last executing test programs: 2.637652909s ago: executing program 3 (id=4276): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioperm(0x401, 0x20, 0x10004) ioprio_get$uid(0x3, 0xee01) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) socket$kcm(0x2, 0xa, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x1c0002, 0x0) write$vga_arbiter(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="6c6f636b207d6f2b6d656d0061ab19f6e7d3c10979458436f214b27be0feba820c7a4eaa433fedd1e6"], 0xc) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES16=r0, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bba200000000000007020000f8ffffffb7030068694afd00080000009406000000000000850000005900000095d7e91f2affaf3176d862908d2d15b65b113d43e2d3f374ea1dd3dbc97f07d6e39b490e67a446973dad554b5a0365ac026bcbe425723d991f1c6870ccc57a0c2627ad0a6f6e52b9cbf6049fc75f73eb1e96a2c257535776e1d0df2d1ef2cc3d27c343a2", @ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) lseek(0xffffffffffffffff, 0x1, 0x0) r5 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000258f88)) msgsnd(r5, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0) msgrcv(r5, 0x0, 0x0, 0x1, 0x1000) msgrcv(r5, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000258f88)={{0x1}, 0x0, 0x0, 0x800000000000000, 0x9, 0x2000002, 0x0, 0x3, 0xe9, 0x0, 0x5, 0x0, 0xffffffffffffffff}) msgctl$IPC_STAT(r5, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40048d0}, 0x0) shmdt(0x0) write$vga_arbiter(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="756e6c6f636b608b6f2b6d230200"], 0xe) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0xa0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 1.740397753s ago: executing program 3 (id=4301): ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x40505330, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) dup(r0) open(&(0x7f0000000000)='./bus\x00', 0x44542, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3000002, 0x42032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) syz_usbip_server_init(0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 1.705620043s ago: executing program 0 (id=4302): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r2, &(0x7f00000003c0)=[{&(0x7f0000033a80)=""/102386, 0x18ff2}, {&(0x7f0000000580)=""/154, 0x9a}], 0x2, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r3, &(0x7f0000002800)=[{&(0x7f0000002500)='\f7', 0x45}], 0x1) write$cgroup_pid(r3, &(0x7f00000031c0), 0x12) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0xffffff6a) 1.421273064s ago: executing program 0 (id=4314): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x6, &(0x7f00000002c0)=[{0x10, 0x2, 0x14, 0x20006}, {0x7, 0x1, 0x0, 0x3}, {0x3, 0xfc, 0x9, 0xd34}, {0xfffe, 0x8, 0x5, 0x6}, {0x4, 0x0, 0x6, 0x5a1}, {0x2, 0x4, 0x3, 0x1}]}) mq_open(&(0x7f0000002740)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x100, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xff, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xb, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES16=r0, @ANYRES64=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095c36dab9c17d3ed48a974dfa8a4c9931ecee42d437260fed1041ac2d21695416a12634a07d9a90a874e4c3bbb70863b9098d5d975885967a0cd797e948cd31c6c8a01893e13a7873e99f87fbd06c756f8556a7b4cfeee21a67182795781daf252e104f528fa519a7a6ae97e21530dd1532660d8ef4caa31d130e79f7c21dce1d963f9b391af83763830d8f5a5"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) rt_sigaction(0x12, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) 1.397927114s ago: executing program 0 (id=4316): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r2, &(0x7f00000003c0)=[{&(0x7f0000033a80)=""/102386, 0x18ff2}, {&(0x7f0000000580)=""/154, 0x9a}], 0x2, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$cgroup_pid(r3, &(0x7f00000031c0), 0x12) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) 1.343582574s ago: executing program 0 (id=4319): r0 = syz_io_uring_setup(0x82e, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x40000000}, &(0x7f0000000100), &(0x7f0000000280)) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000080}, 0xc040) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x23, &(0x7f0000000040)=""/32, &(0x7f0000000080)=0x20) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r2, &(0x7f0000000380)=ANY=[], 0xff2e) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x0, "a05c7b5d00008023e9c5bcf5ff7700"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xff, 0x0, "f957c9c46b9ca1d1"}) r4 = dup3(r3, r2, 0x0) io_setup(0x3, &(0x7f00000003c0)=0x0) io_submit(r5, 0x2, &(0x7f0000000b80)=[&(0x7f0000000380)={0x503, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) getresuid(0x0, 0x0, &(0x7f00000002c0)=0x0) quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000080)=@filename='./file0\x00', r6, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000280)=0x0) quotactl$Q_QUOTAOFF(0xffffffff80000301, &(0x7f0000000200)=@loop={'/dev/loop', 0x0}, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) splice(r8, &(0x7f0000000940)=0x9, r3, &(0x7f0000000980)=0x154, 0x3, 0x7) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r10 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r11, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0x6}, {0xffffffffffffff7f, 0x2, [@TCA_FQ_CODEL_CE_THRESHOLD_MASK={0x5, 0xb, 0x1}, @TCA_FQ_CODEL_LIMIT={0x8, 0x2, 0x2}, @TCA_FQ_CODEL_INTERVAL={0x8, 0x3, 0xf384}, @TCA_FQ_CODEL_FLOWS={0x8, 0x5, 0xffffffff}, @TCA_FQ_CODEL_FLOWS={0x8}, @TCA_FQ_CODEL_DROP_BATCH_SIZE={0x8}, @TCA_FQ_CODEL_ECN={0x8}]}}, @TCA_RATE={0x6, 0x5, {0x4}}]}, 0x78}}, 0x0) r12 = getegid() setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x5, 0x57e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000000), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0x2, 0x2, [{0x11, 0xa, 0xf8, 'batadv0\x00', 'pim6reg0\x00', 'batadv_slave_0\x00', 'nr0\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}, [0xff, 0x0, 0x0, 0xff, 0xff], 0xae, 0x12e, 0x166, [@owner={{'owner\x00', 0x0, 0x18}, {{r6, r7, r9, r12, 0x4, 0x3}}}], [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7, 'syz0\x00', {0x8000000000000000}}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x4}}}], @common=@dnat={'dnat\x00', 0x10, {{@dev={'\xaa\xaa\xaa\xaa\xaa', 0xe}, 0xfffffffffffffffc}}}}, {0x9, 0x11, 0x6005, 'veth1_to_bond\x00', 'ip6gre0\x00', 'veth1_to_hsr\x00', 'netpci0\x00', @broadcast, [0xff, 0x1fe, 0x0, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0x0, 0xff, 0xff], 0x6e, 0x6e, 0x9e, [], [], @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x11, 0xe, 0x805, 'caif0\x00', 'macsec0\x00', 'pimreg\x00', 'wg2\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x34}, [0x0, 0xff, 0xff, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x6e, 0x6e, 0x9e, [], [], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x2, [{0x5, 0x6a, 0xdada, 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'syzkaller0\x00', 'bond_slave_1\x00', @local, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @random="ece32de7b797", [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0xa6, 0xd6, 0x106, [@mac={{'mac\x00', 0x0, 0x10}, {{@random="8164748a71f2"}}}], [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}], @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffd}}}}, {0x11, 0x50, 0x6001, 'bond0\x00', 'pimreg0\x00', 'pim6reg0\x00', 'hsr0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @remote, [0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0x116, 0x146, [], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8}}}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0xff, 0x3, 0x0, 0x0, "eabb433b7fffa5320b76932fb92d8042cb0297fce63f02598419b40072f08d963b0c9704e126a90361ae5aac191ecfcd1814f5e31bc30a20612064b8526396d9"}}}], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}]}]}, 0x5f6) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x22, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0}, {0x0}]}, 0x2}, 0x1) 1.338093574s ago: executing program 4 (id=4320): r0 = socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2040400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000200000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0004000000"], 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed7f0000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b000000070000000100010009000000010000"], 0x5c) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x7fffffff, 0x0, r4, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'netdevsim0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='mm_page_free\x00', r3}, 0x18) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0eddff000400080200000600000000000089", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sendfile(r10, r10, 0x0, 0xee0c) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') quotactl$Q_GETNEXTQUOTA(0x0, &(0x7f0000002040)=@filename='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1050f0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2904, 0x4, 0x4, 0x0, 0x0, 0xfffffffe, 0xffff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f00000002c0)=""/64) 1.178894815s ago: executing program 4 (id=4324): perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x62, 0x1}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, @private0, @remote, 0x8, 0x4, 0x5, 0x400, 0x18b1, 0x84000100}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) getpgrp(0x0) 1.141689195s ago: executing program 4 (id=4325): r0 = socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2040400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000200000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0004000000"], 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed7f0000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b000000070000000100010009000000010000"], 0x5c) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x7fffffff, 0x0, r4, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'netdevsim0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='mm_page_free\x00', r3}, 0x18) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0eddff000400080200000600000000000089", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sendfile(r10, r10, 0x0, 0xee0c) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') quotactl$Q_GETNEXTQUOTA(0x0, &(0x7f0000002040)=@filename='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1050f0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2904, 0x4, 0x4, 0x0, 0x0, 0xfffffffe, 0xffff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f00000002c0)=""/64) 1.108092995s ago: executing program 3 (id=4326): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000240)=@framed={{}, [@map_idx={0x18, 0xde96663559f19cda, 0x5, 0x0, 0x1}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) sendmsg$rds(r0, &(0x7f0000000680)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000005c0)={0x2, 0x0, @multicast2}, 0x52) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="180100001c0000000000000000100000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000780)='netlink_extack\x00', r2}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5, 0xffffffffffffffff}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) r8 = socket$inet(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000004300)=@mangle={'mangle\x00', 0x44, 0x6, 0x420, 0x2b8, 0x0, 0x138, 0x0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00'}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @ECN={0x28}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) fcntl$setlease(r3, 0x400, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x300, 0xf5ff) r9 = socket(0x11, 0x800000003, 0x20000) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x8c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1000]}}]}}]}, 0x8c}}, 0x0) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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") openat$ptp0(0xffffffffffffff9c, &(0x7f0000000340), 0x40000, 0x0) 1.055011746s ago: executing program 3 (id=4329): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x2, &(0x7f0000000680)=ANY=[@ANYRES32=r0, @ANYBLOB="1a875200725adf9f1f03dfa6d82ff0c0e6cd1ad5efae08739f451bf00d4b9d67a9f699c2e1c26565c71b959de60582a161eac1665e25375e85f01394b0d1215b7c68e59e720dc047420227c69d2a970aa48e92cf4ec48d5f003422b4fdfc9a22799359ee25b9d7eccdebe300bc2737ed7cf7ad6c82ef63ebf9aa24c8d65c727d442ac266d018084d70cedc1cd0a9ceae37779072743b3469a8a475a6ce5844290cf3af02843984af41388f2d33c26c8fae70729f64bd7fa7a3af077db093a77f9f1d1968c62fbc3c8fc8561ad1277f79339f35fcce91c205c4c6c893d26175b253a98a88", @ANYRESHEX=r0, @ANYRES32=0x0, @ANYRES32=r0], &(0x7f0000000140)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x9, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}, {0x4, 0x4, 0x4, 0x45afb760}, {0x0, 0x28, 0x6, 0x7}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) readv(r2, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000280)={'pimreg\x00', @broadcast}) ioperm(0x0, 0x2, 0x2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r3}, 0x10) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000140)="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"/297, 0x3accf8d5) vmsplice(r4, &(0x7f0000001a40)=[{&(0x7f00000000c0)='7', 0x1}], 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) setresgid(0x0, 0x0, 0x0) 992.616586ms ago: executing program 1 (id=4330): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d0000"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) r3 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0xe, &(0x7f0000001ec0)={[{@abort}, {@journal_path={'journal_path', 0x3d, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}}, {@commit={'commit', 0x3d, 0x9}}, {@acl}], [{@permit_directio}, {@pcr={'pcr', 0x3d, 0x2}}, {@uid_lt}, {@obj_role={'obj_role', 0x3d, ':\xd0#'}}]}, 0x3, 0x47b, &(0x7f0000001a40)="$eJzs3M9vFFUcAPDvbH9ABWwl+IMfahWNjT9aCqgcPKjRxAMmJnrAY9MWghRqaE2ENFqMwZMxJt6NR/8FT+pBjScTr3o3JMTUA4XTmpmdaXeX7dJufyx0P59k4L2ZN33vOzNv9s2+3Q2gYw2m/yQRuyPir4jor2RrCwxW/ltcmBu/uTA3nkS5/O6/SVbuxsLceFG02G9XnhkqRZQ+T+Jgg3pnLl0+NzY1NXkxz4/Mnv9wZObS5RfOnh87M3lm8sLREyeOHxt9+aWjL25InGmbbhz4ZPrQ/rfe//rtk1/WxF8XRyPda69ysNnGp8vltf/Fu9ieqnRSd7C6troxrFpXfm33ZP2/P7qqrvT+ePOztjYO2FTlcrm8a+XN82VgG0uiNj9f7s7vC8D2VrzQp8+/xVI/CHh184YfbXf9tcoDUBr34sLcf4tL8XdHKS/TU/d8u5EGI+LU/K1v0yVW8T4EAMB6/ZiOf55vNP4rxUNV5e7P54YGIuKBiNiblYjYFxEPRmRlH46IR9ZYfzZJ8vNy/vbxT+lay8GtQjr+eyWf2yqWvN6iyEBXntuTxd+TnD47NXkkPyZD0bMjzY82qeOnN/78aqVt1eO/dEnrL8aCeTuude+o3WdibHZsPTFXu34l4kB3xGKxYin+ZGkmIImI/RFxoMU6zj77/aGVtt05/iZamJSrV/4u4pnK+Z+PmvO/PAuaNJ+fHNkZU5NHRoqr4na//3H1nZXqX1f8GyA9//c1vP6X4h9IqudrZ9Zex9W/v1jxmabV6783eS9L9+brPh6bnb04GtGbnKw0unr90eV9i3xRPo1/6HDj/r83lo/EwYhIL+JHI+KxiHg8b/sTEfFkRBxuEv9vrz/1QbP4+9p8/ifWdP6XE71Rv6ZhoivO/fJDTaUDtfGfmr91s/n5P56lhvI1q7n/raJdLV7NAAAAcO8pRcTuSErDsTPL745SaXi48nn5fRGlqemZ2edOT390YaLyHYGB6CkV73T1V70fOpo/1lfyVyKi8tGCYvuxfb9m+W+6+rL88Pj01ERbIwd2LfX/4l5Q6f+pf3xxA7a/DZhHA+5R+j90Lv0fOpf+D52rQf/va0c7gK3X6PX/0za0A9h6fq8NOpfnf+hcK/b/7fzLP0DG6z90pJm+uPOX5Jsmir/U4u7bNhE9m1xF8dMX9ZuW1hRzOOusq5w0PLlRujuOs8TmJNpzPwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANho/wcAAP//XSzQaw==") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="efab5a8491fadf180000001a000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000e86a202cca727d000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000740)=[r0, r1, 0xffffffffffffffff, r3, r1, r3, r1], 0x7) mknod$loop(&(0x7f0000000500)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x1) 974.931576ms ago: executing program 4 (id=4331): socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x1, 0xfff9, 0x7fff, 0x9, 0xa, "2f75030632c24ebc"}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x8, &(0x7f0000002e00)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = mq_open(&(0x7f0000001140)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\xe0\x9d\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xdf\x15\f]\x15\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb', 0x42, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = eventfd(0x800a6) write$eventfd(r5, &(0x7f0000000000)=0xfffffffffffffffb, 0x8) dup(r5) socket$packet(0x11, 0x2, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mq_unlink(&(0x7f0000000000)='eth0\x00') close(r2) 781.328887ms ago: executing program 1 (id=4332): mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f00000004c0)={'ah\x00'}, &(0x7f0000000500)=0x1e) 765.706367ms ago: executing program 1 (id=4333): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x4, 0x1, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000ecff850000000400000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = syz_io_uring_setup(0x4174, &(0x7f0000000780)={0x0, 0x7e05, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x27}) io_uring_enter(r1, 0x567, 0x0, 0x0, 0x0, 0x0) 749.258307ms ago: executing program 1 (id=4334): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000240)=@framed={{}, [@map_idx={0x18, 0xde96663559f19cda, 0x5, 0x0, 0x1}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$rds(r0, &(0x7f0000000680)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000005c0)={0x2, 0x0, @multicast2}, 0x52) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="180100001c0000000000000000100000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000780)='netlink_extack\x00', r2}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5, 0xffffffffffffffff}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) r8 = socket$inet(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000004300)=@mangle={'mangle\x00', 0x44, 0x6, 0x420, 0x2b8, 0x0, 0x138, 