last executing test programs: 1.827461002s ago: executing program 3 (id=168): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000801000000ffffffff000000000000000023d63cf30a0d9596d9d67801e684dec0c462272480cd7fe123ae544dd8f26205bca83df9234777901411466d719ae952b321b63617", @ANYRES32=0x0, @ANYRES32=r0], 0x7c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4010) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000000000000080000000800000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000006c0)="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", 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) fcntl$lock(r5, 0x26, &(0x7f0000000000)) 1.771978773s ago: executing program 2 (id=169): ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000180)=0x1) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b9595b0f8bca7a3711e78d71900000000009d8328b99c7c1d74dc1048b1e2501a92d6cf48f60be02198bf228ff95927e50000000000ff0000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001000000000000", @ANYRES32=0x1, @ANYBLOB="000099662dbf29d161a64582af5cbe0cb56ea37f1235ec298b5ef8589142462b729fc82f0000000000c0ac59f592aaf81d12016be01a271fb563e387b8771a4504cf49bbd619e5bceb215d531ccf96e2a345dc3d5a850b47cfde85cb47ddc825a2b7716c9fb9efbf3ab9af620a4742712294ad2b06d07fce31495292929f8eaba7c84480e8cbfab172f7128c47e9e79d9cc86554db26c63662c801bc1dc7c8df5be97f8f7fec0ff2a864193ae54a144606d5ee91d10c4c386478fa5bc748bc534d81f4f94bbfdc9770b6dee3679fb457f2f98d1b8f4937bc01c27755fdee6e8604fb329b3aa3e557", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = epoll_create1(0x0) r5 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x80044940, &(0x7f00000030c0)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)={0x40002007}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r3, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) socket$kcm(0xa, 0x5, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x145340, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x3, 0x7f) setsockopt$packet_tx_ring(r8, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) r9 = getegid() lchown(&(0x7f0000000300)='./file0\x00', 0x0, r9) setsockopt$packet_rx_ring(r8, 0x107, 0x5, &(0x7f0000000100)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x861}, 0x1c) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) sendto$packet(r0, &(0x7f00000000c0)="3f03fe7f0302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 1.676660273s ago: executing program 3 (id=171): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3c6, &(0x7f00000004c0)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x8004587d, &(0x7f0000000140)={0x2, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)=@known='system.posix_acl_access\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00'}, 0x10) r4 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x20, 0x6, 0x0) 1.675979643s ago: executing program 4 (id=172): openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000980)={0x28, r5, 0xb03, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x6, 0x2, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0xe, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000200)='mm_page_free\x00', r6, 0x0, 0x2}, 0x18) dup(r0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r7 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@ipv4_newrule={0x28, 0x20, 0x301, 0x0, 0xfffffffc, {0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r8, r8}}]}, 0x28}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000400)='./file1\x00', 0x200000, &(0x7f0000000740)={[{@jqfmt_vfsv1}, {@min_batch_time={'min_batch_time', 0x3d, 0xc0}}, {@delalloc}, {@noauto_da_alloc}, {@init_itable_val={'init_itable', 0x3d, 0x7}}, {@nouid32}, {@resgid}, {@errors_remount}, {@sysvgroups}], [{@audit}, {@euid_eq={'euid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '/%'}}]}, 0x1, 0x573, &(0x7f0000001140)="$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") chdir(&(0x7f0000000080)='./file0\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), &(0x7f0000002700)=ANY=[], 0xe01, 0x0) rename(&(0x7f0000000300)='./file0\x00', &(0x7f00000000c0)='./file1\x00') r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r9}, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_enter\x00', r10}, 0x10) rseq(0x0, 0x0, 0x1, 0x0) 1.556535754s ago: executing program 2 (id=174): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000ff0000000000d9dfc044181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newtaction={0x78, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @loopback}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @broadcast}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1ff}, 0x0, 0xf5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000202000000000000000000000a03000000000000000000000a"], 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x100000, &(0x7f00000002c0), 0x0, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000600)="89eeea5dbb8b688b90e72c9544ca2218609d03cb91b88798c34e45d29c983a0dfb1f4a14920b4afdfe114478f0b58868a9bb0fe6b8efde57352c9bae15e4569031e8fb9494e3e0c516088488c0a0b8f2bc104f3330c518f57837e0d29cd6fc7d3ffc851192353738fcb14f781dba6256f037f0ae55b3e0c1c94cfe4ce447030f56736b840d4254db172045e4b831fc4e2b42cb909c8aec4e3a510fde34955229d954bd76e7c79f0d721ddb9c393df28825b9328f14696ab4352c9514782757f5ad1b69b828f2bd4beeca72fa3c701ade967fae309c6ef4d73f82514e2c") r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1001b) writev(r4, &(0x7f0000000080)=[{&(0x7f0000000000)="e5", 0x1}], 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[@ANYBLOB="540000000101010100000000000000000200000006001240000400002c0001800c000280050001000000000006000340000000001400018008ec00007f00000108000200000000000c0019"], 0x54}}, 0x20000) 1.440663574s ago: executing program 4 (id=176): r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000014c0), 0x1, 0x793, &(0x7f0000001700)="$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") syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000000)='./bus\x00', 0x802, &(0x7f0000000ec0)={[{@nocompress}, {@iocharset={'iocharset', 0x3d, 'macinuit'}}, {@nojoliet}, {@map_acorn}, {@check_relaxed}, {@uid}, {@mode}, {@overriderock}, {@overriderock}, {@unhide}, {@unhide}, {}, {@iocharset={'iocharset', 0x3d, 'iso8859-6'}}, {@overriderock}]}, 0x4, 0xa00, &(0x7f00000003c0)="$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") getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/137, 0x89) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000007fc0)='./bus\x00', 0x60142, 0x0) socket(0x10, 0x80002, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='kmem_cache_free\x00', r3}, 0x10) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x1000) msgsnd(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="03"], 0x401, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x2, 0x0, 0xee00, 0xee01, 0x0, 0x2, 0x2}, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x8, 0xfffe, 0x1b}) (fail_nth: 1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 1.411880354s ago: executing program 2 (id=177): r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) r2 = eventfd(0x2) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x8, r0, &(0x7f0000000100), 0x0, 0x7, 0x0, 0x1, r2}]) (async) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x8, r0, &(0x7f0000000100), 0x0, 0x7, 0x0, 0x1, r2}]) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x293501e, &(0x7f0000000280), 0xfe, 0x508, &(0x7f0000000f80)="$eJzs3V1rLGcdAPD/TLLHnJ7UpOpFLbQWWzmn6Nk9aWwbvGgrincFpd4fQ7IJIZtsyG7ak1AkxQ8giGjBK6+8EfwAgvQjSKFgwUtRUURP9cILdWRmZ9Oc7WyT0H0pye8Hz+4zz8zO///kZfLMS2YCuLKejIiXI2ImIp6JiIWyPS1LHPdKvtz7999Yy0s+59W/J5GUbRFF9cSN8mNzvbdKncOj7dVWq7lfTje6O3uNzuHR7a2d1c3mZnN3eXnp+ZUXVp5buTOSfub9evGbf/7JD3/xrRd/85XX/3D3r7e+nyf9jXJ+2Y+Re694reVfixOzEbE/jmBTMFP2pzbtRAAAOJd8jP+ZiPhiMf5fiJliNFcYHNLNTT47AAAAYBSyl+bjP0lEBgAAAFxaL0XE769F1MtrAeYjTev13jW8n4uH0la70/3yRvtgdz2fF7EYtXRjq9W8U15Tuxi1JJ9eKuofTD87ML0cEY9ExI8XrhfT9bV2a33aBz8AAADgirhR7PMnaX///18Lvf1/AAAA4JJZnHYCAAAAwNgN2/9PJpwHAAAAMD7O/wMAAMCl9u1XXslL1n/+9fprhwfb7ddurzc72/Wdg7X6Wnt/r77Zbm8W9+zbOWt9rXZ776uxe3Cv0W12uo3O4dHdnfbBbvfulucHAgAAwLQ88oW330si4vhr14uSu5a/zFQt7R8C4DJJL7Lwn8aXBzB5lX/mgSthdtoJANNzPO0EgGl74MhexaDg9MU7Dxwz+O34cgIAAEbr5uerz//nuwC1aScHjNWFzv8Dl4rz/3B1XfD8/zvjygOYvJoRAFx5Z/1nz9Cbd1Sd/79WtWCWnbkuAABgrOaLkqT18lzgfKRpvR7xcPFYgFqysdVq3omIT0fE7xZqn8qnl4pPJu4GAAAAAAAAAAAAAAAAAAAAAAAAAADnlGVJZAAAAMClFpH+JSmf/3Vz4en5weMD15J/L0T5SK/Xf/bqT++tdrv7S3n7P07au2+V7c9O4wgGAAAAMKi/n97fjwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAUXr//htr/TLJuH/7ekQsVsWfjbnifS5qEfHQP5OYPfW5JCJmRhD/+M2IeLQqfpKnFYtlFoPx04i4Ppn4j2dZVhn/xgjiw1X2dr79ebnq9y+NJ4v36t//2bJ8XMO3f+nJ9m9myPbv4XPGeOzdXzWGxn8z4rHZ6u1PP34yJP5TVStMP9z0ve8eHX2osbfyyH4ecbPy70/yQKxGd2ev0Tk8ur21s7rZ3GzuLi8vPb/ywspzK3caG1utZvla2ccfPf7r/w00/TfrKfofQ+IvntH/p/NK7VRjNhimDPbuvfuf7VVrA6so4t96qvr7/+hHxM9/Jr5Ufrnz+Tf79eNe/bQnfvnOE5WJlfHXh/T/rO//rWErHfDMd37wx3MuCgBMQOfwaHu11Wruj73yVpZlk4qlcvFKf3Q3thBzn5SeqpxVGcWRLQAA4JPmg0H/tDMBAAAAAAAAAAAAAAAAAACAq6tzGOm4byc2GPN4Ol0FAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPhI/w8AAP//pzrezw==") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2405, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xd) 1.409260284s ago: executing program 3 (id=178): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000100), &(0x7f0000000140)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000400)='./file0\x00', 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRES8], 0x1, 0x11dc, &(0x7f0000001280)="$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") creat(&(0x7f0000000240)='./bus\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r2, &(0x7f0000004200)='t', 0x1) r3 = open(&(0x7f0000000280)='./bus\x00', 0x10d042, 0x12) sendfile(r2, r3, 0x0, 0x10001) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, 0x0) write$tun(0xffffffffffffffff, 0x0, 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.265835545s ago: executing program 1 (id=180): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffff, 0x0, 0x0, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 1.160485515s ago: executing program 1 (id=182): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0xfffffffffffffe82, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) (fail_nth: 12) 984.380596ms ago: executing program 2 (id=183): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) r0 = socket(0x2, 0x80805, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x2, 0x1, 0x2}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f28000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) 742.245827ms ago: executing program 3 (id=184): ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000180)=0x1) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b9595b0f8bca7a3711e78d71900000000009d8328b99c7c1d74dc1048b1e2501a92d6cf48f60be02198bf228ff95927e50000000000ff0000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001000000000000", @ANYRES32=0x1, @ANYBLOB="000099662dbf29d161a64582af5cbe0cb56ea37f1235ec298b5ef8589142462b729fc82f0000000000c0ac59f592aaf81d12016be01a271fb563e387b8771a4504cf49bbd619e5bceb215d531ccf96e2a345dc3d5a850b47cfde85cb47ddc825a2b7716c9fb9efbf3ab9af620a4742712294ad2b06d07fce31495292929f8eaba7c84480e8cbfab172f7128c47e9e79d9cc86554db26c63662c801bc1dc7c8df5be97f8f7fec0ff2a864193ae54a144606d5ee91d10c4c386478fa5bc748bc534d81f4f94bbfdc9770b6dee3679fb457f2f98d1b8f4937bc01c27755fdee6e8604fb329b3aa3e557", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = epoll_create1(0x0) r5 