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1055.555668][T13514] FAULT_INJECTION: forcing a failure. [ 1055.555668][T13514] name failslab, interval 1, probability 0, space 0, times 0 [ 1055.560003][ T58] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1055.560040][ T58] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1055.589182][T13514] CPU: 0 UID: 0 PID: 13514 Comm: syz.4.15015 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1055.589205][T13514] Tainted: [W]=WARN [ 1055.589210][T13514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1055.589298][T13514] Call Trace: [ 1055.589302][T13514] [ 1055.589307][T13514] __dump_stack+0x1d/0x30 [ 1055.589323][T13514] dump_stack_lvl+0xe8/0x140 [ 1055.589397][T13514] dump_stack+0x15/0x1b [ 1055.589408][T13514] should_fail_ex+0x265/0x280 [ 1055.589487][T13514] should_failslab+0x8c/0xb0 [ 1055.589502][T13514] kmem_cache_alloc_node_noprof+0x57/0x320 [ 1055.589547][T13514] ? __alloc_skb+0x101/0x320 [ 1055.589616][T13514] __alloc_skb+0x101/0x320 [ 1055.589627][T13514] alloc_skb_with_frags+0x7d/0x470 [ 1055.589640][T13514] ? avc_has_perm_noaudit+0x1b1/0x200 [ 1055.589657][T13514] sock_alloc_send_pskb+0x43a/0x4f0 [ 1055.589697][T13514] hci_sock_sendmsg+0x129/0x910 [ 1055.589715][T13514] ? __pfx_hci_sock_sendmsg+0x10/0x10 [ 1055.589785][T13514] __sock_sendmsg+0x145/0x180 [ 1055.589802][T13514] sock_write_iter+0x165/0x1b0 [ 1055.589839][T13514] aio_write+0x2e5/0x410 [ 1055.589858][T13514] io_submit_one+0xacd/0x11d0 [ 1055.589878][T13514] __se_sys_io_submit+0xfb/0x280 [ 1055.589926][T13514] __x64_sys_io_submit+0x43/0x50 [ 1055.589940][T13514] x64_sys_call+0x2d5d/0x2ff0 [ 1055.589953][T13514] do_syscall_64+0xd2/0x200 [ 1055.590032][T13514] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1055.590048][T13514] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1055.590123][T13514] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1055.590137][T13514] RIP: 0033:0x7f970b1eebe9 [ 1055.590149][T13514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1055.590227][T13514] RSP: 002b:00007f9709c4f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 1055.590241][T13514] RAX: ffffffffffffffda RBX: 00007f970b415fa0 RCX: 00007f970b1eebe9 [ 1055.590288][T13514] RDX: 0000200000000340 RSI: 0000000000000001 RDI: 00007f9709c0b000 [ 1055.590296][T13514] RBP: 00007f9709c4f090 R08: 0000000000000000 R09: 0000000000000000 [ 1055.590304][T13514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1055.590312][T13514] R13: 00007f970b416038 R14: 00007f970b415fa0 R15: 00007fffbd968fd8 [ 1055.590323][T13514] [ 1055.929597][T13521] pim6reg1: entered promiscuous mode [ 1055.935081][T13521] pim6reg1: entered allmulticast mode [ 1055.954470][T13517] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1056.118487][T13541] pim6reg1: entered promiscuous mode [ 1056.123882][T13541] pim6reg1: entered allmulticast mode [ 1056.212899][T13543] pim6reg1: entered promiscuous mode [ 1056.218245][T13543] pim6reg1: entered allmulticast mode [ 1056.457173][T13552] netlink: 'syz.1.15030': attribute type 1 has an invalid length. [ 1056.473411][T13552] 8021q: adding VLAN 0 to HW filter on device bond11 [ 1057.151972][T13568] FAULT_INJECTION: forcing a failure. [ 1057.151972][T13568] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.164668][T13568] CPU: 1 UID: 0 PID: 13568 Comm: syz.2.15034 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1057.164703][T13568] Tainted: [W]=WARN [ 1057.164707][T13568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1057.164715][T13568] Call Trace: [ 1057.164720][T13568] [ 1057.164775][T13568] __dump_stack+0x1d/0x30 [ 1057.164867][T13568] dump_stack_lvl+0xe8/0x140 [ 1057.164908][T13568] dump_stack+0x15/0x1b [ 1057.164919][T13568] should_fail_ex+0x265/0x280 [ 1057.164932][T13568] ? allocate_file_region_entries+0xd2/0x310 [ 1057.164952][T13568] should_failslab+0x8c/0xb0 [ 1057.164966][T13568] __kmalloc_cache_noprof+0x4c/0x320 [ 1057.165009][T13568] ? __pfx_workingset_update_node+0x10/0x10 [ 1057.165023][T13568] allocate_file_region_entries+0xd2/0x310 [ 1057.165090][T13568] region_chg+0x232/0x2d0 [ 1057.165104][T13568] alloc_hugetlb_folio+0x312/0x1070 [ 1057.165124][T13568] hugetlb_fault+0xd71/0x1b50 [ 1057.165141][T13568] handle_mm_fault+0x1861/0x2c20 [ 1057.165210][T13568] ? mt_find+0x200/0x320 [ 1057.165227][T13568] ? try_grab_folio+0x75/0x170 [ 1057.165240][T13568] ? down_read+0x77/0xe0 [ 1057.165267][T13568] __get_user_pages+0x102e/0x1fa0 [ 1057.165286][T13568] __mm_populate+0x243/0x3a0 [ 1057.165301][T13568] do_mlock+0x47f/0x520 [ 1057.165316][T13568] ? fput+0x8f/0xc0 [ 1057.165405][T13568] ? ksys_write+0x192/0x1a0 [ 1057.165419][T13568] __x64_sys_mlock+0x36/0x50 [ 1057.165435][T13568] x64_sys_call+0x18f8/0x2ff0 [ 1057.165477][T13568] do_syscall_64+0xd2/0x200 [ 1057.165501][T13568] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1057.165526][T13568] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1057.165553][T13568] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1057.165568][T13568] RIP: 0033:0x7f136127ebe9 [ 1057.165588][T13568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1057.165684][T13568] RSP: 002b:00007f135fce7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 1057.165742][T13568] RAX: ffffffffffffffda RBX: 00007f13614a5fa0 RCX: 00007f136127ebe9 [ 1057.165750][T13568] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 00002000007d8000 [ 1057.165759][T13568] RBP: 00007f135fce7090 R08: 0000000000000000 R09: 0000000000000000 [ 1057.165767][T13568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1057.165774][T13568] R13: 00007f13614a6038 R14: 00007f13614a5fa0 R15: 00007fff330e69a8 [ 1057.165836][T13568] [ 1057.466694][T13574] pim6reg1: entered promiscuous mode [ 1057.472097][T13574] pim6reg1: entered allmulticast mode [ 1057.530312][T13576] pim6reg1: entered promiscuous mode [ 1057.535779][T13576] pim6reg1: entered allmulticast mode [ 1057.547315][T13580] __nla_validate_parse: 6 callbacks suppressed [ 1057.547421][T13580] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15040'. [ 1057.563415][T13580] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15040'. [ 1057.602172][T13584] netlink: 'syz.1.15042': attribute type 1 has an invalid length. [ 1057.615038][T13584] 8021q: adding VLAN 0 to HW filter on device bond12 [ 1057.810212][ T29] kauditd_printk_skb: 4419 callbacks suppressed [ 1057.810231][ T29] audit: type=1400 audit(1057.782:64521): avc: denied { getopt } for pid=13600 comm="syz.1.15048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1057.878393][T13610] pim6reg1: entered promiscuous mode [ 1057.883769][T13610] pim6reg1: entered allmulticast mode [ 1058.186192][T13617] netlink: 'syz.4.15055': attribute type 1 has an invalid length. [ 1058.264634][T13617] 8021q: adding VLAN 0 to HW filter on device bond3 [ 1058.291064][ T29] audit: type=1326 audit(1058.272:64522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13622 comm="syz.4.15057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1058.314454][ T29] audit: type=1326 audit(1058.272:64523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13622 comm="syz.4.15057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1058.337810][ T29] audit: type=1326 audit(1058.272:64524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13622 comm="syz.4.15057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1058.361280][ T29] audit: type=1326 audit(1058.272:64525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13622 comm="syz.4.15057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1058.384504][ T29] audit: type=1326 audit(1058.272:64526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13622 comm="syz.4.15057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1058.407751][ T29] audit: type=1326 audit(1058.272:64527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13622 comm="syz.4.15057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1058.412206][T13628] netlink: 830 bytes leftover after parsing attributes in process `syz.4.15059'. [ 1058.430937][ T29] audit: type=1326 audit(1058.272:64528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13622 comm="syz.4.15057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1058.430970][ T29] audit: type=1326 audit(1058.272:64529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13622 comm="syz.4.15057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1058.448587][T13624] netlink: 36 bytes leftover after parsing attributes in process `syz.0.15056'. [ 1058.463307][ T29] audit: type=1326 audit(1058.272:64530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13622 comm="syz.4.15057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1058.613348][T13635] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15062'. [ 1058.627296][T13637] pim6reg1: entered promiscuous mode [ 1058.632704][T13637] pim6reg1: entered allmulticast mode [ 1058.689722][T13642] netlink: 36 bytes leftover after parsing attributes in process `syz.4.15065'. [ 1058.714714][T13645] netlink: 84 bytes leftover after parsing attributes in process `syz.2.15066'. [ 1058.715300][T13646] netlink: 'syz.1.15067': attribute type 1 has an invalid length. [ 1058.737089][T13646] 8021q: adding VLAN 0 to HW filter on device bond13 [ 1058.760340][T13649] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15068'. [ 1058.770298][T13649] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15068'. [ 1059.177485][T13661] netlink: 830 bytes leftover after parsing attributes in process `syz.0.15072'. [ 1059.876496][T13680] IPv6: Can't replace route, no match found [ 1060.026114][T13687] uprobe: syz.1.15083:13687 failed to unregister, leaking uprobe [ 1060.114852][T13697] netlink: 'syz.1.15087': attribute type 1 has an invalid length. [ 1060.128828][T13697] 8021q: adding VLAN 0 to HW filter on device bond14 [ 1060.207127][T13707] pim6reg1: entered promiscuous mode [ 1060.212571][T13707] pim6reg1: entered