0x0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00'}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @ECN={0x28}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) fcntl$setlease(r3, 0x400, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x300, 0xf5ff) r9 = socket(0x11, 0x800000003, 0x20000) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x8c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1000]}}]}}]}, 0x8c}}, 0x0) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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") socket$inet6_sctp(0xa, 0x1, 0x84) 718.558447ms ago: executing program 1 (id=4335): perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x62, 0x1}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="05000000010000008a000000c9e7000001000000", @ANYRES32, @ANYBLOB="00001b00"/20, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, @private0, @remote, 0x8, 0x4, 0x5, 0x400, 0x18b1, 0x84000100}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) getpgrp(0x0) 655.623077ms ago: executing program 1 (id=4336): ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x40505330, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) dup(r0) open(&(0x7f0000000000)='./bus\x00', 0x44542, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3000002, 0x42032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) syz_usbip_server_init(0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 494.125858ms ago: executing program 2 (id=4338): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000003, 0x13, r0, 0x0) r1 = getpid() r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) process_vm_readv(r1, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) 387.595648ms ago: executing program 0 (id=4339): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000240)=@framed={{}, [@map_idx={0x18, 0xde96663559f19cda, 0x5, 0x0, 0x1}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) sendmsg$rds(r0, &(0x7f0000000680)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000005c0)={0x2, 0x0, @multicast2}, 0x52) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="180100001c0000000000000000100000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000780)='netlink_extack\x00', r2}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5, 0xffffffffffffffff}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) r8 = socket$inet(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000004300)=@mangle={'mangle\x00', 0x44, 0x6, 0x420, 0x2b8, 0x0, 0x138, 0x0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00'}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @ECN={0x28}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) fcntl$setlease(r3, 0x400, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x300, 0xf5ff) r9 = socket(0x11, 0x800000003, 0x20000) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x8c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1000]}}]}}]}, 0x8c}}, 0x0) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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") openat$ptp0(0xffffffffffffff9c, &(0x7f0000000340), 0x40000, 0x0) 355.571968ms ago: executing program 2 (id=4340): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000"], 0x48) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x400) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000005c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xffffff94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000300), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)=@assoc_value, 0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000880)=ANY=[@ANYRES32=0x0, @ANYBLOB="1935a222690be10d92aea8a3c78cc43b5fc5aad07cbc4a0acd00a6a47d2f7c10643706cc695ff66c124bdc2b674f6c8ca376467072e043a64fa3c2df8ee439a4c8b08a4fbbb08baaccfa707e93350e44a4149d1a32d5ae05682303ab9193313dfc80d1ca7eda8ed9af58"], 0xe) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r5, @ANYBLOB="0100000000000000000001000000060006000000000024000300a0cb879a3fa6d031c74a1553b6e901b9ff2f518c78042fb5426c010880f4000080068005000180000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff240002001bc715ee4868b12a49f4df11bc05475489f6a27c4d6483ad2fa5e45903b0ce8514000400f9ffffffab1414aa00000000000000008c00098028000080060001000a00000014000200ff020000000000000000000000000001050003000000000028000080060001000a000000140002000000000000000000000000000000000105000300030000001c000080060001000200da0008000200e000000105000300000000001c0000141400050003000000000074000080200004000a004e2200000000fc0000000000000000000000000000000400000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffcbfe4381ffffffffff080003000100000024000200cde20bc0d9b90ac13642d7b66459dd9ddce608000700000000001400020077673000"/420], 0x1c8}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'wg2\x00', 0x0}) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000ce12a300000000000000000004000000000000", @ANYRES32=0x0, @ANYRES16=r1, @ANYRES32=0x0, @ANYRES32, @ANYRES8=r2], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x2d) syz_clone(0x2280e080, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="63000010", @ANYRES16=r5, @ANYBLOB="000226bd7000fedbdf250000000008000100", @ANYRES32=r6, @ANYBLOB], 0x30}}, 0x800) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) add_key(&(0x7f00000001c0)='ceph\x00', 0x0, &(0x7f0000000840)='\x00\x00\x00\x00\x00\x00\x00\x00\x00*\x00\x00', 0xc, 0x0) bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r9, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCSACTIVE(r9, 0x40047459, &(0x7f0000000080)={0xfffffffffffffe43, 0x0}) read(r9, 0x0, 0x0) write$ppp(r9, &(0x7f0000000200)="bc72", 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r10, 0x0, 0x24000041) 354.884059ms ago: executing program 0 (id=4341): socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0xf766, 0x2, 0x2, 0xe2}, {0x9, 0x67, 0x0, 0x5}]}) unshare(0x62020780) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000002000000070000000400000000000000", @ANYRES32], 0x2e) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000100850000000100000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='kfree\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000001440)=ANY=[], 0xc0) sendmmsg$inet6(r5, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000180)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x1101088, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000080)={0x0, 0x0, 0x20000}, 0x20) unshare(0xe000480) 190.825859ms ago: executing program 3 (id=4342): perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x759b}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x7, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='rxrpc_rx_packet\x00'}, 0x18) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000004c0)='./file0\x00', 0x8104e2, &(0x7f0000000a80)=ANY=[], 0x1, 0x263, &(0x7f0000000a00)="$eJzs2s9rHGUYB/BnkkhjSrIRf9GA+KIXvQxNTgqCDdKCGFBqI6ggnZqJLtnshswSWJE2N6/+CZ7FozdBivdc/AuKeMslxx7Eke7GmsQI20RNmnw+lzzh3e8+7/Iwwzsw2298vbqyXOXLRTdGsizGrsRm3M9iOkZiNAY249Xbr9174f0PP3pnfmHh6vWUrs3fmJ1LKU29+OPHX3730t3uxQ++n/rhQmxNf7K9M/fr1nNbl7Z/v/F5s0rNKrU73VSkW51Ot7jVKtNSs1rJU3qvVRZVmZrtqlzft77c6qyt9VLRXpqcWFsvqyoV7V5aKXup20nd9V4qPiua7ZTneZqcCCJi/KjBxW/v13Xs1E/cjLqun/wmLt6NyXvRiOyplD19JXv2Zvb8ZnZpp64bB5Kjx981p8Df5z811Pw5G456/XM2/Dn/LLL+/+Z/vuw51I1HrH61sbixOPg7WJ9fjma0oozL0Yjf4sFtYtegvvb2wtXLqW860uqd3fydjcXR/fnZmNltWdfjD6t+fnaQT/vzF2Jib34uGvHM4f3nDs2Pxysv78nn0YifP41OtGKp3/qv/O3ZlN56d+FAfqb/OQCAsyZPDx16fsvzf1of5B/hfHjgfDUWM2Mn+9uJqHpfrBStVrl+Porru8+xp2U/j1aMxcl1/yl+ef0/bvHgsfDY3xMjEadlXo91cdJ3Jv4Pey6cI9j89zcEAAAAAAAAAADAUIZ9H/DN47ySCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwhD8CAAD//3ws3uY=") ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000001c0)=0x0) syz_mount_image$ext4(&(0x7f0000000500)='ext2\x00', &(0x7f0000000600)='./file0\x00', 0x0, &(0x7f0000000c80)={[{@barrier}, {@i_version}, {@discard}, {@nombcache}, {@dax}, {@stripe={'stripe', 0x3d, 0xff}}, {@data_journal}, {@journal_async_commit}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@dont_appraise}, {@dont_appraise}, {@subj_type={'subj_type', 0x3d, 'sch@+\xa3\x9d5\xb8]\xe6h\x000\x9a}\x86\r:\x06f3Nb4B*\xc1\x80\x92\xf5\x0f\x11\x8f\x86\x88\x1c\xb1\xbe\xb4\xec\xd5{\xc6\xd4+m|\x05}f%v\x8b\x88?ex\"F\xabf\x96\x1d\xb1\xcc\xef\x8a\x1f\x16wM\xe5\xb5\xa9\xc5\xc5\xf8N\xf4\xe1\xcc\xa7W\xde\xd5\x066GF\xf9/V+\xa6!\xea\t\xe7@\xfcga\xa6\xd9)\xc1\xb2^Oh\xb7\x8b6\xd0{\"\"\xd9\x17\x06>f\r\x86\xcd)K\xa7HP\xe7\xa4\xe5\xaa\x15:P\xd9\x17\xad\xd5zF\x87\tG\xf7\a\x87\xad\xfe@?\a\x8a\xa7\xb2/\x13\xffu\xe6\x81\x9d\x7f\xc2.\x1c\xba\xf8V2\xe3+\xbeJ\x92\xd3\x19\x8dE\x17U%\xf2\x05\x12\xbe>C\xbd`\x91#k\xdfV\xa8\xe5H\x81\x9eu\xb7\xfc\x12\xb5\xf1^\xffm\xda\x1d+\xca\x86\xe2g`\xbd\xfb\xf8\xd4\x8a\x9f7\x8d\x0f\xf05\xb8V'}}, {@subj_role={'subj_role', 0x3d, '&\'\xd4[$&.}$,$]##]@!'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/input/event#\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', r0}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}, 0x6, 0x56a, &(0x7f00000015c0)="$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") setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000300)=ANY=[], 0x835, 0x0) statx(0xffffffffffffffff, &(0x7f0000003e40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6000, 0x40, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000e6ffffffffc40000001f00000095"], &(0x7f0000000180)='GPL\x00', 0xc, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r1}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b7050000000400007910a800000000005d0a0000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x5, 0xbc, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='./binderfs/binder-control\x00', 0x800, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300), 0x10400, 0x0) sendfile(r3, r4, &(0x7f0000000340)=0x5, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="d80000001b0001000000000000000000fe8000000000000000000000000000bbe000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\b'], 0xd8}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b00000000001b000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000006ffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x802) ioctl$EVIOCGBITSW(r6, 0x40044590, &(0x7f0000000300)=""/240) ioctl$EVIOCGRAB(r6, 0x40044590, 0x0) r7 = gettid() timer_create(0x7, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000640)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x12}}, 0xfffffffd}, 0x1c) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRES16, @ANYRES8=0x0], 0x48) 128.689179ms ago: executing program 3 (id=4343): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d000000"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) r3 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0xe, &(0x7f0000001ec0)={[{@abort}, {@journal_path={'journal_path', 0x3d, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}}, {@commit={'commit', 0x3d, 0x9}}, {@acl}], [{@permit_directio}, {@pcr={'pcr', 0x3d, 0x2}}, {@uid_lt}, {@obj_role={'obj_role', 0x3d, ':\xd0#'}}]}, 0x3, 0x47b, &(0x7f0000001a40)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="efab5a8491fadf180000001a000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000e86a202cca727d000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000740)=[r0, r1, 0xffffffffffffffff, r3, r1, r3, r1], 0x7) mknod$loop(&(0x7f0000000500)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x1) 127.48961ms ago: executing program 4 (id=4344): mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f00000004c0)={'ah\x00'}, &(0x7f0000000500)=0x1e) 112.00951ms ago: executing program 2 (id=4345): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000240)=@framed={{}, [@map_idx={0x18, 0xde96663559f19cda, 0x5, 0x0, 0x1}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$rds(r0, &(0x7f0000000680)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000005c0)={0x2, 0x0, @multicast2}, 0x52) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="180100001c0000000000000000100000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000780)='netlink_extack\x00', r2}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5, 0xffffffffffffffff}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) r8 = socket$inet(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000004300)=@mangle={'mangle\x00', 0x44, 0x6, 0x420, 0x2b8, 0x0, 0x138, 0x0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00'}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @ECN={0x28}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) fcntl$setlease(r3, 0x400, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x300, 0xf5ff) r9 = socket(0x11, 0x800000003, 0x20000) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x8c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1000]}}]}}]}, 0x8c}}, 0x0) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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") socket$inet6_sctp(0xa, 0x1, 0x84) 97.2183ms ago: executing program 4 (id=4346): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r2, &(0x7f00000003c0)=[{&(0x7f0000033a80)=""/102386, 0x18ff2}, {&(0x7f0000000580)=""/154, 0x9a}], 0x2, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$cgroup_pid(r3, &(0x7f00000031c0), 0x12) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) 50.28493ms ago: executing program 2 (id=4347): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x6, &(0x7f00000002c0)=[{0x10, 0x2, 0x14, 0x20006}, {0x7, 0x1, 0x0, 0x3}, {0x3, 0xfc, 0x9, 0xd34}, {0xfffe, 0x8, 0x5, 0x6}, {0x4, 0x0, 0x6, 0x5a1}, {0x2, 0x4, 0x3, 0x1}]}) mq_open(&(0x7f0000002740)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x100, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xff, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xb, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES16=r0, @ANYRES64=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095c36dab9c17d3ed48a974dfa8a4c9931ecee42d437260fed1041ac2d21695416a12634a07d9a90a874e4c3bbb70863b9098d5d975885967a0cd797e948cd31c6c8a01893e13a7873e99f87fbd06c756f8556a7b4cfeee21a67182795781daf252e104f528fa519a7a6ae97e21530dd1532660d8ef4caa31d130e79f7c21dce1d963f9b391af83763830d8f5a5"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) rt_sigaction(0x12, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) 24.55248ms ago: executing program 2 (id=4348): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x4, 0x1, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = syz_io_uring_setup(0x4174, &(0x7f0000000780)={0x0, 0x7e05, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x27}) io_uring_enter(r2, 0x567, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 2 (id=4349): r0 = syz_io_uring_setup(0x82e, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x40000000}, &(0x7f0000000100), &(0x7f0000000280)) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000080}, 0xc040) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x23, &(0x7f0000000040)=""/32, &(0x7f0000000080)=0x20) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r2, &(0x7f0000000380)=ANY=[], 0xff2e) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x0, "a05c7b5d00008023e9c5bcf5ff7700"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xff, 0x0, "f957c9c46b9ca1d1"}) r4 = dup3(r3, r2, 0x0) io_setup(0x3, &(0x7f00000003c0)=0x0) io_submit(r5, 0x2, &(0x7f0000000b80)=[&(0x7f0000000380)={0x503, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) getresuid(0x0, 0x0, &(0x7f00000002c0)=0x0) quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000080)=@filename='./file0\x00', r6, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000280)=0x0) quotactl$Q_QUOTAOFF(0xffffffff80000301, &(0x7f0000000200)=@loop={'/dev/loop', 0x0}, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) splice(r8, &(0x7f0000000940)=0x9, r3, &(0x7f0000000980)=0x154, 0x3, 0x7) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r10 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r11, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0x6}, {0xffffffffffffff7f, 0x2, [@TCA_FQ_CODEL_CE_THRESHOLD_MASK={0x5, 0xb, 0x1}, @TCA_FQ_CODEL_LIMIT={0x8, 0x2, 0x2}, @TCA_FQ_CODEL_INTERVAL={0x8, 0x3, 0xf384}, @TCA_FQ_CODEL_FLOWS={0x8, 0x5, 0xffffffff}, @TCA_FQ_CODEL_FLOWS={0x8}, @TCA_FQ_CODEL_DROP_BATCH_SIZE={0x8}, @TCA_FQ_CODEL_ECN={0x8}]}}, @TCA_RATE={0x6, 0x5, {0x4}}]}, 0x78}}, 0x0) r12 = getegid() setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x5, 0x57e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000000), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0x2, 0x2, [{0x11, 0xa, 0xf8, 'batadv0\x00', 'pim6reg0\x00', 'batadv_slave_0\x00', 'nr0\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}, [0xff, 0x0, 0x0, 0xff, 0xff], 0xae, 0x12e, 0x166, [@owner={{'owner\x00', 0x0, 0x18}, {{r6, r7, r9, r12, 0x4, 0x3}}}], [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7, 'syz0\x00', {0x8000000000000000}}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x4}}}], @common=@dnat={'dnat\x00', 0x10, {{@dev={'\xaa\xaa\xaa\xaa\xaa', 0xe}, 0xfffffffffffffffc}}}}, {0x9, 0x11, 0x6005, 'veth1_to_bond\x00', 'ip6gre0\x00', 'veth1_to_hsr\x00', 'netpci0\x00', @broadcast, [0xff, 0x1fe, 0x0, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0x0, 0xff, 0xff], 0x6e, 0x6e, 0x9e, [], [], @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x11, 0xe, 0x805, 'caif0\x00', 'macsec0\x00', 'pimreg\x00', 'wg2\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x34}, [0x0, 0xff, 0xff, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x6e, 0x6e, 0x9e, [], [], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x2, [{0x5, 0x6a, 0xdada, 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'syzkaller0\x00', 