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x80044940, &(0x7f00000030c0)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)={0x40002007}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r3, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) socket$kcm(0xa, 0x5, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x145340, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x3, 0x7f) setsockopt$packet_tx_ring(r8, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) r9 = getegid() lchown(&(0x7f0000000300)='./file0\x00', 0x0, r9) setsockopt$packet_rx_ring(r8, 0x107, 0x5, &(0x7f0000000100)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x861}, 0x1c) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) sendto$packet(r0, &(0x7f00000000c0)="3f03fe7f0302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 688.377937ms ago: executing program 1 (id=185): r0 = socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) fsync(r3) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002140)={'wg2\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002300)=ANY=[@ANYBLOB="400000006800010000000000feffffff0a00000000000000060007000700000008000500", @ANYRES32=r4, @ANYBLOB="18000880"], 0x40}}, 0x0) 685.663437ms ago: executing program 2 (id=187): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x2, 0x9, 0x1000f4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000640)='kfree\x00', r2, 0x0, 0x200}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000004800)=@newtaction={0x894, 0x30, 0x12f, 0x0, 0x0, {}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}, @TCA_POLICE_AVRATE={0x8}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x40000001, 0x0, 0x8, 0x8, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0xfffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa369, 0x0, 0x8, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd8, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5f5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7e2, 0x0, 0x0, 0xd5, 0x7, 0x96e4, 0x0, 0x0, 0xa, 0x0, 0x3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x2, 0x9, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x80, 0x0, 0x0, 0x800, 0xfffff0e7, 0xfffffffd, 0xfff, 0x0, 0x0, 0x0, 0x1ff]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x3, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x1ff}, {0xd, 0x0, 0x0, 0x80, 0x0, 0x20002}}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x894}}, 0x890) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000240)=0x2) connect$vsock_stream(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f00000004c0)={'ip6tnl0\x00', 0x0, 0x29, 0x5, 0x7, 0x9, 0x61, @private1={0xfc, 0x1, '\x00', 0x1}, @local, 0x40, 0x7800, 0x30, 0xfffff753}}) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000400)=0x0, &(0x7f0000000540)=0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000580)={'erspan0\x00', 0x0, 0x8000, 0x7, 0x0, 0x7, {{0x19, 0x4, 0x1, 0x5, 0x64, 0x64, 0x0, 0x5, 0x29, 0x0, @empty, @private=0xa010102, {[@noop, @timestamp={0x44, 0xc, 0x80, 0x0, 0xa, [0x6, 0x9]}, @noop, @rr={0x7, 0x7, 0x2b, [@multicast2]}, @timestamp_addr={0x44, 0xc, 0xeb, 0x1, 0x0, [{@rand_addr=0x64010102, 0x8}]}, @rr={0x7, 0x7, 0x54, [@local]}, @ssrr={0x89, 0x7, 0xde, [@remote]}, @cipso={0x86, 0x21, 0x0, [{0x6, 0xf, "2241d2894169ccc68f2146724f"}, {0x0, 0x7, "8c550e80e5"}, {0x4, 0x5, "53fda0"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000700)={'syztnl2\x00', &(0x7f00000006c0)={'gre0\x00', 0x0, 0x1, 0x700, 0xffffff01, 0x5, {{0x8, 0x4, 0x1, 0x25, 0x20, 0x68, 0x0, 0x2, 0x2f, 0x0, @private=0xa010102, @local, {[@generic={0x82, 0xc, "9f98e02915b4439a5dd2"}]}}}}}) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000740)=0x0, &(0x7f00000007c0)=0x4) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000900)={&(0x7f0000000800)={0xd4, r6, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x24000000}, 0x20000000) shutdown(r5, 0x1) poll(&(0x7f0000000300)=[{r5}], 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r4, 0x0, 0x9135}, 0x18) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r12, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000060a0b040000000000000000020001000900010073797a30000000000900020073797a3200000000140000001100010000000000000000000000000a"], 0x54}}, 0x0) 548.156538ms ago: executing program 4 (id=188): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3c6, &(0x7f00000004c0)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x8004587d, &(0x7f0000000140)={0x2, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)=@known='system.posix_acl_access\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3}, 0x10) r4 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x20, 0x6, 0x0) 535.009138ms ago: executing program 2 (id=189): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_io_uring_setup(0x112, &(0x7f0000000a00)={0x0, 0x0, 0x400}, &(0x7f0000000580)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r1, 0x47f6, 0x8095ac, 0x0, 0x0, 0x0) preadv2(r0, &(0x7f0000000040)=[{&(0x7f0000000300)=""/97, 0x4}], 0x1, 0x0, 0x0, 0x0) stat(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000025c0)=[{0x0}], 0x1) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810100850000006d000000850000005000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000850000000800000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$pptp(0x18, 0x1, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='mm_compaction_begin\x00', r5, 0x0, 0xb}, 0x18) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_io_uring_setup(0x48d0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1000002, 0x354}, &(0x7f0000000340)=0x0, &(0x7f0000000380)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r12, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0x12, r12, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r8, 0x4, &(0x7f0000000080), 0x0, 0x4) syz_io_uring_submit(r8, r9, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index, 0x0, 0x0}) io_uring_enter(r7, 0x3f70, 0x4e35, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) inotify_init1(0x0) 523.540378ms ago: executing program 0 (id=190): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000001000000100002800c00018008000100030000000400"], 0x28}}, 0x0) 447.131718ms ago: executing program 1 (id=191): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r2, &(0x7f00000005c0)={&(0x7f0000000000), 0x10, &(0x7f0000000040)=[{&(0x7f0000000180)="f7", 0x1}, {&(0x7f00000004c0)="b01802aec27fab32cf60b066159173105b055de034244ec2ef1381a2000388a3a9bf2f9d3d2ae506d4233fa072a5289b08bf673758cfa8f54d928f04e2bf660be3d152ebf89bd5eab71cd6dd7cf0cc5422562022a3be765881af8b864be73689f5bee3583e26e6bc22858ac78fc78f371d408c98ef6cb693b22168ef9973e0e608098a80a826fcb5eea53c45cf7af667f023fa1b6c05b0eb1367d57f164d9821fb78f977f82ff109bdb27298c0ce1653942eab31b011509d85aedcbc5214d8eac73d75d361e66a", 0xc7}], 0x2}, 0x0) 443.239209ms ago: executing program 0 (id=192): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffff, 0x0, 0x0, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 372.132179ms ago: executing program 1 (id=193): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x240400, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000060000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet6(0xa, 0x806, 0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e23, @rand_addr=0x64010102}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e21, 0x0, @local, 0xe}, @in6={0xa, 0x4e21, 0x1ff, @private0, 0x4}, @in6={0xa, 0x4e24, 0xfffffe01, @private2, 0x5}, @in6={0xa, 0x4e23, 0x9, @mcast2, 0x80000000}], 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r6}, 0x10) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) listen(r3, 0x2009) close_range(r0, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000001080)='sys_enter\x00', r8}, 0x18) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) setsockopt$inet6_buf(r4, 0x29, 0x14, &(0x7f0000000200)="769832e1e1a69ba11dcf12ec92c4bc07e80d70eb9f7a7672", 0x18) 371.822169ms ago: executing program 4 (id=194): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000100), &(0x7f0000000140)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000400)='./file0\x00', 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRES8], 0x1, 0x11dc, &(0x7f0000001280)="$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") creat(&(0x7f0000000240)='./bus\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r2, &(0x7f0000004200)='t', 0x1) r3 = open(&(0x7f0000000280)='./bus\x00', 0x10d042, 0x12) sendfile(r2, r3, 0x0, 0x10001) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, 0x0) write$tun(0xffffffffffffffff, 0x0, 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 343.452199ms ago: executing program 0 (id=195): mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x8000000, 0x2, 0x0, 0xd, 0xa, [{0x8, 0x2}, {0x4, 0x2}]}]}}, &(0x7f0000000f40)=""/4089, 0x36, 0xff9, 0x1, 0x2, 0x0, @void, @value}, 0x28) 300.065909ms ago: executing program 0 (id=196): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) (async) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) (async) pipe2$9p(&(0x7f0000000180), 0x80080) socket$inet(0x2, 0x4000000805, 0x0) (async) socket$inet_smc(0x2b, 0x1, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_io_uring_setup(0x304, &(0x7f0000000240)={0x0, 0x0, 0x10100, 0x2, 0xdf}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x7, 0x0, @fd_index=0xa, 0x0, 0x0, 0x8000, 0x7, 0x1}) (async) write$UHID_CREATE2(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="06"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) (async) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2001, 0x2}) (async) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, 0x0, &(0x7f0000000040)}, 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="186800000006", @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000004c0)}) (async) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b000000000000000000008f0000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 264.674139ms ago: executing program 3 (id=197): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000801000000ffffffff000000000000000023d63cf30a0d9596d9d67801e684dec0c462272480cd7fe123ae544dd8f26205bca83df9234777901411466d719ae952b321b63617", @ANYRES32=0x0, @ANYRES32=r0], 0x7c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4010) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000006c0)="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", 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) fcntl$lock(r6, 0x26, &(0x7f0000000000)) 226.393879ms ago: executing program 0 (id=198): syz_read_part_table(0x59d, &(0x7f0000000000)="$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") munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000000080)={{0x0, 0x989680}}, 0x0) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x3, &(0x7f0000000440)={{0x0, 0x3938700}}, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x3ff, 0xfffffff7ffffffff, 0x2, 0x800b, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x100, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe, 0x8, 0x1000000, 0x0, 0xffffffffffffff43, 0x3, 0x0, 