allmulticast mode [ 1060.419360][T13720] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1060.491490][T13720] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1060.562108][T13720] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1060.642408][T13720] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1060.741793][ T9100] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.762898][ T9100] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.771488][ T9100] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.779811][ T9100] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.807744][T13727] netlink: 'syz.4.15099': attribute type 1 has an invalid length. [ 1060.825521][T13727] 8021q: adding VLAN 0 to HW filter on device bond4 [ 1060.877813][T13736] pim6reg1: entered promiscuous mode [ 1060.883334][T13736] pim6reg1: entered allmulticast mode [ 1060.907851][T13738] pim6reg1: entered promiscuous mode [ 1060.913324][T13738] pim6reg1: entered allmulticast mode [ 1060.918444][T13742] netlink: 'syz.2.15106': attribute type 1 has an invalid length. [ 1060.935638][T13742] 8021q: adding VLAN 0 to HW filter on device bond14 [ 1060.956455][T13742] macvlan2: entered promiscuous mode [ 1060.961893][T13742] macvlan2: entered allmulticast mode [ 1060.969472][T13742] bond14: entered promiscuous mode [ 1060.976393][T13742] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1060.984801][T13742] bond14: left promiscuous mode [ 1061.135065][T13751] netlink: 'syz.2.15109': attribute type 3 has an invalid length. [ 1061.237922][T13749] netlink: 'syz.7.15107': attribute type 3 has an invalid length. [ 1061.269889][T13758] netlink: 'syz.2.15111': attribute type 1 has an invalid length. [ 1061.288422][T13758] 8021q: adding VLAN 0 to HW filter on device bond15 [ 1061.614693][T13773] pim6reg1: entered promiscuous mode [ 1061.620042][T13773] pim6reg1: entered allmulticast mode [ 1061.752768][T13783] netlink: 'syz.0.15122': attribute type 1 has an invalid length. [ 1061.774885][T13783] 8021q: adding VLAN 0 to HW filter on device bond12 [ 1061.872043][T13790] syzkaller0: entered promiscuous mode [ 1061.877565][T13790] syzkaller0: entered allmulticast mode [ 1062.058804][T13798] pim6reg1: entered promiscuous mode [ 1062.064295][T13798] pim6reg1: entered allmulticast mode [ 1062.497512][T13811] netlink: 'syz.1.15133': attribute type 1 has an invalid length. [ 1062.514180][T13811] 8021q: adding VLAN 0 to HW filter on device bond15 [ 1062.683033][T13818] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1062.708784][T13824] pim6reg1: entered promiscuous mode [ 1062.714285][T13824] pim6reg1: entered allmulticast mode [ 1062.737802][T13828] pim6reg1: entered promiscuous mode [ 1062.743333][T13828] pim6reg1: entered allmulticast mode [ 1062.817060][ T29] kauditd_printk_skb: 5017 callbacks suppressed [ 1062.817118][ T29] audit: type=1400 audit(1062.792:69548): avc: denied { unmount } for pid=5815 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1062.828997][T13832] __nla_validate_parse: 8 callbacks suppressed [ 1062.829011][T13832] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15143'. [ 1062.845393][ T29] audit: type=1326 audit(1062.802:69549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13831 comm="syz.0.15143" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1062.864000][T13832] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15143'. [ 1062.881813][ T29] audit: type=1326 audit(1062.802:69550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13831 comm="syz.0.15143" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1062.913882][ T29] audit: type=1326 audit(1062.802:69551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13831 comm="syz.0.15143" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1062.937143][ T29] audit: type=1326 audit(1062.802:69552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13831 comm="syz.0.15143" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1062.960301][ T29] audit: type=1326 audit(1062.802:69553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13831 comm="syz.0.15143" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1062.983441][ T29] audit: type=1326 audit(1062.802:69554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13831 comm="syz.0.15143" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1063.006720][ T29] audit: type=1326 audit(1062.802:69555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13831 comm="syz.0.15143" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1063.029927][ T29] audit: type=1326 audit(1062.832:69556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13831 comm="syz.0.15143" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1063.053164][ T29] audit: type=1326 audit(1062.832:69557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13831 comm="syz.0.15143" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3e01f7ebe9 code=0x7ffc0000 [ 1063.192991][ T5623] syz_tun (unregistering): left allmulticast mode [ 1063.294098][ T31] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1063.364753][ T31] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1063.447286][ T31] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1063.494992][ T31] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1063.674607][ T31] bridge_slave_1: left allmulticast mode [ 1063.680306][ T31] bridge_slave_1: left promiscuous mode [ 1063.686176][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 1063.766148][ T31] bridge_slave_0: left allmulticast mode [ 1063.771997][ T31] bridge_slave_0: left promiscuous mode [ 1063.777671][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 1063.872770][T13862] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1063.944645][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1063.956848][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1063.967658][ T31] bond0 (unregistering): Released all slaves [ 1063.973907][T13870] FAULT_INJECTION: forcing a failure. [ 1063.973907][T13870] name failslab, interval 1, probability 0, space 0, times 0 [ 1063.976563][ T31] bond1 (unregistering): Released all slaves [ 1063.986663][T13870] CPU: 1 UID: 0 PID: 13870 Comm: syz.7.15153 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1063.986695][T13870] Tainted: [W]=WARN [ 1063.986702][T13870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1063.986714][T13870] Call Trace: [ 1063.986720][T13870] [ 1063.986728][T13870] __dump_stack+0x1d/0x30 [ 1063.986749][T13870] dump_stack_lvl+0xe8/0x140 [ 1063.986791][T13870] dump_stack+0x15/0x1b [ 1063.986808][T13870] should_fail_ex+0x265/0x280 [ 1063.986828][T13870] should_failslab+0x8c/0xb0 [ 1063.986852][T13870] __kmalloc_node_noprof+0xa9/0x410 [ 1063.986883][T13870] ? __vmalloc_node_range_noprof+0x3f9/0xe00 [ 1063.986915][T13870] __vmalloc_node_range_noprof+0x3f9/0xe00 [ 1063.986949][T13870] ? cred_has_capability+0x210/0x280 [ 1063.987006][T13870] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 1063.987032][T13870] __vmalloc_noprof+0x83/0xc0 [ 1063.987140][T13870] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 1063.987165][T13870] bpf_prog_alloc_no_stats+0x47/0x3a0 [ 1063.987236][T13870] ? bpf_prog_alloc+0x2a/0x150 [ 1063.987288][T13870] bpf_prog_alloc+0x3c/0x150 [ 1063.987313][T13870] bpf_prog_load+0x514/0x1070 [ 1063.987345][T13870] ? security_bpf+0x2b/0x90 [ 1063.987374][T13870] __sys_bpf+0x462/0x7b0 [ 1063.987462][T13870] __x64_sys_bpf+0x41/0x50 [ 1063.987485][T13870] x64_sys_call+0x2aea/0x2ff0 [ 1063.987578][T13870] do_syscall_64+0xd2/0x200 [ 1063.987603][T13870] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1063.987625][T13870] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1063.987655][T13870] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1063.987719][T13870] RIP: 0033:0x7f4d73b6ebe9 [ 1063.987736][T13870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1063.987787][T13870] RSP: 002b:00007f4d725d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1063.987807][T13870] RAX: ffffffffffffffda RBX: 00007f4d73d95fa0 RCX: 00007f4d73b6ebe9 [ 1063.987820][T13870] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 1063.987897][T13870] RBP: 00007f4d725d7090 R08: 0000000000000000 R09: 0000000000000000 [ 1063.987910][T13870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1063.987922][T13870] R13: 00007f4d73d96038 R14: 00007f4d73d95fa0 R15: 00007ffcaba31f18 [ 1063.987940][T13870] [ 1063.987947][T13870] syz.7.15153: vmalloc error: size 4096, failed to allocated page array size 8, mode:0x500dc2(GFP_HIGHUSER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null) [ 1063.995176][ T31] bond2 (unregistering): Released all slaves [ 1064.004093][T13870] ,cpuset=/,mems_allowed=0 [ 1064.032805][ T31] bond3 (unregistering): Released all slaves [ 1064.033394][T13870] CPU: 1 UID: 0 PID: 13870 Comm: syz.7.15153 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1064.033456][T13870] Tainted: [W]=WARN [ 1064.033463][T13870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1064.033475][T13870] Call Trace: [ 1064.033542][T13870] [ 1064.033550][T13870] __dump_stack+0x1d/0x30 [ 1064.033572][T13870] dump_stack_lvl+0xe8/0x140 [ 1064.033591][T13870] dump_stack+0x15/0x1b [ 1064.033608][T13870] warn_alloc+0x12b/0x1a0 [ 1064.033661][T13870] ? should_failslab+0x8c/0xb0 [ 1064.033688][T13870] __vmalloc_node_range_noprof+0x497/0xe00 [ 1064.033724][T13870] ? cred_has_capability+0x210/0x280 [ 1064.033747][T13870] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 1064.033845][T13870] __vmalloc_noprof+0x83/0xc0 [ 1064.033873][T13870] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 1064.033905][T13870] bpf_prog_alloc_no_stats+0x47/0x3a0 [ 1064.033930][T13870] ? bpf_prog_alloc+0x2a/0x150 [ 1064.033955][T13870] bpf_prog_alloc+0x3c/0x150 [ 1064.034066][T13870] bpf_prog_load+0x514/0x1070 [ 1064.034099][T13870] ? security_bpf+0x2b/0x90 [ 1064.034145][T13870] __sys_bpf+0x462/0x7b0 [ 1064.034175][T13870] __x64_sys_bpf+0x41/0x50 [ 