'bond_slave_1\x00', @local, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @random="ece32de7b797", [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0xa6, 0xd6, 0x106, [@mac={{'mac\x00', 0x0, 0x10}, {{@random="8164748a71f2"}}}], [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}], @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffd}}}}, {0x11, 0x50, 0x6001, 'bond0\x00', 'pimreg0\x00', 'pim6reg0\x00', 'hsr0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @remote, [0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0x116, 0x146, [], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8}}}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0xff, 0x3, 0x0, 0x0, "eabb433b7fffa5320b76932fb92d8042cb0297fce63f02598419b40072f08d963b0c9704e126a90361ae5aac191ecfcd1814f5e31bc30a20612064b8526396d9"}}}], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}]}]}, 0x5f6) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x22, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0}, {0x0}]}, 0x2}, 0x1) kernel console output (not intermixed with test programs): 612][T10859] bridge_slave_0: entered allmulticast mode [ 115.145338][T10859] bridge_slave_0: entered promiscuous mode [ 115.153931][T10859] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.161068][T10859] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.169939][T10859] bridge_slave_1: entered allmulticast mode [ 115.176576][T10859] bridge_slave_1: entered promiscuous mode [ 115.179565][T10919] hub 6-0:1.0: USB hub found [ 115.187815][T10919] hub 6-0:1.0: 8 ports detected [ 115.212419][T10859] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 115.223460][T10859] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 115.253031][T10859] team0: Port device team_slave_0 added [ 115.260284][T10859] team0: Port device team_slave_1 added [ 115.278789][T10859] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 115.285825][T10859] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 115.311876][T10859] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 115.323296][T10859] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 115.330388][T10859] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 115.356356][T10859] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 115.372649][T10931] vlan2: entered allmulticast mode [ 115.377829][T10931] bridge_slave_0: entered allmulticast mode [ 115.386041][T10931] bridge_slave_0: left allmulticast mode [ 115.411520][T10859] hsr_slave_0: entered promiscuous mode [ 115.417822][T10859] hsr_slave_1: entered promiscuous mode [ 115.423867][T10859] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 115.431932][T10859] Cannot create hsr debugfs directory [ 115.513520][T10859] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 115.546938][T10859] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 115.596351][T10958] netlink: 392 bytes leftover after parsing attributes in process `syz.0.3001'. [ 115.607672][T10859] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 115.656855][T10859] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 115.671030][T10961] netlink: 76 bytes leftover after parsing attributes in process `syz.2.2998'. [ 115.719729][T10859] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 115.728619][T10859] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 115.737300][T10859] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 115.745978][T10859] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 115.804511][T10859] 8021q: adding VLAN 0 to HW filter on device bond0 [ 115.821795][T10859] 8021q: adding VLAN 0 to HW filter on device team0 [ 115.837156][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.844776][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.869465][ T3412] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.876642][ T3412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.995962][T10859] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 116.018246][T10991] netlink: 76 bytes leftover after parsing attributes in process `syz.1.3007'. [ 116.108091][T11000] bond_slave_1: mtu greater than device maximum [ 116.125063][T11006] netlink: 392 bytes leftover after parsing attributes in process `syz.3.3014'. [ 116.175307][T11003] bond1: entered promiscuous mode [ 116.180364][T11003] bond1: entered allmulticast mode [ 116.195673][T11003] 8021q: adding VLAN 0 to HW filter on device bond1 [ 116.208002][T11003] bond1 (unregistering): Released all slaves [ 116.228008][T10859] veth0_vlan: entered promiscuous mode [ 116.236272][T10859] veth1_vlan: entered promiscuous mode [ 116.242388][T11021] bond_slave_1: mtu greater than device maximum [ 116.268625][T10859] veth0_macvtap: entered promiscuous mode [ 116.282327][T10859] veth1_macvtap: entered promiscuous mode [ 116.301124][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 116.311716][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.321645][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 116.332369][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.342231][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 116.352859][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.362792][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 116.373237][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.383119][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 116.393622][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.403579][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 116.414022][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.425159][T10859] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 116.437513][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 116.448018][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.457963][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 116.468505][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.478443][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 116.488890][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.498752][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 116.509224][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.513599][T11035] FAULT_INJECTION: forcing a failure. [ 116.513599][T11035] name failslab, interval 1, probability 0, space 0, times 0 [ 116.519136][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 116.519168][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.519181][T10859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 116.519194][T10859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.522966][T10859] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 116.531810][T11035] CPU: 1 UID: 0 PID: 11035 Comm: syz.2.3023 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 116.547917][T10859] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.551996][T11035] Tainted: [W]=WARN [ 116.552071][T11035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 116.552082][T11035] Call Trace: [ 116.552087][T11035] [ 116.552094][T11035] dump_stack_lvl+0xf2/0x150 [ 116.562529][T10859] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.572249][T11035] dump_stack+0x15/0x1a [ 116.572280][T11035] should_fail_ex+0x223/0x230 [ 116.579530][T10859] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.591693][T11035] should_failslab+0x8f/0xb0 [ 116.591723][T11035] __kmalloc_noprof+0xab/0x3f0 [ 116.600393][T10859] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.604157][T11035] ? security_sb_alloc+0x47/0x110 [ 116.622071][T11030] xt_check_target: 5 callbacks suppressed [ 116.622090][T11030] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 116.625059][T11035] security_sb_alloc+0x47/0x110 [ 116.625094][T11035] alloc_super+0x108/0x5a0 [ 116.699575][T11035] ? __pfx_set_anon_super_fc+0x10/0x10 [ 116.705132][T11035] sget_fc+0x259/0x670 [ 116.709272][T11035] ? __pfx_set_anon_super_fc+0x10/0x10 [ 116.714799][T11035] ? __pfx_mqueue_fill_super+0x10/0x10 [ 116.720335][T11035] get_tree_nodev+0x28/0xf0 [ 116.724832][T11035] mqueue_get_tree+0x6b/0x90 [ 116.729449][T11035] vfs_get_tree+0x56/0x1e0 [ 116.733869][T11035] fc_mount+0x16/0x70 [ 116.737843][T11035] mq_init_ns+0x253/0x300 [ 116.742247][T11035] copy_ipcs+0x218/0x3b0 [ 116.746545][T11035] create_new_namespaces+0x135/0x430 [ 116.751841][T11035] ? security_capable+0x81/0x90 [ 116.756741][T11035] unshare_nsproxy_namespaces+0xe6/0x120 [ 116.762379][T11035] ksys_unshare+0x3c9/0x6e0 [ 116.766901][T11035] __x64_sys_unshare+0x1f/0x30 [ 116.771658][T11035] x64_sys_call+0x1a3e/0x2dc0 [ 116.776375][T11035] do_syscall_64+0xc9/0x1c0 [ 116.780868][T11035] ? clear_bhb_loop+0x55/0xb0 [ 116.785536][T11035] ? clear_bhb_loop+0x55/0xb0 [ 116.790199][T11035] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 116.796097][T11035] RIP: 0033:0x7f875b0dff19 [ 116.800501][T11035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 116.820149][T11035] RSP: 002b:00007f8759757058 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 116.828572][T11035] RAX: ffffffffffffffda RBX: 00007f875b2a5fa0 RCX: 00007f875b0dff19 [ 116.836587][T11035] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000e000480 [ 116.844551][T11035] RBP: 00007f87597570a0 R08: 0000000000000000 R09: 0000000000000000 [ 116.852513][T11035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.860556][T11035] R13: 0000000000000000 R14: 00007f875b2a5fa0 R15: 00007ffeaa45a498 [ 116.868527][T11035] [ 116.968178][T11048] FAULT_INJECTION: forcing a failure. [ 116.968178][T11048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.981295][T11048] CPU: 0 UID: 0 PID: 11048 Comm: syz.4.3027 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 116.993561][T11048] Tainted: [W]=WARN [ 116.997360][T11048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 117.007446][T11048] Call Trace: [ 117.010717][T11048] [ 117.013701][T11048] dump_stack_lvl+0xf2/0x150 [ 117.018358][T11048] dump_stack+0x15/0x1a [ 117.022568][T11048] should_fail_ex+0x223/0x230 [ 117.027243][T11048] should_fail+0xb/0x10 [ 117.031390][T11048] should_fail_usercopy+0x1a/0x20 [ 117.036476][T11048] _copy_from_user+0x1e/0xb0 [ 117.041104][T11048] copy_msghdr_from_user+0x54/0x2a0 [ 117.046299][T11048] ? __fget_files+0x17c/0x1c0 [ 117.051034][T11048] __sys_sendmsg+0x13e/0x230 [ 117.055625][T11048] __x64_sys_sendmsg+0x46/0x50 [ 117.060380][T11048] x64_sys_call+0x2734/0x2dc0 [ 117.065047][T11048] do_syscall_64+0xc9/0x1c0 [ 117.069591][T11048] ? clear_bhb_loop+0x55/0xb0 [ 117.074257][T11048] ? clear_bhb_loop+0x55/0xb0 [ 117.079050][T11048] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 117.084954][T11048] RIP: 0033:0x7fe7f60aff19 [ 117.089426][T11048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.109039][T11048] RSP: 002b:00007fe7f4727058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 117.117446][T11048] RAX: ffffffffffffffda RBX: 00007fe7f6275fa0 RCX: 00007fe7f60aff19 [ 117.125449][T11048] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 117.133417][T11048] RBP: 00007fe7f47270a0 R08: 0000000000000000 R09: 0000000000000000 [ 117.141448][T11048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.149417][T11048] R13: 0000000000000000 R14: 00007fe7f6275fa0 R15: 00007ffde2b28638 [ 117.157405][T11048] [ 117.275864][T11056] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3030'. [ 117.432478][T11070] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3036'. [ 117.632818][T11082] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(14) [ 117.639463][T11082] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 117.646991][T11082] vhci_hcd vhci_hcd.0: Device attached [ 117.703467][T11087] vhci_hcd: cannot find the pending unlink 0 [ 117.764183][T11087] vhci_hcd: connection closed [ 117.773113][ T40] vhci_hcd: stop threads [ 117.782178][ T40] vhci_hcd: release socket [ 117.786661][ T40] vhci_hcd: disconnect device [ 117.862261][T11101] bond_slave_1: mtu greater than device maximum [ 118.270566][T11152] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 118.470738][T11180] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3075'. [ 118.487087][T11180] bridge_slave_1: left allmulticast mode [ 118.492770][T11180] bridge_slave_1: left promiscuous mode [ 118.498440][T11180] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.511027][T11180] bridge_slave_0: left allmulticast mode [ 118.516772][T11180] bridge_slave_0: left promiscuous mode [ 118.522463][T11180] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.607752][T11198] netlink: 36 bytes leftover after parsing attributes in process `syz.0.3078'. [ 118.654208][T11206] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 118.680122][T11211] bpf_get_probe_write_proto: 2 callbacks suppressed [ 118.680137][T11211] syz.0.3082[11211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.689341][T11211] syz.0.3082[11211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.707965][T11211] syz.0.3082[11211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.799013][T11221] vlan2: entered allmulticast mode [ 118.815856][T11221] bridge_slave_0: entered allmulticast mode [ 118.843476][T11221] bridge_slave_0: left allmulticast mode [ 119.226696][T11231] chnl_net:caif_netlink_parms(): no params data found [ 119.336444][T11231] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.343600][T11231] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.352078][ T29] kauditd_printk_skb: 837 callbacks suppressed [ 119.352091][ T29] audit: type=1400 audit(1733269989.010:29924): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 119.380700][ T29] audit: type=1400 audit(1733269989.010:29925): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 119.401852][T11231] bridge_slave_0: entered allmulticast mode [ 119.402441][ T29] audit: type=1400 audit(1733269989.010:29926): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 119.430592][ T29] audit: type=1400 audit(1733269989.010:29927): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 119.442805][T11231] bridge_slave_0: entered promiscuous mode [ 119.453250][ T29] audit: type=1400 audit(1733269989.010:29928): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 119.494248][T11231] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.501435][T11231] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.514468][T11231] bridge_slave_1: entered allmulticast mode [ 119.523951][T11231] bridge_slave_1: entered promiscuous mode [ 119.589301][T11231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 119.620248][T11231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 119.646750][T11257] __nla_validate_parse: 2 callbacks suppressed [ 119.646765][T11257] netlink: 36 bytes leftover after parsing attributes in process `syz.0.3092'. [ 119.689870][T11231] team0: Port device team_slave_0 added [ 119.698228][T11231] team0: Port device team_slave_1 added [ 119.743986][T11231] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 119.751170][T11231] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 119.777205][T11231] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 119.822877][T11231] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 119.829976][T11231] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 119.855936][T11231] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 119.909741][T11231] hsr_slave_0: entered promiscuous mode [ 119.920454][T11231] hsr_slave_1: entered promiscuous mode [ 119.932061][T11231] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 119.945771][T11231] Cannot create hsr debugfs directory [ 119.951281][T11267] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 120.085998][T11231] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 120.165598][T11231] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 120.190049][ T29] audit: type=1400 audit(1733269989.840:29929): avc: denied { write } for pid=11273 comm="syz.0.