0x3}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r1, 0xf50f, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0xfffffffffffffff8, &(0x7f0000000280)={&(0x7f0000001040)=ANY=[@ANYBLOB="30000000120097023dbd70000000000007000000", @ANYRES32=0x0, @ANYBLOB="0000000000000008001d0040000000"], 0x30}, 0x1, 0x0, 0x0, 0x40010}, 0x0) sendmsg$inet(r3, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0x0, @local}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0x34000}], 0x1, 0x0, 0x0, 0x2000}, 0x60) 225.97511ms ago: executing program 3 (id=199): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000500000008500000008000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r3, 0x8008551d, &(0x7f0000000000)={0xfd73, 0x1, [{0x3, 0x1}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r4, r5, 0x60000000000, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x18, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @ldst={0x2, 0xfef15a11c7ccbdd4, 0x3, 0x2, 0x5, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x95}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000000}}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x5237}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000000180)='syzkaller\x00', 0xff, 0x0, 0x0, 0x41100, 0x52, '\x00', 0x0, 0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x1, 0x7, 0x2, 0x1000}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000340)=[r1], &(0x7f0000000380)=[{0x0, 0x4, 0x8, 0x7}], 0x10, 0x77, @void, @value}, 0x94) 117.97744ms ago: executing program 4 (id=200): r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00'}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) 40.09506ms ago: executing program 1 (id=201): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) ioprio_set$pid(0x1, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140), 0x75f, 0xa382) r1 = gettid() r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f000000fe80), 0x40800, 0x0) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f000000fec0)=ANY=[@ANYBLOB="13a18c04cbece8"]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="050000b4b76d4e1f9f62e76f54453d749c001000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f00000005c0)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESHEX=r0, @ANYRESDEC=r0], 0x0, 0x100000, 0x61, 0x0, 0x41000, 0x4d, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) request_key(&(0x7f0000000180)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000680)='{-^@\\\x83+C\x17\xd0]\x05\xc1\xbb]\x81\xa2\x00n\x94\xa0\xfb\x9c\x1c\xfa\xeb\xae\x93\xe4\xf0\x11\xdf\xed.\a\xf2W{\x061\xb7W\xc5b\xac\xd9c^\x91\xc3\'\x8e)\f$\x1f\x03\xb1\x91K\xbeK\xb4\x02\nwO\xb0\xd5\x90TTU\xb0E\xfa\x85]\x85\xe8\xb5\t\x9b\xcf\xf4\xb9\x1c>\xc8F?\x0f\xc6\x83IC\x02b\xa2\x11\xd3\xd8\xf0\xb3\x85\v\x02I*#\xc6@\xca\xdbM\xea<\xf3\xa3_\xff*\xaa~b{+\xc4I\xd1$)\xcf^\xaf\x92\xe1\xb4\x93\xfb\x05\x00\x00\x00\x00\x00\x00\x00\x9f\v\x81\xda\xe3`\xe7\x15\x05\b\x03-\xeckHP\xee\xcd\xd0\xe3\x0e\x05)\x97z\xdd0h\x8e\xe2\xb8\xeb\x8dOKK\x1b\xf7\xac\xfe\xc9\xf7\xcb\xb5\xac\x90\x9cZ\x18\x80I\t\xa2\xee\x1f\xfa\xa1\xc9\x84\x93\xcc\x85', 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="9d00000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000016000000000000850000008200ffe19500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x2) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_test', 0x141a82, 0x0) sendfile(r9, r9, 0x0, 0x2f) ioctl$TIOCSPTLCK(r6, 0x40045431, &(0x7f0000000300)=0x1) readv(r6, &(0x7f0000000000)=[{&(0x7f0000001300)=""/241, 0xf1}], 0x1) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000cc0)=@filter={'filter\x00', 0x42, 0x4, 0x380, 0xffffffff, 0x250, 0x0, 0x250, 0xffffffff, 0xffffffff, 0x2e8, 0x2e8, 0x2e8, 0xffffffff, 0x5, 0x0, {[{{@ip={@multicast2, @dev={0xac, 0x14, 0x14, 0x27}, 0x1000000, 0xff, 'wg1\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98, 0x1ba, {0x46010000, 0x2c000000000000}}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'team_slave_0\x00', 'team0\x00', {0xff}, {}, 0x62, 0x3, 0xc}, 0x287, 0x158, 0x1b8, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x3, 0xf4, 'kmp\x00', "377da29a98a85027440fb1647c5950ecfd45c615dfd84bacf537ed92ac620b95fe75775bfa0c1f3636674f1bc9affc23d45f6e27b674720897315a51a5338ca0ac2dd6b5b2d96bd558dc767e923d15aba2f74dff1149e15f5ba483d804234a06e4bc7d462efc9092f876f845199bb88c0f39fec8f07125d04e8375b370fdb68d", 0x5d, 0x2, {0x6}}}, @common=@unspec=@cpu={{0x28}, {0x3}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x4, [0x0, 0x0, 0x3, 0x0, 0x4, 0x4], 0x1, 0x3}, {0x4, [0x6, 0x5, 0x6, 0x0, 0x5], 0x1, 0x2}}}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 7.10684ms ago: executing program 0 (id=202): syz_read_part_table(0x59d, &(0x7f0000000000)="$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") munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0x0, @local}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0x34000}], 0x1, 0x0, 0x0, 0x2000}, 0x60) (fail_nth: 6) 0s ago: executing program 4 (id=203): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000001000000100002800c0001800800010003000000040001"], 0x28}}, 0x0) kernel console output (not intermixed with test programs): [ 19.604786][ T29] audit: type=1400 audit(1732362766.038:81): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.157' (ED25519) to the list of known hosts. [ 25.737842][ T29] audit: type=1400 audit(1732362772.168:82): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.739031][ T3305] cgroup: Unknown subsys name 'net' [ 25.760588][ T29] audit: type=1400 audit(1732362772.168:83): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.787975][ T29] audit: type=1400 audit(1732362772.198:84): avc: denied { unmount } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.929333][ T3305] cgroup: Unknown subsys name 'cpuset' [ 25.935500][ T3305] cgroup: Unknown subsys name 'rlimit' [ 26.106728][ T29] audit: type=1400 audit(1732362772.538:85): avc: denied { setattr } for pid=3305 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.132139][ T29] audit: type=1400 audit(1732362772.538:86): avc: denied { create } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.152767][ T29] audit: type=1400 audit(1732362772.538:87): avc: denied { write } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.173126][ T29] audit: type=1400 audit(1732362772.538:88): avc: denied { read } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.176729][ T3309] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 26.193491][ T29] audit: type=1400 audit(1732362772.548:89): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.226876][ T29] audit: type=1400 audit(1732362772.548:90): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.232505][ T3305] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.250547][ T29] audit: type=1400 audit(1732362772.638:91): avc: denied { relabelto } for pid=3309 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.379942][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 27.485563][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 27.499660][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.506822][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.514068][ T3318] bridge_slave_0: entered allmulticast mode [ 27.520550][ T3318] bridge_slave_0: entered promiscuous mode [ 27.529121][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 27.537657][ T3325] chnl_net:caif_netlink_parms(): no params data found [ 27.553945][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.561154][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.568342][ T3318] bridge_slave_1: entered allmulticast mode [ 27.574827][ T3318] bridge_slave_1: entered promiscuous mode [ 27.625264][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.635423][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.660598][ T3324] chnl_net:caif_netlink_parms(): no params data found [ 27.687285][ T3318] team0: Port device team_slave_0 added [ 27.703843][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.711048][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.718245][ T3316] bridge_slave_0: entered allmulticast mode [ 27.725052][ T3316] bridge_slave_0: entered promiscuous mode [ 27.734093][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.741259][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.748573][ T3316] bridge_slave_1: entered allmulticast mode [ 27.755052][ T3316] bridge_slave_1: entered promiscuous mode [ 27.761792][ T3318] team0: Port device team_slave_1 added [ 27.772314][ T3325] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.779392][ T3325] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.786546][ T3325] bridge_slave_0: entered allmulticast mode [ 27.792883][ T3325] bridge_slave_0: entered promiscuous mode [ 27.816975][ T3325] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.824064][ T3325] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.831516][ T3325] bridge_slave_1: entered allmulticast mode [ 27.838041][ T3325] bridge_slave_1: entered promiscuous mode [ 27.857024][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.871806][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.878897][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.886137][ T3317] bridge_slave_0: entered allmulticast mode [ 27.892623][ T3317] bridge_slave_0: entered promiscuous mode [ 27.901279][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.908335][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.934512][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.946062][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.955350][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.962399][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.988312][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.003690][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.010817][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.017951][ T3317] bridge_slave_1: entered allmulticast mode [ 28.024415][ T3317] bridge_slave_1: entered promiscuous mode [ 28.040525][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.050765][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.078607][ T3316] team0: Port device team_slave_0 added [ 28.094330][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.107977][ T3324] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.115068][ T3324] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.122234][ T3324] bridge_slave_0: entered allmulticast mode [ 28.128722][ T3324] bridge_slave_0: entered promiscuous mode [ 28.135647][ T3316] team0: Port device team_slave_1 added [ 28.146760][ T3325] team0: Port device team_slave_0 added [ 28.153372][ T3325] team0: Port device team_slave_1 added [ 28.159993][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.177437][ T3324] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.184537][ T3324] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.191797][ T3324] bridge_slave_1: entered allmulticast mode [ 28.198139][ T3324] bridge_slave_1: entered promiscuous mode [ 28.210013][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.216997][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.243058][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.271069][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.278130][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.304092][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.319581][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.326554][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.352513][ T3325] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.364855][ T3318] hsr_slave_0: entered promiscuous mode [ 28.371055][ T3318] hsr_slave_1: entered promiscuous mode [ 28.384342][ T3317] team0: Port device team_slave_0 added [ 28.390261][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.397217][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.423212][ T3325] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.444842][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.460421][ T3317] team0: Port device team_slave_1 added [ 28.474327][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.502446][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.509461][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.535460][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.557317][ T3316] hsr_slave_0: entered promiscuous mode [ 28.563576][ T3316] hsr_slave_1: entered promiscuous mode [ 28.569425][ T3316] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.576967][ T3316] Cannot create hsr debugfs directory [ 28.582819][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.589820][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.615896][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.634906][ T3324] team0: Port device team_slave_0 added [ 28.661330][ T3324] team0: Port device team_slave_1 added [ 28.686990][ T3317] hsr_slave_0: entered promiscuous mode [ 28.693042][ T3317] hsr_slave_1: entered promiscuous mode [ 28.698953][ T3317] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.706541][ T3317] Cannot create hsr debugfs directory [ 28.722758][ T3325] hsr_slave_0: entered promiscuous mode [ 28.728894][ T3325] hsr_slave_1: entered promiscuous mode [ 28.734794][ T3325] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.742410][ T3325] Cannot create hsr debugfs directory [ 28.768760][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.775730][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.801837][ T3324] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.813133][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.820109][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.846024][ T3324] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.902015][ T3324] hsr_slave_0: entered promiscuous mode [ 28.908077][ T3324] hsr_slave_1: entered promiscuous mode [ 28.914015][ T3324] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.921614][ T3324] Cannot create hsr debugfs directory [ 28.968996][ T3318] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 28.991230][ T3318] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.010371][ T3318] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.034216][ T3318] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.054740][ T3316] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.074028][ T3316] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.094010][ T3316] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.115600][ T3316] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.130993][ T3317] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.151914][ T3317] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.161067][ T3317] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.174599][ T3317] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.187637][ T3325] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.196735][ T3325] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.205484][ T3325] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.214582][ T3325] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.263285][ T3324] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.272020][ T3324] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.281407][ T3324] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.291076][ T3324] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.309039][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.341641][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.357503][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.373876][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.381064][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.393901][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.401062][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.426983][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.435018][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.464772][ T380] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.471830][ T380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.483404][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.490452][ T380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.508295][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.518564][ T3325] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.533875][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.542954][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.550053][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.563978][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.571118][ T380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.583300][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.606604][ T3325] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.617053][ T3325] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.633398][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.641629][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.648744][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.665742][ T3340] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.672828][ T3340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.682703][ T3324] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.719745][ T380] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.726889][ T380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.751626][ T3325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.774068][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.781234][ T380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.830039][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.854621][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.897403][ T3318] veth0_vlan: entered promiscuous mode [ 29.911088][ T3318] veth1_vlan: entered promiscuous mode [ 29.934052][ T3324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.966548][ T3318] veth0_macvtap: entered promiscuous mode [ 29.982120][ T3318] veth1_macvtap: entered promiscuous mode [ 29.997415][ T3325] veth0_vlan: entered promiscuous mode [ 30.020731][ T3325] veth1_vlan: entered promiscuous mode [ 30.045973][ T3317] veth0_vlan: entered promiscuous mode [ 30.057620][ T3325] veth0_macvtap: entered promiscuous mode [ 30.065324][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.084520][ T3317] veth1_vlan: entered promiscuous mode [ 30.092139][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.102454][ T3325] veth1_macvtap: entered promiscuous mode [ 30.114133][ T3325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.124736][ T3325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.135560][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.151569][ T3316] veth0_vlan: entered promiscuous mode [ 30.159403][ T3325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.169888][ T3325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.181957][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.191706][ T3318] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.200514][ T3318] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.209258][ T3318] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.217977][ T3318] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.231146][ T3325] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.239923][ T3325] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.248674][ T3325] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.257370][ T3325] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.270180][ T3316] veth1_vlan: entered promiscuous mode [ 30.283183][ T3317] veth0_macvtap: entered promiscuous mode [ 30.297636][ T3317] veth1_macvtap: entered promiscuous mode [ 30.332779][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.343417][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.353329][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.363848][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.375764][ T3325] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.381025][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.403083][ T3324] veth0_vlan: entered promiscuous mode [ 30.423722][ T3316] veth0_macvtap: entered promiscuous mode [ 30.434619][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.445103][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.455036][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.465540][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.477351][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.495175][ T3324] veth1_vlan: entered promiscuous mode [ 30.495725][ T3460] loop0: detected capacity change from 0 to 8192 [ 30.507828][ T3316] veth1_macvtap: entered promiscuous mode [ 30.519385][ T3317] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.528125][ T3317] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.537097][ T3317] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.542486][ T3460] syz.0.1 uses obsolete (PF_INET,SOCK_PACKET) [ 30.546001][ T3317] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.582392][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.592957][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.602801][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.613352][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.623278][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.633785][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.644372][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.657307][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.667877][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.677725][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.688187][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.698095][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.708530][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.719559][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.741688][ T3316] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.750492][ T3316] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.759364][ T3316] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.768065][ T3316] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.803540][ T3324] veth0_macvtap: entered promiscuous mode [ 30.808042][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 30.808057][ T29] audit: type=1400 audit(1732362777.238:135): avc: denied { create } for pid=3466 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 30.835185][ T29] audit: type=1400 audit(1732362777.248:136): avc: denied { create } for pid=3466 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 30.859846][ T29] audit: type=1400 audit(1732362777.298:137): avc: denied { open } for pid=3465 