1064.034199][T13870] x64_sys_call+0x2aea/0x2ff0 [ 1064.034282][T13870] do_syscall_64+0xd2/0x200 [ 1064.034308][T13870] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1064.034332][T13870] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1064.034356][T13870] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1064.034438][T13870] RIP: 0033:0x7f4d73b6ebe9 [ 1064.034453][T13870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1064.034471][T13870] RSP: 002b:00007f4d725d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1064.034492][T13870] RAX: ffffffffffffffda RBX: 00007f4d73d95fa0 RCX: 00007f4d73b6ebe9 [ 1064.034505][T13870] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 1064.034544][T13870] RBP: 00007f4d725d7090 R08: 0000000000000000 R09: 0000000000000000 [ 1064.034557][T13870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1064.034569][T13870] R13: 00007f4d73d96038 R14: 00007f4d73d95fa0 R15: 00007ffcaba31f18 [ 1064.034587][T13870] [ 1064.034593][T13870] Mem-Info: [ 1064.040228][ T31] bond4 (unregistering): Released all slaves [ 1064.042227][T13870] active_anon:4254 inactive_anon:131 isolated_anon:0 [ 1064.042227][T13870] active_file:7343 inactive_file:23720 isolated_file:0 [ 1064.042227][T13870] unevictable:0 dirty:359 writeback:0 [ 1064.042227][T13870] slab_reclaimable:3760 slab_unreclaimable:83988 [ 1064.042227][T13870] mapped:36031 shmem:399 pagetables:1204 [ 1064.042227][T13870] sec_pagetables:0 bounce:0 [ 1064.042227][T13870] kernel_misc_reclaimable:0 [ 1064.042227][T13870] free:1786612 free_pcp:11125 free_cma:0 [ 1064.055115][ T31] bond5 (unregistering): Released all slaves [ 1064.058023][T13870] Node 0 active_anon:17016kB inactive_anon:524kB active_file:29372kB inactive_file:94880kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:144124kB dirty:1436kB writeback:0kB shmem:1596kB kernel_stack:5696kB pagetables:4816kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 1064.068005][ T31] bond6 (unregistering): Released all slaves [ 1064.069132][T13870] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1064.079908][ T31] bond7 (unregistering): Released all slaves [ 1064.085285][T13870] lowmem_reserve[]: [ 1064.097319][ T31] bond8 (unregistering): Released all slaves [ 1064.100063][T13870] 0 2883 [ 1064.107776][ T31] bond9 (unregistering): Released all slaves [ 1064.109276][T13870] 7862 7862 [ 1064.109297][T13870] Node 0 [ 1064.118285][ T31] bond10 (unregistering): Released all slaves [ 1064.122681][T13870] DMA32 free:2949296kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2952828kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:0kB free_cma:0kB [ 1064.130142][ T31] bond11 (unregistering): Released all slaves [ 1064.133356][T13870] lowmem_reserve[]: 0 0 4978 4978 [ 1064.143861][ T31] bond12 (unregistering): Released all slaves [ 1064.145037][T13870] [ 1064.154073][ T31] bond13 (unregistering): Released all slaves [ 1064.169032][T13870] Node 0 Normal free:4181792kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB free_highatomic:0KB active_anon:17016kB inactive_anon:524kB active_file:29372kB inactive_file:94880kB unevictable:0kB writepending:1436kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:40988kB local_pcp:26516kB free_cma:0kB [ 1064.180230][ T31] bond14 (unregistering): Released all slaves [ 1064.185500][T13870] lowmem_reserve[]: 0 0 0 0 [ 1064.196142][ T31] bond15 (unregistering): Released all slaves [ 1064.201553][T13870] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1064.744654][T13870] Node 0 DMA32: 4*4kB (M) 4*8kB (M) 4*16kB (M) 2*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949296kB [ 1064.760752][T13870] Node 0 Normal: 2*4kB (UE) 1175*8kB (UM) 450*16kB (UME) 936*32kB (M) 707*64kB (UME) 555*128kB (UME) 273*256kB (UM) 227*512kB (UM) 191*1024kB (UM) 78*2048kB (UM) 849*4096kB (UM) = 4181792kB [ 1064.779673][T13870] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1064.789006][T13870] 31603 total pagecache pages [ 1064.793730][T13870] 169 pages in swap cache [ 1064.798080][T13870] Free swap = 124140kB [ 1064.802252][T13870] Total swap = 124996kB [ 1064.806469][T13870] 2097051 pages RAM [ 1064.810276][T13870] 0 pages HighMem/MovableOnly [ 1064.814956][T13870] 80444 pages reserved [ 1064.821518][T13844] chnl_net:caif_netlink_parms(): no params data found [ 1064.837245][T13871] pim6reg1: entered promiscuous mode [ 1064.842693][T13871] pim6reg1: entered allmulticast mode [ 1064.871213][T13884] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15155'. [ 1064.881841][T13884] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15155'. [ 1064.891763][ T31] tipc: Left network mode [ 1064.893242][T13844] bridge0: port 1(bridge_slave_0) entered blocking state [ 1064.896828][T13886] netlink: 8 bytes leftover after parsing attributes in process `syz.7.15154'. [ 1064.903214][T13844] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.914487][T13844] bridge_slave_0: entered allmulticast mode [ 1064.925929][T13844] bridge_slave_0: entered promiscuous mode [ 1064.934777][ T31] hsr_slave_0: left promiscuous mode [ 1064.940745][ T31] hsr_slave_1: left promiscuous mode [ 1064.946775][ T31] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1064.954217][ T31] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1064.962255][ T31] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1064.969659][ T31] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1064.977933][ T31] batman_adv: batadv0: Interface deactivated: macvlan0 [ 1064.984937][ T31] batman_adv: batadv0: Removing interface: macvlan0 [ 1065.002765][ T31] veth1_macvtap: left promiscuous mode [ 1065.008332][ T31] veth0_macvtap: left promiscuous mode [ 1065.013974][ T31] veth1_vlan: left promiscuous mode [ 1065.019275][ T31] veth0_vlan: left promiscuous mode [ 1065.064110][ T31] pimreg (unregistering): left allmulticast mode [ 1065.101153][ T31] team0 (unregistering): Port device team_slave_1 removed [ 1065.114764][ T31] team0 (unregistering): Port device team_slave_0 removed [ 1065.149807][T13844] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.156958][T13844] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.165083][T13844] bridge_slave_1: entered allmulticast mode [ 1065.171819][T13844] bridge_slave_1: entered promiscuous mode [ 1065.221716][T13844] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1065.232086][T13899] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1065.244360][T13844] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1065.264007][T13844] team0: Port device team_slave_0 added [ 1065.270903][T13844] team0: Port device team_slave_1 added [ 1065.286685][T13844] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1065.293693][T13844] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1065.319726][T13844] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1065.331833][T13899] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1065.342916][T13844] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1065.349886][T13844] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1065.376301][T13844] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1065.407955][T13844] hsr_slave_0: entered promiscuous mode [ 1065.414152][T13844] hsr_slave_1: entered promiscuous mode [ 1065.419926][T13844] debugfs: 'hsr0' already exists in 'hsr' [ 1065.425740][T13844] Cannot create hsr debugfs directory [ 1065.456695][T13899] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1065.523380][T13899] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1065.575613][ T31] IPVS: stop unused estimator thread 0... [ 1065.583902][ T12] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.596748][ T12] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.605059][ T12] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.618928][ T9100] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.720296][T13904] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1065.731300][T13844] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1065.745427][T13844] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1065.755610][T13844] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1065.762431][T13910] netlink: 84 bytes leftover after parsing attributes in process `syz.7.15164'. [ 1065.776450][T13844] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1065.796129][T13912] pim6reg1: entered promiscuous mode [ 1065.801515][T13912] pim6reg1: entered allmulticast mode [ 1065.846526][T13844] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.853642][T13844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1065.861004][T13844] bridge0: port 1(bridge_slave_0) entered blocking state [ 1065.868113][T13844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1065.883070][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1065.892914][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.932898][T13928] bond16: entered promiscuous mode [ 1065.938069][T13928] bond16: entered allmulticast mode [ 1065.943735][T13928] 8021q: adding VLAN 0 to HW filter on device bond16 [ 1065.954233][T13928] bond16 (unregistering): Released all slaves [ 1065.959905][T13935] netlink: 8 bytes leftover after parsing attributes in process `syz.0.15171'. [ 1065.969649][T13922] pim6reg1: entered promiscuous mode [ 1065.975077][T13922] pim6reg1: entered allmulticast mode [ 1066.002154][T13844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1066.014634][T13844] 8021q: adding VLAN 0 to HW filter on device team0 [ 1066.027628][T29115] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.034785][T29115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1066.046467][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1066.053557][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1066.145962][T13844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1066.158533][T13938] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1066.282054][T13844] veth0_vlan: entered promiscuous mode [ 