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 120.221156][T11274] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3099'. [ 120.237128][T11231] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 120.287060][T11276] netlink: 392 bytes leftover after parsing attributes in process `syz.0.3100'. [ 120.316280][T11231] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 120.390222][T11231] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 120.406458][T11231] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 120.426086][T11231] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 120.446355][T11231] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 120.531735][T11231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 120.555640][T11231] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.575265][T11231] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 120.585768][T11231] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 120.613749][ T2605] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.620868][ T2605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.632377][ T2605] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.639456][ T2605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.707755][T11231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 120.980762][ T29] audit: type=1326 audit(1733269990.390:29930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11280 comm="syz.0.3101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe11ec9ff19 code=0x7ffc0000 [ 121.004550][ T29] audit: type=1326 audit(1733269990.390:29931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11280 comm="syz.0.3101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe11ec9ff19 code=0x7ffc0000 [ 121.028200][ T29] audit: type=1326 audit(1733269990.390:29932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11280 comm="syz.0.3101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe11ec9ff19 code=0x7ffc0000 [ 121.051868][ T29] audit: type=1326 audit(1733269990.390:29933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11280 comm="syz.0.3101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=32 compat=0 ip=0x7fe11ec9ff19 code=0x7ffc0000 [ 121.137928][T11231] veth0_vlan: entered promiscuous mode [ 121.146175][T11231] veth1_vlan: entered promiscuous mode [ 121.161241][T11231] veth0_macvtap: entered promiscuous mode [ 121.169346][T11285] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(14) [ 121.176023][T11285] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 121.183536][T11285] vhci_hcd vhci_hcd.0: Device attached [ 121.193663][T11288] vhci_hcd: connection closed [ 121.193980][ T2605] vhci_hcd: stop threads [ 121.203003][ T2605] vhci_hcd: release socket [ 121.207438][ T2605] vhci_hcd: disconnect device [ 121.232700][T11231] veth1_macvtap: entered promiscuous mode [ 121.243891][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 121.254451][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.264308][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 121.274753][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.284568][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 121.295020][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.304992][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 121.315470][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.325286][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 121.335700][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.345527][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 121.356016][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.365822][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 121.376299][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.387643][T11231] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 121.412011][T11304] netlink: 36 bytes leftover after parsing attributes in process `syz.3.3104'. [ 121.421759][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 121.432352][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.442220][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 121.452840][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.462707][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 121.473354][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.483356][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 121.493923][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.503846][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 121.514277][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.524100][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 121.534531][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.544508][T11231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 121.555071][T11231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 121.567160][T11231] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 121.575575][T11231] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.584324][T11231] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.593056][T11231] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.601809][T11231] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.630870][T11308] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 121.856753][T11316] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(14) [ 121.863388][T11316] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 121.870858][T11316] vhci_hcd vhci_hcd.0: Device attached [ 121.928955][T11322] vhci_hcd: cannot find the pending unlink 0 [ 122.011759][T11322] vhci_hcd: connection closed [ 122.027025][ T3412] vhci_hcd: stop threads [ 122.035990][ T3412] vhci_hcd: release socket [ 122.040458][ T3412] vhci_hcd: disconnect device [ 122.080221][T11327] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 122.087339][ T3373] vhci_hcd: vhci_device speed not set [ 122.156709][T11331] netlink: 392 bytes leftover after parsing attributes in process `syz.2.3113'. [ 122.225167][T11341] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 122.331138][T11352] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 122.352270][T11354] syz.3.3122[11354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.352377][T11354] syz.3.3122[11354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.361143][T11356] syz.0.3123[11356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.364505][T11354] syz.3.3122[11354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.377282][T11356] syz.0.3123[11356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.401303][T11356] syz.0.3123[11356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.477138][T11362] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 122.620343][T11378] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 122.632109][T11376] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 122.803663][T11392] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 122.982721][T11394] chnl_net:caif_netlink_parms(): no params data found [ 123.005063][T11408] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 123.054251][T11394] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.061398][T11394] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.068804][T11394] bridge_slave_0: entered allmulticast mode [ 123.075445][T11394] bridge_slave_0: entered promiscuous mode [ 123.082296][T11417] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3145'. [ 123.084858][T11394] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.098363][T11394] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.105669][T11394] bridge_slave_1: entered allmulticast mode [ 123.112181][T11394] bridge_slave_1: entered promiscuous mode [ 123.130607][T11394] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 123.141210][T11394] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 123.163641][T11394] team0: Port device team_slave_0 added [ 123.171417][T11394] team0: Port device team_slave_1 added [ 123.187319][T11394] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 123.194311][T11394] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 123.220330][T11394] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 123.232413][T11394] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 123.239400][T11394] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 123.265425][T11394] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 123.291656][T11394] hsr_slave_0: entered promiscuous mode [ 123.297668][T11394] hsr_slave_1: entered promiscuous mode [ 123.303469][T11394] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 123.311133][T11394] Cannot create hsr debugfs directory [ 123.368266][T11394] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.374722][T11429] syz.2.3150[11429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.409985][T11394] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.484754][T11443] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 123.506145][T11394] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.535340][T11448] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 123.557208][T11394] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.595425][T11451] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3154'. [ 123.641981][T11394] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 123.656629][T11394] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 123.665470][T11394] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 123.674128][T11394] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 123.717993][T11394] 8021q: adding VLAN 0 to HW filter on device bond0 [ 123.726042][T11454] bond_slave_1: mtu greater than device maximum [ 123.750442][T11394] 8021q: adding VLAN 0 to HW filter on device team0 [ 123.766528][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.773600][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.788696][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.795780][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.841867][T11394] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 123.920467][T11394] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 123.928763][T11474] netlink: 76 bytes leftover after parsing attributes in process `syz.4.3162'. [ 124.029670][T11483] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 124.042559][T11394] veth0_vlan: entered promiscuous mode [ 124.056546][T11394] veth1_vlan: entered promiscuous mode [ 124.063568][T11485] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 124.081816][T11394] veth0_macvtap: entered promiscuous mode [ 124.090235][T11394] veth1_macvtap: entered promiscuous mode [ 124.101941][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 124.112482][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.122350][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 124.132808][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.142618][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 124.153120][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.163039][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 124.173504][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.183345][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 124.194034][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.203952][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 124.214461][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.224360][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 124.234864][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.244743][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 124.255368][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.270854][T11394] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 124.283756][T11492] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3170'. [ 124.304921][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 124.315459][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.325293][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 124.335725][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.345691][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 124.356145][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.366008][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 124.376469][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.386301][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 124.396823][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.406677][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 124.417109][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.427195][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 124.437714][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.447542][T11394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 124.457984][T11394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.463739][T11503] bpf_get_probe_write_proto: 2 callbacks suppressed [ 124.463756][T11503] syz.3.3175[11503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.468304][ T29] kauditd_printk_skb: 571 callbacks suppressed [ 124.468319][ T29] audit: type=1326 audit(1733269994.020:30505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11497 comm="syz.3.3173" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 124.515582][ T29] audit: type=1326 audit(1733269994.020:30506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11497 comm="syz.3.3173" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 124.534071][T11503] syz.3.3175[11503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.539137][ T29] audit: type=1326 audit(1733269994.020:30507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11497 comm="syz.3.3173" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 124.553062][T11503] syz.3.3175[11503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.574083][ T29] audit: type=1326 audit(1733269994.020:30508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11497 comm="syz.3.3173" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 124.574114][ T29] audit: type=1326 audit(1733269994.020:30509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11497 comm="syz.3.3173" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 124.574157][ T29] audit: type=1326 audit(1733269994.070:30510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11495 comm="syz.4.3172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 124.592572][T11394] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 124.609134][ T29] audit: type=1326 audit(1733269994.070:30511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11495 comm="syz.4.3172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 124.638490][T11496] bond_slave_1: mtu greater than device maximum [ 124.656323][ T29] audit: type=1326 audit(1733269994.070:30512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11495 comm="syz.4.3172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fe7f60aff53 code=0x7ffc0000 [ 124.669933][T11394] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 124.687663][ T29] audit: type=1326 audit(1733269994.070:30513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11495 comm="syz.4.3172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fe7f60ae9cf code=0x7ffc0000 [ 124.693816][T11394] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 124.717146][ T29] audit: type=1326 audit(1733269994.070:30514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11495 comm="syz.4.3172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7fe7f60affa7 code=0x7ffc0000 [ 124.725872][T11394] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 124.790540][T11394] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 124.885793][T11515] syz.0.3140[11515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.885857][T11515] syz.0.3140[11515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.908490][T11515] syz.0.3140[11515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.037539][T11528] bond_slave_1: mtu greater than device maximum [ 125.102164][T11532] bond_slave_1: mtu greater than device maximum [ 125.694246][T11576] syz.1.3204[11576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.694325][T11576] syz.1.3204[11576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.726801][T11576] syz.1.3204[11576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.882125][T11600] netlink: 76 bytes leftover after parsing attributes in process `syz.0.3205'. [ 125.927444][T11602] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 126.379746][T11621] syz.0.3221[11621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.438009][T11623] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3222'. [ 126.626793][T11632] bond_slave_1: mtu greater than device maximum [ 126.999296][T11645] bond_slave_1: mtu greater than device maximum [ 127.167188][T11647] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(14) [ 127.173825][T11647] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 127.181278][T11647] vhci_hcd vhci_hcd.0: Device attached [ 127.322684][T11650] vhci_hcd: connection closed [ 127.340542][ T3412] vhci_hcd: stop threads [ 127.349567][ T3412] vhci_hcd: release socket [ 127.354068][ T3412] vhci_hcd: disconnect device [ 127.365997][ T3436] vhci_hcd: vhci_device speed not set [ 127.918394][T11670] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 128.219367][T11703] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3256'. [ 128.310323][T11712] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 128.779289][T11739] netlink: 76 bytes leftover after parsing attributes in process `syz.3.3271'. [ 129.311660][T11752] bond_slave_1: mtu greater than device maximum [ 129.340401][T11756] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 129.351764][T11754] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 129.437788][T11764] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 129.492791][ T29] kauditd_printk_skb: 909 callbacks suppressed [ 129.492807][ T29] audit: type=1400 audit(1733269999.140:31424): avc: denied { create } for pid=11769 comm="syz.1.3285" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 129.520519][ T29] audit: type=1400 audit(1733269999.140:31425): avc: denied { map } for pid=11769 comm="syz.1.3285" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=35035 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 129.546387][ T29] audit: type=1400 audit(1733269999.140:31426): avc: denied { read write } for pid=11769 comm="syz.1.3285" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=35035 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 129.581913][T11772] netlink: 392 bytes leftover after parsing attributes in process `syz.4.3286'. [ 129.605203][T11776] netlink: 76 bytes leftover after parsing attributes in process `syz.1.3285'. [ 129.676115][ T29] audit: type=1400 audit(1733269999.330:31427): avc: denied { read write } for pid=11771 comm="syz.4.3286" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 129.699733][ T29] audit: type=1400 audit(1733269999.330:31428): avc: denied { open } for pid=11771 comm="syz.4.3286" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 129.740323][ T29] audit: type=1400 audit(1733269999.330:31429): avc: denied { ioctl } for pid=11771 comm="syz.4.3286" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 129.765221][ T29] audit: type=1400 audit(1733269999.380:31430): avc: denied { read write } for pid=11759 comm="syz.3.3280" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 129.789495][ T29] audit: type=1400 audit(1733269999.380:31431): avc: denied { open } for pid=11759 comm="syz.3.3280" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 129.813630][ T29] audit: type=1400 audit(1733269999.380:31432): avc: denied { ioctl } for pid=11759 comm="syz.3.3280" path="socket:[35047]" dev="sockfs" ino=35047 ioctlcmd=0x8906 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 129.838801][ T29] audit: type=1400 audit(1733269999.380:31433): avc: denied { write } for pid=11759 comm="syz.3.3280" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 129.946874][T11787] bond_slave_1: mtu greater than device maximum [ 130.069289][T11792] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 130.228325][T11800] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 130.864471][T11832] bpf_get_probe_write_proto: 17 callbacks suppressed [ 130.864488][T11832] syz.3.3308[11832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.871320][T11832] syz.3.3308[11832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.882933][T11832] syz.3.3308[11832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.044206][T11844] bond_slave_1: mtu greater than device maximum [ 131.156621][T11858] syz.2.3321[11858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.156736][T11858] syz.2.3321[11858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.178351][T11858] syz.2.3321[11858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.234290][T11862] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 131.567530][T11880] netlink: 76 bytes leftover after parsing attributes in process `syz.3.3330'. [ 131.921160][T11890] syz.1.3333[11890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.921277][T11890] syz.1.3333[11890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.932935][T11890] syz.1.3333[11890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.082759][T11900] netlink: 392 bytes leftover after parsing attributes in process `syz.1.3337'. [ 132.452257][T11923] netlink: 392 bytes leftover after parsing attributes in process `syz.3.3346'. [ 132.568813][T11935] bond_slave_1: mtu greater than device maximum [ 132.724940][T11946] syz.3.3355[11946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.846106][T11951] netlink: 76 bytes leftover after parsing attributes in process `syz.0.3356'. [ 133.336419][T11969] netlink: 392 bytes leftover after parsing attributes in process `syz.4.3364'. [ 133.722858][T11985] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 133.862473][T12001] bond_slave_1: mtu greater than device maximum [ 133.977004][T12009] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3381'. [ 134.018208][T12012] netlink: 76 bytes leftover after parsing attributes in process `syz.3.3380'. [ 134.313414][T12038] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 134.371539][T12044] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3397'. [ 134.515701][ T29] kauditd_printk_skb: 810 callbacks suppressed [ 134.515713][ T29] audit: type=1326 audit(1733270004.170:32244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12060 comm="syz.4.3405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 134.541333][T12064] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 134.545680][ T29] audit: type=1326 audit(1733270004.170:32245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12060 comm="syz.4.3405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 134.579572][ T29] audit: type=1326 audit(1733270004.170:32246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12060 comm="syz.4.3405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 134.603574][ T29] audit: type=1326 audit(1733270004.170:32247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12060 comm="syz.4.3405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 134.627273][ T29] audit: type=1326 audit(1733270004.170:32248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12060 comm="syz.4.3405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 134.651033][ T29] audit: type=1404 audit(1733270004.180:32249): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 134.666948][ T29] audit: type=1400 audit(1733270004.190:32250): avc: denied { map_create } for pid=12063 comm="syz.4.3406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 134.686780][ T29] audit: type=1400 audit(1733270004.190:32251): avc: denied { prog_load } for pid=12063 comm="syz.4.3406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 134.706024][ T29] audit: type=1400 audit(1733270004.190:32252): avc: denied { create } for pid=12063 comm="syz.4.3406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 134.725622][ T29] audit: type=1400 audit(1733270004.190:32253): avc: denied { prog_load } for pid=12063 comm="syz.4.3406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 134.820116][T12073] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3409'. [ 134.939495][T12084] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 134.958823][T12086] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 134.991558][T12091] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 135.136167][T12113] netlink: 392 bytes leftover after parsing attributes in process `syz.2.3427'. [ 135.328026][T12143] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 135.941967][T12185] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 135.971848][T12188] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 136.336484][T12222] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 136.474611][T12238] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 137.152710][T12290] bond_slave_1: mtu less than device minimum [ 137.244543][T12295] bpf_get_probe_write_proto: 5 callbacks suppressed [ 137.244561][T12295] syz.2.3504[12295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.251324][T12295] syz.2.3504[12295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.262806][T12295] syz.2.3504[12295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.651383][T12334] __nla_validate_parse: 2 callbacks suppressed [ 137.651399][T12334] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3520'. [ 137.918730][T12347] syz.2.3525[12347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.918875][T12347] syz.2.3525[12347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.934218][T12347] syz.2.3525[12347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.580758][T12354] bond_slave_1: mtu greater than device maximum [ 139.560275][T12377] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3535'. [ 139.575446][ T29] kauditd_printk_skb: 691 callbacks suppressed [ 139.575504][ T29] audit: type=1400 audit(1733270009.230:32945): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 139.603780][ T29] audit: type=1400 audit(1733270009.230:32946): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 139.625603][ T29] audit: type=1400 audit(1733270009.230:32947): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.648035][ T29] audit: type=1400 audit(1733270009.230:32948): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.670736][ T29] audit: type=1400 audit(1733270009.230:32949): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.785581][ T29] audit: type=1400 audit(1733270009.380:32950): avc: denied { unmount } for pid=9669 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 139.805771][ T29] audit: type=1400 audit(1733270009.390:32951): avc: denied { create } for pid=12379 comm="syz.1.3538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 139.825466][ T29] audit: type=1400 audit(1733270009.400:32952): avc: denied { setopt } for pid=12379 comm="syz.1.3538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 139.845223][ T29] audit: type=1400 audit(1733270009.410:32953): avc: denied { write } for pid=12379 comm="syz.1.3538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 139.874680][T12384] xt_check_target: 5 callbacks suppressed [ 139.874697][T12384] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 139.901533][ T29] audit: type=1400 audit(1733270009.530:32954): avc: denied { create } for pid=12382 comm="syz.2.3539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 139.970861][T12388] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 140.027403][T12396] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 140.078268][T12402] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3547'. [ 140.518444][T12415] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 140.642017][T12426] FAULT_INJECTION: forcing a failure. [ 140.642017][T12426] name failslab, interval 1, probability 0, space 0, times 0 [ 140.654725][T12426] CPU: 1 UID: 0 PID: 12426 Comm: syz.1.3557 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 140.667051][T12426] Tainted: [W]=WARN [ 140.670852][T12426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 140.680914][T12426] Call Trace: [ 140.684201][T12426] [ 140.687138][T12426] dump_stack_lvl+0xf2/0x150 [ 140.691738][T12426] dump_stack+0x15/0x1a [ 140.695905][T12426] should_fail_ex+0x223/0x230 [ 140.700710][T12426] should_failslab+0x8f/0xb0 [ 140.705367][T12426] kmem_cache_alloc_node_noprof+0x59/0x320 [ 140.711186][T12426] ? __alloc_skb+0x10b/0x310 [ 140.715852][T12426] __alloc_skb+0x10b/0x310 [ 140.720270][T12426] _sctp_make_chunk+0x53/0x210 [ 140.725114][T12426] sctp_make_abort_user+0x3f/0x500 [ 140.730239][T12426] sctp_close+0x198/0x550 [ 140.734641][T12426] ? __memcg_slab_free_hook+0x69/0x1e0 [ 140.740118][T12426] ? ip_mc_drop_socket+0x1ae/0x1d0 [ 140.745252][T12426] inet_release+0xce/0xf0 [ 140.749579][T12426] sock_close+0x68/0x150 [ 140.753843][T12426] ? __pfx_sock_close+0x10/0x10 [ 140.758750][T12426] __fput+0x17a/0x6d0 [ 140.762786][T12426] ____fput+0x1c/0x30 [ 140.766761][T12426] task_work_run+0x13a/0x1a0 [ 140.771499][T12426] syscall_exit_to_user_mode+0xa8/0x120 [ 140.777169][T12426] do_syscall_64+0xd6/0x1c0 [ 140.781665][T12426] ? clear_bhb_loop+0x55/0xb0 [ 140.786393][T12426] ? clear_bhb_loop+0x55/0xb0 [ 140.791064][T12426] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.797113][T12426] RIP: 0033:0x7f60e0adff19 [ 140.801523][T12426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.821165][T12426] RSP: 002b:00007f60df157058 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 140.829705][T12426] RAX: 0000000000000000 RBX: 00007f60e0ca5fa0 RCX: 00007f60e0adff19 [ 140.837670][T12426] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000000 [ 140.845636][T12426] RBP: 00007f60df1570a0 R08: 0000000000000000 R09: 0000000000000000 [ 140.853737][T12426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.861699][T12426] R13: 0000000000000000 R14: 00007f60e0ca5fa0 R15: 00007ffe03144068 [ 140.869681][T12426] [ 140.960094][T12439] hsr0: entered promiscuous mode [ 140.972038][T12439] macsec1: entered allmulticast mode [ 140.977386][T12439] hsr0: entered allmulticast mode [ 140.982421][T12439] hsr_slave_0: entered allmulticast mode [ 140.988320][T12439] hsr_slave_1: entered allmulticast mode [ 141.393455][T12463] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 141.605979][T12478] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3572'. [ 141.949187][T12491] syz.4.3580[12491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.949265][T12491] syz.4.3580[12491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.976884][T12491] syz.4.3580[12491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.200176][T12509] netlink: 76 bytes leftover after parsing attributes in process `syz.4.3586'. [ 142.829512][T12550] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 142.875249][T12555] FAULT_INJECTION: forcing a failure. [ 142.875249][T12555] name failslab, interval 1, probability 0, space 0, times 0 [ 142.887998][T12555] CPU: 1 UID: 0 PID: 12555 Comm: syz.4.3602 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 142.900345][T12555] Tainted: [W]=WARN [ 142.904197][T12555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 142.914267][T12555] Call Trace: [ 142.917567][T12555] [ 142.920500][T12555] dump_stack_lvl+0xf2/0x150 [ 142.925109][T12555] dump_stack+0x15/0x1a [ 142.929450][T12555] should_fail_ex+0x223/0x230 [ 142.934152][T12555] should_failslab+0x8f/0xb0 [ 142.938828][T12555] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 142.944614][T12555] ? __d_alloc+0x3d/0x340 [ 142.948949][T12555] __d_alloc+0x3d/0x340 [ 142.953112][T12555] d_alloc_pseudo+0x1e/0x80 [ 142.957613][T12555] alloc_file_pseudo+0x70/0x140 [ 142.962517][T12555] __shmem_file_setup+0x1bb/0x1f0 [ 142.967584][T12555] shmem_file_setup+0x3b/0x50 [ 142.972263][T12555] __se_sys_memfd_create+0x31d/0x5c0 [ 142.977557][T12555] __x64_sys_memfd_create+0x31/0x40 [ 142.982760][T12555] x64_sys_call+0x2d4c/0x2dc0 [ 142.987446][T12555] do_syscall_64+0xc9/0x1c0 [ 142.992015][T12555] ? clear_bhb_loop+0x55/0xb0 [ 142.996762][T12555] ? clear_bhb_loop+0x55/0xb0 [ 143.001451][T12555] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 143.007425][T12555] RIP: 0033:0x7fe7f60aff19 [ 143.011858][T12555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.031535][T12555] RSP: 002b:00007fe7f4726e38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 143.039945][T12555] RAX: ffffffffffffffda RBX: 00000000000004c1 RCX: 00007fe7f60aff19 [ 143.047911][T12555] RDX: 00007fe7f4726f10 RSI: 0000000000000000 RDI: 00007fe7f6124209 [ 143.055883][T12555] RBP: 0000000020000680 R08: 00007fe7f4726bd7 R09: 00007fe7f4726e60 [ 143.063843][T12555] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000640 [ 143.071865][T12555] R13: 00007fe7f4726f10 R14: 00007fe7f4726ed0 R15: 00000000200001c0 [ 143.079850][T12555] [ 143.083860][T12554] netlink: 76 bytes leftover after parsing attributes in process `syz.1.3603'. [ 143.197121][T12568] tmpfs: Unknown parameter 'Iÿÿÿÿÿÿÿû' [ 143.416405][T12575] netlink: 392 bytes leftover after parsing attributes in process `syz.0.3610'. [ 143.950619][T12597] bond_slave_1: mtu greater than device maximum [ 144.563441][T12614] netlink: 392 bytes leftover after parsing attributes in process `syz.0.3623'. [ 144.820979][ T29] kauditd_printk_skb: 608 callbacks suppressed [ 144.821020][ T29] audit: type=1326 audit(1733270014.470:33563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12618 comm="syz.2.3625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 144.852271][T12619] FAULT_INJECTION: forcing a failure. [ 144.852271][T12619] name failslab, interval 1, probability 0, space 0, times 0 [ 144.864971][T12619] CPU: 0 UID: 0 PID: 12619 Comm: syz.2.3625 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 144.877328][T12619] Tainted: [W]=WARN [ 144.881261][T12619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 144.891318][T12619] Call Trace: [ 144.894596][T12619] [ 144.897584][T12619] dump_stack_lvl+0xf2/0x150 [ 144.902183][T12619] dump_stack+0x15/0x1a [ 144.906368][T12619] should_fail_ex+0x223/0x230 [ 144.911089][T12619] should_failslab+0x8f/0xb0 [ 144.915746][T12619] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 144.922095][T12619] ? sidtab_sid2str_get+0xb8/0x140 [ 144.927228][T12619] kmemdup_noprof+0x2a/0x60 [ 144.931743][T12619] sidtab_sid2str_get+0xb8/0x140 [ 144.936790][T12619] security_sid_to_context_core+0x1eb/0x2f0 [ 144.942697][T12619] security_sid_to_context+0x27/0x30 [ 144.947987][T12619] selinux_lsmprop_to_secctx+0x2c/0x40 [ 144.953482][T12619] security_lsmprop_to_secctx+0x4a/0x90 [ 144.959133][T12619] audit_log_task_context+0x93/0x1c0 [ 144.964508][T12619] audit_log_task+0xf9/0x1c0 [ 144.969155][T12619] audit_seccomp+0x68/0x130 [ 144.973670][T12619] __seccomp_filter+0x6fa/0x1180 [ 144.978622][T12619] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 144.984285][T12619] ? vfs_write+0x596/0x920 [ 144.988797][T12619] ? putname+0xcf/0xf0 [ 144.993043][T12619] __secure_computing+0x9f/0x1c0 [ 144.998008][T12619] syscall_trace_enter+0xd1/0x1f0 [ 145.003104][T12619] ? fpregs_assert_state_consistent+0x83/0xa0 [ 145.009223][T12619] do_syscall_64+0xaa/0x1c0 [ 145.013728][T12619] ? clear_bhb_loop+0x55/0xb0 [ 145.018543][T12619] ? clear_bhb_loop+0x55/0xb0 [ 145.023220][T12619] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.029226][T12619] RIP: 0033:0x7f7f00d1ff19 [ 145.033636][T12619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.053319][T12619] RSP: 002b:00007f7eff397058 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 145.061747][T12619] RAX: ffffffffffffffda RBX: 00007f7f00ee5fa0 RCX: 00007f7f00d1ff19 [ 145.069716][T12619] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffffffffffffff [ 145.077785][T12619] RBP: 00007f7eff3970a0 R08: 0000000000000000 R09: 0000000000000000 [ 145.085750][T12619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.091604][ T29] audit: type=1326 audit(1733270014.510:33564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12618 comm="syz.2.3625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 145.093735][T12619] R13: 0000000000000000 R14: 00007f7f00ee5fa0 R15: 00007ffd47386b78 [ 145.117321][ T29] audit: type=1326 audit(1733270014.510:33565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12618 comm="syz.2.3625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 145.125197][T12619] [ 145.125518][T12619] audit: error in audit_log_task_context [ 145.148911][ T29] audit: type=1326 audit(1733270014.510:33566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12618 comm="syz.2.3625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 145.148950][ T29] audit: type=1326 audit(1733270014.510:33567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12618 comm="syz.2.3625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 145.148986][ T29] audit: type=1326 audit(1733270014.510:33568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12618 