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.878913][ T29] audit: type=1400 audit(1732362777.298:138): avc: denied { kernel } for pid=3465 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.906743][ T3468] netlink: 'syz.2.7': attribute type 3 has an invalid length. [ 30.915123][ T3324] veth1_macvtap: entered promiscuous mode [ 30.940226][ T29] audit: type=1400 audit(1732362777.378:139): avc: denied { write } for pid=3466 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 30.965050][ T3468] netlink: 72 bytes leftover after parsing attributes in process `syz.2.7'. [ 30.966622][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.984225][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.994121][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.004741][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.013676][ T29] audit: type=1400 audit(1732362777.398:140): avc: denied { nlmsg_write } for pid=3466 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 31.014698][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.035006][ T29] audit: type=1400 audit(1732362777.428:141): avc: denied { create } for pid=3472 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 31.045358][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.045373][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.065613][ T29] audit: type=1400 audit(1732362777.428:142): avc: denied { write } for pid=3472 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 31.075413][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.117986][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.135545][ T29] audit: type=1400 audit(1732362777.548:143): avc: denied { read write } for pid=3474 comm="syz.1.2" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.135577][ T29] audit: type=1400 audit(1732362777.548:144): avc: denied { open } for pid=3474 comm="syz.1.2" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.172468][ T3479] netlink: 'syz.1.2': attribute type 39 has an invalid length. [ 31.186917][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.204003][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.213935][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.224521][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.234463][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.244965][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.254896][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.265356][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.276279][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.296245][ T3479] veth1_macvtap: left promiscuous mode [ 31.317566][ T3324] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.326351][ T3324] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.335233][ T3324] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.335611][ T3483] loop0: detected capacity change from 0 to 128 [ 31.343952][ T3324] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.450975][ T3492] atomic_op ffff88811764a528 conn xmit_atomic 0000000000000000 [ 31.527211][ T3499] loop3: detected capacity change from 0 to 512 [ 31.540919][ T3499] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 31.557414][ T3501] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 31.597859][ T3501] loop4: detected capacity change from 0 to 164 [ 31.604663][ T3501] ======================================================= [ 31.604663][ T3501] WARNING: The mand mount option has been deprecated and [ 31.604663][ T3501] and is ignored by this kernel. Remove the mand [ 31.604663][ T3501] option from the mount to silence this warning. [ 31.604663][ T3501] ======================================================= [ 31.650028][ T3501] isofs_fill_super: root inode is not a directory. Corrupted media? [ 31.654330][ T3499] EXT4-fs (loop3): shut down requested (2) [ 31.708320][ T3499] netlink: 'syz.3.16': attribute type 21 has an invalid length. [ 31.728794][ T3499] netlink: 132 bytes leftover after parsing attributes in process `syz.3.16'. [ 31.730304][ T3509] loop0: detected capacity change from 0 to 128 [ 31.749452][ T3499] netlink: 4 bytes leftover after parsing attributes in process `syz.3.16'. [ 31.792291][ T3316] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.660756][ T3535] FAULT_INJECTION: forcing a failure. [ 32.660756][ T3535] name failslab, interval 1, probability 0, space 0, times 1 [ 32.673590][ T3535] CPU: 0 UID: 0 PID: 3535 Comm: syz.0.27 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 32.683794][ T3535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 32.693880][ T3535] Call Trace: [ 32.697184][ T3535] [ 32.700126][ T3535] dump_stack_lvl+0xf2/0x150 [ 32.704752][ T3535] dump_stack+0x15/0x20 [ 32.708923][ T3535] should_fail_ex+0x223/0x230 [ 32.713605][ T3535] ? sel_write_avc_cache_threshold+0x11b/0x1b0 [ 32.719766][ T3535] should_failslab+0x8f/0xb0 [ 32.724360][ T3535] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 32.730784][ T3535] memdup_user_nul+0x2c/0xd0 [ 32.735420][ T3535] sel_write_avc_cache_threshold+0x11b/0x1b0 [ 32.741404][ T3535] ? __pfx_sel_write_avc_cache_threshold+0x10/0x10 [ 32.747908][ T3535] vfs_write+0x281/0x920 [ 32.752202][ T3535] ? putname+0xcf/0xf0 [ 32.756277][ T3535] ? __fget_files+0x17c/0x1c0 [ 32.761020][ T3535] ksys_write+0xe8/0x1b0 [ 32.765273][ T3535] __x64_sys_write+0x42/0x50 [ 32.769879][ T3535] x64_sys_call+0x287e/0x2dc0 [ 32.774598][ T3535] do_syscall_64+0xc9/0x1c0 [ 32.779109][ T3535] ? clear_bhb_loop+0x55/0xb0 [ 32.783798][ T3535] ? clear_bhb_loop+0x55/0xb0 [ 32.788484][ T3535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.794456][ T3535] RIP: 0033:0x7f2516dee819 [ 32.798873][ T3535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.818507][ T3535] RSP: 002b:00007f2515467038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 32.826918][ T3535] RAX: ffffffffffffffda RBX: 00007f2516fa5fa0 RCX: 00007f2516dee819 [ 32.834891][ T3535] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000005 [ 32.842943][ T3535] RBP: 00007f2515467090 R08: 0000000000000000 R09: 0000000000000000 [ 32.850914][ T3535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 32.858882][ T3535] R13: 0000000000000000 R14: 00007f2516fa5fa0 R15: 00007ffdd0090c58 [ 32.866861][ T3535] [ 33.086861][ T3552] loop2: detected capacity change from 0 to 2048 [ 33.112077][ T3548] loop0: detected capacity change from 0 to 512 [ 33.126972][ T3552] workqueue: Failed to create a rescuer kthread for wq "ext4-rsv-conversion": -EINTR [ 33.127010][ T3552] EXT4-fs: failed to create workqueue [ 33.141976][ T3552] EXT4-fs (loop2): mount failed [ 33.155904][ T3548] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 33.189865][ T3548] EXT4-fs (loop0): shut down requested (2) [ 33.238468][ T3548] netlink: 'syz.0.33': attribute type 21 has an invalid length. [ 33.246340][ T3548] netlink: 132 bytes leftover after parsing attributes in process `syz.0.33'. [ 33.278724][ T3561] netlink: 4 bytes leftover after parsing attributes in process `syz.0.33'. [ 33.357534][ T3567] loop2: detected capacity change from 0 to 1764 [ 33.364373][ T3567] iso9660: Bad value for 'gid' [ 33.369194][ T3567] iso9660: Bad value for 'gid' [ 33.502061][ T3572] loop3: detected capacity change from 0 to 128 [ 33.559009][ T3574] loop2: detected capacity change from 0 to 128 [ 33.676175][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.956577][ T3587] delete_channel: no stack [ 34.071141][ T3587] netlink: 604 bytes leftover after parsing attributes in process `syz.3.43'. [ 34.094372][ T3599] loop0: detected capacity change from 0 to 2048 [ 34.113038][ T3587] tipc: Started in network mode [ 34.117997][ T3587] tipc: Node identity ac14140f, cluster identity 4711 [ 34.143547][ T3587] tipc: New replicast peer: 255.255.255.255 [ 34.149729][ T3587] tipc: Enabled bearer , priority 10 [ 34.233408][ T3599] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 34.268552][ T3599] EXT4-fs error (device loop0): ext4_find_extent:938: inode #2: comm syz.0.44: pblk 1 bad header/extent: invalid magic - magic 2, entries 0, max 3(0), depth 0(4) [ 34.379166][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.400498][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::ffff:0.0.0.0]:20002. Sending cookies. [ 34.467831][ T3622] loop0: detected capacity change from 0 to 1764 [ 34.489001][ T3622] iso9660: Bad value for 'gid' [ 34.493833][ T3622] iso9660: Bad value for 'gid' [ 35.394604][ T24] tipc: Node number set to 2886997007 [ 35.462658][ T3635] loop3: detected capacity change from 0 to 512 [ 35.667601][ T3635] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.681235][ T3635] EXT4-fs (loop3): shut down requested (2) [ 35.733071][ T3316] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.866638][ T29] kauditd_printk_skb: 181 callbacks suppressed [ 35.866665][ T29] audit: type=1400 audit(1732362782.298:326): avc: denied { getopt } for pid=3654 comm="syz.3.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 35.927874][ T29] audit: type=1400 audit(1732362782.358:327): avc: denied { write } for pid=3660 comm="syz.2.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 35.984168][ T3668] FAULT_INJECTION: forcing a failure. [ 35.984168][ T3668] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 35.995725][ T3663] loop1: detected capacity change from 0 to 1764 [ 35.997307][ T3668] CPU: 0 UID: 0 PID: 3668 Comm: syz.2.64 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 36.013710][ T3668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 36.023850][ T3668] Call Trace: [ 36.027137][ T3668] [ 36.029906][ T3663] iso9660: Bad value for 'gid' [ 36.030070][ T3668] dump_stack_lvl+0xf2/0x150 [ 36.030152][ T3668] dump_stack+0x15/0x20 [ 36.034930][ T3663] iso9660: Bad value for 'gid' [ 36.048570][ T3668] should_fail_ex+0x223/0x230 [ 36.053390][ T3668] should_fail+0xb/0x10 [ 36.057580][ T3668] should_fail_usercopy+0x1a/0x20 [ 36.062680][ T3668] _copy_from_user+0x1e/0xb0 [ 36.067321][ T3668] move_addr_to_kernel+0x82/0x120 [ 36.072516][ T3668] __sys_connect+0x67/0x1b0 [ 36.077087][ T3668] __x64_sys_connect+0x41/0x50 [ 36.081878][ T3668] x64_sys_call+0x22a7/0x2dc0 [ 36.086680][ T3668] do_syscall_64+0xc9/0x1c0 [ 36.091213][ T3668] ? clear_bhb_loop+0x55/0xb0 [ 36.095941][ T3668] ? clear_bhb_loop+0x55/0xb0 [ 36.100725][ T3668] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.106632][ T3668] RIP: 0033:0x7f14a9e3e819 [ 36.111068][ T3668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 36.130717][ T3668] RSP: 002b:00007f14a84b7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 36.139163][ T3668] RAX: ffffffffffffffda RBX: 00007f14a9ff5fa0 RCX: 00007f14a9e3e819 [ 36.147192][ T3668] RDX: 000000000000001c RSI: 0000000020000680 RDI: 0000000000000004 [ 36.155179][ T3668] RBP: 00007f14a84b7090 R08: 0000000000000000 R09: 0000000000000000 [ 36.163170][ T3668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.171175][ T3668] R13: 0000000000000000 R14: 00007f14a9ff5fa0 R15: 00007ffc40c65e58 [ 36.179179][ T3668] [ 36.309454][ T29] audit: type=1400 audit(1732362782.738:328): avc: denied { write } for pid=3674 comm="syz.2.67" name="001" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 36.332282][ T29] audit: type=1326 audit(1732362782.738:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3673 comm="syz.1.66" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fba175ae819 code=0x7ffc0000 [ 36.355489][ T29] audit: type=1326 audit(1732362782.738:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3673 comm="syz.1.66" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fba175ae819 code=0x7ffc0000 [ 36.378787][ T29] audit: type=1326 audit(1732362782.738:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3673 comm="syz.1.66" exe="/root/syz-executor" sig=0 arch=c000003e syscall=240 compat=0 ip=0x7fba175ae819 code=0x7ffc0000 [ 36.402002][ T29] audit: type=1326 audit(1732362782.738:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3673 comm="syz.1.66" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fba175ae819 code=0x7ffc0000 [ 36.425236][ T29] audit: type=1326 audit(1732362782.738:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3673 comm="syz.1.66" exe="/root/syz-executor" sig=0 arch=c000003e syscall=245 compat=0 ip=0x7fba175ae819 code=0x7ffc0000 [ 36.448486][ T29] audit: type=1326 audit(1732362782.738:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3673 comm="syz.1.66" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fba175ae819 code=0x7ffc0000 [ 36.647816][ T29] audit: type=1400 audit(1732362782.768:335): avc: denied { connect } for pid=3674 comm="syz.2.