1066.292268][T13949] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1066.305254][T13844] veth1_vlan: entered promiscuous mode [ 1066.329745][T13844] veth0_macvtap: entered promiscuous mode [ 1066.361502][T13844] veth1_macvtap: entered promiscuous mode [ 1066.379353][T13844] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1066.396426][T13844] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1066.411030][ T9100] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1066.423413][ T9100] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1066.444561][ T9100] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1066.459031][ T9100] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1066.506028][T13960] netlink: 84 bytes leftover after parsing attributes in process `syz.1.15176'. [ 1066.535572][T13962] netlink: 4 bytes leftover after parsing attributes in process `syz.1.15177'. [ 1066.553754][T13962] netlink: 4 bytes leftover after parsing attributes in process `syz.1.15177'. [ 1066.843596][ T12] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1066.909889][T13977] chnl_net:caif_netlink_parms(): no params data found [ 1066.935319][ T12] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1066.956590][T13977] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.963776][T13977] bridge0: port 1(bridge_slave_0) entered disabled state [ 1066.971324][T13977] bridge_slave_0: entered allmulticast mode [ 1066.977727][T13977] bridge_slave_0: entered promiscuous mode [ 1066.984575][T13977] bridge0: port 2(bridge_slave_1) entered blocking state [ 1066.991654][T13977] bridge0: port 2(bridge_slave_1) entered disabled state [ 1066.998872][T13977] bridge_slave_1: entered allmulticast mode [ 1067.005395][T13977] bridge_slave_1: entered promiscuous mode [ 1067.012665][ T12] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1067.035266][T13977] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1067.046348][T13977] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1067.065646][ T12] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1067.076969][T13977] team0: Port device team_slave_0 added [ 1067.083626][T13977] team0: Port device team_slave_1 added [ 1067.098927][T13977] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1067.105978][T13977] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1067.132009][T13977] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1067.144236][T13977] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1067.151246][T13977] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1067.177502][T13977] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1067.206301][T13977] hsr_slave_0: entered promiscuous mode [ 1067.214195][T13977] hsr_slave_1: entered promiscuous mode [ 1067.220212][T13977] debugfs: 'hsr0' already exists in 'hsr' [ 1067.225985][T13977] Cannot create hsr debugfs directory [ 1067.267521][ T12] bridge_slave_1: left allmulticast mode [ 1067.273350][ T12] bridge_slave_1: left promiscuous mode [ 1067.279003][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1067.287449][ T12] bridge_slave_0: left allmulticast mode [ 1067.293263][ T12] bridge_slave_0: left promiscuous mode [ 1067.298912][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1067.382617][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1067.393743][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1067.403155][ T12] bond0 (unregistering): Released all slaves [ 1067.411268][ T12] bond1 (unregistering): Released all slaves [ 1067.419354][ T12] bond2 (unregistering): Released all slaves [ 1067.428259][ T12] bond3 (unregistering): Released all slaves [ 1067.436671][ T12] bond4 (unregistering): Released all slaves [ 1067.445611][ T12] bond5 (unregistering): Released all slaves [ 1067.454623][ T12] bond6 (unregistering): Released all slaves [ 1067.478170][ T12] bond7 (unregistering): Released all slaves [ 1067.490088][ T12] bond8 (unregistering): Released all slaves [ 1067.500038][ T12] bond9 (unregistering): Released all slaves [ 1067.511694][ T12] bond10 (unregistering): Released all slaves [ 1067.521425][ T12] bond11 (unregistering): Released all slaves [ 1067.536338][ T12] bond12 (unregistering): Released all slaves [ 1067.552221][T13995] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1067.677146][ T12] tipc: Left network mode [ 1067.706452][ T12] hsr_slave_0: left promiscuous mode [ 1068.097000][ T29] kauditd_printk_skb: 4234 callbacks suppressed [ 1068.097017][ T29] audit: type=1326 audit(1067.682:73792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14000 comm="syz.2.15186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe2f0fb5ba7 code=0x7ffc0000 [ 1068.126564][ T29] audit: type=1326 audit(1068.072:73793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14000 comm="syz.2.15186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe2f0f5ade9 code=0x7ffc0000 [ 1068.149707][ T29] audit: type=1326 audit(1068.072:73794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14000 comm="syz.2.15186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe2f0fb5ba7 code=0x7ffc0000 [ 1068.172781][ T29] audit: type=1326 audit(1068.072:73795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14000 comm="syz.2.15186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe2f0f5ade9 code=0x7ffc0000 [ 1068.196063][ T29] audit: type=1326 audit(1068.072:73796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14000 comm="syz.2.15186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe2f0fb5ba7 code=0x7ffc0000 [ 1068.219124][ T29] audit: type=1326 audit(1068.072:73797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14000 comm="syz.2.15186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe2f0f5ade9 code=0x7ffc0000 [ 1068.242279][ T29] audit: type=1326 audit(1068.072:73798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14000 comm="syz.2.15186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe2f0fb5ba7 code=0x7ffc0000 [ 1068.265390][ T29] audit: type=1326 audit(1068.072:73799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14000 comm="syz.2.15186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe2f0f5ade9 code=0x7ffc0000 [ 1068.288448][ T29] audit: type=1326 audit(1068.072:73800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14000 comm="syz.2.15186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe2f0fb5ba7 code=0x7ffc0000 [ 1068.311663][ T29] audit: type=1326 audit(1068.072:73801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14000 comm="syz.2.15186" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe2f0f5ade9 code=0x7ffc0000 [ 1068.334988][ T12] hsr_slave_1: left promiscuous mode [ 1068.340831][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1068.348339][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1068.364334][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1068.372002][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1068.389336][ T12] batman_adv: batadv0: Interface deactivated: macvlan0 [ 1068.396365][ T12] batman_adv: batadv0: Removing interface: macvlan0 [ 1068.422731][ T12] veth1_macvtap: left promiscuous mode [ 1068.428364][ T12] veth0_macvtap: left promiscuous mode [ 1068.436169][ T12] veth1_vlan: left promiscuous mode [ 1068.443238][ T12] veth0_vlan: left promiscuous mode [ 1068.596852][ T12] team0 (unregistering): Port device team_slave_1 removed [ 1068.615312][ T12] team0 (unregistering): Port device team_slave_0 removed [ 1069.033302][T13977] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1069.069269][T13977] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1069.128623][ T12] IPVS: stop unused estimator thread 0... [ 1069.131621][T13977] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1069.170812][T14025] __nla_validate_parse: 4 callbacks suppressed [ 1069.170829][T14025] netlink: 4 bytes leftover after parsing attributes in process `syz.7.15192'. [ 1069.196770][T13977] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1069.275184][T14026] netlink: 4 bytes leftover after parsing attributes in process `syz.7.15192'. [ 1069.424777][T13977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1069.491924][T13977] 8021q: adding VLAN 0 to HW filter on device team0 [ 1069.533585][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 1069.540760][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1069.610545][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 1069.617718][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1069.711661][T13977] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1069.746546][T14036] block device autoloading is deprecated and will be removed. [ 1069.853755][T13977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1069.876936][T14036] cgroup: Unknown subsys name '¬§@﬽æì¦4*oäÂÒ£hÓîºoþüíUÜ' [ 1070.046503][T13977] veth0_vlan: entered promiscuous mode [ 1070.060108][T13977] veth1_vlan: entered promiscuous mode [ 1070.094497][T14055] netlink: 28 bytes leftover after parsing attributes in process `syz.1.15197'. [ 1070.117585][T14049] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1070.128226][T13977] veth0_macvtap: entered promiscuous mode [ 1070.156543][T13977] veth1_macvtap: entered promiscuous mode [ 1070.212738][T13977] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1070.224889][T13977] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1070.235697][ T58] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1070.296253][ T58] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1070.391669][ T58] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1070.429524][ T58] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1070.573896][T14063] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1070.682544][T14063] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1070.704105][T14067] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15201'. [ 1070.717823][T14067] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15201'. [ 1070.782491][T14073] IPv6: Can't replace route, no match found [ 1070.782494][T14063] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1070.829088][T14078] pim6reg1: entered promiscuous mode [ 1070.834605][T14078] pim6reg1: entered allmulticast mode [ 1070.862358][T14063] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1070.998208][T14084] bond16: entered promiscuous mode [ 1071.003449][T14084] bond16: entered allmulticast mode [ 1071.010190][T14084] 8021q: adding VLAN 0 to HW filter on device bond16 [ 1071.020911][T14084] bond16 (unregistering): Released all slaves [ 1071.027519][T14099] netlink: 'syz.2.15212': attribute type 13 has an invalid length. [ 1071.035618][ T67] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1071.050156][T14093] bond1: entered promiscuous mode [ 1071.055326][T14093] bond1: entered allmulticast mode [ 1071.060809][T14093] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1071.077632][T14093] bond1 (unregistering): Released all slaves [ 1071.083804][T14101] netlink: 148 bytes leftover after parsing attributes in process `syz.2.15212'. [ 1071.129873][T14099] bridge0: port 2(bridge_slave_1) entered disabled state [ 1071.135054][T14106] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14106 comm=syz.2.15212 [ 1071.137250][T14099] bridge0: port 1(bridge_slave_0) entered disabled state [ 1071.164532][T14106] netlink: 360 bytes leftover after parsing attributes in process `syz.2.15212'. [ 1071.195937][T14109] netlink: 84 bytes leftover after parsing attributes in process `syz.7.15215'. [ 1071.218463][T14099] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1071.229576][T14099] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1071.288881][T29115] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1071.313449][T14112] IPv6: Can't replace route, no match found [ 1071.321999][T29115] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1071.339745][T29115] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1071.356774][T14117] pim6reg1: entered promiscuous mode [ 1071.362136][T14117] pim6reg1: entered allmulticast mode [ 1071.372891][T29115] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1071.401383][T29115] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1071.436248][T29115] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1071.449438][T29115] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1071.514615][T14130] netlink: 4 bytes leftover after parsing attributes in process `syz.7.15223'. [ 1071.543239][T14130] netlink: 4 bytes leftover after parsing attributes in process `syz.7.15223'. [ 1071.613120][T14133] FAULT_INJECTION: forcing a failure. [ 1071.613120][T14133] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1071.626296][T14133] CPU: 1 UID: 0 PID: 14133 Comm: syz.4.15219 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1071.626447][T14133] Tainted: [W]=WARN [ 1071.626517][T14133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1071.626529][T14133] Call Trace: [ 1071.626535][T14133] [ 1071.626543][T14133] __dump_stack+0x1d/0x30 [ 1071.626565][T14133] dump_stack_lvl+0xe8/0x140 [ 1071.626582][T14133] dump_stack+0x15/0x1b [ 1071.626617][T14133] should_fail_ex+0x265/0x280 [ 1071.626705][T14133] should_fail+0xb/0x20 [ 1071.626716][T14133] should_fail_usercopy+0x1a/0x20 [ 1071.626778][T14133] _copy_from_user+0x1c/0xb0 [ 1071.626847][T14133] sctp_setsockopt+0x154/0xe30 [ 1071.626866][T14133] sock_common_setsockopt+0x66/0x80 [ 1071.626884][T14133] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 1071.626977][T14133] __sys_setsockopt+0x184/0x200 [ 1071.626990][T14133] __x64_sys_setsockopt+0x64/0x80 [ 1071.627003][T14133] x64_sys_call+0x20ec/0x2ff0 [ 1071.627034][T14133] do_syscall_64+0xd2/0x200 [ 1071.627087][T14133] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1071.627101][T14133] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1071.627117][T14133] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1071.627130][T14133] RIP: 0033:0x7f970b1eebe9 [ 1071.627141][T14133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1071.627220][T14133] RSP: 002b:00007f9709c0d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1071.627234][T14133] RAX: ffffffffffffffda RBX: 00007f970b416180 RCX: 00007f970b1eebe9 [ 1071.627243][T14133] RDX: 0000000000000009 RSI: 0000000000000084 RDI: 0000000000000004 [ 1071.627251][T14133] RBP: 00007f9709c0d090 R08: 000000000000009c R09: 0000000000000000 [ 1071.627259][T14133] R10: 0000200000000200 R11: 0000000000000246 R12: 0000000000000001 [ 1071.627308][T14133] R13: 00007f970b416218 R14: 00007f970b416180 R15: 00007fffbd968fd8 [ 1071.627319][T14133] [ 1071.884502][T14145] IPv6: Can't replace route, no match found [ 1071.912968][T14147] netlink: 'syz.0.15229': attribute type 13 has an invalid length. [ 1071.985318][T14147] bridge0: port 2(bridge_slave_1) entered disabled state [ 1071.992589][T14147] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.027257][T14152] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14152 comm=syz.0.15229 [ 1072.097901][T14147] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1072.234118][T14147] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1072.342149][ T58] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1072.385550][ T58] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1072.424694][ T58] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1072.455573][ T58] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1072.476116][T14160] pim6reg1: entered promiscuous mode [ 1072.481498][T14160] pim6reg1: entered allmulticast mode [ 1072.612726][T14169] netlink: 'syz.2.15235': attribute type 13 has an invalid length. [ 1072.625730][T14169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14169 comm=syz.2.15235 [ 1072.777028][T14178] IPv6: Can't replace route, no match found [ 1072.848536][T14176] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1073.102268][ T29] kauditd_printk_skb: 12911 callbacks suppressed [ 1073.102288][ T29] audit: type=1326 audit(1073.072:86710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.4.15230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7f970b1eebe9 code=0x7ffc0000 [ 1073.131847][ T29] audit: type=1326 audit(1073.082:86711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.4.15230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f970b1e5ba7 code=0x7ffc0000 [ 1073.155211][ T29] audit: type=1326 audit(1073.082:86712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.4.15230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f970b18ade9 code=0x7ffc0000 [ 1073.178412][ T29] audit: type=1326 audit(1073.082:86713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.4.15230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f970b1e5ba7 code=0x7ffc0000 [ 1073.201669][ T29] audit: type=1326 audit(1073.082:86714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.4.15230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f970b18ade9 code=0x7ffc0000 [ 1073.224820][ T29] audit: type=1326 audit(1073.082:86715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.4.15230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f970b1e5ba7 code=0x7ffc0000 [ 1073.247929][ T29] audit: type=1326 audit(1073.082:86716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.4.15230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f970b18ade9 code=0x7ffc0000 [ 1073.271004][ T29] audit: type=1326 audit(1073.082:86717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.4.15230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f970b1e5ba7 code=0x7ffc0000 [ 1073.294113][ T29] audit: type=1326 audit(1073.082:86718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.4.15230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f970b18ade9 code=0x7ffc0000 [ 1073.317229][ T29] audit: type=1326 audit(1073.082:86719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.4.15230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f970b1e5ba7 code=0x7ffc0000 [ 1073.726136][T14203] netlink: 'syz.4.15249': attribute type 13 has an invalid length. [ 1073.830925][T14206] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14206 comm=syz.4.15249 [ 1073.916903][T14203] bridge0: port 2(bridge_slave_1) entered disabled state [ 1073.924224][T14203] bridge0: port 1(bridge_slave_0) entered disabled state [ 1074.088427][T14203] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1074.119140][T14203] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1074.147354][T14212] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1074.240876][ T31] netdevsim netdevsim4 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1074.252163][ T31] netdevsim netdevsim4 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1074.262045][ T31] netdevsim netdevsim4 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1074.271246][ T31] netdevsim netdevsim4 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1074.470250][T14240] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1074.516551][T14249] __nla_validate_parse: 14 callbacks suppressed [ 1074.516563][T14249] netlink: 4 bytes leftover after parsing attributes in process `syz.1.15265'. [ 1074.534519][T14249] netlink: 4 bytes leftover after parsing attributes in process `syz.1.15265'. [ 1074.606669][T14255] netlink: 830 bytes leftover after parsing attributes in process `syz.0.15268'. [ 1074.637023][T14260] pim6reg1: entered promiscuous mode [ 1074.642583][T14260] pim6reg1: entered allmulticast mode [ 1074.685133][T14264] dummy0: entered allmulticast mode [ 1074.690757][T14264] dummy0: left allmulticast mode [ 1074.696638][T14264] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=14264 comm=syz.0.15272 [ 1074.709289][T14264] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=14264 comm=syz.0.15272 [ 1074.722399][T14264] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=14264 comm=syz.0.15272 [ 1074.792259][T14266] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1074.893770][T14280] pim6reg1: entered promiscuous mode [ 1074.899178][T14280] pim6reg1: entered allmulticast mode [ 1075.033441][T14285] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15281'. [ 1075.056669][T14285] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15281'. [ 1075.331500][T14291] netlink: 830 bytes leftover after parsing attributes in process `syz.2.15282'. [ 1075.375629][T14293] pim6reg1: entered promiscuous mode [ 1075.380990][T14293] pim6reg1: entered allmulticast mode [ 1075.531644][T14306] netlink: 4 bytes leftover after parsing attributes in process `syz.1.15288'. [ 1075.543463][T14306] netlink: 4 bytes leftover after parsing attributes in process `syz.1.15288'. [ 1075.611142][T14304] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1075.659679][T14313] netlink: 'syz.2.15291': attribute type 13 has an invalid length. [ 1075.669997][T14313] netlink: 148 bytes leftover after parsing attributes in process `syz.2.15291'. [ 1075.679369][T14313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14313 comm=syz.2.15291 [ 1075.714026][T14313] netlink: 360 bytes leftover after parsing attributes in process `syz.2.15291'. [ 1075.986543][T14324] pim6reg1: entered promiscuous mode [ 1075.991967][T14324] pim6reg1: entered allmulticast mode [ 1076.476902][T14333] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1076.492045][T14341] netlink: 'syz.0.15303': attribute type 13 has an invalid length. [ 1076.501024][T14341] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14341 comm=syz.0.15303 [ 1076.539726][T14347] pim6reg1: entered promiscuous mode [ 1076.545129][T14347] pim6reg1: entered allmulticast mode [ 1076.575034][T14350] netlink: 'syz.0.15307': attribute type 1 has an invalid length. [ 1076.637731][T14358] netlink: 'syz.1.15311': attribute type 1 has an invalid length. [ 1076.652397][T14358] 8021q: adding VLAN 0 to HW filter on device bond16 [ 1076.671851][T14358] macvlan2: entered promiscuous mode [ 1076.677294][T14358] macvlan2: entered allmulticast mode [ 1076.684178][T14358] bond16: (slave macvlan2): Opening slave failed [ 1076.741867][T14374] netlink: 'syz.7.15318': attribute type 1 has an invalid length. [ 1076.757733][T14374] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1076.772780][T14374] macvlan2: entered promiscuous mode [ 1076.778136][T14374] macvlan2: entered allmulticast mode [ 1076.785398][T14374] bond1: entered promiscuous mode [ 1076.792326][T14374] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1076.800488][T14374] bond1: left promiscuous mode [ 1076.825385][T14369] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1077.095879][T14386] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.132106][T14386] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.155169][T14392] pim6reg1: entered promiscuous mode [ 1077.160595][T14392] pim6reg1: entered allmulticast mode [ 1077.182103][T14386] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.288960][T14386] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.360557][ T31] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1077.384026][ T31] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1077.392475][T14402] pim6reg1: entered promiscuous mode [ 1077.397850][T14402] pim6reg1: entered allmulticast mode [ 1077.406582][ T31] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1077.418990][ T31] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1077.508433][T14407] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1077.550880][T14413] netlink: 'syz.7.15333': attribute type 13 has an invalid length. [ 1077.624586][T14413] bridge0: port 2(bridge_slave_1) entered disabled state [ 1077.631824][T14413] bridge0: port 1(bridge_slave_0) entered disabled state [ 1077.660181][T14418] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14418 comm=syz.7.15333 [ 1077.734439][T14413] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1077.754979][T14413] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1077.808345][ T58] netdevsim netdevsim7 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.827674][T14423] pim6reg1: entered promiscuous mode [ 1077.833127][T14423] pim6reg1: entered allmulticast mode [ 1077.851126][ T58] netdevsim netdevsim7 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.865286][ T58] netdevsim netdevsim7 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.884092][ T58] netdevsim netdevsim7 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.911230][T14427] netlink: 'syz.1.15338': attribute type 13 has an invalid length. [ 1077.956732][T14427] bridge0: port 2(bridge_slave_1) entered disabled state [ 1077.963870][T14427] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.002297][T14427] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1078.011789][T14427] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1078.022986][T14432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14432 comm=syz.1.15338 [ 1078.036507][T14427] batman_adv: batadv0: Interface deactivated: macvlan0 [ 1078.072824][ T58] netdevsim netdevsim1 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1078.082262][ T58] netdevsim netdevsim1 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1078.090948][ T58] netdevsim netdevsim1 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1078.099333][ T58] netdevsim netdevsim1 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1078.215544][ T29] kauditd_printk_skb: 5760 callbacks suppressed [ 1078.215561][ T29] audit: type=1326 audit(1078.192:92480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14441 comm="syz.7.15343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d73b6ebe9 code=0x7ffc0000 [ 1078.273882][T14445] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1078.331022][ T29] audit: type=1326 audit(1078.192:92481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14441 comm="syz.7.15343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d73b6ebe9 code=0x7ffc0000 [ 1078.354432][ T29] audit: type=1326 audit(1078.192:92482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14441 comm="syz.7.15343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=311 compat=0 ip=0x7f4d73b6ebe9 code=0x7ffc0000 [ 1078.377881][ T29] audit: type=1326 audit(1078.192:92483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14441 comm="syz.7.15343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d73b6ebe9 code=0x7ffc0000 [ 1078.401219][ T29] audit: type=1400 audit(1078.302:92484): avc: denied { bind } for pid=14446 comm="syz.0.15345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1078.429393][T14460] pim6reg1: entered promiscuous mode [ 1078.434762][T14460] pim6reg1: entered allmulticast mode [ 1078.459185][ T29] audit: type=1326 audit(1078.332:92485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14455 comm="syz.7.15349" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d73b6ebe9 code=0x7ffc0000 [ 1078.482478][ T29] audit: type=1326 audit(1078.342:92486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14455 comm="syz.7.15349" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f4d73b6ebe9 code=0x7ffc0000 [ 1078.505686][ T29] audit: type=1326 audit(1078.342:92487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14455 comm="syz.7.15349" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d73b6ebe9 code=0x7ffc0000 [ 1078.528850][ T29] audit: type=1326 audit(1078.342:92488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14455 comm="syz.7.15349" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d73b6ebe9 code=0x7ffc0000 [ 1078.552078][ T29] audit: type=1326 audit(1078.342:92489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14455 comm="syz.7.15349" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f4d73b6ebe9 code=0x7ffc0000 [ 1078.910547][ T9] IPVS: starting estimator thread 0... [ 1079.000585][T14483] IPVS: using max 3840 ests per chain, 192000 per kthread [ 1079.297645][T14489] pim6reg1: entered promiscuous mode [ 1079.303144][T14489] pim6reg1: entered allmulticast mode [ 1079.589449][T14494] __nla_validate_parse: 34 callbacks suppressed [ 1079.589469][T14494] netlink: 84 bytes leftover after parsing attributes in process `syz.4.15360'. [ 1079.629443][T14496] bond17: entered promiscuous mode [ 1079.634703][T14496] bond17: entered allmulticast mode [ 1079.640189][T14496] 8021q: adding VLAN 0 to HW filter on device bond17 [ 1079.648753][T14496] bond17 (unregistering): Released all slaves [ 1079.660668][T14499] pim6reg1: entered promiscuous mode [ 1079.665982][T14499] pim6reg1: entered allmulticast mode [ 1079.758949][T14501] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1079.802366][T14505] netlink: 830 bytes leftover after parsing attributes in process `syz.4.15366'. [ 1079.838012][T14508] FAULT_INJECTION: forcing a failure. [ 1079.838012][T14508] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1079.851361][T14508] CPU: 0 UID: 0 PID: 14508 Comm: syz.4.15367 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1079.851395][T14508] Tainted: [W]=WARN [ 1079.851402][T14508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1079.851449][T14508] Call Trace: [ 1079.851455][T14508] [ 1079.851463][T14508] __dump_stack+0x1d/0x30 [ 1079.851487][T14508] dump_stack_lvl+0xe8/0x140 [ 1079.851564][T14508] dump_stack+0x15/0x1b [ 1079.851668][T14508] should_fail_ex+0x265/0x280 [ 1079.851691][T14508] should_fail_alloc_page+0xf2/0x100 [ 1079.851768][T14508] __alloc_frozen_pages_noprof+0xff/0x360 [ 1079.851806][T14508] alloc_pages_mpol+0xb3/0x250 [ 1079.851832][T14508] alloc_pages_noprof+0x90/0x130 [ 1079.851968][T14508] get_zeroed_page_noprof+0x1a/0x40 [ 1079.851986][T14508] simple_transaction_get+0x4c/0x130 [ 1079.852008][T14508] selinux_transaction_write+0x9d/0x110 [ 1079.852045][T14508] ? __pfx_selinux_transaction_write+0x10/0x10 [ 1079.852073][T14508] vfs_write+0x269/0x960 [ 1079.852093][T14508] ? __rcu_read_unlock+0x4f/0x70 [ 1079.852123][T14508] ? __fget_files+0x184/0x1c0 [ 1079.852164][T14508] ksys_write+0xda/0x1a0 [ 1079.852186][T14508] __x64_sys_write+0x40/0x50 [ 1079.852210][T14508] x64_sys_call+0x27fe/0x2ff0 [ 1079.852267][T14508] do_syscall_64+0xd2/0x200 [ 1079.852297][T14508] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1079.852353][T14508] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1079.852401][T14508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1079.852421][T14508] RIP: 0033:0x7f970b1eebe9 [ 1079.852464][T14508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1079.852481][T14508] RSP: 002b:00007f9709c4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1079.852501][T14508] RAX: ffffffffffffffda RBX: 00007f970b415fa0 RCX: 00007f970b1eebe9 [ 1079.852509][T14508] RDX: 0000000000000023 RSI: 0000200000000540 RDI: 0000000000000006 [ 1079.852517][T14508] RBP: 00007f9709c4f090 R08: 0000000000000000 R09: 0000000000000000 [ 1079.852525][T14508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1079.852534][T14508] R13: 00007f970b416038 R14: 00007f970b415fa0 R15: 00007fffbd968fd8 [ 1079.852551][T14508] [ 1080.115672][T14512] netlink: 'syz.2.15369': attribute type 1 has an invalid length. [ 1080.128379][T14512] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1080.139447][T14512] macvlan2: entered promiscuous mode [ 1080.144916][T14512] macvlan2: entered allmulticast mode [ 1080.151237][T14512] bond1: entered promiscuous mode [ 1080.156467][T14512] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1080.175848][T14512] bond1: left promiscuous mode [ 1080.177910][T14515] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15370'. [ 1080.212114][T14515] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15370'. [ 1080.307721][T14522] FAULT_INJECTION: forcing a failure. [ 1080.307721][T14522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1080.320995][T14522] CPU: 1 UID: 0 PID: 14522 Comm: syz.2.15372 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1080.321026][T14522] Tainted: [W]=WARN [ 1080.321033][T14522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1080.321044][T14522] Call Trace: [ 1080.321049][T14522] [ 1080.321058][T14522] __dump_stack+0x1d/0x30 [ 1080.321147][T14522] dump_stack_lvl+0xe8/0x140 [ 1080.321169][T14522] dump_stack+0x15/0x1b [ 1080.321186][T14522] should_fail_ex+0x265/0x280 [ 1080.321209][T14522] should_fail+0xb/0x20 [ 1080.321229][T14522] should_fail_usercopy+0x1a/0x20 [ 1080.321254][T14522] _copy_from_user+0x1c/0xb0 [ 1080.321344][T14522] ___sys_sendmsg+0xc1/0x1d0 [ 1080.321382][T14522] __x64_sys_sendmsg+0xd4/0x160 [ 1080.321487][T14522] x64_sys_call+0x191e/0x2ff0 [ 1080.321506][T14522] do_syscall_64+0xd2/0x200 [ 1080.321530][T14522] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1080.321578][T14522] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1080.321613][T14522] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1080.321637][T14522] RIP: 0033:0x7fe2f0fbebe9 [ 1080.321661][T14522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1080.321736][T14522] RSP: 002b:00007fe2efa1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1080.321757][T14522] RAX: ffffffffffffffda RBX: 00007fe2f11e5fa0 RCX: 00007fe2f0fbebe9 [ 1080.321771][T14522] RDX: 0000000000000000 RSI: 0000200000000380 RDI: 000000000000000a [ 1080.321786][T14522] RBP: 00007fe2efa1f090 R08: 0000000000000000 R09: 0000000000000000 [ 1080.321798][T14522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1080.321850][T14522] R13: 00007fe2f11e6038 R14: 00007fe2f11e5fa0 R15: 00007ffd7247f4d8 [ 1080.321870][T14522] [ 1080.511568][T14525] netlink: 84 bytes leftover after parsing attributes in process `syz.2.15373'. [ 1080.608793][T14529] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1080.638506][T14531] pim6reg1: entered promiscuous mode [ 1080.643919][T14531] pim6reg1: entered allmulticast mode [ 1080.937482][T14537] netlink: 830 bytes leftover after parsing attributes in process `syz.2.15378'. [ 1081.038375][T14539] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1081.068460][T14541] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15380'. [ 1081.080094][T14541] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15380'. [ 1081.132406][T14547] netlink: 16 bytes leftover after parsing attributes in process `syz.0.15383'. [ 1081.216875][T14553] netlink: 84 bytes leftover after parsing attributes in process `syz.4.15385'. [ 1081.372645][ T5922] syz_tun (unregistering): left allmulticast mode [ 1081.505162][T14566] chnl_net:caif_netlink_parms(): no params data found [ 1081.540157][T14566] bridge0: port 1(bridge_slave_0) entered blocking state [ 1081.547258][T14566] bridge0: port 1(bridge_slave_0) entered disabled state [ 1081.554512][T14566] bridge_slave_0: entered allmulticast mode [ 1081.561099][T14566] bridge_slave_0: entered promiscuous mode [ 1081.568162][T14566] bridge0: port 2(bridge_slave_1) entered blocking state [ 1081.575298][T14566] bridge0: port 2(bridge_slave_1) entered disabled state [ 1081.582511][T14566] bridge_slave_1: entered allmulticast mode [ 1081.588922][T14566] bridge_slave_1: entered promiscuous mode [ 1081.607082][T14566] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1081.617362][T14566] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1081.636596][T14566] team0: Port device team_slave_0 added [ 1081.643593][T14566] team0: Port device team_slave_1 added [ 1081.661001][T14566] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1081.667969][T14566] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1081.693989][T14566] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1081.705387][T14566] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1081.712423][T14566] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1081.738481][T14566] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1081.768588][T14566] hsr_slave_0: entered promiscuous mode [ 1081.774793][T14566] hsr_slave_1: entered promiscuous mode [ 1081.780782][T14566] debugfs: 'hsr0' already exists in 'hsr' [ 1081.786496][T14566] Cannot create hsr debugfs directory [ 1081.798072][ T12] bridge_slave_1: left allmulticast mode [ 1081.803775][ T12] bridge_slave_1: left promiscuous mode [ 1081.809477][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1081.819200][ T12] bridge_slave_0: left allmulticast mode [ 1081.824877][ T12] bridge_slave_0: left promiscuous mode [ 1081.830731][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1081.882051][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1081.891658][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1081.900971][ T12] bond0 (unregistering): Released all slaves [ 1081.908783][ T12] bond1 (unregistering): Released all slaves [ 1081.917187][ T12] bond2 (unregistering): Released all slaves [ 1081.925370][ T12] bond3 (unregistering): Released all slaves [ 1081.933329][ T12] bond4 (unregistering): Released all slaves [ 1081.942008][ T12] bond5 (unregistering): Released all slaves [ 1081.949844][ T12] bond6 (unregistering): Released all slaves [ 1081.958292][ T12] bond7 (unregistering): Released all slaves [ 1081.966645][ T12] bond8 (unregistering): Released all slaves [ 1081.975038][ T12] bond9 (unregistering): Released all slaves [ 1081.984020][ T12] bond10 (unregistering): Released all slaves [ 1081.994104][ T12] bond11 (unregistering): Released all slaves [ 1082.002763][ T12] bond12 (unregistering): Released all slaves [ 1082.010727][ T12] bond13 (unregistering): Released all slaves [ 1082.018670][ T12] bond14 (unregistering): Released all slaves [ 1082.027467][ T12] bond15 (unregistering): Released all slaves [ 1082.035914][ T12] bond16 (unregistering): Released all slaves [ 1082.093322][ T12] tipc: Left network mode [ 1082.100917][ T12] hsr_slave_0: left promiscuous mode [ 1082.106512][ T12] hsr_slave_1: left promiscuous mode [ 1082.112203][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1082.119580][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1082.127576][ T12] batman_adv: batadv0: Removing interface: macvlan0 [ 1082.159025][ T12] team0 (unregistering): Port device team_slave_1 removed [ 1082.168630][ T12] team0 (unregistering): Port device team_slave_0 removed [ 1082.350029][T14594] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1082.373891][T14598] netlink: 'syz.4.15398': attribute type 1 has an invalid length. [ 1082.389073][T14598] 8021q: adding VLAN 0 to HW filter on device bond5 [ 1082.408837][T14598] macvlan2: entered promiscuous mode [ 1082.414279][T14598] macvlan2: entered allmulticast mode [ 1082.420290][T14598] bond5: entered promiscuous mode [ 1082.425709][T14598] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1082.433532][T14598] bond5: left promiscuous mode [ 1082.509303][T14566] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1082.518241][T14566] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1082.529389][T14566] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1082.540599][T14566] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1082.557884][T14566] bridge0: port 2(bridge_slave_1) entered blocking state [ 1082.565052][T14566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1082.572467][T14566] bridge0: port 1(bridge_slave_0) entered blocking state [ 1082.579538][T14566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1082.587804][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 1082.595922][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 1082.626467][T14566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1082.638498][T14566] 8021q: adding VLAN 0 to HW filter on device team0 [ 1082.650073][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 1082.657274][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1082.668428][ T12] IPVS: stop unused estimator thread 0... [ 1082.689498][ T67] bridge0: port 2(bridge_slave_1) entered blocking state [ 1082.696609][ T67] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1082.775343][T14624] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1082.785923][T14566] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1082.855521][T14566] veth0_vlan: entered promiscuous mode [ 1082.863411][T14566] veth1_vlan: entered promiscuous mode [ 1082.877445][T14566] veth0_macvtap: entered promiscuous mode [ 1082.885540][T14566] veth1_macvtap: entered promiscuous mode [ 1082.897749][T14566] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1082.908904][T14566] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1082.921980][ T31] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1082.931567][ T31] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1082.937776][T14641] netlink: 'syz.2.15408': attribute type 13 has an invalid length. [ 1082.942680][ T31] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1082.959484][ T31] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1082.971336][T14641] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14641 comm=syz.2.15408 [ 1083.210451][ T3468] IPVS: starting estimator thread 0... [ 1083.300528][T14650] IPVS: using max 2736 ests per chain, 136800 per kthread [ 1083.519920][ T29] kauditd_printk_skb: 396 callbacks suppressed [ 1083.519936][ T29] audit: type=1326 audit(1083.492:92886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14657 comm="syz.0.15413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c051aebe9 code=0x7ffc0000 [ 1083.551864][ T29] audit: type=1326 audit(1083.492:92887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14657 comm="syz.0.15413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c051aebe9 code=0x7ffc0000 [ 1083.575408][ T29] audit: type=1326 audit(1083.502:92888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14657 comm="syz.0.15413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1c051aebe9 code=0x7ffc0000 [ 1083.598745][ T29] audit: type=1326 audit(1083.502:92889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14657 comm="syz.0.15413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c051aebe9 code=0x7ffc0000 [ 1083.621897][ T29] audit: type=1326 audit(1083.502:92890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14657 comm="syz.0.15413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1c051aebe9 code=0x7ffc0000 [ 1083.645102][ T29] audit: type=1326 audit(1083.502:92891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14657 comm="syz.0.15413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c051aebe9 code=0x7ffc0000 [ 1083.668453][ T29] audit: type=1326 audit(1083.502:92892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14657 comm="syz.0.15413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c051aebe9 code=0x7ffc0000 [ 1083.691625][ T29] audit: type=1326 audit(1083.502:92893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14657 comm="syz.0.15413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=14 compat=0 ip=0x7f1c051aebe9 code=0x7ffc0000 [ 1083.714687][ T29] audit: type=1326 audit(1083.502:92894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14657 comm="syz.0.15413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c051aebe9 code=0x7ffc0000 [ 1083.737894][ T29] audit: type=1326 audit(1083.502:92895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14657 comm="syz.0.15413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c051aebe9 code=0x7ffc0000 [ 1084.195830][T14679] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1085.182248][T14158] IPVS: starting estimator thread 0... [ 1085.270513][T14699] IPVS: using max 3840 ests per chain, 192000 per kthread [ 1085.302481][T14704] pim6reg1: entered promiscuous mode [ 1085.307900][T14704] pim6reg1: entered allmulticast mode [ 1085.496249][T14712] __nla_validate_parse: 20 callbacks suppressed [ 1085.496265][T14712] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15444'. [ 1085.541225][T14712] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15444'. [ 1085.560172][T14710] netlink: 16 bytes leftover after parsing attributes in process `syz.2.15433'. [ 1085.637089][T14725] netlink: 4 bytes leftover after parsing attributes in process `syz.7.15439'. [ 1085.703303][T14725] netlink: 4 bytes leftover after parsing attributes in process `syz.7.15439'. [ 1086.178193][T14751] FAULT_INJECTION: forcing a failure. [ 1086.178193][T14751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1086.191447][T14751] CPU: 1 UID: 0 PID: 14751 Comm: syz.4.15448 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1086.191557][T14751] Tainted: [W]=WARN [ 1086.191565][T14751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1086.191575][T14751] Call Trace: [ 1086.191583][T14751] [ 1086.191590][T14751] __dump_stack+0x1d/0x30 [ 1086.191610][T14751] dump_stack_lvl+0xe8/0x140 [ 1086.191677][T14751] dump_stack+0x15/0x1b [ 1086.191723][T14751] should_fail_ex+0x265/0x280 [ 1086.191744][T14751] should_fail+0xb/0x20 [ 1086.191765][T14751] should_fail_usercopy+0x1a/0x20 [ 1086.191791][T14751] _copy_to_user+0x20/0xa0 [ 1086.191865][T14751] simple_read_from_buffer+0xb5/0x130 [ 1086.191888][T14751] proc_fail_nth_read+0x10e/0x150 [ 1086.191917][T14751] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1086.191955][T14751] vfs_read+0x1a8/0x770 [ 1086.191979][T14751] ? __rcu_read_unlock+0x4f/0x70 [ 1086.192003][T14751] ? __fget_files+0x184/0x1c0 [ 1086.192030][T14751] ksys_read+0xda/0x1a0 [ 1086.192091][T14751] __x64_sys_read+0x40/0x50 [ 1086.192116][T14751] x64_sys_call+0x27bc/0x2ff0 [ 1086.192141][T14751] do_syscall_64+0xd2/0x200 [ 1086.192206][T14751] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 1086.192392][T14751] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1086.192418][T14751] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1086.192443][T14751] RIP: 0033:0x7f970b1ed5fc [ 1086.192461][T14751] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1086.192481][T14751] RSP: 002b:00007f9709c0d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1086.192564][T14751] RAX: ffffffffffffffda RBX: 00007f970b416180 RCX: 00007f970b1ed5fc [ 1086.192577][T14751] RDX: 000000000000000f RSI: 00007f9709c0d0a0 RDI: 0000000000000007 [ 1086.192589][T14751] RBP: 00007f9709c0d090 R08: 0000000000000000 R09: 0000000000000000 [ 1086.192603][T14751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1086.192615][T14751] R13: 00007f970b416218 R14: 00007f970b416180 R15: 00007fffbd968fd8 [ 1086.192633][T14751] [ 1086.718986][T14784] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15463'. [ 1086.729177][T14784] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15463'. [ 1086.886056][T14790] netlink: 'syz.0.15465': attribute type 1 has an invalid length. [ 1086.902486][T14790] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1086.917822][T14790] macvlan2: entered promiscuous mode [ 1086.923313][T14790] macvlan2: entered allmulticast mode [ 1086.929948][T14790] bond1: entered promiscuous mode [ 1086.936944][T14790] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1086.944885][T14790] bond1: left promiscuous mode [ 1087.031020][T14794] netlink: 'syz.0.15466': attribute type 1 has an invalid length. [ 1087.047348][T14794] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1087.065243][T14794] macvlan2: entered promiscuous mode [ 1087.070659][T14794] macvlan2: entered allmulticast mode [ 1087.079636][T14794] bond2: entered promiscuous mode [ 1087.085070][T14794] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1087.094855][T14794] bond2: left promiscuous mode [ 1087.169182][T14799] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 1087.201747][T14808] bond6: entered promiscuous mode [ 1087.206789][T14808] bond6: entered allmulticast mode [ 1087.213883][T14808] 8021q: adding VLAN 0 to HW filter on device bond6 [ 1087.226510][T14808] bond6 (unregistering): Released all slaves [ 1087.661545][T14830] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15479'. [ 1087.679808][T14830] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15479'. [ 1087.997653][T14835] ================================================================== [ 1088.005790][T14835] BUG: KCSAN: data-race in selinux_inode_permission / selinux_inode_permission [ 1088.014869][T14835] [ 1088.017203][T14835] read to 0xffff888129313120 of 4 bytes by task 14836 on cpu 0: [ 1088.024862][T14835] selinux_inode_permission+0x334/0x740 [ 1088.030434][T14835] security_inode_permission+0x6d/0xb0 [ 1088.035904][T14835] inode_permission+0x106/0x310 [ 1088.040767][T14835] link_path_walk+0x162/0x900 [ 1088.045452][T14835] path_openat+0x1de/0x2170 [ 1088.049957][T14835] do_filp_open+0x109/0x230 [ 1088.054583][T14835] do_sys_openat2+0xa6/0x110 [ 1088.059180][T14835] __x64_sys_openat+0xf2/0x120 [ 1088.063955][T14835] x64_sys_call+0x2e9c/0x2ff0 [ 1088.068641][T14835] do_syscall_64+0xd2/0x200 [ 1088.073151][T14835] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1088.079059][T14835] [ 1088.081390][T14835] write to 0xffff888129313120 of 4 bytes by task 14835 on cpu 1: [ 1088.089113][T14835] selinux_inode_permission+0x3ac/0x740 [ 1088.094684][T14835] security_inode_permission+0x6d/0xb0 [ 1088.100158][T14835] inode_permission+0x106/0x310 [ 1088.105024][T14835] link_path_walk+0x162/0x900 [ 1088.109706][T14835] path_openat+0x1de/0x2170 [ 1088.114208][T14835] do_filp_open+0x109/0x230 [ 1088.118712][T14835] do_sys_openat2+0xa6/0x110 [ 1088.123308][T14835] __x64_sys_openat+0xf2/0x120 [ 1088.128166][T14835] x64_sys_call+0x2e9c/0x2ff0 [ 1088.132849][T14835] do_syscall_64+0xd2/0x200 [ 1088.137366][T14835] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1088.143258][T14835] [ 1088.145581][T14835] value changed: 0x00000000 -> 0x00000002 [ 1088.151291][T14835] [ 1088.153610][T14835] Reported by Kernel Concurrency Sanitizer on: [ 1088.159783][T14835] CPU: 1 UID: 0 PID: 14835 Comm: syz.2.15480 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1088.171249][T14835] Tainted: [W]=WARN [ 1088.175049][T14835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1088.185104][T14835] ==================================================================