comm="syz.2.3625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 145.149008][ T29] audit: type=1326 audit(1733270014.510:33569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12618 comm="syz.2.3625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 145.149089][ T29] audit: type=1326 audit(1733270014.510:33570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12618 comm="syz.2.3625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7f00d1e880 code=0x7ffc0000 [ 145.207807][T12625] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3626'. [ 145.228893][ T29] audit: type=1326 audit(1733270014.510:33571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12618 comm="syz.2.3625" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f7f00d1e9cf code=0x7ffc0000 [ 145.350906][T12621] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 145.370317][T12629] bond_slave_1: mtu greater than device maximum [ 145.436242][T12638] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3634'. [ 145.523389][T12649] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 145.576399][T12654] syz.1.3640[12654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.576551][T12654] syz.1.3640[12654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.588699][T12654] syz.1.3640[12654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.618061][T12656] syz.3.3641[12656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.629626][T12656] syz.3.3641[12656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.641680][T12656] syz.3.3641[12656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.819432][T12669] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3647'. [ 145.874528][T12676] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 145.953412][T12686] syz.1.3655[12686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.953486][T12686] syz.1.3655[12686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.978403][T12686] syz.1.3655[12686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.103690][T12696] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3659'. [ 146.272946][T12706] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 146.313888][T12709] netlink: 20 bytes leftover after parsing attributes in process `syz.4.3664'. [ 146.559732][T12720] bond_slave_1: mtu greater than device maximum [ 146.644369][T12723] syz.1.3670[12723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.742179][T12728] rdma_op ffff888136839180 conn xmit_rdma 0000000000000000 [ 146.865317][T12732] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3671'. [ 146.947351][T12734] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 147.341912][T12745] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3676'. [ 147.498696][T12758] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 147.828133][T12776] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 148.106101][T12790] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 148.161308][T12795] __nla_validate_parse: 2 callbacks suppressed [ 148.161323][T12795] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3695'. [ 148.290994][T12803] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3698'. [ 148.385036][T12807] FAULT_INJECTION: forcing a failure. [ 148.385036][T12807] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.398188][T12807] CPU: 0 UID: 0 PID: 12807 Comm: syz.3.3700 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 148.410521][T12807] Tainted: [W]=WARN [ 148.414323][T12807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 148.424459][T12807] Call Trace: [ 148.427782][T12807] [ 148.430707][T12807] dump_stack_lvl+0xf2/0x150 [ 148.435317][T12807] dump_stack+0x15/0x1a [ 148.439485][T12807] should_fail_ex+0x223/0x230 [ 148.444167][T12807] should_fail+0xb/0x10 [ 148.448390][T12807] should_fail_usercopy+0x1a/0x20 [ 148.453459][T12807] _copy_from_user+0x1e/0xb0 [ 148.458056][T12807] copy_msghdr_from_user+0x54/0x2a0 [ 148.463336][T12807] ? __fget_files+0x17c/0x1c0 [ 148.468027][T12807] __sys_sendmsg+0x13e/0x230 [ 148.472718][T12807] __x64_sys_sendmsg+0x46/0x50 [ 148.477516][T12807] x64_sys_call+0x2734/0x2dc0 [ 148.482192][T12807] do_syscall_64+0xc9/0x1c0 [ 148.486723][T12807] ? clear_bhb_loop+0x55/0xb0 [ 148.491403][T12807] ? clear_bhb_loop+0x55/0xb0 [ 148.496077][T12807] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.501990][T12807] RIP: 0033:0x7f2c0699ff19 [ 148.506420][T12807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.526045][T12807] RSP: 002b:00007f2c05017058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 148.534454][T12807] RAX: ffffffffffffffda RBX: 00007f2c06b65fa0 RCX: 00007f2c0699ff19 [ 148.542491][T12807] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 148.550454][T12807] RBP: 00007f2c050170a0 R08: 0000000000000000 R09: 0000000000000000 [ 148.558413][T12807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.566376][T12807] R13: 0000000000000000 R14: 00007f2c06b65fa0 R15: 00007ffd6e6f8918 [ 148.574373][T12807] [ 148.760890][T12815] netlink: 392 bytes leftover after parsing attributes in process `syz.3.3704'. [ 149.137595][T12824] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(14) [ 149.144280][T12824] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 149.151818][T12824] vhci_hcd vhci_hcd.0: Device attached [ 149.160346][T12821] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3705'. [ 149.188754][T12826] vhci_hcd: connection closed [ 149.199658][ T3412] vhci_hcd: stop threads [ 149.208949][ T3412] vhci_hcd: release socket [ 149.213396][ T3412] vhci_hcd: disconnect device [ 149.512487][T12854] netlink: 76 bytes leftover after parsing attributes in process `syz.1.3716'. [ 149.870055][ T29] kauditd_printk_skb: 429 callbacks suppressed [ 149.870068][ T29] audit: type=1400 audit(1733270019.530:34001): avc: denied { write } for pid=12867 comm="syz.3.3724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 149.976242][ T29] audit: type=1326 audit(1733270019.620:34002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12869 comm="syz.1.3725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 149.999865][ T29] audit: type=1326 audit(1733270019.620:34003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12869 comm="syz.1.3725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 150.023519][ T29] audit: type=1326 audit(1733270019.620:34004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12869 comm="syz.1.3725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f60e0adff53 code=0x7ffc0000 [ 150.047314][ T29] audit: type=1326 audit(1733270019.620:34005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12869 comm="syz.1.3725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f60e0ade9cf code=0x7ffc0000 [ 150.088405][T12878] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 150.097172][ T29] audit: type=1326 audit(1733270019.630:34006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12869 comm="syz.1.3725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f60e0adffa7 code=0x7ffc0000 [ 150.122310][ T29] audit: type=1326 audit(1733270019.630:34007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12869 comm="syz.1.3725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f60e0ade880 code=0x7ffc0000 [ 150.145928][ T29] audit: type=1326 audit(1733270019.630:34008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12869 comm="syz.1.3725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f60e0adeb7a code=0x7ffc0000 [ 150.169614][ T29] audit: type=1326 audit(1733270019.630:34009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12869 comm="syz.1.3725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 150.193259][ T29] audit: type=1326 audit(1733270019.630:34010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12869 comm="syz.1.3725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 150.341244][T12890] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(14) [ 150.347922][T12890] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 150.355483][T12890] vhci_hcd vhci_hcd.0: Device attached [ 150.471311][T12895] vhci_hcd: connection closed [ 150.471751][ T55] vhci_hcd: stop threads [ 150.480901][ T55] vhci_hcd: release socket [ 150.485423][ T55] vhci_hcd: disconnect device [ 150.491992][T12907] netlink: 76 bytes leftover after parsing attributes in process `syz.3.3736'. [ 150.917903][T12931] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 151.225578][T12943] netlink: 76 bytes leftover after parsing attributes in process `syz.3.3753'. [ 151.302104][T12947] bpf_get_probe_write_proto: 11 callbacks suppressed [ 151.302119][T12947] syz.0.3755[12947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.309793][T12947] syz.0.3755[12947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.323334][T12947] syz.0.3755[12947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.337630][T12951] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 151.566636][T12962] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(13) [ 151.573262][T12962] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 151.580791][T12962] vhci_hcd vhci_hcd.0: Device attached [ 151.695660][T12970] vhci_hcd: connection closed [ 151.695904][ T11] vhci_hcd: stop threads [ 151.704970][ T11] vhci_hcd: release socket [ 151.709386][ T11] vhci_hcd: disconnect device [ 151.887550][T12984] netlink: 76 bytes leftover after parsing attributes in process `syz.4.3768'. [ 152.321934][T13016] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 152.874972][T13045] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(13) [ 152.881674][T13045] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 152.889112][T13045] vhci_hcd vhci_hcd.0: Device attached [ 152.913025][T13054] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 153.003108][T13051] vhci_hcd: connection closed [ 153.003288][ T40] vhci_hcd: stop threads [ 153.012317][ T40] vhci_hcd: release socket [ 153.016755][ T40] vhci_hcd: disconnect device [ 153.253575][T13069] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3803'. [ 153.330952][T13073] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3805'. [ 153.360456][T13080] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 153.665881][T13106] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3818'. [ 153.874740][T13119] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 153.935635][T13129] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 153.987332][T13135] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3831'. [ 154.048045][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 154.063109][T13140] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 154.102474][T13142] netlink: 392 bytes leftover after parsing attributes in process `syz.0.3834'. [ 154.327932][T13156] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 154.614239][T13168] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 154.776050][T13178] netlink: 76 bytes leftover after parsing attributes in process `syz.4.3846'. [ 154.917146][T13182] netlink: 392 bytes leftover after parsing attributes in process `syz.3.3849'. [ 155.139347][ T29] kauditd_printk_skb: 999 callbacks suppressed [ 155.139364][ T29] audit: type=1400 audit(1733270024.790:35010): avc: denied { write } for pid=13190 comm="syz.0.3850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 155.139500][T13191] netlink: 100 bytes leftover after parsing attributes in process `syz.0.3850'. [ 155.270002][T13198] vcan1: entered promiscuous mode [ 155.284224][ T29] audit: type=1326 audit(1733270024.910:35011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13192 comm="syz.3.3854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 155.287703][T13203] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3857'. [ 155.307897][ T29] audit: type=1326 audit(1733270024.910:35012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13192 comm="syz.3.3854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 155.307926][ T29] audit: type=1326 audit(1733270024.910:35013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13192 comm="syz.3.3854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 155.307949][ T29] audit: type=1326 audit(1733270024.910:35014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13192 comm="syz.3.3854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 155.307975][ T29] audit: type=1326 audit(1733270024.910:35015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13192 comm="syz.3.3854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 155.308093][ T29] audit: type=1326 audit(1733270024.910:35016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13192 comm="syz.3.3854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 155.308117][ T29] audit: type=1326 audit(1733270024.910:35017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13192 comm="syz.3.3854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 155.308195][ T29] audit: type=1326 audit(1733270024.910:35018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13192 comm="syz.3.3854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 155.308224][ T29] audit: type=1326 audit(1733270024.910:35019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13192 comm="syz.3.3854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c0699ff19 code=0x7ffc0000 [ 155.728040][T13217] syz.1.3864[13217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.728167][T13217] syz.1.3864[13217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.757051][T13217] syz.1.3864[13217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.991903][T13228] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 156.026630][T13230] syz.0.3868[13230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.026692][T13230] syz.0.3868[13230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.044769][T13230] syz.0.3868[13230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.086196][T13234] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3870'. [ 156.110696][T13232] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 156.206241][T13236] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 156.267030][T13241] syz.0.3875[13241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.321760][T13250] FAULT_INJECTION: forcing a failure. [ 156.321760][T13250] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.346284][T13250] CPU: 1 UID: 0 PID: 13250 Comm: syz.2.3878 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 156.358569][T13250] Tainted: [W]=WARN [ 156.362377][T13250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 156.372431][T13250] Call Trace: [ 156.375711][T13250] [ 156.378744][T13250] dump_stack_lvl+0xf2/0x150 [ 156.383371][T13250] dump_stack+0x15/0x1a [ 156.387728][T13250] should_fail_ex+0x223/0x230 [ 156.392485][T13250] should_fail+0xb/0x10 [ 156.396750][T13250] should_fail_usercopy+0x1a/0x20 [ 156.401836][T13250] _copy_from_user+0x1e/0xb0 [ 156.406513][T13250] usbdev_ioctl+0x18bf/0x3e00 [ 156.411217][T13250] ? do_vfs_ioctl+0x96e/0x1530 [ 156.416076][T13250] ? selinux_file_ioctl+0x2f7/0x380 [ 156.421367][T13250] ? __fget_files+0x17c/0x1c0 [ 156.426069][T13250] ? __pfx_usbdev_ioctl+0x10/0x10 [ 156.431100][T13250] __se_sys_ioctl+0xc9/0x140 [ 156.435709][T13250] __x64_sys_ioctl+0x43/0x50 [ 156.440316][T13250] x64_sys_call+0x1690/0x2dc0 [ 156.445147][T13250] do_syscall_64+0xc9/0x1c0 [ 156.449719][T13250] ? clear_bhb_loop+0x55/0xb0 [ 156.454407][T13250] ? clear_bhb_loop+0x55/0xb0 [ 156.459090][T13250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.465069][T13250] RIP: 0033:0x7f7f00d1ff19 [ 156.469514][T13250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.489136][T13250] RSP: 002b:00007f7eff397058 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 156.497559][T13250] RAX: ffffffffffffffda RBX: 00007f7f00ee5fa0 RCX: 00007f7f00d1ff19 [ 156.505550][T13250] RDX: 0000000020000000 RSI: 00000000802c550a RDI: 0000000000000003 [ 156.513603][T13250] RBP: 00007f7eff3970a0 R08: 0000000000000000 R09: 0000000000000000 [ 156.521604][T13250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.529588][T13250] R13: 0000000000000000 R14: 00007f7f00ee5fa0 R15: 00007ffd47386b78 [ 156.537904][T13250] [ 156.641527][T13257] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 156.885946][T13299] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 156.987619][T13308] FAULT_INJECTION: forcing a failure. [ 156.987619][T13308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 157.000903][T13308] CPU: 0 UID: 0 PID: 13308 Comm: syz.1.3900 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 157.013237][T13308] Tainted: [W]=WARN [ 157.017063][T13308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 157.027142][T13308] Call Trace: [ 157.030425][T13308] [ 157.033358][T13308] dump_stack_lvl+0xf2/0x150 [ 157.038076][T13308] dump_stack+0x15/0x1a [ 157.042341][T13308] should_fail_ex+0x223/0x230 [ 157.047047][T13308] should_fail+0xb/0x10 [ 157.051262][T13308] should_fail_usercopy+0x1a/0x20 [ 157.056368][T13308] _copy_from_user+0x1e/0xb0 [ 157.061041][T13308] copy_msghdr_from_user+0x54/0x2a0 [ 157.066270][T13308] ? __fget_files+0x17c/0x1c0 [ 157.071017][T13308] __sys_sendmmsg+0x1e8/0x4b0 [ 157.075779][T13308] __x64_sys_sendmmsg+0x57/0x70 [ 157.080637][T13308] x64_sys_call+0x29aa/0x2dc0 [ 157.085377][T13308] do_syscall_64+0xc9/0x1c0 [ 157.089894][T13308] ? clear_bhb_loop+0x55/0xb0 [ 157.094585][T13308] ? clear_bhb_loop+0x55/0xb0 [ 157.099334][T13308] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 157.105243][T13308] RIP: 0033:0x7f60e0adff19 [ 157.109699][T13308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.129378][T13308] RSP: 002b:00007f60df157058 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 157.137812][T13308] RAX: ffffffffffffffda RBX: 00007f60e0ca5fa0 RCX: 00007f60e0adff19 [ 157.145793][T13308] RDX: 0000000000000318 RSI: 00000000200bd000 RDI: 0000000000000005 [ 157.153778][T13308] RBP: 00007f60df1570a0 R08: 0000000000000000 R09: 0000000000000000 [ 157.161760][T13308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 157.169747][T13308] R13: 0000000000000000 R14: 00007f60e0ca5fa0 R15: 00007ffe03144068 [ 157.177802][T13308] [ 157.445795][T13333] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 157.531899][T13341] FAULT_INJECTION: forcing a failure. [ 157.531899][T13341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 157.545050][T13341] CPU: 1 UID: 0 PID: 13341 Comm: syz.3.3916 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 157.557437][T13341] Tainted: [W]=WARN [ 157.561287][T13341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 157.571430][T13341] Call Trace: [ 157.574713][T13341] [ 157.577687][T13341] dump_stack_lvl+0xf2/0x150 [ 157.582302][T13341] dump_stack+0x15/0x1a [ 157.586476][T13341] should_fail_ex+0x223/0x230 [ 157.591161][T13341] should_fail+0xb/0x10 [ 157.595375][T13341] should_fail_usercopy+0x1a/0x20 [ 157.600444][T13341] _copy_from_user+0x1e/0xb0 [ 157.605109][T13341] copy_msghdr_from_user+0x54/0x2a0 [ 157.610323][T13341] ? __fget_files+0x17c/0x1c0 [ 157.615050][T13341] __sys_sendmsg+0x13e/0x230 [ 157.619757][T13341] __x64_sys_sendmsg+0x46/0x50 [ 157.624522][T13341] x64_sys_call+0x2734/0x2dc0 [ 157.629206][T13341] do_syscall_64+0xc9/0x1c0 [ 157.633715][T13341] ? clear_bhb_loop+0x55/0xb0 [ 157.638393][T13341] ? clear_bhb_loop+0x55/0xb0 [ 157.643084][T13341] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 157.649120][T13341] RIP: 0033:0x7f2c0699ff19 [ 157.653543][T13341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.673262][T13341] RSP: 002b:00007f2c05017058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 157.681691][T13341] RAX: ffffffffffffffda RBX: 00007f2c06b65fa0 RCX: 00007f2c0699ff19 [ 157.689791][T13341] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 157.697764][T13341] RBP: 00007f2c050170a0 R08: 0000000000000000 R09: 0000000000000000 [ 157.705729][T13341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 157.713734][T13341] R13: 0000000000000000 R14: 00007f2c06b65fa0 R15: 00007ffd6e6f8918 [ 157.721774][T13341] [ 157.935548][T13365] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 158.137056][T13382] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 158.219880][T13387] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 158.430854][T13397] bpf_get_probe_write_proto: 2 callbacks suppressed [ 158.430868][T13397] syz.2.3940[13397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.446775][T13397] syz.2.3940[13397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.464011][T13397] syz.2.3940[13397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.488955][T13401] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 158.600435][T13414] syz.1.3948[13414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.600597][T13414] syz.1.3948[13414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.619491][T13416] syz.4.3947[13416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.631084][T13416] syz.4.3947[13416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.642680][T13416] syz.4.3947[13416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.668065][T13408] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(13) [ 158.674480][T13414] syz.1.3948[13414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.679451][T13408] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 158.704983][T13408] vhci_hcd vhci_hcd.0: Device attached [ 158.853097][T13417] vhci_hcd: connection closed [ 158.869264][ T55] vhci_hcd: stop threads [ 158.878295][ T55] vhci_hcd: release socket [ 158.882764][ T55] vhci_hcd: disconnect device [ 158.887552][ T2963] vhci_hcd: vhci_device speed not set [ 159.151430][T13455] __nla_validate_parse: 4 callbacks suppressed [ 159.151445][T13455] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3959'. [ 159.556659][T13479] netlink: 392 bytes leftover after parsing attributes in process `syz.2.3973'. [ 159.578767][T13480] netlink: 392 bytes leftover after parsing attributes in process `syz.3.3974'. [ 159.978439][T13498] netlink: 76 bytes leftover after parsing attributes in process `syz.0.3977'. [ 160.174278][ T29] kauditd_printk_skb: 837 callbacks suppressed [ 160.174293][ T29] audit: type=1326 audit(1733270029.760:35857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13508 comm="syz.2.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 160.203925][ T29] audit: type=1400 audit(1733270029.760:35858): avc: denied { execmem } for pid=13508 comm="syz.2.3982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 160.254384][ T29] audit: type=1326 audit(1733270029.830:35859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13508 comm="syz.2.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 160.278269][ T29] audit: type=1326 audit(1733270029.830:35860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13508 comm="syz.2.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 160.301890][ T29] audit: type=1326 audit(1733270029.900:35861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13508 comm="syz.2.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 160.325581][ T29] audit: type=1326 audit(1733270029.900:35862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13508 comm="syz.2.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 160.349210][ T29] audit: type=1326 audit(1733270029.910:35863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13508 comm="syz.2.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 160.373246][ T29] audit: type=1400 audit(1733270030.010:35864): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 160.395399][ T29] audit: type=1400 audit(1733270030.010:35865): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 160.417060][ T29] audit: type=1400 audit(1733270030.010:35866): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 160.450815][T13512] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(13) [ 160.452532][T13516] syz.0.3983[13516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.457437][T13512] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 160.457561][T13512] vhci_hcd vhci_hcd.0: Device attached [ 160.496650][T13513] vhci_hcd: connection closed [ 160.511978][ T40] vhci_hcd: stop threads [ 160.521008][ T40] vhci_hcd: release socket [ 160.525475][ T40] vhci_hcd: disconnect device [ 160.802501][T13528] netlink: 392 bytes leftover after parsing attributes in process `syz.4.3988'. [ 161.213137][T13551] netlink: 76 bytes leftover after parsing attributes in process `syz.4.3995'. [ 161.428455][T13542] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3993'. [ 161.639590][T13557] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3997'. [ 161.769352][T13567] xt_check_target: 6 callbacks suppressed [ 161.769412][T13567] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 161.984662][T13578] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(11) [ 161.991287][T13578] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 161.998724][T13578] vhci_hcd vhci_hcd.0: Device attached [ 162.115651][T13583] vhci_hcd: connection closed [ 162.116366][ T170] vhci_hcd: stop threads [ 162.125437][ T170] vhci_hcd: release socket [ 162.129865][ T170] vhci_hcd: disconnect device [ 162.215282][ T2963] vhci_hcd: vhci_device speed not set [ 162.423888][T13595] netlink: 392 bytes leftover after parsing attributes in process `syz.4.4011'. [ 162.763857][T13612] FAULT_INJECTION: forcing a failure. [ 162.763857][T13612] name failslab, interval 1, probability 0, space 0, times 0 [ 162.776614][T13612] CPU: 1 UID: 0 PID: 13612 Comm: syz.0.4017 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 162.788865][T13612] Tainted: [W]=WARN [ 162.792671][T13612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 162.802813][T13612] Call Trace: [ 162.806089][T13612] [ 162.809114][T13612] dump_stack_lvl+0xf2/0x150 [ 162.813753][T13612] dump_stack+0x15/0x1a [ 162.817922][T13612] should_fail_ex+0x223/0x230 [ 162.822641][T13612] should_failslab+0x8f/0xb0 [ 162.827355][T13612] __kmalloc_node_noprof+0xad/0x410 [ 162.832647][T13612] ? vmemdup_user+0x42/0x1b0 [ 162.837245][T13612] vmemdup_user+0x42/0x1b0 [ 162.841673][T13612] path_setxattrat+0x1c9/0x310 [ 162.846488][T13612] __x64_sys_fsetxattr+0x6d/0x80 [ 162.851434][T13612] x64_sys_call+0x29d2/0x2dc0 [ 162.856114][T13612] do_syscall_64+0xc9/0x1c0 [ 162.860640][T13612] ? clear_bhb_loop+0x55/0xb0 [ 162.865320][T13612] ? clear_bhb_loop+0x55/0xb0 [ 162.870075][T13612] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 162.875981][T13612] RIP: 0033:0x7fc9c9f2ff19 [ 162.880429][T13612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.900046][T13612] RSP: 002b:00007fc9c85a7058 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 162.908588][T13612] RAX: ffffffffffffffda RBX: 00007fc9ca0f5fa0 RCX: 00007fc9c9f2ff19 [ 162.916562][T13612] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000004 [ 162.924550][T13612] RBP: 00007fc9c85a70a0 R08: 0000000000000000 R09: 0000000000000000 [ 162.932538][T13612] R10: 000000000000001e R11: 0000000000000246 R12: 0000000000000001 [ 162.940516][T13612] R13: 0000000000000000 R14: 00007fc9ca0f5fa0 R15: 00007fffaaa642c8 [ 162.948527][T13612] [ 163.052905][T13622] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4021'. [ 163.650045][T13627] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 163.998638][T13634] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(11) [ 164.005285][T13634] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 164.012815][T13634] vhci_hcd vhci_hcd.0: Device attached [ 164.020345][T13636] vhci_hcd: connection closed [ 164.020563][ T40] vhci_hcd: stop threads [ 164.029569][ T40] vhci_hcd: release socket [ 164.033978][ T40] vhci_hcd: disconnect device [ 164.958495][T13680] bpf_get_probe_write_proto: 5 callbacks suppressed [ 164.958513][T13680] syz.1.4043[13680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.966946][T13680] syz.1.4043[13680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.980583][T13680] syz.1.4043[13680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.135864][T13692] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 165.185172][ T29] kauditd_printk_skb: 643 callbacks suppressed [ 165.185196][ T29] audit: type=1400 audit(1733270034.840:36510): avc: denied { create } for pid=13691 comm="syz.1.4047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 165.258187][ T29] audit: type=1400 audit(1733270034.910:36511): avc: denied { create } for pid=13688 comm="syz.2.4046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 165.307492][ T29] audit: type=1400 audit(1733270034.940:36512): avc: denied { write } for pid=13688 comm="syz.2.4046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 165.328085][ T29] audit: type=1400 audit(1733270034.940:36513): avc: denied { read } for pid=13688 comm="syz.2.4046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 165.348577][ T29] audit: type=1400 audit(1733270034.940:36514): avc: denied { read write } for pid=13688 comm="syz.2.4046" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 165.372850][ T29] audit: type=1400 audit(1733270034.940:36515): avc: denied { open } for pid=13688 comm="syz.2.4046" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 165.397252][ T29] audit: type=1400 audit(1733270034.940:36516): avc: denied { create } for pid=13688 comm="syz.2.4046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 165.417021][ T29] audit: type=1400 audit(1733270034.950:36517): avc: denied { ioctl } for pid=13688 comm="syz.2.4046" path="socket:[42570]" dev="sockfs" ino=42570 ioctlcmd=0x8906 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 165.441989][ T29] audit: type=1400 audit(1733270034.950:36518): avc: denied { read } for pid=13688 comm="syz.2.4046" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 165.472493][ T29] audit: type=1400 audit(1733270034.980:36519): avc: denied { name_bind } for pid=13697 comm="syz.1.4050" src=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hi_reserved_port_t tclass=udp_socket permissive=1 [ 165.510105][T13705] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 165.942826][T13722] netlink: 76 bytes leftover after parsing attributes in process `syz.2.4057'. [ 166.138764][T13728] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4059'. [ 166.334957][T13731] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 166.410086][T13734] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 166.618075][T13743] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 166.893738][T13763] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4075'. [ 167.278452][T13771] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 167.590214][T13778] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 167.931685][T13799] netlink: 392 bytes leftover after parsing attributes in process `syz.4.4089'. [ 168.266910][T13814] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 168.317196][T13820] syz.1.4097[13820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.317383][T13820] syz.1.4097[13820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.328919][T13820] syz.1.4097[13820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.366700][T13824] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 168.433335][T13830] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4100'. [ 168.542383][T13838] netlink: 76 bytes leftover after parsing attributes in process `syz.3.4099'. [ 168.643956][T13841] netlink: 392 bytes leftover after parsing attributes in process `syz.0.4104'. [ 168.890183][T13856] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 169.064912][T13869] syz.0.4114[13869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.064991][T13869] syz.0.4114[13869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.076517][T13869] syz.0.4114[13869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.231781][T13884] netlink: 392 bytes leftover after parsing attributes in process `syz.0.4120'. [ 169.267895][T13891] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 169.354044][T13901] syz.2.4127[13901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.485056][T13905] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4128'. [ 169.539140][T13907] netlink: 392 bytes leftover after parsing attributes in process `syz.2.4129'. [ 169.865828][T13946] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 170.024185][T13949] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(11) [ 170.030803][T13949] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 170.038350][T13949] vhci_hcd vhci_hcd.0: Device attached [ 170.152488][T13952] vhci_hcd: connection closed [ 170.152937][ T55] vhci_hcd: stop threads [ 170.161935][ T55] vhci_hcd: release socket [ 170.166374][ T55] vhci_hcd: disconnect device [ 170.208852][ T29] kauditd_printk_skb: 747 callbacks suppressed [ 170.208933][ T29] audit: type=1326 audit(1733270039.860:37267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13962 comm="syz.4.4150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 170.243101][ T29] audit: type=1326 audit(1733270039.860:37268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13962 comm="syz.4.4150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 170.244328][ T24] vhci_hcd: vhci_device speed not set [ 170.266762][ T29] audit: type=1326 audit(1733270039.900:37269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13962 comm="syz.4.4150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=65 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 170.295489][ T29] audit: type=1326 audit(1733270039.900:37270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13962 comm="syz.4.4150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 170.319195][ T29] audit: type=1326 audit(1733270039.900:37271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13962 comm="syz.4.4150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 170.342874][ T29] audit: type=1326 audit(1733270039.900:37272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13962 comm="syz.4.4150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 170.366517][ T29] audit: type=1326 audit(1733270039.930:37273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13962 comm="syz.4.4150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 170.390630][ T29] audit: type=1326 audit(1733270039.930:37274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13962 comm="syz.4.4150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 170.414475][ T29] audit: type=1326 audit(1733270039.930:37275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13962 comm="syz.4.4150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 170.438159][ T29] audit: type=1326 audit(1733270039.930:37276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13962 comm="syz.4.4150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7f60aff19 code=0x7ffc0000 [ 170.501228][T13981] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 170.747342][T13997] bpf_get_probe_write_proto: 5 callbacks suppressed [ 170.747360][T13997] syz.1.4163[13997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.761706][T13997] syz.1.4163[13997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.801507][T13997] syz.1.4163[13997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.300010][T14018] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 171.498891][T14020] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(11) [ 171.505574][T14020] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 171.513686][T14020] vhci_hcd vhci_hcd.0: Device attached [ 171.539825][T14025] __nla_validate_parse: 4 callbacks suppressed [ 171.539842][T14025] netlink: 392 bytes leftover after parsing attributes in process `syz.3.4174'. [ 171.632637][T14022] vhci_hcd: connection closed [ 171.632797][ T55] vhci_hcd: stop threads [ 171.641783][ T55] vhci_hcd: release socket [ 171.646234][ T55] vhci_hcd: disconnect device [ 171.670430][T14029] netlink: 392 bytes leftover after parsing attributes in process `syz.1.4175'. [ 171.906105][T14038] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4177'. [ 172.138841][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 172.159245][T14055] FAULT_INJECTION: forcing a failure. [ 172.159245][T14055] name failslab, interval 1, probability 0, space 0, times 0 [ 172.172023][T14055] CPU: 0 UID: 0 PID: 14055 Comm: syz.4.4185 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 172.184271][T14055] Tainted: [W]=WARN [ 172.188065][T14055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 172.198118][T14055] Call Trace: [ 172.201480][T14055] [ 172.204425][T14055] dump_stack_lvl+0xf2/0x150 [ 172.209026][T14055] dump_stack+0x15/0x1a [ 172.213313][T14055] should_fail_ex+0x223/0x230 [ 172.217993][T14055] should_failslab+0x8f/0xb0 [ 172.222674][T14055] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 172.228440][T14055] ? __d_alloc+0x3d/0x340 [ 172.232770][T14055] __d_alloc+0x3d/0x340 [ 172.236925][T14055] ? security_inode_alloc+0x37/0x100 [ 172.242276][T14055] d_alloc_pseudo+0x1e/0x80 [ 172.246787][T14055] alloc_file_pseudo+0x70/0x140 [ 172.251638][T14055] ? inode_init_always_gfp+0x4b8/0x4f0 [ 172.257107][T14055] sock_alloc_file+0x9b/0x1c0 [ 172.261793][T14055] do_accept+0x1e3/0x390 [ 172.266064][T14055] __sys_accept4+0xc3/0x150 [ 172.270578][T14055] __x64_sys_accept+0x44/0x50 [ 172.275287][T14055] x64_sys_call+0x29f0/0x2dc0 [ 172.279959][T14055] do_syscall_64+0xc9/0x1c0 [ 172.284462][T14055] ? clear_bhb_loop+0x55/0xb0 [ 172.289132][T14055] ? clear_bhb_loop+0x55/0xb0 [ 172.293865][T14055] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 172.299774][T14055] RIP: 0033:0x7fe7f60aff19 [ 172.304191][T14055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.323797][T14055] RSP: 002b:00007fe7f4727058 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 172.332271][T14055] RAX: ffffffffffffffda RBX: 00007fe7f6275fa0 RCX: 00007fe7f60aff19 [ 172.340338][T14055] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 172.348306][T14055] RBP: 00007fe7f47270a0 R08: 0000000000000000 R09: 0000000000000000 [ 172.356283][T14055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 172.364302][T14055] R13: 0000000000000000 R14: 00007fe7f6275fa0 R15: 00007ffde2b28638 [ 172.372365][T14055] [ 172.583432][T14072] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4192'. [ 172.598388][T14076] netlink: 76 bytes leftover after parsing attributes in process `syz.4.4187'. [ 172.702272][T14082] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 172.918406][T14095] netlink: 392 bytes leftover after parsing attributes in process `syz.2.4200'. [ 172.942971][T14097] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 173.065733][T14107] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 173.271485][T14123] syz.2.4211[14123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.271574][T14123] syz.2.4211[14123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.312914][T14123] syz.2.4211[14123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.317184][T14125] netlink: 76 bytes leftover after parsing attributes in process `syz.3.4208'. [ 173.496438][T14129] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4212'. [ 173.649191][T14133] syz.3.4214[14133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.649326][T14133] syz.3.4214[14133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.687994][T14133] syz.3.4214[14133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.722846][T14141] netlink: 392 bytes leftover after parsing attributes in process `syz.2.4217'. [ 173.766069][T14143] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 173.995079][T14161] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 174.007749][T14163] netlink: 392 bytes leftover after parsing attributes in process `syz.3.4223'. [ 174.270536][T14184] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 174.427869][T14202] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 174.503011][T14208] FAULT_INJECTION: forcing a failure. [ 174.503011][T14208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.516264][T14208] CPU: 1 UID: 0 PID: 14208 Comm: syz.1.4241 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 174.528599][T14208] Tainted: [W]=WARN [ 174.532430][T14208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 174.542540][T14208] Call Trace: [ 174.545872][T14208] [ 174.548803][T14208] dump_stack_lvl+0xf2/0x150 [ 174.553472][T14208] dump_stack+0x15/0x1a [ 174.557647][T14208] should_fail_ex+0x223/0x230 [ 174.562411][T14208] should_fail+0xb/0x10 [ 174.566616][T14208] should_fail_usercopy+0x1a/0x20 [ 174.571716][T14208] _copy_from_user+0x1e/0xb0 [ 174.576388][T14208] copy_msghdr_from_user+0x54/0x2a0 [ 174.581749][T14208] ? __fget_files+0x17c/0x1c0 [ 174.586452][T14208] __sys_sendmsg+0x13e/0x230 [ 174.591098][T14208] __x64_sys_sendmsg+0x46/0x50 [ 174.595873][T14208] x64_sys_call+0x2734/0x2dc0 [ 174.600677][T14208] do_syscall_64+0xc9/0x1c0 [ 174.605190][T14208] ? clear_bhb_loop+0x55/0xb0 [ 174.609868][T14208] ? clear_bhb_loop+0x55/0xb0 [ 174.614548][T14208] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 174.620455][T14208] RIP: 0033:0x7f60e0adff19 [ 174.624982][T14208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.644621][T14208] RSP: 002b:00007f60df157058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 174.653047][T14208] RAX: ffffffffffffffda RBX: 00007f60e0ca5fa0 RCX: 00007f60e0adff19 [ 174.661050][T14208] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 174.669038][T14208] RBP: 00007f60df1570a0 R08: 0000000000000000 R09: 0000000000000000 [ 174.677011][T14208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.685038][T14208] R13: 0000000000000000 R14: 00007f60e0ca5fa0 R15: 00007ffe03144068 [ 174.693025][T14208] [ 174.703373][T14210] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 174.749158][T14214] FAULT_INJECTION: forcing a failure. [ 174.749158][T14214] name failslab, interval 1, probability 0, space 0, times 0 [ 174.761827][T14214] CPU: 1 UID: 0 PID: 14214 Comm: syz.1.4244 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 174.774144][T14214] Tainted: [W]=WARN [ 174.777939][T14214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 174.788091][T14214] Call Trace: [ 174.791361][T14214] [ 174.794286][T14214] dump_stack_lvl+0xf2/0x150 [ 174.798883][T14214] dump_stack+0x15/0x1a [ 174.803081][T14214] should_fail_ex+0x223/0x230 [ 174.807754][T14214] should_failslab+0x8f/0xb0 [ 174.812348][T14214] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 174.818670][T14214] ? audit_log_vformat+0x23a/0x490 [ 174.823814][T14214] ? sidtab_sid2str_get+0xb8/0x140 [ 174.829003][T14214] kmemdup_noprof+0x2a/0x60 [ 174.833562][T14214] sidtab_sid2str_get+0xb8/0x140 [ 174.838497][T14214] security_sid_to_context_core+0x1eb/0x2f0 [ 174.844432][T14214] security_sid_to_context+0x27/0x30 [ 174.849714][T14214] avc_audit_post_callback+0x10d/0x530 [ 174.855176][T14214] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 174.861157][T14214] common_lsm_audit+0x90f/0x1010 [ 174.866147][T14214] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 174.872127][T14214] ? avc_denied+0xf1/0x110 [ 174.876542][T14214] slow_avc_audit+0xf9/0x140 [ 174.881242][T14214] avc_has_perm+0x129/0x160 [ 174.885747][T14214] selinux_socket_setsockopt+0x197/0x200 [ 174.891465][T14214] security_socket_setsockopt+0x47/0x80 [ 174.897007][T14214] __sys_setsockopt+0x9f/0x200 [ 174.901793][T14214] __x64_sys_setsockopt+0x66/0x80 [ 174.906813][T14214] x64_sys_call+0x282e/0x2dc0 [ 174.911534][T14214] do_syscall_64+0xc9/0x1c0 [ 174.916028][T14214] ? clear_bhb_loop+0x55/0xb0 [ 174.920728][T14214] ? clear_bhb_loop+0x55/0xb0 [ 174.925398][T14214] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 174.931495][T14214] RIP: 0033:0x7f60e0adff19 [ 174.935932][T14214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.955536][T14214] RSP: 002b:00007f60df157058 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 174.963948][T14214] RAX: ffffffffffffffda RBX: 00007f60e0ca5fa0 RCX: 00007f60e0adff19 [ 174.971917][T14214] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 174.979933][T14214] RBP: 00007f60df1570a0 R08: 0000000000000400 R09: 0000000000000000 [ 174.987900][T14214] R10: 0000000020000f80 R11: 0000000000000246 R12: 0000000000000001 [ 174.995865][T14214] R13: 0000000000000000 R14: 00007f60e0ca5fa0 R15: 00007ffe03144068 [ 175.003844][T14214] [ 175.183671][T14220] syz.1.4247[14220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.214641][ T29] kauditd_printk_skb: 779 callbacks suppressed [ 175.214655][ T29] audit: type=1326 audit(1733270044.860:38056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14219 comm="syz.1.4247" exe="/root/syz-executor" sig=0 arch=c000003e syscall=179 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 175.260833][ T29] audit: type=1326 audit(1733270044.860:38057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14219 comm="syz.1.4247" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 175.284495][ T29] audit: type=1326 audit(1733270044.860:38058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14219 comm="syz.1.4247" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 175.308088][ T29] audit: type=1326 audit(1733270044.860:38059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14219 comm="syz.1.4247" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 175.331692][ T29] audit: type=1326 audit(1733270044.870:38060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14219 comm="syz.1.4247" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 175.355297][ T29] audit: type=1326 audit(1733270044.870:38061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14219 comm="syz.1.4247" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 175.379242][ T29] audit: type=1326 audit(1733270044.920:38062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14221 comm="syz.2.4248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 175.402906][ T29] audit: type=1326 audit(1733270044.920:38063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14221 comm="syz.2.4248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f00d1ff19 code=0x7ffc0000 [ 175.426806][ T29] audit: type=1326 audit(1733270044.970:38064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14219 comm="syz.1.4247" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f60e0adff19 code=0x7ffc0000 [ 175.450727][ T29] audit: type=1326 audit(1733270045.040:38065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14226 comm="syz.3.4249" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f2c0699ff19 code=0x0 [ 175.647984][T14244] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 176.657368][T14316] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING Dec 3 23:54:06 syzkaller kern.info kernel: [ 176.657368][T14316] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 177.423098][T14362] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(6) [ 177.429644][T14362] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 177.437229][T14362] vhci_hcd vhci_hcd.0: Device attached Dec 3 23:54:07 syzkaller kern.info kernel: [ 177.423098][T1436[ 177.449344][T14366] vhci_hcd: connection closed 2] vhci_hcd vhci[ 177.449501][ T55] vhci_hcd: stop threads _hcd.0: pdev(3) [ 177.460687][ T55] vhci_hcd: release socket rhport(0) sockfd(6) Dec 3 23:54:07 syzkaller k[ 177.460696][ T55] vhci_hcd: disconnect device ern.info kernel: [ 177.429644][T14362] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Dec 3 23:54:07 syzkaller kern.info kernel: [ 177.437229][T14362] vhci_hcd vhci_hcd.0: Device attached Dec 3 23:54:07 syzkaller kern.info kernel: [ 177.449344][T14366] vhci_hcd: connection closed Dec 3 23:54:07 syzkaller kern.info kernel: [ 177.449501][ T55] vhci_hcd: stop threads Dec 3 23:54:07 syzkaller kern.info kernel: [ 177.460687][ T55] vhci_hcd: release socket Dec 3 23:54:07 syzkaller kern.info kernel: [ 177.460696][ T55] vhci_hcd: disconnect device [ 177.791875][T14406] bpf_get_probe_write_proto: 2 callbacks suppressed [ 177.791890][T14406] syz.4.4320[14406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.799399][T14406] syz.4.4320[14406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.811024][T14406] syz.4.4320[14406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.837752][T14407] __nla_validate_parse: 5 callbacks suppressed [ 177.837765][T14407] netlink: 76 bytes leftover after parsing attributes in process `syz.0.4319'. [ 177.866725][T14412] xt_check_target: 1 callbacks suppressed [ 177.866787][T14412] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 177.981681][T14419] syz.4.4325[14419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.981814][T14419] syz.4.4325[14419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.993815][T14419] syz.4.4325[14419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.022570][T14421] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 178.373287][T14443] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 178.490219][T14449] syz.2.4337[14449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.490305][T14449] syz.2.4337[14449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.502399][T14449] syz.2.4337[14449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.556077][T14447] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(11) [ 178.574050][T14447] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 178.581490][T14447] vhci_hcd vhci_hcd.0: Device attached [ 178.700485][T14451] vhci_hcd: connection closed [ 178.700689][ T40] vhci_hcd: stop threads [ 178.709685][ T40] vhci_hcd: release socket [ 178.714126][ T40] vhci_hcd: disconnect device [ 178.735513][T14457] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 178.764252][ T3436] vhci_hcd: vhci_device speed not set [ 178.765584][T14460] netlink: 392 bytes leftover after parsing attributes in process `syz.2.4340'. [ 178.923217][T14467] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4342'. [ 179.024741][T14473] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 179.144214][ C1] ================================================================== [ 179.152336][ C1] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 179.159574][ C1] [ 179.161905][ C1] read-write to 0xffff88810006d0b8 of 8 bytes by interrupt on cpu 0: [ 179.169967][ C1] wq_worker_tick+0x63/0x240 [ 179.174574][ C1] sched_tick+0xd7/0x140 [ 179.178841][ C1] update_process_times+0x161/0x190 [ 179.184056][ C1] tick_nohz_handler+0x250/0x2d0 [ 179.189019][ C1] __hrtimer_run_queues+0x20d/0x5e0 [ 179.194237][ C1] hrtimer_interrupt+0x235/0x4a0 [ 179.199190][ C1] __sysvec_apic_timer_interrupt+0x5c/0x1d0 [ 179.205094][ C1] sysvec_apic_timer_interrupt+0x6e/0x80 [ 179.210754][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 179.216760][ C1] _raw_spin_unlock_irq+0x2f/0x50 [ 179.221806][ C1] process_scheduled_works+0x43b/0x9a0 [ 179.227271][ C1] worker_thread+0x51d/0x6f0 [ 179.231876][ C1] kthread+0x1d1/0x210 [ 179.235952][ C1] ret_from_fork+0x4b/0x60 [ 179.240373][ C1] ret_from_fork_asm+0x1a/0x30 [ 179.245138][ C1] [ 179.247455][ C1] read-write to 0xffff88810006d0b8 of 8 bytes by interrupt on cpu 1: [ 179.255500][ C1] wq_worker_tick+0x63/0x240 [ 179.260080][ C1] sched_tick+0xd7/0x140 [ 179.264309][ C1] update_process_times+0x161/0x190 [ 179.269511][ C1] tick_nohz_handler+0x250/0x2d0 [ 179.274443][ C1] __hrtimer_run_queues+0x20d/0x5e0 [ 179.279638][ C1] hrtimer_interrupt+0x235/0x4a0 [ 179.284568][ C1] __sysvec_apic_timer_interrupt+0x5c/0x1d0 [ 179.290499][ C1] sysvec_apic_timer_interrupt+0x6e/0x80 [ 179.296118][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 179.302091][ C1] queue_work_on+0x105/0x180 [ 179.306672][ C1] tty_insert_flip_string_and_push_buffer+0x1d2/0x200 [ 179.313424][ C1] pty_write+0x7e/0xa0 [ 179.317494][ C1] tty_put_char+0x8d/0xc0 [ 179.321830][ C1] __process_echoes+0x393/0x6b0 [ 179.326671][ C1] n_tty_receive_buf_common+0x8f9/0xbe0 [ 179.332229][ C1] n_tty_receive_buf2+0x33/0x40 [ 179.337096][ C1] tty_ldisc_receive_buf+0x63/0x100 [ 179.342365][ C1] tty_port_default_receive_buf+0x59/0x90 [ 179.348077][ C1] flush_to_ldisc+0x1ce/0x410 [ 179.352742][ C1] process_scheduled_works+0x483/0x9a0 [ 179.358190][ C1] worker_thread+0x51d/0x6f0 [ 179.362793][ C1] kthread+0x1d1/0x210 [ 179.367053][ C1] ret_from_fork+0x4b/0x60 [ 179.371804][ C1] ret_from_fork_asm+0x1a/0x30 [ 179.376560][ C1] [ 179.378959][ C1] value changed: 0x000000000061cf10 -> 0x000000000061f620 [ 179.386045][ C1] [ 179.388355][ C1] Reported by Kernel Concurrency Sanitizer on: [ 179.394487][ C1] CPU: 1 UID: 0 PID: 40 Comm: kworker/u8:2 Tainted: G W 6.13.0-rc1-syzkaller-00005-gceb8bf2ceaa7 #0 [ 179.406618][ C1] Tainted: [W]=WARN [ 179.410400][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 179.420440][ C1] Workqueue: events_unbound flush_to_ldisc [ 179.426248][ C1] ================================================================== [ 179.547349][T14485] netlink: 76 bytes leftover after parsing attributes in process `syz.2.4349'.