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 36.939347][ T3686] loop4: detected capacity change from 0 to 8192 [ 37.067307][ T3692] loop1: detected capacity change from 0 to 8192 [ 37.098961][ T3701] loop4: detected capacity change from 0 to 128 [ 37.181596][ T3692] loop1: p1 p2 p3 [ 37.192048][ T3709] loop4: detected capacity change from 0 to 1764 [ 37.200667][ T3018] loop1: p1 p2 p3 [ 37.206147][ T3709] iso9660: Bad value for 'gid' [ 37.211116][ T3709] iso9660: Bad value for 'gid' [ 37.276278][ T3307] udevd[3307]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 37.277750][ T3310] udevd[3310]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 37.299908][ T3487] udevd[3487]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 37.780354][ T3726] FAULT_INJECTION: forcing a failure. [ 37.780354][ T3726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 37.793471][ T3726] CPU: 1 UID: 0 PID: 3726 Comm: syz.4.82 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 37.806515][ T3726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 37.816576][ T3726] Call Trace: [ 37.819868][ T3726] [ 37.822869][ T3726] dump_stack_lvl+0xf2/0x150 [ 37.827553][ T3726] dump_stack+0x15/0x20 [ 37.831724][ T3726] should_fail_ex+0x223/0x230 [ 37.836435][ T3726] should_fail+0xb/0x10 [ 37.840677][ T3726] should_fail_usercopy+0x1a/0x20 [ 37.845770][ T3726] _copy_to_user+0x20/0xa0 [ 37.850348][ T3726] simple_read_from_buffer+0xa0/0x110 [ 37.855759][ T3726] proc_fail_nth_read+0xf9/0x140 [ 37.860810][ T3726] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 37.866389][ T3726] vfs_read+0x1a2/0x700 [ 37.870560][ T3726] ? __rcu_read_unlock+0x4e/0x70 [ 37.875525][ T3726] ? __fget_files+0x17c/0x1c0 [ 37.880237][ T3726] ksys_read+0xe8/0x1b0 [ 37.884431][ T3726] __x64_sys_read+0x42/0x50 [ 37.889058][ T3726] x64_sys_call+0x2874/0x2dc0 [ 37.893880][ T3726] do_syscall_64+0xc9/0x1c0 [ 37.898420][ T3726] ? clear_bhb_loop+0x55/0xb0 [ 37.903123][ T3726] ? clear_bhb_loop+0x55/0xb0 [ 37.907863][ T3726] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.913794][ T3726] RIP: 0033:0x7f16ca5bd25c [ 37.918267][ T3726] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 37.937932][ T3726] RSP: 002b:00007f16c8c31030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 37.946357][ T3726] RAX: ffffffffffffffda RBX: 00007f16ca775fa0 RCX: 00007f16ca5bd25c [ 37.954357][ T3726] RDX: 000000000000000f RSI: 00007f16c8c310a0 RDI: 0000000000000006 [ 37.962413][ T3726] RBP: 00007f16c8c31090 R08: 0000000000000000 R09: 0000000000000000 [ 37.970464][ T3726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.978547][ T3726] R13: 0000000000000000 R14: 00007f16ca775fa0 R15: 00007ffc0d9025b8 [ 37.986619][ T3726] [ 38.409003][ T3752] loop4: detected capacity change from 0 to 2048 [ 38.470589][ T3752] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.484852][ T3750] FAULT_INJECTION: forcing a failure. [ 38.484852][ T3750] name failslab, interval 1, probability 0, space 0, times 0 [ 38.497655][ T3750] CPU: 0 UID: 0 PID: 3750 Comm: syz.4.87 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 38.507958][ T3750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 38.518119][ T3750] Call Trace: [ 38.521502][ T3750] [ 38.524484][ T3750] dump_stack_lvl+0xf2/0x150 [ 38.529113][ T3750] dump_stack+0x15/0x20 [ 38.533359][ T3750] should_fail_ex+0x223/0x230 [ 38.538069][ T3750] ? ext4_find_extent+0x172/0x7c0 [ 38.543203][ T3750] should_failslab+0x8f/0xb0 [ 38.547817][ T3750] __kmalloc_noprof+0xa5/0x370 [ 38.552651][ T3750] ext4_find_extent+0x172/0x7c0 [ 38.557582][ T3750] ext4_ext_map_blocks+0x11f/0x35c0 [ 38.562820][ T3750] ? bpf_prog_0f38b8827da495ce+0x43/0x47 [ 38.568467][ T3750] ? is_bpf_text_address+0x138/0x150 [ 38.573787][ T3750] ? bpf_prog_0f38b8827da495ce+0x43/0x47 [ 38.579440][ T3750] ? invalidate_inode_pages2_range+0x6ea/0x730 [ 38.585748][ T3750] ? folio_mark_accessed+0x11b/0x360 [ 38.591151][ T3750] ? down_read+0x171/0x4b0 [ 38.595646][ T3750] ext4_map_query_blocks+0x71/0x180 [ 38.600930][ T3750] ext4_map_blocks+0x23c/0xd20 [ 38.605848][ T3750] ? __ext4_journal_start_sb+0x130/0x340 [ 38.611594][ T3750] ext4_iomap_begin+0x4a9/0x5d0 [ 38.616518][ T3750] iomap_iter+0x3cc/0x800 [ 38.620890][ T3750] ? __pfx_ext4_iomap_begin+0x10/0x10 [ 38.626380][ T3750] __iomap_dio_rw+0x6e9/0x1110 [ 38.631235][ T3750] ? __pfx_ext4_xattr_security_get+0x10/0x10 [ 38.637258][ T3750] iomap_dio_rw+0x40/0x90 [ 38.641614][ T3750] ext4_file_write_iter+0xb71/0xf20 [ 38.646935][ T3750] vfs_write+0x77f/0x920 [ 38.651218][ T3750] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 38.657033][ T3750] ksys_write+0xe8/0x1b0 [ 38.661408][ T3750] __x64_sys_write+0x42/0x50 [ 38.666113][ T3750] x64_sys_call+0x287e/0x2dc0 [ 38.670894][ T3750] do_syscall_64+0xc9/0x1c0 [ 38.675461][ T3750] ? clear_bhb_loop+0x55/0xb0 [ 38.680192][ T3750] ? clear_bhb_loop+0x55/0xb0 [ 38.685139][ T3750] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 38.691073][ T3750] RIP: 0033:0x7f16ca5be819 [ 38.695515][ T3750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.715178][ T3750] RSP: 002b:00007f16c8c31038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 38.723696][ T3750] RAX: ffffffffffffffda RBX: 00007f16ca775fa0 RCX: 00007f16ca5be819 [ 38.731699][ T3750] RDX: 00000000175d9003 RSI: 0000000020000200 RDI: 0000000000000004 [ 38.739715][ T3750] RBP: 00007f16c8c31090 R08: 0000000000000000 R09: 0000000000000000 [ 38.747727][ T3750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.755715][ T3750] R13: 0000000000000000 R14: 00007f16ca775fa0 R15: 00007ffc0d9025b8 [ 38.763713][ T3750] [ 38.844232][ T3324] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.858752][ T3771] loop2: detected capacity change from 0 to 512 [ 38.879171][ T3771] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 38.892470][ T3771] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 38.916986][ T3771] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2863: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 38.938137][ T3771] EXT4-fs (loop2): 1 truncate cleaned up [ 38.938484][ T3777] capability: warning: `syz.4.94' uses 32-bit capabilities (legacy support in use) [ 38.944191][ T3771] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.997981][ T3779] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 39.010563][ T3325] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.189514][ T3791] netlink: 40 bytes leftover after parsing attributes in process `syz.0.100'. [ 39.210894][ T3791] mmap: syz.0.100 (3791) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 39.293983][ T3795] ip6t_rpfilter: unknown options [ 39.385488][ T3808] loop4: detected capacity change from 0 to 128 [ 39.400134][ T3806] loop0: detected capacity change from 0 to 512 [ 39.414921][ T3806] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 39.428323][ T3814] FAULT_INJECTION: forcing a failure. [ 39.428323][ T3814] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 39.441661][ T3814] CPU: 1 UID: 0 PID: 3814 Comm: syz.2.111 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 39.449029][ T3813] loop1: detected capacity change from 0 to 2048 [ 39.451922][ T3814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 39.451939][ T3814] Call Trace: [ 39.451946][ T3814] [ 39.451959][ T3814] dump_stack_lvl+0xf2/0x150 [ 39.479200][ T3814] dump_stack+0x15/0x20 [ 39.483379][ T3814] should_fail_ex+0x223/0x230 [ 39.488074][ T3814] should_fail_alloc_page+0xfd/0x110 [ 39.493422][ T3814] __alloc_pages_noprof+0x109/0x340 [ 39.498739][ T3814] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 39.504172][ T3814] vma_alloc_folio_noprof+0x1a0/0x2f0 [ 39.509577][ T3814] handle_mm_fault+0xdbe/0x2aa0 [ 39.514450][ T3814] exc_page_fault+0x3b9/0x650 [ 39.519217][ T3814] asm_exc_page_fault+0x26/0x30 [ 39.524158][ T3814] RIP: 0033:0x7f14a9d01900 [ 39.528650][ T3814] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 39.548629][ T3814] RSP: 002b:00007f14a84b64a0 EFLAGS: 00010206 [ 39.554756][ T3814] RAX: 0000000000001000 RBX: 00007f14a84b6540 RCX: 0000000000000003 [ 39.562731][ T3814] RDX: 0000000000007fef RSI: 0000000000000bf0 RDI: 00007f14a84b65e0 [ 39.570702][ T3814] RBP: 0000000000000004 R08: 00007f14a0097000 R09: 000000000000000f [ 39.578675][ T3814] R10: 0000000020000b02 R11: 00000000000004f0 R12: 0000000000000801 [ 39.586683][ T3814] R13: 00007f14a9ec5fa0 R14: 0000000000000016 R15: 00007f14a84b65e0 [ 39.594687][ T3814] [ 39.597839][ T3814] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 39.614455][ T3814] loop2: detected capacity change from 0 to 512 [ 39.630935][ T3806] EXT4-fs (loop0): 1 truncate cleaned up [ 39.641013][ T3806] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.667565][ T3813] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.687037][ T3814] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 39.695612][ T3814] EXT4-fs (loop2): orphan cleanup on readonly fs [ 39.695852][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.711349][ T3814] EXT4-fs warning (device loop2): ext4_enable_quotas:7156: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 39.731260][ T3814] EXT4-fs (loop2): Cannot turn on quotas: error -117 [ 39.731865][ T3823] hsr0: entered promiscuous mode [ 39.738280][ T3814] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz.2.111: bg 0: block 40: padding at end of block bitmap is not set [ 39.757428][ T3814] EXT4-fs error (device loop2) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 39.769560][ T3814] EXT4-fs (loop2): 1 truncate cleaned up [ 39.775719][ T3814] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 39.795404][ T3317] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.817228][ T3325] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.839426][ C1] hrtimer: interrupt took 37530 ns [ 39.905413][ T3829] loop4: detected capacity change from 0 to 512 [ 39.981125][ T3829] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 40.042926][ T3829] EXT4-fs (loop4): orphan cleanup on readonly fs [ 40.061072][ T3850] netlink: 56 bytes leftover after parsing attributes in process `syz.3.122'. [ 40.070137][ T3850] tipc: Enabling of bearer <^dp:s> rejected, media not registered [ 40.113934][ T3829] EXT4-fs warning (device loop4): ext4_enable_quotas:7156: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 40.170679][ T3829] EXT4-fs (loop4): Cannot turn on quotas: error -117 [ 40.177897][ T3829] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.113: bg 0: block 40: padding at end of block bitmap is not set [ 40.200119][ T3829] EXT4-fs error (device loop4) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 40.218712][ T3855] netlink: 4 bytes leftover after parsing attributes in process `syz.2.124'. [ 40.231679][ T3829] EXT4-fs (loop4): 1 truncate cleaned up [ 40.257810][ T3829] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 40.365240][ T3861] loop1: detected capacity change from 0 to 512 [ 40.415237][ T3861] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 40.680340][ T3861] EXT4-fs (loop1): 1 truncate cleaned up [ 40.737924][ T3324] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.749971][ T3861] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.926905][ T29] kauditd_printk_skb: 398 callbacks suppressed [ 40.926923][ T29] audit: type=1326 audit(1732362787.358:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3870 comm="syz.0.129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=245 compat=0 ip=0x7f2516dee819 code=0x7ffc0000 [ 40.995183][ T29] audit: type=1326 audit(1732362787.398:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3870 comm="syz.0.129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2516dee819 code=0x7ffc0000 [ 41.054926][ T3317] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.074237][ T3875] netlink: 56 bytes leftover after parsing attributes in process `syz.0.131'. [ 41.083175][ T3875] tipc: Enabling of bearer <^dp:s> rejected, media not registered [ 41.220448][ T3889] netlink: 4 bytes leftover after parsing attributes in process `syz.3.136'. [ 41.425199][ T3891] loop2: detected capacity change from 0 to 8192 [ 41.463978][ T29] audit: type=1400 audit(1732362787.888:734): avc: denied { getopt } for pid=3896 comm="syz.4.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 41.483319][ T29] audit: type=1400 audit(1732362787.888:735): avc: denied { write } for pid=3896 comm="syz.4.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 41.620168][ T3891] loop2: p1 p2 p3 [ 41.673564][ T3487] udevd[3487]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 41.705619][ T3307] udevd[3307]: inotify_add_watch(7, /dev/loop2p3, 10) failed: No such file or directory [ 41.716509][ T3714] udevd[3714]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 41.725753][ T29] audit: type=1326 audit(1732362788.148:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3890 comm="syz.2.137" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f14a9e3e819 code=0x7ffc0000 [ 41.749609][ T29] audit: type=1326 audit(1732362788.158:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3890 comm="syz.2.137" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f14a9e3e819 code=0x7ffc0000 [ 41.772980][ T29] audit: type=1326 audit(1732362788.158:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3890 comm="syz.2.137" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f14a9e3e819 code=0x7ffc0000 [ 41.796228][ T29] audit: type=1326 audit(1732362788.158:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3890 comm="syz.2.137" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f14a9e3e819 code=0x7ffc0000 [ 41.820125][ T29] audit: type=1326 audit(1732362788.158:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3890 comm="syz.2.137" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f14a9e3e819 code=0x7ffc0000 [ 41.843331][ T29] audit: type=1326 audit(1732362788.158:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3890 comm="syz.2.137" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f14a9e3e819 code=0x7ffc0000 [ 41.859052][ T3901] loop0: detected capacity change from 0 to 512 [ 41.886790][ T3901] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.140: bg 0: block 393: padding at end of block bitmap is not set [ 41.903773][ T3901] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 41.930149][ T3901] EXT4-fs (loop0): 2 truncates cleaned up [ 41.936338][ T3901] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.980809][ T3901] FAULT_INJECTION: forcing a failure. [ 41.980809][ T3901] name failslab, interval 1, probability 0, space 0, times 0 [ 41.993512][ T3901] CPU: 1 UID: 0 PID: 3901 Comm: syz.0.140 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 42.003802][ T3901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 42.013900][ T3901] Call Trace: [ 42.017198][ T3901] [ 42.020147][ T3901] dump_stack_lvl+0xf2/0x150 [ 42.024848][ T3901] dump_stack+0x15/0x20 [ 42.029116][ T3901] should_fail_ex+0x223/0x230 [ 42.033810][ T3901] ? getname_flags+0x81/0x3b0 [ 42.038488][ T3901] should_failslab+0x8f/0xb0 [ 42.043071][ T3901] kmem_cache_alloc_noprof+0x4c/0x290 [ 42.048530][ T3901] getname_flags+0x81/0x3b0 [ 42.053055][ T3901] getname+0x17/0x20 [ 42.056970][ T3901] do_sys_openat2+0x67/0x120 [ 42.061563][ T3901] __x64_sys_openat+0xf3/0x120 [ 42.066342][ T3901] x64_sys_call+0x2b30/0x2dc0 [ 42.071028][ T3901] do_syscall_64+0xc9/0x1c0 [ 42.075535][ T3901] ? clear_bhb_loop+0x55/0xb0 [ 42.080344][ T3901] ? clear_bhb_loop+0x55/0xb0 [ 42.085157][ T3901] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.091106][ T3901] RIP: 0033:0x7f2516dee819 [ 42.095526][ T3901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.115215][ T3901] RSP: 002b:00007f2515467038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 42.123643][ T3901] RAX: ffffffffffffffda RBX: 00007f2516fa5fa0 RCX: 00007f2516dee819 [ 42.131604][ T3901] RDX: 00000000000026e1 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 42.139568][ T3901] RBP: 00007f2515467090 R08: 0000000000000000 R09: 0000000000000000 [ 42.147671][ T3901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.155672][ T3901] R13: 0000000000000000 R14: 00007f2516fa5fa0 R15: 00007ffdd0090c58 [ 42.163655][ T3901] [ 42.258751][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.287667][ T3918] loop3: detected capacity change from 0 to 8192 [ 42.424095][ T3929] netlink: 4 bytes leftover after parsing attributes in process `syz.0.149'. [ 42.457222][ T3931] loop4: detected capacity change from 0 to 8192 [ 42.603819][ T3944] loop3: detected capacity change from 0 to 1024 [ 42.629043][ T3931] loop4: p1 p2 p3 [ 42.678041][ T3018] loop4: p1 p2 p3 [ 42.878976][ T3956] FAULT_INJECTION: forcing a failure. [ 42.878976][ T3956] name failslab, interval 1, probability 0, space 0, times 0 [ 42.891674][ T3956] CPU: 1 UID: 0 PID: 3956 Comm: syz.1.161 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 42.901942][ T3956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 42.912103][ T3956] Call Trace: [ 42.915467][ T3956] [ 42.918457][ T3956] dump_stack_lvl+0xf2/0x150 [ 42.923082][ T3956] dump_stack+0x15/0x20 [ 42.927282][ T3956] should_fail_ex+0x223/0x230 [ 42.930864][ T3307] udevd[3307]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 42.931987][ T3956] ? audit_log_start+0x34c/0x6b0 [ 42.943277][ T3487] udevd[3487]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 42.946643][ T3956] should_failslab+0x8f/0xb0 [ 42.957943][ T3310] udevd[3310]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 42.960998][ T3956] kmem_cache_alloc_noprof+0x4c/0x290 [ 42.976267][ T3956] audit_log_start+0x34c/0x6b0 [ 42.981228][ T3956] audit_seccomp+0x4b/0x130 [ 42.985880][ T3956] __seccomp_filter+0x6fa/0x1180 [ 42.990841][ T3956] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 42.996519][ T3956] ? vfs_write+0x596/0x920 [ 43.001057][ T3956] ? __schedule+0x6fa/0x930 [ 43.005711][ T3956] __secure_computing+0x9f/0x1c0 [ 43.010730][ T3956] syscall_trace_enter+0xd1/0x1f0 [ 43.015869][ T3956] do_syscall_64+0xaa/0x1c0 [ 43.020443][ T3956] ? clear_bhb_loop+0x55/0xb0 [ 43.025194][ T3956] ? clear_bhb_loop+0x55/0xb0 [ 43.029898][ T3956] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.035954][ T3956] RIP: 0033:0x7fba175ae819 [ 43.040390][ T3956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.060022][ T3956] RSP: 002b:00007fba15c27038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 43.065872][ T3944] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 43.068461][ T3956] RAX: ffffffffffffffda RBX: 00007fba17765fa0 RCX: 00007fba175ae819 [ 43.068480][ T3956] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000000 [ 43.068496][ T3956] RBP: 00007fba15c27090 R08: 0000000000000002 R09: 0000000000000000 [ 43.068512][ T3956] R10: 0000000020ffc000 R11: 0000000000000246 R12: 0000000000000001 [ 43.112379][ T3956] R13: 0000000000000000 R14: 00007fba17765fa0 R15: 00007ffc0d05f2f8 [ 43.120399][ T3956] [ 43.133165][ T3949] netlink: 4 bytes leftover after parsing attributes in process `syz.0.157'. [ 43.142967][ T3949] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 43.150638][ T3949] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 43.161244][ T3316] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.172108][ T3949] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 43.179671][ T3949] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 43.225582][ T3963] FAULT_INJECTION: forcing a failure. [ 43.225582][ T3963] name failslab, interval 1, probability 0, space 0, times 0 [ 43.238339][ T3963] CPU: 1 UID: 0 PID: 3963 Comm: syz.3.163 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 43.248670][ T3963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 43.258847][ T3963] Call Trace: [ 43.262151][ T3963] [ 43.265083][ T3963] dump_stack_lvl+0xf2/0x150 [ 43.269765][ T3963] dump_stack+0x15/0x20 [ 43.274035][ T3963] should_fail_ex+0x223/0x230 [ 43.278820][ T3963] ? audit_log_start+0x34c/0x6b0 [ 43.283779][ T3963] should_failslab+0x8f/0xb0 [ 43.288452][ T3963] kmem_cache_alloc_noprof+0x4c/0x290 [ 43.293851][ T3963] audit_log_start+0x34c/0x6b0 [ 43.298637][ T3963] audit_seccomp+0x4b/0x130 [ 43.303276][ T3963] __seccomp_filter+0x6fa/0x1180 [ 43.308219][ T3963] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 43.313859][ T3963] ? vfs_write+0x596/0x920 [ 43.318300][ T3963] __secure_computing+0x9f/0x1c0 [ 43.323303][ T3963] syscall_trace_enter+0xd1/0x1f0 [ 43.328415][ T3963] ? fpregs_assert_state_consistent+0x83/0xa0 [ 43.334502][ T3963] do_syscall_64+0xaa/0x1c0 [ 43.339075][ T3963] ? clear_bhb_loop+0x55/0xb0 [ 43.343774][ T3963] ? clear_bhb_loop+0x55/0xb0 [ 43.348464][ T3963] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.354435][ T3963] RIP: 0033:0x7f194e27e819 [ 43.358855][ T3963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.378475][ T3963] RSP: 002b:00007f194c8f1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 43.386896][ T3963] RAX: ffffffffffffffda RBX: 00007f194e435fa0 RCX: 00007f194e27e819 [ 43.394872][ T3963] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 43.402845][ T3963] RBP: 00007f194c8f1090 R08: 0000000000000000 R09: 0000000000000000 [ 43.410871][ T3963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.418855][ T3963] R13: 0000000000000000 R14: 00007f194e435fa0 R15: 00007fff08e75e98 [ 43.426864][ T3963] [ 43.462134][ T3964] loop2: detected capacity change from 0 to 8192 [ 43.480105][ T3969] FAULT_INJECTION: forcing a failure. [ 43.480105][ T3969] name failslab, interval 1, probability 0, space 0, times 0 [ 43.492894][ T3969] CPU: 1 UID: 0 PID: 3969 Comm: syz.3.166 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 43.503232][ T3969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 43.513305][ T3969] Call Trace: [ 43.516579][ T3969] [ 43.519583][ T3969] dump_stack_lvl+0xf2/0x150 [ 43.524206][ T3969] dump_stack+0x15/0x20 [ 43.528412][ T3969] should_fail_ex+0x223/0x230 [ 43.533222][ T3969] ? audit_log_start+0x34c/0x6b0 [ 43.538228][ T3969] should_failslab+0x8f/0xb0 [ 43.542984][ T3969] kmem_cache_alloc_noprof+0x4c/0x290 [ 43.548393][ T3969] audit_log_start+0x34c/0x6b0 [ 43.553185][ T3969] audit_seccomp+0x4b/0x130 [ 43.557770][ T3969] __seccomp_filter+0x6fa/0x1180 [ 43.562766][ T3969] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 43.568514][ T3969] ? vfs_write+0x596/0x920 [ 43.572984][ T3969] __secure_computing+0x9f/0x1c0 [ 43.577920][ T3969] syscall_trace_enter+0xd1/0x1f0 [ 43.582996][ T3969] ? fpregs_assert_state_consistent+0x83/0xa0 [ 43.589130][ T3969] do_syscall_64+0xaa/0x1c0 [ 43.593758][ T3969] ? clear_bhb_loop+0x55/0xb0 [ 43.598474][ T3969] ? clear_bhb_loop+0x55/0xb0 [ 43.603170][ T3969] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.609077][ T3969] RIP: 0033:0x7f194e27e819 [ 43.613502][ T3969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.633183][ T3969] RSP: 002b:00007f194c8f1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 43.641595][ T3969] RAX: ffffffffffffffda RBX: 00007f194e435fa0 RCX: 00007f194e27e819 [ 43.649571][ T3969] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000000 [ 43.657580][ T3969] RBP: 00007f194c8f1090 R08: 0000000000000002 R09: 0000000000000000 [ 43.665551][ T3969] R10: 0000000020ffc000 R11: 0000000000000246 R12: 0000000000000001 [ 43.673532][ T3969] R13: 0000000000000000 R14: 00007f194e435fa0 R15: 00007fff08e75e98 [ 43.681530][ T3969] [ 43.686417][ T3966] loop1: detected capacity change from 0 to 1024 [ 43.701154][ T3966] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 43.719326][ T3966] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 43.727650][ T3966] EXT4-fs (loop1): orphan cleanup on readonly fs [ 43.745981][ T3966] EXT4-fs error (device loop1) in ext4_reserve_inode_write:5837: Corrupt filesystem [ 43.758999][ T3966] EXT4-fs (loop1): Remounting filesystem read-only [ 43.765693][ T3966] EXT4-fs (loop1): 1 orphan inode deleted [ 43.786194][ T3966] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 43.803689][ T3978] loop0: detected capacity change from 0 to 128 [ 43.815164][ T3966] SELinux: (dev loop1, type ext4) getxattr errno 5 [ 43.825455][ T3966] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.888279][ T3982] netlink: 'syz.4.172': attribute type 2 has an invalid length. [ 43.896665][ T3980] loop3: detected capacity change from 0 to 512 [ 43.897400][ T3982] netlink: 2 bytes leftover after parsing attributes in process `syz.4.172'. [ 43.912764][ T3982] netlink: 2 bytes leftover after parsing attributes in process `syz.4.172'. [ 43.927132][ T3966] +}[@[3966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.927263][ T3966] +}[@[3966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.938716][ T3966] +}[@[3966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.950965][ T3980] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 43.977619][ T3966] +}[@ (3966) used greatest stack depth: 9752 bytes left [ 44.010636][ T3982] loop4: detected capacity change from 0 to 1024 [ 44.024226][ T3982] ext4: Unknown parameter 'audit' [ 44.037673][ T3980] EXT4-fs (loop3): shut down requested (2) [ 44.097341][ T3994] loop4: detected capacity change from 0 to 2048 [ 44.109820][ T3988] debugfs: Directory 'ttyS3' with parent 'caif_serial' already present! [ 44.120614][ T3994] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 44.136040][ T3316] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.194942][ T4005] loop2: detected capacity change from 0 to 512 [ 44.322861][ T4004] loop3: detected capacity change from 0 to 8192 [ 44.370524][ T4014] FAULT_INJECTION: forcing a failure. [ 44.370524][ T4014] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.383928][ T4014] CPU: 1 UID: 0 PID: 4014 Comm: syz.4.176 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 44.394201][ T4014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 44.404270][ T4014] Call Trace: [ 44.407562][ T4014] [ 44.410521][ T4014] dump_stack_lvl+0xf2/0x150 [ 44.415151][ T4014] dump_stack+0x15/0x20 [ 44.419419][ T4014] should_fail_ex+0x223/0x230 [ 44.424204][ T4014] should_fail+0xb/0x10 [ 44.428423][ T4014] should_fail_usercopy+0x1a/0x20 [ 44.433473][ T4014] _copy_from_user+0x1e/0xb0 [ 44.438193][ T4014] __se_sys_msgctl+0x20e/0x290 [ 44.443052][ T4014] __x64_sys_msgctl+0x43/0x50 [ 44.447739][ T4014] x64_sys_call+0x2c98/0x2dc0 [ 44.452452][ T4014] do_syscall_64+0xc9/0x1c0 [ 44.456979][ T4014] ? clear_bhb_loop+0x55/0xb0 [ 44.461694][ T4014] ? clear_bhb_loop+0x55/0xb0 [ 44.466397][ T4014] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.472295][ T4014] RIP: 0033:0x7f16ca5be819 [ 44.476757][ T4014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.496379][ T4014] RSP: 002b:00007f16c8c10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000047 [ 44.504802][ T4014] RAX: ffffffffffffffda RBX: 00007f16ca776080 RCX: 00007f16ca5be819 [ 44.512844][ T4014] RDX: 0000000020000040 RSI: 0000000000000001 RDI: 0000000000000000 [ 44.520902][ T4014] RBP: 00007f16c8c10090 R08: 0000000000000000 R09: 0000000000000000 [ 44.528876][ T4014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.536851][ T4014] R13: 0000000000000000 R14: 00007f16ca776080 R15: 00007ffc0d9025b8 [ 44.544840][ T4014] [ 44.577055][ T4025] netlink: 8 bytes leftover after parsing attributes in process `syz.2.183'. [ 44.590137][ T4022] FAULT_INJECTION: forcing a failure. [ 44.590137][ T4022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.603309][ T4022] CPU: 0 UID: 0 PID: 4022 Comm: syz.1.182 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 44.613578][ T4022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 44.623700][ T4022] Call Trace: [ 44.627090][ T4022] [ 44.630039][ T4022] dump_stack_lvl+0xf2/0x150 [ 44.634736][ T4022] dump_stack+0x15/0x20 [ 44.638936][ T4022] should_fail_ex+0x223/0x230 [ 44.643696][ T4022] should_fail+0xb/0x10 [ 44.647875][ T4022] should_fail_usercopy+0x1a/0x20 [ 44.652962][ T4022] copy_fpstate_to_sigframe+0x5db/0x780 [ 44.658619][ T4022] ? copy_fpstate_to_sigframe+0xe7/0x780 [ 44.664276][ T4022] ? dequeue_signal+0x332/0x370 [ 44.669181][ T4022] ? fpu__alloc_mathframe+0x95/0xd0 [ 44.674462][ T4022] get_sigframe+0x2f3/0x430 [ 44.679002][ T4022] x64_setup_rt_frame+0xad/0x590 [ 44.683966][ T4022] arch_do_signal_or_restart+0x287/0x4b0 [ 44.689621][ T4022] syscall_exit_to_user_mode+0x62/0x120 [ 44.695233][ T4022] do_syscall_64+0xd6/0x1c0 [ 44.699768][ T4022] ? clear_bhb_loop+0x55/0xb0 [ 44.704470][ T4022] ? clear_bhb_loop+0x55/0xb0 [ 44.709193][ T4022] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.715123][ T4022] RIP: 0033:0x7fba175ae819 [ 44.719641][ T4022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.739251][ T4022] RSP: 002b:00007fba15c27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 44.747667][ T4022] RAX: fffffffffffffffc RBX: 00007fba17765fa0 RCX: 00007fba175ae819 [ 44.755646][ T4022] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 44.763613][ T4022] RBP: 00007fba15c27090 R08: 0000000000000000 R09: 0000000000000000 [ 44.771627][ T4022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 44.779621][ T4022] R13: 0000000000000000 R14: 00007fba17765fa0 R15: 00007ffc0d05f2f8 [ 44.787646][ T4022] [ 44.958505][ T4043] netlink: 20 bytes leftover after parsing attributes in process `syz.1.185'. [ 44.958721][ T3324] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.047466][ T4055] loop4: detected capacity change from 0 to 512 [ 45.074643][ T4055] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 45.091459][ T4055] EXT4-fs (loop4): shut down requested (2) [ 45.162683][ T3324] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.353969][ T4079] loop0: detected capacity change from 0 to 2048 [ 45.376875][ T4070] loop4: detected capacity change from 0 to 8192 [ 45.434759][ T4079] Alternate GPT is invalid, using primary GPT. [ 45.441387][ T4079] loop0: p2 p3 p7 [ 45.471223][ T4079] netlink: 16 bytes leftover after parsing attributes in process `syz.0.198'. [ 45.508288][ T4085] serio: Serial port ptm0 [ 45.518033][ T4085] Cannot find add_set index 4 as target [ 45.546349][ T3018] ================================================================== [ 45.554480][ T3018] BUG: KCSAN: data-race in set_nlink / set_nlink [ 45.560882][ T3018] [ 45.563220][ T3018] write to 0xffff888105014c50 of 4 bytes by task 3714 on cpu 1: [ 45.570864][ T3018] set_nlink+0x98/0xb0 [ 45.574976][ T3018] kernfs_iop_permission+0x1c8/0x210 [ 45.580299][ T3018] inode_permission+0x18c/0x300 [ 45.585174][ T3018] link_path_walk+0x14b/0x820 [ 45.589880][ T3018] path_openat+0x1af/0x1fa0 [ 45.594413][ T3018] do_filp_open+0x107/0x230 [ 45.598976][ T3018] do_sys_openat2+0xab/0x120 [ 45.603592][ T3018] __x64_sys_openat+0xf3/0x120 [ 45.608382][ T3018] x64_sys_call+0x2b30/0x2dc0 [ 45.613093][ T3018] do_syscall_64+0xc9/0x1c0 [ 45.617630][ T3018] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.623561][ T3018] [ 45.625892][ T3018] read to 0xffff888105014c50 of 4 bytes by task 3018 on cpu 0: [ 45.633453][ T3018] set_nlink+0x2b/0xb0 [ 45.637638][ T3018] kernfs_iop_permission+0x1c8/0x210 [ 45.642943][ T3018] inode_permission+0x18c/0x300 [ 45.647818][ T3018] link_path_walk+0x14b/0x820 [ 45.652510][ T3018] path_lookupat+0x72/0x2b0 [ 45.657030][ T3018] filename_lookup+0x150/0x340 [ 45.661809][ T3018] vfs_statx+0x9a/0x170 [ 45.665984][ T3018] __se_sys_newfstatat+0xdc/0x300 [ 45.671021][ T3018] __x64_sys_newfstatat+0x55/0x70 [ 45.676061][ T3018] x64_sys_call+0x236d/0x2dc0 [ 45.680751][ T3018] do_syscall_64+0xc9/0x1c0 [ 45.685273][ T3018] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.691173][ T3018] [ 45.693496][ T3018] value changed: 0x0000000b -> 0x00000008 [ 45.699218][ T3018] [ 45.701540][ T3018] Reported by Kernel Concurrency Sanitizer on: [ 45.707700][ T3018] CPU: 0 UID: 0 PID: 3018 Comm: udevd Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0 [ 45.717597][ T3018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 45.727842][ T3018] ================================================================== [ 45.737159][ T4093] loop0: detected capacity change from 0 to 2048 [ 45.785564][ T3487] Alternate GPT is invalid, using primary GPT. [ 45.792087][ T3487] loop0: p2 p3 p7 [ 45.811983][ T4093] Alternate GPT is invalid, using primary GPT. [ 45.818471][ T4093] loop0: p2 p3 p7 [ 45.862495][ T3714] udevd[3714]: inotify_add_watch(7, /dev/loop0p3, 10) failed: No such file or directory [ 45.876284][ T3487] udevd[3487]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 45.888995][ T3307] udevd[3307]: inotify_add_watch(7, /dev/loop0p7, 10) failed: No such file or directory [ 45.904605][ T3714] udevd[3714]: inotify_add_watch(7, /dev/loop0p3, 10) failed: No such file or directory [ 45.916184][ T3307] udevd[3307]: inotify_add_watch(7, /dev/loop0p7, 10) failed: No such file or directory [ 45.928030][ T3487] udevd[3487]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory