last executing test programs: 8m15.979167776s ago: executing program 32 (id=546): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x1000407, &(0x7f0000000040)={[{@abort}, {@norecovery}, {@orlov}, {@nomblk_io_submit}]}, 0x4, 0x5cd, &(0x7f0000001400)="$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") r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000000850000000400000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fcntl$notify(r1, 0x402, 0x8000000c) r4 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r3}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xb, 0x7, 0x8, 0x8, 0x10002, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r4}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000016000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) fcntl$notify(r6, 0x402, 0x8000003b) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x8, 0x7fff0007}]}) close_range(r7, 0xffffffffffffffff, 0x0) 7m22.742420468s ago: executing program 33 (id=1647): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'netpci0\x00', 0x0}) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=0xffffffffffffffff, 0x4) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0xc9, 0x143, 0x5, 0x8128, 0xffffffffffffffff, 0xd, '\x00', r0, r1, 0x0, 0x4, 0x5, 0x4, @value=r2, @void, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000600000000000000001811", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095", @ANYBLOB="d8285ac876d4d6f1e56b7de01954863c1f5d99c7707d258c28f46b58", @ANYRESHEX], &(0x7f0000000100)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{r3}, &(0x7f0000000680), &(0x7f00000006c0)='%+9llu \x00'}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) uname(0x0) ioperm(0x9fda, 0x85, 0x6) unshare(0x4020400) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close_range(0xffffffffffffffff, r4, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x30100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) ioctl$PPPIOCSPASS(r5, 0x40107447, &(0x7f0000000280)={0x4, &(0x7f0000000200)=[{0x8, 0x5, 0x6, 0xfffffffc}, {0xc, 0x2, 0x5}, {0xfff, 0xf1, 0x9, 0xff}, {0xcf, 0x7, 0xd, 0x7}]}) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x4) unshare(0x46060480) getrandom(0x0, 0x0, 0x3) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) msgrcv(0x0, 0x0, 0x0, 0xffffff7f00000000, 0x3000) 7m18.071492902s ago: executing program 34 (id=1724): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x53d, &(0x7f0000000b80)="$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") syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed000e, &(0x7f00000000c0)={[{@noauto_da_alloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}, {@debug}, {@nogrpid}, {@noacl}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x9}}, {@nolazytime}, {@dax_inode}, {@nodelalloc}]}, 0x1, 0x475, &(0x7f00000004c0)="$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") 7m14.328079612s ago: executing program 35 (id=1780): sendmsg$802154_dgram(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xf, 0x8, 0x10002, 0x1, 0x1, 0xffffffffffffffff, 0x4000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0, 0xffffffffffffffff}, &(0x7f00000003c0)=0x18, &(0x7f0000000140)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000ecff850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x0, &(0x7f00000003c0)) ptrace$cont(0x9, r3, 0x10000, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x54e, &(0x7f00000014c0)="$eJzs3c9vHFcdAPDvjH+sm6ZxAj1ABSRAIaAou/Gmjape2lxAqKqEqDggDqmxN5bJbjZk16U2kXD/hiKBxAn+BA5IHJB64sCNIxIHhFQOSAEsUIwE0qKZHf+ovcaLd73bej8faTLz5s3M973Ys+/t2/W8ACbWlYjYjIjZiHgzIuaL/UmxxKvdJTvuydajpe2tR0tJdDpv/C3J87N9+QmlvWs+XVxzLiK+8dWI7ySH47bWN+4t1uu1h0W60m48qLTWN66vNhZXaiu1+9XqrYVbN166+WJ1aHW93PjF46+svvbNX//q0+//bvPLP8iKdb7I263HkHWrPrMbJzMdEa+dRrAxmCrWs2MuByeTRsTHIuJz+f0/H1P5bycAcJZ1OvPRmd+fBgDOujQfA0vSckSkadEJKHfH8J6Nc2m92Wpfu9tcu7/cHSu7GDPp3dV67cal0h++lx88k2TphTwvz8/T1QPpmxFxKSJ+VHoqT5eXmvXl8XR5AGDiPb2//Y+If5bStFzu69Qen+oBAB8Zc+MuAAAwctp/AJg82n8AmDx9tP/Fh/2bp14WAGA0/r/3/xdOrRwAwOgY/weAyaP9B4CJ8vXXX8+Wznbx/Ovlt9bX7jXfur5ca90rN9aWykvNhw/KK83mSv7MnsZx16s3mw8WXoi1tyvtWqtdaa1v3Gk01+637+TP9b5TmxlJrQCA/+XS5fd+n0TE5stP5Uvsm8tBWw1nWzruAgBjMzXIyToI8JFmti+YXH014Xkn4benXhZgPHo+zHuu5+YH/aS7erefIL5nBB8qVz/Z//i/OZ7hbDH+D5PrZOP/rwy9HMDoGf+HydXpJAfn/J/dzQIAzqQBvsLX+eGwOiHAWB03mfdxn/8DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAJDofEd+NJC3nc4Gn2b9puRzxTERcjJnk7mq9diMiLsTliJgpZemFcRcaABhQ+pekmP/r6vzz5w/mzib/KuXriPj+T9/48duL7fbDhWz/33f3l3amD6vunTfAvIIAwJDl7Xe1WO97I/9k69HSzjLK8jy+Hf8ppiJe2t56lC/dnOnIdkbM5X2Jc/9IYro4Zy4inouIqSHE33wnIj7Rq/5JPjZysZj5dH/8KGI/M9L46Qfip3led511vj4+hLLApHnvdkS82uv+S+NKvu59/8/lr1CDe3y7e7Gd177tffGni0hTPeJn9/yVfmO88JuvHdrZme/mvRPx3HSv+Mlu/OSI+M/3Gf+Pn/rMu68ckdf5WcTV6B1/f6xKu/Gg0lrfuL7aWFyprdTuV6u3Fm7deOnmi9VKPkZd2RmpPuyvL1+7cFTZsvqfOyL+XM/6z+6e+4U+6//zf7/57c/uJUsH43/p871//s/2jN+VtYlf7DP+4rlfHjl9dxZ/+Yj6H/fzv9Zn/Pf/vLHc56EAwAi01jfuLdbrtYcDbWTvQodxnUMbWRH7O3inuzhY0D/FadTihBszp/W/euob07t9xeFe+VvZFXtkpX3+kpxkIx16LQbaeDKqWON7TQJGY++mH3dJAAAAAAAAAAAAAACAo4ziT5fGXUcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADOrv8GAAD//xxkzKw=") lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=r4, @ANYBLOB="040000000000800008000000", @ANYRES32=r4, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) r5 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) pwrite64(r5, 0x0, 0x0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='kmem_cache_free\x00'}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000280), 0xa7c, r6}, 0x38) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) open(&(0x7f0000000040)='.\x00', 0x418601, 0x8) 7m13.489842408s ago: executing program 36 (id=1785): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x8, 0x0, 0x0}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/162}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001c2df6f270000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x14, r3, 0x1}, 0x14}}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa1081e, &(0x7f0000000200)={[{@dioread_nolock}]}, 0x1, 0x4f2, &(0x7f0000001240)="$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") 7m9.032217143s ago: executing program 37 (id=1816): r0 = socket(0x23, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40e41, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd9, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x78, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x13) unshare(0x2c020400) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="020100000a0000000600000000000000030006000000000002000000ffffffff0000000000000000030005000000000002000000ac1e00010000000000000000020013"], 0x50}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r3, &(0x7f000001a240)=""/102400, 0x19000, 0x0) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x9, 0x401, 0x2, @private2, @mcast1, 0x700, 0x40, 0x0, 0x1}}) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="380000006800010000000000000000000a000000000000000600070008000000100008800c0001000000000000000d0008000500", @ANYRES64=0x0], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x0) write$tun(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c0000f5000000000000000000e1ff00000002"], 0x73) 6m59.783585182s ago: executing program 38 (id=1938): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x1200052, &(0x7f00000003c0), 0x1, 0x7aa, &(0x7f0000000800)="$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") open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x8, 0x101002) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ftruncate(r1, 0xc17a) rename(&(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./bus\x00', 0x0, 0x1000, 0x0) r2 = open(&(0x7f00000005c0)='./bus\x00', 0x700, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x4c02, &(0x7f0000000140)) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000100)='.\x00', 0x1a4243c, &(0x7f0000003840)=ANY=[@ANYRES16, @ANYRES16=r0, @ANYBLOB="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", @ANYRES8=r2, @ANYRESDEC, @ANYRES16, @ANYRESDEC=0x0, @ANYBLOB="9a7f40ad4c7145903a868b9020e1e8899ed5747db23004fc9d248900abcaa6b065cf0800930a71dcd8b8955d93c78b9d4e5e06d8d5c9ac9b75d177754d6eba23e6d2be546c0dfecdf61baf732950a5729c01fbdc11e36cb411be200a9135657acd97d21ee46aac313ebdddd9265af16558dd3e5ba4836659a6abfe08aad84276acf949bdaa34bdf7f7b2dfb2fe8b9d6d225dcecebeb6e15f649994728842bd99fc94897d24315ac2d17bf6c2acfbfa8464d80f36304f88b906b78ab359be3479db5b0e7555f04416807c2202d6551f2425440be741dbe053e0bfeb845623e722a9293843f1cf0a71119dcadf7e353af4da52aed3086d6e5a095774248be9a1b1418dec1c03a2cb0ece0840ebeaaf7b67867da45943b700e2d6dad775ae6f33e55aa86ca84c336c91e3b7d7224f7a9a10d5b45a6ce0769d875415bea136b5508e5e0a88290792da3b11b2284a3d757c301cec78b55d3fcfa073615ccb089f66c5b9a5c84f6c1bb78c3370c4687eab260711fa05525687c7709e15cddea061f70798cbf940ad929eb80f33ad8bb4fcd322dd0558f111d7d01351147976b425a27e573402490055054cf3d80bebde6a89f3086170633740f08780aac3a73f17eaeda8deb642c2887962596b4d78c0ffffb28d0e64073b0641f89cf83a69afaaea03ba6070838fdbdaccb81630a6fdaa77fc10146013b9fd79e965a320daf81c1a51f032a3f462f2740e579eb116cad80b4e233326bf94fea52184517accf608b1fbfb395942869841b9ca0f314beff6b2dc0a74d7599012274b24775f0382e72907c1f0c571b994f048c0266feb775d893fec84e5733cd66a96cd45b60f63743b17b05d99c427a2d00a27fef17cadf128059a2e227b80701755b0bc706f32255c8cd619fa995cc7649f28337361a62cff46669fa4cf095a2d148987a9fafa6e1fb9f59b5ac5ff10a4c62e0187a3c75a983f7f5211142c6c09170a13e29c2044e5568bda8055cee4722e445e83ea01307c42cbe63a5bc529e1200e5874f7500275abacd6cc0e3bf8fd38ab7bab39f54d180d60892e2e3a713a3e654c89b8e9ba4474909991844514c04b655c66ccd6f2a17e29ff69d343ebac7ac5e1510ad4ff52e6a932a97bb0d814259da6545022152dd63f06219a1d66ec2278b694876ed6195b0543b8c9289b8438e8ee57dd38bcdb045a6fc4cede28effaa0354afbd4190fcbccd9a0e91508e4399e0e30a0bfdedcc19454b6dd7c2785a6e4fe74a0ece1d683ad07d76eafec02fb0d88debfeacd3531413185da0ffa4fb9b5e6d5a916f7bb5d51efc8ab61e4953fc6b2d1e670769f3ca56d51b804ceb118278acc90422e1f51e448a27d2fe4f93c88cf7c6148474bf650902dd6dd96541044113d244cf938150ec426e7ed63e1f153bbe328f4232552b104c8dee60b0c4e4c25f2605e97cc6f4263d32e8340be2d167137682373ae4cd501fdc9c5359b40f52803a5e4c0e04a5de0412c5cbd4d05e6135a1209d4b2dff50d39e481f1d1b01ed71004fb0c18e736af8ab176f833a439a85c9132e6d2296f665771c6a284eadc08c94ffa520dcc37fd6426c152364699514b15d4df6732fff39834e8ba29688b19db27a970d9d7fbee973c76bee04fb6164963969ebde0f785606781d63726736d8b60a713d5f72207a23f6f00420fdf24d14c069f36a7e236620481cc7a63857cc1355bac8d4f9a3f32785ad4d9d81719077a816b33b98006c322ee473aa9f8f83fae86a4d421104b298a9e42357c44b773e3504b3f9eb5b29330411b776b78fdb6dd9713dd1aee0cc9c7ee8bd23a50d4c8babaf6d74bc25377009a8c57c941f80e58ac08c93a275656cbad3864df9e791305d66103ab30983b07553ede5b5d5b0aab157f805eb6c11c75dd7f297c2cc9110551131a797164dec422b13799f1c261464c765a62c201eb9c8686eee94642d59f429cd137cba0d1a8126dcdfc28ea5c201526c61164a86f480dfde0c60fdf6afd3cd64719de1d89b5a362e058054a9db73aaffac324b04e8903060e1f14ca4ac31c82183066e6d581685efbe3452a20a665166b03808220770d66051971b61d8114376e22a4511cae9fdf7bbed68bb9f45b57eee1c15775730ef1434731d7b82a7cbcd6155396263984edfcea62196189da0ba9908d7d5ef514d75a3e1d4ae42654365083873fc4ce969fa4fac51d640be8d948bb9464d1a7e494c8df98bd5a569ff7fe1aca542c34610148a8f1dc9d60ff0f761270577f286a362f32164184ffce3ad132637e9f0381e9ce76a11f296f9d1e835cdc44926104e1df4d0a282a84b9fbc23064bfcab0d221c6e3124ae8ba6022e62f170dcc2d655f73b40f83fd65f5c705bc1f9e8df13adeadff9e1fe4660a55be7dc969cfffaed607190162dcd09d0cd86a297b22142b88f0eb28dd1a45152a4f4f2dca0d96d39fa594349040f486cd486af619b7083236cf90324cddc6f1ed0f6a103c8d936d7f2f31d420ef50931838e66721bff7494617b6b4bc385f3e51b3f81cf5d6953ac7fddc0f3466682911b38bc7f082e0c18e3ae0badf7f3fd3e186ebc2bab71fa26f77bb14cd97e6761c93c8c25887c0ef1f3dc1d8d86ce0fb73190f66f4deca77977e8d6064bfeeac3fad2bc50488c144e2a1a82fcc1e1c12ac54bf3e2d468e8f53241e4a6ad9e466746a45b053452ded5caa20461881d78d8235e986ba8b77e83601655d2650bf1b64ce17c75314216b43bbd1101a2e12e57525bb7d3b136a70635bdac8af24367a24ce2fe2a72ef2b0e56ff8dc62a82946f86f9b6b1418a89b1971372dfe7d5ce2e6611befff721f04a19bce7f90b1551a4cdead136662c50513fdde6f9d4a199c3907ed8799f231f54dd8347c71d829ff8ddc5d96b5aac2fe58652c81ff7f54e2568119dff2763ef435aa420630dacc7e9414340ee8688f46c7a8ab96d860937641042b3cdf6857ff1d2d4e47cec1f23e65fe541f38cb96b132666f999002e89cd1896ca58c2e63b87382e1a6c1ee9afa56cf3ba923fa9c989e20bff313f37252632fdcff03fbdd2d334ee93baf75c1bdae30feaa81fb2ac1b63c42dda06f20ce8c9d003eb3efed7931def342fb874fce92763f6f477c7f589b75d2129419fc4cb7a8893a1d3f94533ed9fdf9f21fc254fd80aa74750833d390327a2107e761240928d35a36c5eaca61fd848116b8dd7ec8157928bc2dd87f7756aa517cf6a61d2009fd4ba0579ca3b3129cfd5403546f5ab6d0575799a008fc67da9658427636d8f806d9b8cad64aee438d0a9b45957f31a5afe3ed894add9acadfd347246099c6ff0b4ec6f19ac61557daf8739e528185ab1468ca72d6d72e4f026e371e540b774b6576df3014dcc9e91b2cd1f0403a4fcaa6627b22682bb54f92150c2917acaee1972b2b03bc2bd37fdb9e7352c654d94ef196b7229e4da5ee62b7d395ecdd5177f2563242ea49ff78151a4a816a94e89b03f41c7e6684f8be3e5802e9338e7cbd3b43f708c062f944a59f31b02ca9a177e6b681accee8785d2467d2d78636be4330febaa3f6907db07992a2de74e459f3ae8ee6adae20cbc75aabd2d5d3424de0ddcc3ddd981c3a4966c57f8fdb1c42db87395f0bc800ff8ddb4c228a7d793d8a997885494a8578f5433d3f82886ea573641bf16065efbc25718c88f7277ce04c94af560d8deb7968496f849d3fad78741272b08bf7aec3f3c777428d3b8b897333ae5afb6823af63cb7347601ee2e8d4e21b21a12e6d42f66a1aac26d296bc68a998d8ba179ed5f756c2efd8a7acc0e3f08093bb4a83d37f15b4fe07c90858058ad1ff0e21bb7bf4363079c5d452dba5972b21c8f41daf6f11a51d321d3c1d544190238036d907d965ff469ce4895eb7675f3e94a15f83b837b892a40390d87d76e9b15eda02366299d3dd93943466bceeb2f9e465adccc08e1a02c3ac01815931627ed327e0ffbe09563221a365b88c4f2449bd3634920d5bfbde7cdc92c4cb16a579f35f07dafc87ce6ce4de7bf9e8ff0e80b81cdab8f2164a25a0a6929679ce9ae0dc2ac7ed41a787446676f091597551dc2e8c054224bac6652bba5fb675c0b2c94d2faac160f11b7b96fc96415aca8a47fa03658b8afa24b6bd97f7dbeead9ae5f7ec1cb0d000055f41a5043c6c4c97212398b168b5cb9ee650726eabcc31b6712e815fdaae77885350884fb36d6d5444d5e5500a7d636d4eced14b9d411c765b36a4be06ca9be2965d6d6c06c3b6bcb38babeb2999ee71295d48926bf6e39363fabf74de5e57aa0b59f9dddeca142d0c50ab7ff198196c69c971e6ab591220f4e42d6525e2dbd99b6c57949c854e4ee0e4581f9e3e160b3f66b01f23f4d0472c0a1f307837ac8dac0a257d09ab82975148dcd764fe6359a5f21b9cbe2ae7b9b277489a8b3285b8289a84ff854508b4488ffcf68f47ec7a5c18a8c3d06e26b32f754ac74ea8e93a554147fd3b3daf1fbe924e2e389cac13a5f80f3a21dbd250d3917f7b5acfc739a63f2b3d6b3f099efb4be7a842215c89fc87bd8550d11ba2a4af0f111ab124503b26feeae3be3ee24168dd4553a226b9168edb11c3e61bc850adf995b4d6f1aace6db0b91f805c3d1789a3e6b470e5470968f429d5b05c8f76ca2981e37f5bde4ad00a09755c76774ead7d93f3f41255b1d56152e36900133b2e0b277427c992323d1b4d8c438434e9e901ddd43788f80cb9a975e9dd1671ce16be5ff8033d5da824f00fd78b540edbcd69a2e9aff03e31af9afefb809434f52b4a1239fdd241ed3a268258addde19d1724155a1a4c877bd59b0659b7a786886f6ffcb5999d1f9c007d615020926f7165a9ddd4aaa3c7b631d30cc951e328131d99282ac06a18f88373092320ea5308f06c376e711aecda4cd1c2b639d9ea7a2613d4e9eaa9a0ef72774fdec622f7d131b45135d577897bf686b460a371083070139ea544bda15012251d6c8e7163c25412841faefba76765648ca7cd1b423403a654b6b5754588ae6c309621477db20f7c9236af1e422ebd3fb6d6a712e7a6d00d58416b7d65a53a2514bf51bedfe9207f16a4d79418600389b98ea8b9e06b8da708a86f191e567925af39a09ac9fd7902e8f8e77567baf1b75c05ba1eb7089b424801405afc982a8d79c80fada184a1ab3bab526a3b0a5e20d2dc6bcdd2c5cb7c49f735f3e8f4d36a388ca805876ae08f0e3acca5dd864c1fa1552068bf799095221480374fd2dcaeddb74be93470eff4fe278e190f0a131f32340ada9cca518af769f42943875f4c5707beee2179771da21cd66405b9973648bd047a516d1cf902fa1f0fcdcbc3f4c1f20fc22f9a7e9f4c3a52576399604c46f83ede44f542d06d54e6e8a1e693a2cfcbb16c178d1bace976133e72cc4533bd02b1c4ec2cc22097435aff5a682ca7227414895450831560fa682493f4814ce8fbdb190f8ce2b533ed9582638511bda93aeae5d0690f745b788db622864ba3fb60952f119427fbe66754c5c038c5fb2cb87c326d65862e353c14950bd1fa7c70e36323e9cf90c81f6275e59c7926acac1560a0b6bbc7a850817f2effa19d485315a219d49e293f871278294d02765cf72caa2f438de3337ed205bf68ff6ddaaa5e4b80de5fba022dfcf9cf074a319678df11eb77b3ef66e512b67ba5182265a60eaf457691e973d23cbaf6000537f886695074ebb616f9cdad9de7c6fe9ecfbd13d537d64c34a7c90ca56b50e60d6a7067e391e63561793edf6ed3c2eeb8555909a59ce73da1f096d41fb42de44494128324a938df9e15a67b83ce1a5d2a2d40330aeb15b459949c657d0af0f258d1de11f4b3e55045c943af4f4ee20a23e39a0de7ad6c100b0f3a46eabbc293a2d40ebe833c4ea0b542e3f32eda073fd5b7588a09bfb6d1d305cf0cb2da295a48edf98c5dc682292fd9ebe67823cf37d847811600255403f9ea8bfdd72149f1ebc290c50a", @ANYRES8, @ANYRESOCT], 0x0, 0x0, &(0x7f0000000000)) 5m15.224457663s ago: executing program 39 (id=4353): creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) syz_mount_image$ext4(&(0x7f0000000880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x42, &(0x7f0000000380)={[{@nomblk_io_submit}, {@quota}, {@errors_remount}, {@grpquota}, {@jqfmt_vfsv1}, {@nogrpid}]}, 0x4, 0x51a, &(0x7f00000008c0)="$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") socket(0x2, 0x80805, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r2, 0x0, 0x2, 0x2}}, 0x20) 4m49.401876126s ago: executing program 40 (id=4898): prlimit64(0x0, 0xa, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='projid_map\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) sysinfo(&(0x7f00000013c0)=""/105) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kmem_cache_free\x00', r0, 0x0, 0x80000003}, 0x18) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000140)) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000180)="80fd", 0x2}], 0x1, 0xffffffff, 0x1000006) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socket(0x1, 0x2, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a00000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) syz_usb_connect$hid(0x2, 0x3f, &(0x7f0000000100)=ANY=[@ANYBLOB="12010102000000"], 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 4m41.715270404s ago: executing program 41 (id=5036): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000f600850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0xca4497123b1d3f23, 0x5, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r3}, &(0x7f00000004c0), &(0x7f0000000500)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000600)='sys_enter\x00', r4}, 0x10) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000180)='enc=\xecd|\xb9\xb8\xc1N\x8f\xa6\x85JR\xccw\xe1\a5;g\x05\xd9\xc9F\x94\xa7\xdf=\x15\xa4\xe2\xea$\xd7\x1b\xf9\xcd\xc6.[\x9a\x15g\xd2\x91\xf5\x8bo>?\x1a\xed1\xf2\xdc\x1fTw\xe7\xd0I\xb1\x1c\ry\x90\x1eC\'\x05\x9e\x03d\xae\x94\xf6\xf04\xdd\r\x9183\xddD)\xe0-\xaa\x1c\xa7\x10\xc8\xdc\x9d\x1a\x8e\"\f\xa3\xcd\x8d\xe2\xaf.\n#\xcdn\xc1\xf1\xef\x92\xe0\xfc\x83\xabC', 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001840)={{r2}, &(0x7f00000017c0), &(0x7f0000001800)='%-5lx \x00'}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r6}, 0x10) setitimer(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x21081e, &(0x7f0000000000)={[{@nobarrier}, {@nouid32}, {@minixdf}]}, 0x1, 0x504, &(0x7f0000001480)="$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") llistxattr(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 4m37.585530059s ago: executing program 42 (id=5101): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0000007a00000000216b00000000000008000000733cdeefab4342e029181a4a5fd5d1428dc834e72dbae70ba0c0b30afbc742962fd0a3b5e3e6b2f96c5f5c448b7c4199e997a4234c777fff4a56c02e096ae22290a015605f7fe4e8f4e9368860351cfc66a91238874a282839e955fe30445c2cdbd6295239a45a88fd72dd50d912b4fbde4500", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000002c0), 0x1, 0x4f2, &(0x7f0000000d40)="$eJzs3U1vW1kZAODXzpeTyUwywywAAVOGgYKqOok7E1VdQFkhhCohugSpDY4bRbHjKHZKE4qU/gckKrGCJT+AdVfs2SDYsSkLJD4iUFOJhdG9vkncxG4CSeNM/DzS1T3nXMfvOUnuOclr2SeAgXUlIrYjYjQi7kfEVNaey4643T6Sx73YeVze3XlczkWrdfcfufR60hYdX5N4K3vOQkT84DsRP84djdvY3FpZqFYr61l9pllbm2lsbl1fri0sVZYqq6XS/Nz87M0bn5TObKwf1Eaz0hef/377Gz9NujWZtXSO4yy1hz6yHyey7/n33kSwPhiKiOHs94dPn3xEvBcRH6b3/1QMpT9NAOAya7WmojXVWQcALrt8mgPL5YtZLmAy8vlisZ3Dez8m8tV6o3ntQX1jdbGdK5uOkfyD5WplNssVTsdILqnPpeWDeulQ/UZEvBsRPx8bT+vFcr262M8/fABggL11aP3/91h7/QcALrlCvzsAAJw76z8ADB7rPwAMHus/AAwe6z8ADB7rPwAMnLF+dwAAOFffv3MnOVq72edfLz7c3FipP7y+WGmsFGsb5WK5vr5WXKrXl9LP7Kkd93zVen1t7uPYeDT9zbVGc6axuXWvVt9Ybd5LP9f7XmXkXEYFALzOux88+1MuIrZvjadHdOzlYK2Gyy3f7w4AfTPU7w4AfWO3Lxhcp/gfX3oALokuW/S+ohAR44cbW61W6811CXjDrn5O/h8GVUf+37uAYMDI/8Pgkv+HwdVq5U6653+c9IEAwMUmxw/0eP3/vez8m+zFgR8tHn7E08MN3lEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA4Njb/7eY7dwxGfl8sRjxdkRMx0juwXK1MhsR70TEH8dGxpL6XJ/7DACcVv6vuWz/r6tTH00evjqaezmWniPiJ7+8+4tHC83m+h+S9n/utzefZu2lfvQfADjO3jqdnjv+kX+x87i8d5xnf/727YgotOPv7ozG7n784RhOz4UYiYiJf+WyeluuI3dxGttPIuKz3cafi8k0B9Le+fRw/CT22+caP/9K/Hx6rX1OvhefOYO+wKB5lsw/t7vdf/m4kp673/+FdIY6vWz+S56qvJvOgQfx9+a/oR7z35WTxvj4d99tl8aPXnsS8fnhiL3Yux3zz178XI/4Hx19uq7+/IUvfdjrWutXEVejM/7PygcRDkozzdraTGNz6/pybWGpslRZLZXm5+Znb974pDST5qhneq8Gf7917Z1e15LxT0T38ReOGf9XTzb8+PV/7v/wy6+J//WvdIufj/dfEz9ZE792wvgLE78t9LqWxF/sMf7jfv7XThj/+V+2jmwbDgD0T2Nza2WhWq2sKyhc/ELyK3sButG18K3zijUa/9NXtVr/V6xeM8ZZZN2Ai2D/po+Il/3uDAAAAAAAAAAAAAAA0NV5vGOp32MEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg8vpvAAAA//+sXtJf") 4m29.179142812s ago: executing program 43 (id=5281): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x183341, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f0000000040), &(0x7f0000000140)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r2}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r3, &(0x7f0000000040)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r6}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(r7) waitid(0x0, 0x0, 0x0, 0x4, 0x0) r8 = socket$netlink(0x10, 0x3, 0x4) writev(r8, &(0x7f0000000300)=[{&(0x7f0000000340)="580000001400192340834b80040d8c5602117436c379000000000000000058000b4824ca945f6400940f6a0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100030c10000000214e224e0000", 0x58}], 0x1) r9 = socket$key(0xf, 0x3, 0x2) r10 = dup3(r9, r0, 0x0) sendmsg$key(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000680)=ANY=[@ANYBLOB="0213000005000000000000000000000003000058"], 0x28}}, 0x0) 4m28.295973032s ago: executing program 44 (id=5302): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x403, 0x0, 0x800, {0x0, 0x0, 0x74, 0x0, 0x0, 0x11203}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_BR_STP_STATE={0x8, 0x5, 0x1}, @IFLA_BR_VLAN_DEFAULT_PVID={0x6}, @IFLA_BR_FORWARD_DELAY={0x8, 0x1, 0x5}, @IFLA_BR_HELLO_TIME={0x8, 0x2, 0x3}, @IFLA_BR_AGEING_TIME={0x8, 0x4, 0x8}, @IFLA_BR_MCAST_ROUTER={0x5, 0x16, 0xfe}, @IFLA_BR_VLAN_STATS_ENABLED={0x5, 0x29, 0x1}]}}}]}, 0x6c}, 0x1, 0x0, 0x0, 0xe31b6ebc2b7a32ab}, 0x0) 4m27.753429731s ago: executing program 45 (id=5315): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x183341, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f0000000040), &(0x7f0000000140)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r2}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r3, &(0x7f0000000040)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r6}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(r7) waitid(0x0, 0x0, 0x0, 0x4, 0x0) r8 = socket$netlink(0x10, 0x3, 0x4) writev(r8, &(0x7f0000000300)=[{&(0x7f0000000340)="580000001400192340834b80040d8c5602117436c379000000000000000058000b4824ca945f6400940f6a0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100030c10000000214e224e0000", 0x58}], 0x1) r9 = socket$key(0xf, 0x3, 0x2) r10 = dup3(r9, r0, 0x0) sendmsg$key(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000680)=ANY=[@ANYBLOB="0213000005000000000000000000000003000058"], 0x28}}, 0x0) 4m23.755907394s ago: executing program 46 (id=5363): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) timer_settime(r3, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, 0x0) r5 = syz_open_pts(r4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000200)=0x2) read(r5, 0x0, 0x2006) 4m23.505486587s ago: executing program 9 (id=5371): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000040)={[{@nobh}, {@abort}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x4e22, @empty}, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1, 0xfffffffffffffffd}}}, 0x118) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) chmod(&(0x7f0000000200)='./file0\x00', 0x135) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000da1a4ca27446c534c44a91dba6d8d59fbd3d8961f2122b511e8032c26405292262690a4a1d3fbab355efe0da96bfbcec2044526d312d0761819f1ae79ed24e8d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x1a) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x800, @mcast1, 0xfffffffd}, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x6af0dc3c}, r2, 0x3}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) r7 = socket(0x2, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r8}, 0x10) sendmmsg$inet_sctp(r7, &(0x7f0000000bc0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000001c0)=[{0x0, 0x2}], 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c0000000000000002002b0388edb6556900"/51, @ANYRES32=0x0], 0x30}], 0x1, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./bus\x00', 0x0, 0x1000, 0x0) 4m23.221206163s ago: executing program 9 (id=5375): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000002c0), 0x1, 0x4f2, &(0x7f0000000600)="$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") mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffd) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="5300000007000046009ce6e7e68cce73c582dc6dfdbca736b02715df74ff5409f0233ef78972b95b"], 0x53) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) (fail_nth: 3) 4m22.446675543s ago: executing program 9 (id=5384): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000710000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000cc0)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 4m22.446336183s ago: executing program 47 (id=5384): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000710000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000cc0)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 4m16.688765196s ago: executing program 48 (id=5471): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b0000000000000600"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000014000000000000000000000018110000", @ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000240)='kmem_cache_free\x00', r1}, 0x18) syz_mount_image$ext4(&(0x7f0000000540)='ext2\x00', &(0x7f00000001c0)='./file2\x00', 0x488, &(0x7f0000000280)={[{@nogrpid}, {@min_batch_time}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@nobarrier}, {@nodiscard}, {@noload}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "810000cc2b000000000000fa25ffff00ffffff"}) syz_open_pts(r3, 0x141601) bind$inet6(r2, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x7, @loopback, 0x3}, 0x1c) r4 = add_key(&(0x7f0000000380)='blacklist\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="4b7535dcf8eda26a8e953caf37b8e070de6f42d00616cd6933c8bce75e39eee6684ef4b5ff17526f78ac2dc6a4a7cc8e2ffd511caf1fd0a6186db739cfd8c3513c95ba17ff97421c264f895ad2df7d09ae4195855c8abb1740c0856a67ae65d0f220ed81de742683", 0x68, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000480)='trusted\x00', &(0x7f0000000500)) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0x91, 0x2, 0x0) set_mempolicy_home_node(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0) 4m14.945975444s ago: executing program 49 (id=5506): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="0107000000000000000020000000040003"], 0x1c}, 0x1, 0x0, 0x0, 0x8041}, 0x0) 4m14.016933608s ago: executing program 50 (id=5519): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000580), r2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r3, 0x8}, 0x14}}, 0x4040000) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000440)=ANY=[], 0x0) close_range(r5, 0xffffffffffffffff, 0x0) 4m12.381562887s ago: executing program 51 (id=5531): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'ipvlan1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="000000000000efff2800128008000100687372001c000280050007000100000008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4], 0x48}}, 0x0) 4m8.033381271s ago: executing program 4 (id=5558): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x84, @loopback, 0x0, 0x0, 'rr\x00'}, 0x2c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r2, &(0x7f0000001680)=[{&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x7c, &(0x7f0000000100)=[{&(0x7f0000000040)="9e", 0x1}], 0x1}], 0x1, 0xfc) 4m7.986841105s ago: executing program 4 (id=5559): sendmsg$inet6(0xffffffffffffffff, 0x0, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x18, 0x7ffc1fff}]}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000480)='./file1\x00', 0x100000, &(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYRESOCT=r2], 0xb, 0x308, &(0x7f00000019c0)="$eJzs3MtPE1scwPFfH/RFoCxu7s29yQ0n927u3UygulYaA4mxiQSp8RFNBphq07ElnQZTY0RXbo1/hAtkyY5E+QfYuNONLlzJxsSFLIw1nc7Qh1OeI+Xx/SRkfpxzfjPnDFPyOw1l49qze4WcpeX0igRjSgIiIpsiQxIUV8A5Bu04Iq0ey//9X97+feX6jUvpTGZ8SqmJ9PSZlFJqcPjV/YdxZ9hqVNaHbm98Tn1c/339z43v03fzlspbqliqKF3NlN5X9BnTUHN5q6ApNWkaumWofNEyyo3+UqM/Z5bm56tKL84NJObLhmUpvVhVBaOqKiVVKVdV6I6eLypN09RAQrCT7NLUlJ7eZ/Ksz5PBL1Iup/WQiDgvxk/Rl7ecnuxSL+cFAAB6o7P+D4rys/5f/met0n91ZdCp/1cjXvX/2XeNc7XV/zER8az/3et71v/63ur/uF+38Zg6UP2Po2E48lNToBnWO8tpPeG8fm1Pbi6P2AH1PwAAAAAAAAAAAAAAAAAAAAAAx8FmrZas1WpJ9+h+RUUkJiLu9x6pIRE534Mpw0cH+PnjBGh+cC88KGI+XcguZBtHZ8CaiJhiyIgk5Zv9PDjqsfvJI1U3JK/NRSd/cSEbsnvSOcnb+aOS7JPO/Fpt4mJmfFQ1tOf3SaI1PyVJ+c07P+WZH5H//m3J1yQpb2alJKbM2fNo5j8aVerC5UxHftweBwAAAADASaCpLZ77d03r1t/I39pfd74/EGrur0c89+dh+Svc27UDAAAAAHBaWNUHBd00jfI2QVx2HuMEUTcIiuwyK7y7M+85cFfYdUxERFpa3L9l8Hkauwvci7d1xZxG329LYLvb0iX40N4SlP1cfbi+GnXQVbhvG3UbI5Njez9zWHy4vX88f/HVv2fj3Epsh5XuPwht/wD0HdovIAAAAACHpln0uy1jvZ0QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACn0GH8f7terxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4Kn4EAAD//zcwAww=") seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000100)={0x2, &(0x7f0000000040)=[{0xb716, 0x7, 0x3, 0xcec}, {0x7, 0x46, 0x9, 0x100}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000600), 0x8) 4m7.898823703s ago: executing program 4 (id=5560): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@nouid32}, {@minixdf}]}, 0x1, 0x504, &(0x7f0000001480)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9sCWE0KoEqJHkNqQuFEUO45ipzShh/TMFYlKnODIH8C5J+5cENy4lAMSPyJQg8TBaMaT1E3tJtokdhR/PtJo3ps3nu97cea9+Dn2C2BoXY2I3YgYi4h7ETGdHc9lW9xqb8l5z/ceLe3vPVrKRat155+5tDw5Fh2PSVzJrlmMiB9+N+InuVfjNrZ31har1cpmlp9t1jZmG9s7N1ZriyuVlcp6ubwwvzD3yc2Py2fW1vdqY1nqq8/+sPutnyXVmsqOdLbjLLWbXjiMkxiNiO+fR7ABGMnaMzboivC55CPi7Yh4P73/p2MkfTYBgMus1ZqO1nRnHgC47PLpHFguX8rmAqYiny+V2nN478RkvlpvNK/fr2+tL7fnymaikL+/Wq3MZXOFM1HIJfn5NP0iXz6SvxkRb0XEL8Yn0nxpqV5dHuQfPgAwxK4cGf//M94e/wGAS6446AoAAH1n/AeA4WP8B4DhY/wHgOHTHv8nBl0NAKCPvP4HgOFj/AeAofKD27eTrbWfff/18oPtrbX6gxvLlcZaqba1VFqqb26UVur1lfQ7e2rHXa9ar2/MfxRbD2e+vdFozja2d+7W6lvrzbvp93rfrRTSs3b70DIAoJe33nv651wyIn86kW7RsZZDYaA1A85bftAVAAZmZNAVAAbGal8wvE7xGt/0AFwSXZbofUmx2weEWq1W6/yqBJyza18y/w/DqmP+338Bw5Ax/w/Dy/w/DK9WK3fSNf/jpCcCABebOX6gx/v/b2f732ZvDvx4+egZT7o+bjfrXs6uggAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHABHaz/W8rWAp+KfL5UingjImaikLu/Wq3MRcSbEfGn8cJ4kp8fcJ0BgNPK/y2Xrf91bfrDqZeK3r1ymByLiJ/+6s4vHy42m5t/jBjL/Wv84HjzSXa83P/aAwDHOxin033HC/nne4+WDrZ+1ufv34mIYjv+/t5Y7B/GH43RdF+MQkRM/juX5dtyHXMXp7H7OCK+2K39uZhK50DaK58ejZ/EfqOv8fMvxc+nZe198rP4whnUBYbN06T/udXt/svH1XTf/f4vpj3U6WX9X3Kppf20D3wR/6D/G+nR/109aYyPfv+9dmri1bLHEV8ejTiIvd/R/xzEz/WI/+EJ4//lK+++36us9euIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m85Rz/YeDf7x6fU3e5Ul7Z/sEb94TPu/fsL2/+Z/9370tdfE/+YH3eLn453XxE/GxG+cMP7i5O+KvcqS+Ms92n/c83/9hPGf/XXnlWXDAYDBaWzvrC1Wq5VNCYmLn0h+ZS9ANbomPutXrLHoXvTzD9r39JGiVuv1F/yse1GvHuMsZt2Ai+Dwpo+I/w66MgAAAAAAAAAAAAAAQFf9+MTSoNsIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA5fX/AAAA//+YXdZi") r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0x0, 0xb, 0x5, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_COMPAT_NAME={0x7, 0x1, '\\)\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0xfffffffe}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x7}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x301240, 0x0) fchmod(r2, 0x0) ioctl$HIDIOCGPHYS(r2, 0x80404812, &(0x7f0000000100)) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000500)=@gcm_256={{0x303}, "2a4001011f891d5b", "11682d84dd05bb63ae661f051e1e79ceafeaa60a5bd1dc83db142ade2bd907fd", "fd6ed24e", "d4e9e1c90d89691c"}, 0x38) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) socket(0x11, 0x3, 0x0) epoll_create1(0x0) epoll_create1(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pwrite64(r3, &(0x7f0000000140)='2', 0xfdef, 0xfecc) 4m7.321090056s ago: executing program 4 (id=5561): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000040)={[{@nobh}, {@abort}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x4e22, @empty}, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1, 0xfffffffffffffffd}}}, 0x118) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) chmod(&(0x7f0000000200)='./file0\x00', 0x135) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000da1a4ca27446c534c44a91dba6d8d59fbd3d8961f2122b511e8032c26405292262690a4a1d3fbab355efe0da96bfbcec2044526d312d0761819f1ae79ed24e8d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x1a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000000000ac000000ac000000070000000b00000000000009030000000f00000004000093080000000c00000040000000080000000c00000000000100010000000d0000003b000000010100000e0000000400000000000100080000000000000a020000000900000002000005000500000800000005000000a95a0000050000000300000007000000000a00000000080000000000000e05000000020000000500000001000005070000000500000001000000010100000030005ffc2e00000000000000"], &(0x7f00000003c0)=""/112, 0xcb, 0x70, 0x1, 0x3, 0x10000, @value=r0}, 0x28) creat(&(0x7f00000000c0)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./bus\x00', 0x0, 0x1000, 0x0) 4m7.138285762s ago: executing program 4 (id=5568): r0 = socket(0x23, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40e41, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd9, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x78, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4, 0x0, 0xffffffffffffffff}, 0x13) unshare(0x2c020400) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r0}, 0x8) r5 = socket$key(0xf, 0x3, 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x8, 0xb, &(0x7f00000005c0)=ANY=[@ANYRESOCT=r5], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r7, &(0x7f000001a240)=""/102400, 0x19000, 0x0) socket$kcm(0x2, 0xa, 0x2) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x9, 0x401, 0x2, @private2, @mcast1, 0x700, 0x40, 0x0, 0x1}}) r8 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmsg$nl_route(r8, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="380000006800010000000000000000000a000000000000000600070008000000100008800c0001000000000000000d0008000500", @ANYRES64=0x0], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 4m6.3990886s ago: executing program 4 (id=5577): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@nouid32}, {@minixdf}]}, 0x1, 0x504, &(0x7f0000001480)="$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") r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0x0, 0xb, 0x5, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_COMPAT_NAME={0x7, 0x1, '\\)\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0xfffffffe}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x7}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0x1c8}, 0x1, 0x0, 0x0, 0x24000101}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x301240, 0x0) fchmod(r2, 0x0) ioctl$HIDIOCGPHYS(r2, 0x80404812, &(0x7f0000000100)) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000500)=@gcm_256={{0x303}, "2a4001011f891d5b", "11682d84dd05bb63ae661f051e1e79ceafeaa60a5bd1dc83db142ade2bd907fd", "fd6ed24e", "d4e9e1c90d89691c"}, 0x38) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) socket(0x11, 0x3, 0x0) epoll_create1(0x0) epoll_create1(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pwrite64(r3, &(0x7f0000000140)='2', 0xfdef, 0xfecc) 4m6.39353364s ago: executing program 52 (id=5577): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@nouid32}, {@minixdf}]}, 0x1, 0x504, &(0x7f0000001480)="$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") r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0x0, 0xb, 0x5, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_COMPAT_NAME={0x7, 0x1, '\\)\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0xfffffffe}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x7}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0x1c8}, 0x1, 0x0, 0x0, 0x24000101}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x301240, 0x0) fchmod(r2, 0x0) ioctl$HIDIOCGPHYS(r2, 0x80404812, &(0x7f0000000100)) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000500)=@gcm_256={{0x303}, "2a4001011f891d5b", "11682d84dd05bb63ae661f051e1e79ceafeaa60a5bd1dc83db142ade2bd907fd", "fd6ed24e", "d4e9e1c90d89691c"}, 0x38) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) socket(0x11, 0x3, 0x0) epoll_create1(0x0) epoll_create1(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pwrite64(r3, &(0x7f0000000140)='2', 0xfdef, 0xfecc) 4m2.929822235s ago: executing program 9 (id=5578): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000040)={[{@nobh}, {@abort}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x4e22, @empty}, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1, 0xfffffffffffffffd}}}, 0x118) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) chmod(&(0x7f0000000200)='./file0\x00', 0x135) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000da1a4ca27446c534c44a91dba6d8d59fbd3d8961f2122b511e8032c26405292262690a4a1d3fbab355efe0da96bfbcec2044526d312d0761819f1ae79ed24e8d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085100000030000001800000000000000000000000000000095000000000000009500000000000000d5b2307878b6a5229917ebb4029a0bea3522c1f874a88524b8256e9616dc84ef9f539900f13815da3cbc479df45e1acd7454a155dd43645345f9a4cddab3d6d9d40e13de56bf656d77b7451f09e02bcb6cf96a4c0fce8ff74fe80460b51e50b4d8105ae605917a45734dbd377e5f99ad246b74853c2ec4862629a63ca0445673c32ad594e33b56f0d0fc6e3a6c84dcd0b6a6746ccfe43cab05ecc5c02583d24d43d968d74062c0f54d148107a22b928921fd"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x1a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000000000ac000000ac000000070000000b00000000000009030000000f00000004000093080000000c00000040000000080000000c00000000000100010000000d0000003b000000010100000e0000000400000000000100080000000000000a020000000900000002000005000500000800000005000000a95a0000050000000300000007000000000a00000000080000000000000e05000000020000000500000001000005070000000500000001000000010100000030005ffc2e00000000000000"], &(0x7f00000003c0)=""/112, 0xcb, 0x70, 0x1, 0x3, 0x10000, @value=r0}, 0x28) creat(&(0x7f00000000c0)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./bus\x00', 0x0, 0x1000, 0x0) 4m2.750159511s ago: executing program 9 (id=5634): r0 = socket(0x23, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40e41, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x5, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd9, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x78, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3, 0x0, 0xffffffffffffffff}, 0x13) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r0}, 0x8) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00000001c0)={0x500, 0x0, &(0x7f0000000040)={0x0, 0x50}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r5, &(0x7f000001a240)=""/102400, 0x19000, 0x0) r6 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x9, 0x401, 0x2, @private2, @mcast1, 0x700, 0x40, 0x0, 0x1}}) r9 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="380000006800010000000000000000000a000000000000000600070008000000100008800c0001000000000000000d0008000500", @ANYRES64=0x0], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000080)=@ipv4_newnexthop={0x38, 0x68, 0x300, 0x70bd2b, 0x25dfdbfc, {0x2, 0x0, 0x2, 0x0, 0x9871d55535670b35}, [@NHA_GROUP_TYPE={0x6, 0x3, 0x1}, @NHA_OIF={0x8, 0x5, r8}, @NHA_OIF={0x8, 0x5, r10}, @NHA_GROUP_TYPE={0x6}]}, 0x38}}, 0x0) write$tun(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c0000f5000000000000000000e1ff00000002"], 0x73) 4m1.232303209s ago: executing program 9 (id=5674): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x2, 0x51, 0x1, 0x9, 0x14, 0x1, 0x7, 0x7f, 0x3, 0x7, 0x9, 0x1, 0x3, 0x8}, 0xe) socket$nl_generic(0x10, 0x3, 0x10) socket$xdp(0x2c, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000887babcbfd0977d6000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) llistxattr(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 4m1.232094578s ago: executing program 53 (id=5674): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x2, 0x51, 0x1, 0x9, 0x14, 0x1, 0x7, 0x7f, 0x3, 0x7, 0x9, 0x1, 0x3, 0x8}, 0xe) socket$nl_generic(0x10, 0x3, 0x10) socket$xdp(0x2c, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000887babcbfd0977d6000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) llistxattr(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 3m59.953192614s ago: executing program 3 (id=5726): r0 = socket(0x23, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40e41, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x5, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd9, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x78, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3, 0x0, 0xffffffffffffffff}, 0x13) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r0}, 0x8) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00000001c0)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x50}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r5, &(0x7f000001a240)=""/102400, 0x19000, 0x0) r6 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x9, 0x401, 0x2, @private2, @mcast1, 0x700, 0x40, 0x0, 0x1}}) r9 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="380000006800010000000000000000000a000000000000000600070008000000100008800c0001000000000000000d0008000500", @ANYRES64=0x0], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000080)=@ipv4_newnexthop={0x38, 0x68, 0x300, 0x70bd2b, 0x25dfdbfc, {0x2, 0x0, 0x2, 0x0, 0x9871d55535670b35}, [@NHA_GROUP_TYPE={0x6, 0x3, 0x1}, @NHA_OIF={0x8, 0x5, r8}, @NHA_OIF={0x8, 0x5, r10}, @NHA_GROUP_TYPE={0x6}]}, 0x38}}, 0x0) write$tun(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c0000f5000000000000000000e1ff00000002"], 0x73) 3m59.445282951s ago: executing program 3 (id=5732): bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x170}, 0x18) r0 = socket$inet(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000004300)=@mangle={'mangle\x00', 0x44, 0x6, 0x420, 0x2b8, 0x0, 0x138, 0x0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00'}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @ECN={0x28}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) 3m59.407117895s ago: executing program 3 (id=5733): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000740)={&(0x7f0000000180), 0x0, 0xf, 0x2}) r2 = socket(0x840000000002, 0x3, 0xff) sendmmsg$inet(r2, &(0x7f0000000440)=[{{&(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000280)="a9050000000096580a59e25eb7d4f9423bcc7464f42fd2d4599a0e8202adbf32abdbb05a", 0x24}], 0x1}}], 0x1, 0x0) 3m59.357108299s ago: executing program 3 (id=5734): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000040)={[{@nobh}, {@abort}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x4e22, @empty}, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1, 0xfffffffffffffffd}}}, 0x118) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x800, @mcast1, 0xfffffffd}, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x6af0dc3c}, r2, 0x3}}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000000000ac000000ac000000070000000b00000000000009030000000f00000004000093080000000c00000040000000080000000c00000000000100010000000d0000003b000000010100000e0000000400000000000100080000000000000a020000000900000002000005000500000800000005000000a95a0000050000000300000007000000000a00000000080000000000000e05000000020000000500000001000005070000000500000001000000010100000030005ffc2e00000000000000"], &(0x7f00000003c0)=""/112, 0xcb, 0x70, 0x1, 0x3, 0x10000, @value=r0}, 0x28) creat(&(0x7f00000000c0)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./bus\x00', 0x0, 0x1000, 0x0) 3m59.063439686s ago: executing program 3 (id=5742): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x170}, 0x18) r1 = socket$inet(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000004300)=@mangle={'mangle\x00', 0x44, 0x6, 0x420, 0x2b8, 0x0, 0x138, 0x0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00'}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @ECN={0x28}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) 3m57.952791746s ago: executing program 3 (id=5753): chdir(&(0x7f0000000140)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x49, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x21, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000580)={'ipvlan1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="000000000000efff2800128008000100687372001c000280050007000100000008000200", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r7], 0x48}}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) creat(&(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) 3m57.952581396s ago: executing program 54 (id=5753): chdir(&(0x7f0000000140)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x49, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x21, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000580)={'ipvlan1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="000000000000efff2800128008000100687372001c000280050007000100000008000200", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r7], 0x48}}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) creat(&(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) 3m47.209339161s ago: executing program 7 (id=5912): r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f00000008c0)=""/49, 0x31) getdents(r0, 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f0000000100)) quotactl_fd$Q_SETINFO(r0, 0x0, r1, &(0x7f00000001c0)={0x8, 0x7, 0x0, 0x1}) 3m47.209223501s ago: executing program 7 (id=5913): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001e00)="d8000000180081064e81f782db4cb904021d0800fe007c05e8fe55a10a000700014002020a600e41b0000900ac00040211000000160012000a0002000048035c4c61c1d67f6f94007133cf6efb8000a007a290457f01a7cee4090000001fb7d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de61fccd40dd6e4edef3d93452a9247c47870ae1d092665c07a81ead0f98a952c795c0e9703920723f9000000008af26c8b7b55f4d2a6823a45", 0xd8}], 0x1}, 0x0) 3m47.208995661s ago: executing program 7 (id=5914): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000200)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 3m47.183348364s ago: executing program 7 (id=5915): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000040)={[{@nobh}, {@abort}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x4e22, @empty}, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1, 0xfffffffffffffffd}}}, 0x118) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x800, @mcast1, 0xfffffffd}, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x6af0dc3c}, r2, 0x3}}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000000000ac000000ac000000070000000b00000000000009030000000f00000004000093080000000c00000040000000080000000c00000000000100010000000d0000003b000000010100000e0000000400000000000100080000000000000a020000000900000002000005000500000800000005000000a95a0000050000000300000007000000000a00000000080000000000000e05000000020000000500000001000005070000000500000001000000010100000030005ffc2e00000000000000"], &(0x7f00000003c0)=""/112, 0xcb, 0x70, 0x1, 0x3, 0x10000, @value=r0}, 0x28) creat(&(0x7f00000000c0)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./bus\x00', 0x0, 0x1000, 0x0) 3m47.077750603s ago: executing program 7 (id=5918): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) readv(r0, &(0x7f0000000000)=[{&(0x7f0000001300)=""/244, 0x940}], 0x1) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000300"/28], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x14) ioctl$TIOCVHANGUP(r4, 0x5437, 0x2) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r6) socket$inet_tcp(0x2, 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000000c0), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000480)='cgroup.threads\x00', 0x2, 0x0) sendfile(r10, r10, 0x0, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r11, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) 3m46.405368534s ago: executing program 7 (id=5928): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000040)={[{@nobh}, {@abort}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x4e22, @empty}, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1, 0xfffffffffffffffd}}}, 0x118) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x800, @mcast1, 0xfffffffd}, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x6af0dc3c}, r2, 0x3}}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000000000ac000000ac000000070000000b00000000000009030000000f00000004000093080000000c00000040000000080000000c00000000000100010000000d0000003b000000010100000e0000000400000000000100080000000000000a020000000900000002000005000500000800000005000000a95a0000050000000300000007000000000a00000000080000000000000e05000000020000000500000001000005070000000500000001000000010100000030005ffc2e00000000000000"], &(0x7f00000003c0)=""/112, 0xcb, 0x70, 0x1, 0x3, 0x10000, @value=r0}, 0x28) creat(&(0x7f00000000c0)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./bus\x00', 0x0, 0x1000, 0x0) 3m46.376289717s ago: executing program 55 (id=5928): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000040)={[{@nobh}, {@abort}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x4e22, @empty}, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1, 0xfffffffffffffffd}}}, 0x118) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x800, @mcast1, 0xfffffffd}, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x6af0dc3c}, r2, 0x3}}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000000000ac000000ac000000070000000b00000000000009030000000f00000004000093080000000c00000040000000080000000c00000000000100010000000d0000003b000000010100000e0000000400000000000100080000000000000a020000000900000002000005000500000800000005000000a95a0000050000000300000007000000000a00000000080000000000000e05000000020000000500000001000005070000000500000001000000010100000030005ffc2e00000000000000"], &(0x7f00000003c0)=""/112, 0xcb, 0x70, 0x1, 0x3, 0x10000, @value=r0}, 0x28) creat(&(0x7f00000000c0)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./bus\x00', 0x0, 0x1000, 0x0) 54.975970021s ago: executing program 5 (id=9274): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) uname(&(0x7f0000000000)=""/4096) 54.938097424s ago: executing program 5 (id=9276): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffdffff18d6, 0x96ef}, 0x0, 0x0, 0x7, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000013007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x2000000, &(0x7f0000000280), 0x1, 0x787, &(0x7f0000002dc0)="$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") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000041c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000042c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a300000000044000400200001000a00000000000000002d000000000000000000000000000100000000200002000a"], 0x6c}}, 0x0) open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xfd14) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@remote, @in6=@ipv4={""/10, ""/2, @initdev}}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x22, 0x0, 0x0) 54.799251087s ago: executing program 5 (id=9279): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8ff0000000000ff000044850000000e0000003f0000000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WOWLAN(r1, &(0x7f0000000440)={0x0, 0xfffffd33, &(0x7f0000000880)={&(0x7f00000008c0)={0x28, r2, 0x301, 0x0, 0x0, {{0x5}, {@val={0x8}, @void, @void}}}, 0x28}}, 0x0) (fail_nth: 3) 54.758092641s ago: executing program 5 (id=9281): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800009428bd7000fddbdf250a000300080000000400040008000500", @ANYRES32=r2, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4000800}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0x5}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x10001, 0xc0000) r5 = syz_clone(0x8000, &(0x7f0000000200)="768590bd776cf02d867ae279cfebe29449fa74f63f5690e1c37d9a2c8800d6b9ee47b16399d75d1cb49318132bfac1024e253ddbc486c8669da515c5b1b4901c104cff60c5aecaa491609ee862fa0f500f9406a4281a3ed64c819a5c97d4ce33331201556dbc7eaf7ccbd95cb1387d5bffefaa756c1197cd4566ffe76ada37f16f348b6f6df23b516d776e08076f2e301187c2e22abd4b9feb2ae5f2e2bb682a21a9d2700ce028d9e74ea1842d7948274e77f2347933a1134a5926426008c72ecc66d8f31301f9fcdd495a1ab3e98df2c627cec6b3b4cdf610", 0xd9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="c6c007ece40bfe9d2e8128365734cd57954043f0622ecba5569ba5f906e79dc56d5211018cf3a6441922b9c0e8e08ad58614dd35f0bc71a3de0a3947ffc79e88cbaaedb83ed04b4dec8d49876ab29f3983e5191dc7022730bcabf974eeea086d2236fd8e0c5a717a9246378c8db92e863dff09ce90a2d93762190b6b45c11d3cae624007c084c0615f61d382e3e99bb166645b6a9adb11e73331b49ba8f7863bd91335fbfd32df2cc300") ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000640)={'\x00', 0x400, 0x5, 0x3, 0xfffffffffffffffa, 0x0, r5}) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) syz_emit_ethernet(0x7e, &(0x7f0000000480)=ANY=[@ANYBLOB="0180c2000001aaaaaaaaaa3a080045000070000000000e01907864010100ac1414aa0b009078032c000045000fff000000000089000000000000ac1414aa86360000000faffa0dea2e903528000902a20948fd74060009ccf0294e2a3bdb890700ffffffff00"/126], 0x0) 54.757524471s ago: executing program 5 (id=9282): shmget$private(0x0, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) r0 = shmget(0x1, 0x4000, 0x78000000, &(0x7f0000ffc000/0x4000)=nil) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x4198, 0xe, 0x5, 0x40, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2, 0xe, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000180)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x1101088, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') mount(0x0, &(0x7f0000000d40)='./file0/../file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/../file0/../file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x40042, 0x1fe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r6}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r4, 0x0, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="b80000000001010400000000000000000a0000003c0001802c0001801400030000000000000000000000ffffac1414c714000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300ff02000000000000000000000000000114000400fe8000000000000000000000000000aa0c0002800500010000000000080007400000000008000480040003801c000f"], 0xb8}}, 0x0) shmctl$SHM_STAT_ANY(r0, 0xf, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) getpeername$unix(r8, &(0x7f0000000380), &(0x7f0000000280)=0x6e) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c200de00ba8d7061966c86dd60bc426000082c00fc000000000000000000000000000000ff0200000000000000000000000000013b000001"], 0x0) 54.561932319s ago: executing program 5 (id=9284): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000003c0), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') acct(&(0x7f0000000200)='./file0\x00') 39.593162578s ago: executing program 56 (id=9284): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000003c0), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') acct(&(0x7f0000000200)='./file0\x00') 1.648849489s ago: executing program 6 (id=10211): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2000000, r0, 0x4}, 0x38) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x3, 0x25, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0xbc29, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000013c0)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x10000, 0x7, 0xff, 0x2, r2, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1, 0xb, @void, @value, @void, @value}, 0x50) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3, &(0x7f0000000d40), 0x9, 0x61d, &(0x7f0000000700)="$eJzs3U1rXFUfAPD/nbwnz/MkDQ9qXWhAtAVt0qStFBG0CK5KqS8LwY1jk5ba6QtNRFMrTaFuBHHjQnDlwrrwO2hBcOUXcOHGlVSKSDdK0ZE7uTNOk7nJTMzMtJnfD8Y5556bOeea/HvOnDnnTgA9ayr9TyFid0RcSCIm68r6IyucWj3v9m+XT6SPJMrlV35N4vKVZKX+tZLseSwi0oI/xyP5LiIm+9bXu7h86UyxVFq4mOVnls5emFlcvrTv9NniqYVTC+fmnp47fOjgocOz++t+6uSLrV7frrr00WtvvTP+4bHXv/jsTjL75Y/Hkni+VpZeV6uvvZmpmIpypv54+v/18HZX1iV9tb+TfyRrD6z1QhsbREuqv7+BiHgwxqOv7rc5Hh+81NXGAW1VTqLWRwG9JhH/0KOq44Dqe/vm3gcPtnlUAnTCrSMRT9TifyAiqvHfvzo3GMOVuYHR28ld8zxJROzfhvrTOr7/9ti19BFtmocDGlu5OpTN26/t/5NKbE7EcCU3ertwV/wXsmnciWz+8OWNqxnPK5hak8/qH9rq9QDNW7kaEQ81Gv9vHv9vZM/p8Te3WH9O/AMAAAAAAABbcONIRDzV6PO/Qm39z2CD9T9jEXW757Zu88//Cje3oRqggVtHIp5tuP63UD1loi/L/beyHmAgOXm6tLA/Iv4XEXtjYCjNz9a/6Fd1Px0R+z6a/DSv/vr1f+kjrb+6FjBrx83+NauB5otLxW24dOh5t65GPNyfv/4n7f+TBv1/Gt8Xmqxj8vHrx/PKNo9/oF3Kn0fsadj/J7Vzko3vzzFTGQ/MVEcF6z3y3sdf59Uv/qF70v5/dOP4H0rq79ez2NrrD0bEgeX+cl75Vsf/g8mrfVG3E/Hd4tLSxdmIweTo+uNzrbUZ7ifDzZ/6fkRU4qEaL2n8731s4/m/2vi/Lg5Hsnt8NeOBv8Z+yivT/0P3pPE/v3H/P3F3/996Yu76xDd59R9vqv8/WOnT92ZHzP/BxpoN0G63EwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADuR4WI+E8khelaulCYno4Yi4j/x2ihdH5x6cmT598+N5+WVb7/v1D9pt/x1XxS/f7/ibr83Jr8gYjYFRGf9I1U8tMnzpfmu33xAAAAAAAAAAAAAAAAAAAAcI8YW31at/8/9XNfV5sGdEJ/9izeoff0d7sBQNeIf+hd4h96V378/36nXNHR5gAd1Gz/X77S5oYAHbfF8b+PC2AH8P4fetVAc6cNt7sdQDfo/wEAAAAAYEfZ9eiNH5KIWHlmpPJIDWZltQ8GR7rVOqCdCnkFQ51tB9B51vBC77L0B3pXk4t/gR0sqaX+aLjZP3/1f9KeBgEAAAAAAAAAAAAA6+zZ3cT+f2BHyt3/D+x4G+z/b7Sxx+0CYAex/x96l9t8AdXBft43/dv/DwAAAAAAAAAAAAD3gOFLZ4ql0sLFxeWmE1daOfnfJ36JvKLnOtmM7UqsFO+JZtwPiYGIWFNUHl/9sz1TLL0WnW1PNWI6UddgB+vKSXTp3yMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGCdvwMAAP//emUoLA==") mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @mcast2, 0x9}, 0x1c) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000000500)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x40, 0x0, 0x0, 0xfffffff9}, {0x6}]}, 0x10) sendto$inet6(r3, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1baa87f, &(0x7f0000000440)={[{@nr_blocks={'nr_blocks', 0x3d, [0x74]}}]}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000280)={0x0, 0x5}, 0xe) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f00000003c0)={r6, 0x5}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x8, 0x0, &(0x7f00000002c0)="b800000500000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = getpid() r8 = perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x8c, 0xfd, 0x0, 0x0, 0x54908, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x1010, 0x2, 0xffffffff}, r7, 0x0, 0xffffffffffffffff, 0xf5e6272c9b501da4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, r2, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080)={0x0, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001180)={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020000000100000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000f01b1d91d3d82fa0162ced000000"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYRES32, @ANYRES16=r8], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.560706907s ago: executing program 6 (id=10216): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ppoll(&(0x7f0000000080)=[{r0, 0x1210}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) ioprio_set$pid(0x3, r1, 0x4004) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xc, 0x0, 0xe, 0xf4, 0x20, "5add1000b1df0223aca67a9bc9000000000500"}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000140)={0x6, 0x1, 0x7, 0x8, 0x9, "2a7363aad533c871"}) 1.307314111s ago: executing program 0 (id=10226): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1a77}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000200)=0x7fffffff, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1088d8b8588d72ec29c48f0af5f2d9f51c4b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465ad32b77a74e802a0dc6bf25cca242bc6099ad2300000480006ef6c1ff0900000000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767042361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b6c7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae645ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48fc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1fb8f72cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa7956488bef241875f3b4b6ab7929a57affe760e797724f4fce1093b62d7e8c7123d890decacec55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f870b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f154772f514216bdf57d2a40d40b51ab67903ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1594e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214d00000000d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c471c784ae7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec30cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd63bed8d31c31c37a373d4efd89f0000377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f0059161c5e0000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe34124172e436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fa03b84f63e022fe755f4007a4a899eaf52c4f491d8e97c862e29e457060000007ac691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104ebc1581848f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c716357d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c24936615ee68538e8fddd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426ca85e82ccf821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ad6acf5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba1c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63c41cbde2ba66ad81168070c8c6e18a6e452a31bdc4a60d637545ed4c8a1c649c3ce54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c5140200000054d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c7340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a3bc38613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f14eafe4b28ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1bfeef448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae0040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483f02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e9180100000000000000654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732e74dd690c57bdfdc1f069f9491bca7a8c59363799be70018c25ece5ad7307dc7a95c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272ab28a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece98c077b358e752b439132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae2676384ff799783f55d7e5a1a092a01b965dc99cb7a9d98440c355927629f2bcf9dc2396eb2f5d25829715b24327642ac48f1201014a95e0e65e12cdf27e19043e3c5d3e798375cead35b9a93190a52cdecaaccc854a1d41ef365303f0e9b4fc969c9dab6df5e8a795b140fcc09e8a7b694d12932917facd8ceaa4e2d0d16bb0b95387fcd5ff136d8abddf94daf442bbff744591931872a36cf921ad69f2127386e8b0f9afee4da8d3fbec809fbb3ca0fded2859cf25d4c6155d396c5b9bd1a928923123f63f4c40688eae69990a9419456247bbaeb7948de84d2ff875414883bb1e503d4bfebc01bc12a53ea06bf38e571157bd642dac25dbee7832c58378374a39483d6721eec96c28911db21c0c006b42afc90000000000000000000000700000000000000000008ce4ea442c1a207108b35511186c5e860278f6463f52f3990ce08b1bfccc3cff4b5ae27b610aa9ba11b47d4f94c439e055cdbb2b12c983885c93ea4ab4ca1e02d831ae162ee104"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x64, 0x6, 0x600, 0x0, 0x0, 0x1d0, 0x0, 0x1d0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'vcan0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0x7a00000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x9}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'syzkaller1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private0}}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'veth1_to_batadv\x00', 'vlan1\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@ipv6header={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty}}}, {{@ipv6={@private0, @mcast2, [], [], 'veth1_to_team\x00', 'veth0_macvtap\x00'}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x660) kexec_load(0x300, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='kfree\x00'}, 0x10) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x800414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2bb, &(0x7f0000000440)="$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") mkdir(&(0x7f0000000080)='./file1\x00', 0x8cffffffffffffff) 1.306274811s ago: executing program 8 (id=10227): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x5000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000880)='./bus\x00', 0x40, &(0x7f00000000c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@nodelalloc}, {@abort}, {@noload}, {@noload}]}, 0x64, 0x50a, &(0x7f0000000900)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) 1.257767196s ago: executing program 2 (id=10229): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {r1}}, './file0\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x20000000000001a2, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x3c, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000a40)={[{@stripe={'stripe', 0x3d, 0x3}}, {@noauto_da_alloc}, {@jqfmt_vfsold}, {@data_err_ignore}, {@noauto_da_alloc}, {@delalloc}, {@resuid}, {@oldalloc}, {@jqfmt_vfsv1}]}, 0xfc, 0x550, &(0x7f0000000b00)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42042, 0x2) pwritev2(r6, 0x0, 0x0, 0x6e45, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB="300000001800010000000000000000000200000000000006000000000c00090008000000"], 0x30}}, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x26}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}]}, 0x3c}}, 0x800) r8 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x80044940, &(0x7f0000000680)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setresuid(0x0, r5, 0x0) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) setrlimit(0x40000000000008, &(0x7f0000000000)) setsockopt$sock_linger(r9, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e20, @broadcast}, 0x20, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000200)='gre0\x00', 0x2000000000000, 0x6, 0xffff}) sendto$inet6(r9, 0x0, 0x0, 0x404c080, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 963.100252ms ago: executing program 8 (id=10230): sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000041}, 0x20010010) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000ffff00000000000000bd0000000000000000000000e4ec01000000004000000000fc00000000000000000000000000013da51fd47aa2e2f70000000000000000000000000000000000000000000000000000000000040006000000000000000005000000"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f00000005c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 962.524882ms ago: executing program 1 (id=10231): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000001a000000000000000000000000c998c3478044f976637343408992ba8ed11c0f00504b6e72cc1d69bb9198038a00bd0d7f25068482a3914212ca520f0858665f88b57397974419055fc424e0b6621cb1d31d13c4817773fe36a424dddd9535a9e0778c06dc20cf78f795d068f0abdd350bb2a7159e55f1fe93ac10ba39cf128f7aa58478ab1271f18937302b8d0349"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = io_uring_setup(0x7fe7, &(0x7f0000000140)={0x0, 0x0, 0x3000, 0x0, 0xfffffffe}) poll(&(0x7f0000000000)=[{r3, 0x11000}], 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0xc4) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0xffffffffffffff90, &(0x7f00000000c0)={&(0x7f0000000680)=@newtfilter={0x58, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xa}, {}, {0x5}}, [@filter_kind_options=@f_u32={{0x8}, {0x2c}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r7) sendmsg$NFC_CMD_DEP_LINK_UP(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000200)={0x14, r8, 0x1, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x44000}, 0x40) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 961.966582ms ago: executing program 8 (id=10232): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/xfrm_stat\x00') pread64(r0, &(0x7f0000004180)=""/4096, 0x1000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB='ya\x00'], 0x1c}}, 0x0) r2 = syz_io_uring_setup(0x3be6, &(0x7f0000000080)={0x0, 0x0, 0x10100, 0x3}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x40, 0x0, r1, 0x0, &(0x7f0000000640)="1dc930653dbb97", 0x7}) io_uring_enter(r2, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000080)=""/30, 0x1e}, {&(0x7f0000000180)=""/46, 0x2e}, {&(0x7f0000000400)=""/63, 0x3f}, {&(0x7f00000005c0)=""/211, 0xd3}, {&(0x7f00000006c0)=""/87, 0x57}, {&(0x7f0000000740)=""/214, 0xd6}], 0x6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) r6 = syz_open_dev$usbfs(&(0x7f0000000480), 0xc, 0x141341) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$igmp(0x2, 0x3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) keyctl$restrict_keyring(0x3, 0xfffffffffffffffb, 0x0, 0x0) request_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0xfffffffffffffffb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r7 = inotify_init1(0x0) inotify_add_watch(r7, &(0x7f0000000040)='.\x00', 0x140002d2) read(r7, 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000004000000005efe2100850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kmem_cache_free\x00', r8, 0x0, 0x800}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}, {0x0, 0x1, 0x7, 0x3}]}) 961.180332ms ago: executing program 2 (id=10233): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8800}, 0x44040) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x7c, 0x464, 0x200, 0x70bd2c, 0x25dfdbfe, "460efd93c736c3600c44e1449f121ec2b3270c24f403a8ebb2241247676c5dd168dbe82cacbcf8050a9e249d06839837b464357f7a4ff190ad6e71c5cb4d0fadf5ba8fd4c984394fa756ae619f8a13b8b189e1ef8d62a510e5209bf28a403d8584bbf3437fb0da98cf4b13", [""]}, 0x7c}, 0x1, 0x0, 0x0, 0x4c001}, 0x8000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x19, 0x7, 0xc00, 0x6, 0x1000, 0xffffffffffffffff, 0x70000, '\x00', 0x0, r1, 0x3, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0x8, 0x7, 0x4, 0x6a1}, {0x8, 0x7, 0x15, 0x200}, {0x6, 0xdf, 0xe, 0xbd3e}]}, 0x10) r3 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x60, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xf}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7}]}, 0x60}, 0x1, 0x0, 0x0, 0xc010}, 0x40045) (async) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)=0x0) (async) fcntl$getownex(r2, 0x10, &(0x7f0000000500)={0x0, 0x0}) kcmp(r4, r5, 0x2, r0, r0) (async, rerun: 32) r6 = socket$unix(0x1, 0x5, 0x0) (rerun: 32) ioctl$F2FS_IOC_DEFRAGMENT(r2, 0xc010f508, &(0x7f0000000540)={0x2, 0x2b}) (async, rerun: 64) syz_io_uring_setup(0x3a1b, &(0x7f0000000580)={0x0, 0x3075, 0x400, 0x0, 0x2d, 0x0, r1}, &(0x7f0000000600), &(0x7f0000000640)) (rerun: 64) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, r7, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000041}, 0x10) (async) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), r1) (async) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000840)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000940)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x70, r8, 0x400, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x2, 0x54}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x29}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x18}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x80}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x41}]}, 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) (async) r10 = socket$pptp(0x18, 0x1, 0x2) sendmsg$sock(r10, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000980)="3c5991f7ba625778a7e01dd6c7bbf59f9d35f6409bfae177140d54753a410ea689a8cf146be7e81c178ce2a612259d387696582ff5d5acdd052f", 0x3a}, {&(0x7f00000009c0)="eceb384548b3f25806d579550b49e5651838a0f958e1cffb2cef808989f0324cb967e16d32f279af259c1feb51fe5bcb2a37ce1cd213e1a1409150b20c9b85052c", 0x41}, {&(0x7f0000000a40)="d3d20554eb55b211070648c37c807d8767fcf1e56c46dd6248359676818bfd293fa07ff1bbbc293b708e40a7e58905b683ea01d5a7bb09574c00673ddb690760f62098b012ea6ce9bdc4873fff506657d6386a65874b4984996dc8f937f6d468485445f171da7b710b1abcc06eb8f366d46934f4e4b8ea954d1ed762e56651c74dc2219d20cafd2711c9f605914957cc088c3b17c46e0591a3b01b88af01ccd80e59f9334de4b5791a9c34a4be8fc0d19af85395d910bacf4ba9b1f645c9e2e447ef5ea02597db1129ceb361e85537b298349c4208779920d75535fc972e6acaa94647f2fc71fdfce5fca1a8", 0xec}, {&(0x7f0000000b40)="7d776df522a2efe21537b7547eb4de7332d8f906cc8c418fc003a4b2ecfae300e0d45eabb539ddd9c307472e433c6ed6ab57752b3956f72e85fae25a2579dd89f6972098db9ef4df87d78784b46137c5d31bacf0610218dc822fec4ab8f51a01a80d137c09dc416afcc0ea403ff15cbb1920e70c51db907fdd4700d6d4afcbed4bd8a1b1928528f5b2aa19628cfc20df3f5ddf02595b0dbeaf2c7b81b29fae3e46d7f15cdd92b50047da8ba65212eab04a191d037877bd02710b1a1b47b699e48361bf44497588d8db40e32d8f492103766a03ef649c8c971d4c24c3a82f93317c639cc6c69d8f8d8abd0d0a", 0xec}, {&(0x7f0000000c40)="9191448feffe9a801f7a3dae1df1f236cba0c0eae142d473850a515a37e2b78e02944c", 0x23}, {&(0x7f0000000c80)="0bbf076ef8deca791bec540a8a08efdb786a46bfafd5e59ed832294893c6b7b18bb233e50decac477cdc672f8c26705728d780b8752c2f138c5b4abce810d0bd78bddf31863252afeb305498e6fc4e31f252cbe81db4f276fbfe07d47b1367685e8e52720308adbdbf6ee3231511cd7997b8f2c712dd765760adf42ceb57936d4fae636640eac1481602d763295fb5a91464650bb093b85d1ca70f34666fa16fc7fe9ebe0c62caa5a27942878283838ac4c0419bdfd314523e8b022cd8a7b1b524f1f9e3f6fda39b473d88d8e09ef7d41d8722e53c2386a90e805a7e3f", 0xdd}], 0x6, &(0x7f0000000e00)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x22e4c0f}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x78}, 0x4004000) (async) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r11, &(0x7f0000000fc0)={&(0x7f0000000ec0), 0xc, &(0x7f0000000f80)={&(0x7f0000000f00)={0x48, 0x0, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team_slave_0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vcan0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x20040000) (async) sendmsg$inet(r10, &(0x7f0000002200)={&(0x7f0000001000)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002180)=[{&(0x7f0000001040)="4a2370c63deda96d02f035eaa48c4d843331622f363bedc59f2380dbd5f20f1ac0b7c2f1e794f8fb4bad771d501c48e2787db032fb5fa84ca2bb025e92626e8e", 0x40}, {&(0x7f0000001080)="439e899cb6a8c41e2bd6dace8a3a36dd1aa4a3fd598aa0bc277c", 0x1a}, {&(0x7f00000010c0)="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", 0x1000}, {&(0x7f00000020c0)="3f6195ca355cc10e11b71860dd910b4b96b66bdb1a3784b22859dc6f757b9c7b617a78aee3ac49c7a3791bb8339d445ca7952e8bd6046fd020a9c35e2e13ed7f91f94bcabf7ea441c3c781eab87aad7386762f6e7b9930553929b6c7976d5b1e5470d36ec5e99b5986f19f86fee83bac43162695dcbd5814dd39f0327efe59ef9f937ba1994b3bc8dc948f6f9c", 0x8d}], 0x4, &(0x7f00000021c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}], 0x30}, 0x4044001) (async) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000002240)={0x7, 0x80, 0x3b}) fcntl$setlease(r6, 0x400, 0x0) (async, rerun: 64) syz_pidfd_open(r5, 0x0) (rerun: 64) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000022c0)={0x0}, &(0x7f0000002300)=0xc) syz_pidfd_open(r12, 0x0) (async) syz_usb_connect$hid(0x2, 0x36, &(0x7f0000002340)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x3, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x7f, 0x0, 0x1, [{{0x9, 0x4, 0x0, 0x5, 0x2, 0x3, 0x1, 0x2, 0x0, {0x9, 0x21, 0xc, 0xb, 0x1, {0x22, 0x680}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x57, 0x6, 0x41}}}}}]}}]}}, &(0x7f0000002500)={0xa, &(0x7f0000002380)={0xa, 0x6, 0x0, 0x9, 0xa, 0x3, 0x10, 0x5}, 0x54, &(0x7f00000023c0)={0x5, 0xf, 0x54, 0x4, [@ssp_cap={0x18, 0x10, 0xa, 0x8, 0x3, 0xcb, 0xf000, 0x6, [0xf, 0xff00, 0x3f0f]}, @wireless={0xb, 0x10, 0x1, 0x4, 0x3c, 0x7, 0x9, 0x3, 0x1}, @generic={0x22, 0x10, 0x4, "2593ea654897e27c0fd3603ed83fe5413bea418d5176c7a0f5459c7729b7df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x2}]}, 0x3, [{0x17, &(0x7f0000002440)=@string={0x17, 0x3, "bb1baf9b488060e52060aac8bfe274d129d007422b"}}, {0x4, &(0x7f0000002480)=@lang_id={0x4, 0x3, 0xc04}}, {0x4, &(0x7f00000024c0)=@lang_id={0x4, 0x3, 0x457}}]}) 960.734502ms ago: executing program 1 (id=10234): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f000000f480), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f000000f780)={0x0, 0x0, &(0x7f000000f740)={&(0x7f000000f680)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000207e000100000020e8ff00800800060002000000"], 0x20}, 0x1, 0x0, 0x0, 0x4010}, 0x44040) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYRES64=0x0], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) semget$private(0x0, 0x4000000009, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000280)='netlink_extack\x00', r5}, 0x10) r6 = socket$inet6(0xa, 0x80002, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000040)={@mcast2, 0x33, r8}) 938.083894ms ago: executing program 1 (id=10235): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mlock2(&(0x7f0000003000/0xb000)=nil, 0xb000, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e0000000000f86fbbffffffcb880000080c0200", @ANYRES32=r2, @ANYBLOB="0700030000000000000000000000000000080000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="00000000ff7b0000040000000f00"/28], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0000000000000000000000000000abcacd379a52eee8ae8e499130", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3, @ANYBLOB="00850000008600000095000000000000050000000000000000", @ANYRES16=r1, @ANYRESOCT=r2, @ANYRES8, @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1500000000000020000000000000000031640300", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24, @ANYRES32, @ANYBLOB="469df32ef9c1633304a8d87c77b2db1356f304aa7ede9e6ae2005a9a8cfe29b8766d3519869863b373feb757f852dd068c65eb0cec57ff55709f25ebe2ac3b0c829e831904e9ad17be1ad841b3648a8dfc90bca8e37b23ed240813ce0e49243caa0857f8f8269412700c3f051684c9b8f7be893affff5447d6ed22e339f45fcd5e36a1dbbe6cee0e604b3a472a1c584fe255a5926245846f25df35689467382f6b286dd200a38e54446930cb699f7a97d1e40a35eaad8b8da787"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7ffffd, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) write$cgroup_freezer_state(r6, &(0x7f0000000100)='THAWED\x00', 0x7) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socket$rxrpc(0x21, 0x2, 0xa) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000001c0), 0x4) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) r7 = eventfd(0x0) gettid() timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0f0000012000000000000000", @ANYRES32=0x0, @ANYRES64=0x0], 0x20) read$eventfd(r7, &(0x7f0000000040), 0x8) ioctl$TIOCL_GETKMSGREDIRECT(r6, 0x541c, &(0x7f0000000280)) syz_genetlink_get_family_id$nfc(&(0x7f00000000c0), r0) chdir(0x0) 685.691297ms ago: executing program 6 (id=10236): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r0, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf2, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000540), &(0x7f0000000900), 0x8, 0x84, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x18, 0x0, 0x1b7c) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r4, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0xb, 0x0, 0x1, 0xa, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000c40)={0x1, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c80)={0xffffffffffffffff, 0x489b, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x5, 0x14, &(0x7f0000000380)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xffffffffffffffff}, @ldst={0x3, 0x3, 0x1, 0x4, 0xb, 0x1, 0x8}, @ldst={0x2, 0x3, 0x4, 0x3, 0x2, 0x30, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xc8, &(0x7f0000000800)=""/200, 0x41100, 0x40, '\x00', r1, @fallback=0x29, r2, 0x8, &(0x7f0000000ac0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x3, 0xb, 0x0, 0xfffffeff}, 0x10, r5, r0, 0x0, &(0x7f0000000cc0)=[r6, r7, r8, r9], 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000031d0851000000600000018040000", @ANYRES32, @ANYBLOB="0000000000000000060000000000000018000000000000000000000000000000950000000000000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b502000050000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r10 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x220, 0x340, 0x25, 0x148, 0x0, 0x60, 0x488, 0x2a8, 0x2a8, 0x488, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8, 0x0, {0x200003ae, 0x7f00}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x280) 685.303668ms ago: executing program 6 (id=10237): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$random(0xffffffffffffff9c, &(0x7f00000016c0), 0x341, 0x0) writev(r2, &(0x7f0000001a80)=[{&(0x7f0000001700)="f25c8dc65d4e1ad9ebebd62d7af6ab896be7c142aa0e8b4ca7440f81a9f78ea6e31c52a8b3b777783abbbcd71336c03808826631df54c6679f8ecf6aaa4e66472542", 0x42}, {0x0}], 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000008, &(0x7f0000000100)={[{@grpid}, {@auto_da_alloc}, {@delalloc}, {@nodioread_nolock}, {@init_itable}]}, 0xff, 0x52e, &(0x7f0000000640)="$eJzs3cFvI1cZAPBvnDib7GabFDhApZZCi7IVrJ00tI04lCIhOFVClPsSEieK4sRR7LSbqILsX4CEECBxggsXJP4AJLQSF44IqRKcQSoCIdiCBAfoINvjJDjjxFuceNf5/aTZeW/GM9/3vHnjGc/TOIAr69mIeC0i3k/T9IWImMmWF7IpDttT83XvPXh7pTklkaZv/DWJJFvW2VeSzW9km01GxFe/HPGN5HTc+v7B5nK1WtnN6uXG1k65vn9we2Nreb2yXtleXFx4eemVpZeW5gfSzpsR8eoX//i9b//kS6/+4jNv/eHOn299s5nWdLb+ZDse0vhZK9tNL16b7Npg9wMGexQ121PsVKb62+beBeYDAEBvzXP8D0XEJyPihZiJsbNPZwEAAIDHUPr56fh3EpHmm+ixHAAAAHiMFFpjYJNCKRsLMB2FQqnUHsP7kbheqNbqjU+v1fa2V9tjZWejWFjbqFbms7HCs1FMmvWFVvm4/mJXfTEinoyI785MteqllVp1ddhffgAAAMAVcaPr+v8fM+3rfwAAAGDEzA47AQAAAODCuf4HAACA0ef6HwAAAEbaV15/vTmlnd+/Xn1zf2+z9ubt1Up9s7S1t1Jaqe3ulNZrtfXWM/u2zttftVbb+Wxs790tNyr1Rrm+f3Bnq7a33bizEZOX0iAAAADglCc/fv93SUQcfm6qNTVNDDsp4FKMH5WSbJ7T+3//RHv+7iUlBVyKsT5e8+61/OXOE+DxNt69oEdfB0ZPcdgJAEOXnLO+5+CdX2fzTww2HwAAYPDmPpZ////8+wKHhUtID7hAOjFcXV2f8+nMsBIBLl3r/n+/A3mcLMBIKfY1AhAYZf/3/f9zpelDJQQAAAzcdGtKCqXs673pKBRKpYibrZ8FKCZrG9XKfEQ8ERG/nSlea9YXWlsm514zAAAAAAAAAAAAAAAAAAAAAAAAAABtaZpECgAAAIy0iMKfkl+2n+U/N/P8dPf3AxPJv1o/CTwREW/98I3v311uNHYXmsv/drS88YNs+YvD+AYDAAAA6Na5Tm/N/znsbAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYNe89eHulM/Xx8qlBxf3LFyJiNi/+eEy25pNRjIjrf09i/MR2SUSMDSD+4b2I+Ghe/KSZ1lHIvPiDeBPOiR+z2buQF//GAOLDVXa/efx5La//FeLZ1jy//41H/E/9g+p9/Iuj499Yj/5/s88YT73zs3LP+PcinhrPP/504ic94j/XZ/yvf+3goNe69EcRc53Pn9YR72SE41K5sbVTru8f3N7YWl6vrFe2FxcXXl56Zemlpfny2ka1kv2bG+M7T//8/bPafz338y/Jsund/udz9pf3mfSfd+4++HCncng6/q3ncuL/6sfZK07HL2RxPpWVm+vnOuXDdvmkZ376m2fOav/qcfuLD/P/f6vXTrud6ihP9/unAwBcgPr+weZytVrZHdlC8yr9EUhD4REsfGugO0zTNG32qZxV9yOin/0kMeCWFvLzOS70PAIM+8gEAAAM2vFJ/7AzAQAAAAAAAAAAAAAAAAAAgKvrMp6y1h3z+BHIySAeoQ0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMBD/DQAA///dpdP7") 684.849918ms ago: executing program 6 (id=10238): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000040000000875065b0000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_newrule={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x81, 0x14, 0x20}}, 0x1c}, 0x1, 0x0, 0x0, 0x4008081}, 0x0) cachestat(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) io_setup(0x4, &(0x7f0000000180)=0x0) io_submit(r4, 0x1, &(0x7f0000000300)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) 590.930146ms ago: executing program 6 (id=10239): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000004cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)="4798", 0x2}], 0x1, &(0x7f0000000a40)=ANY=[], 0x30, 0x40400d1}}], 0x1, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 463.355078ms ago: executing program 0 (id=10240): io_uring_setup(0x66b, &(0x7f00000002c0)={0x0, 0x0, 0x100, 0x0, 0x10000}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) openat$binfmt_register(0xffffff9c, &(0x7f0000000180), 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r3, @ANYBLOB='\b\x00', @ANYBLOB="0a0001000000"], 0x64}}, 0x0) 389.147275ms ago: executing program 0 (id=10241): shmat(0x0, &(0x7f0000313000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f000027e000/0x1000)=nil, 0x4000) r0 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000311000/0x3000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000de00000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) unshare(0x68040200) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r2, &(0x7f0000000500)="ac", 0x1, 0x24000005, &(0x7f0000000380)={0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) shutdown(r2, 0x1) r3 = dup2(r2, r2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001200)={'syztnl0\x00', &(0x7f0000001180)={'ip_vti0\x00', 0x0, 0x7800, 0x80, 0xa, 0xb, {{0x6, 0x4, 0x3, 0x7, 0x18, 0x66, 0x0, 0x9, 0x981436eb86f48008, 0x0, @loopback, @multicast2, {[@timestamp={0x44, 0x4, 0x1c, 0x0, 0x2}]}}}}}) sendmmsg$inet6(r2, 0x0, 0x0, 0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x6e, &(0x7f0000000000), 0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x2804049, &(0x7f0000001340)=ANY=[], 0x42, 0x30c, &(0x7f00000001c0)="$eJzs3M9LG2kYwPEnMZoY0eSwLOsuiy+7l93LoNn77oZFYdnALq5ZdrdQGM2kDZkmITO1REpNT73232jw6KUIrf0DvPTWUy+lFy+FXoTWpsyPmEQTTWNNlHw/IO/jvO8zP/JOwjMDM/v/PryVz1paVrclGFESFKnKoUjciXxr0yISkIC4zYS3MOI1Vflx6u2Lb5WIJFOpxWWllpIrPyWUUjNzT+7c3fpu1576Z3tmJyx78ev7bxKv9r7cm93/sHIzZ6mcpQpFW+lqtfjS1ldNQ2VyVl5T6i/T0C1D5QqWUfb6i7a/WSmVKkovZKajpbJhWUovVFTeqCi7qOxyRek39FxBaZqmpqMyOg7m3Kb0qXnp2vKynuxzo2t95uGz2z21t1xufHme1dt70rWL2ycAAHBZNer/cGv9f9Be/wf8Ntha//uqUnXq/7//+/+PHur/nYku9X/xRP3vX1+IrfRfncbtz5pF6v9+RU4uStfG+q//cUWUJ0VqW9L8Rt+/tjXvBtT/AAAAAAAAAAAAAAAAAAAAAABcBQf1eqxer8ecNihe7PyF/QdGGv8Pez9xMVrn35vrkDPrzP+IaHlwLyJiPlhPr6e91utPZiUnphgyLzF5754PPi9e+j21GFCuuDw1N/38zfX0WHv+gsQk3jl/wctX7fnjEm3NT0hMvuicn+iYPyE/fN+Sr0lMnq9JUUzJuOd1M//eglK//Zk6lj8pmQ5PzAEAAAAAcBVp6kjH63dN69bv5fdyf2C+4/V5SL4ODffYAQAAAAAYFVZlI6+bplE+M3jkZ5w5+LU/sOc1nzcY7/Uowr2v+bEbBLqtOXL00d3+aoBH2gwa72Q+dfCkP6ity789szn4fT53MDeUrYeck75lSbTr4JmxTh/4aUHYfyuzs+SwfmzMz9vfvKts/DJ7xixfUDDQnyEAAAAAA9As+oe9JwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAjK5BvE5s2McIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXBYfAwAA//81CRJE") r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x7, &(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYRES64=r4, @ANYBLOB="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"], &(0x7f0000000540)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x20702, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) write$cgroup_int(r6, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) time(0x0) 323.394461ms ago: executing program 0 (id=10242): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE2(r0, 0x0, 0x2) 310.845352ms ago: executing program 2 (id=10243): sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000041}, 0x20010010) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000ffff00000000000000bd0000000000000000000000e4ec01000000004000000000fc00000000000000000000000000013da51fd47aa2e2f700000000000000000000000000000000000000000000000000000000000400060000000000000000050000000a004e200e"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f00000005c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 309.773142ms ago: executing program 0 (id=10244): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000001a000000000000000000000000c998c3478044f976637343408992ba8ed11c0f00504b6e72cc1d69bb9198038a00bd0d7f25068482a3914212ca520f0858665f88b57397974419055fc424e0b6621cb1d31d13c4817773fe36a424dddd9535a9e0778c06dc20cf78f795d068f0abdd350bb2a7159e55f1fe93ac10ba39cf128f7aa58478ab1271f18937302b8d0349"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = io_uring_setup(0x7fe7, &(0x7f0000000140)={0x0, 0x0, 0x3000, 0x0, 0xfffffffe}) poll(&(0x7f0000000000)=[{r3, 0x11000}], 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0xc4) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0xffffffffffffff90, &(0x7f00000000c0)={&(0x7f0000000680)=@newtfilter={0x58, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xa}, {}, {0x5}}, [@filter_kind_options=@f_u32={{0x8}, {0x2c}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r7) sendmsg$NFC_CMD_DEP_LINK_UP(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000200)={0x14, r8, 0x1, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x44000}, 0x40) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 279.913145ms ago: executing program 2 (id=10245): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {r1}}, './file0\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x20000000000001a2, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x3c, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000a40)={[{@stripe={'stripe', 0x3d, 0x3}}, {@noauto_da_alloc}, {@jqfmt_vfsold}, {@data_err_ignore}, {@noauto_da_alloc}, {@delalloc}, {@resuid}, {@oldalloc}, {@jqfmt_vfsv1}]}, 0xfc, 0x550, &(0x7f0000000b00)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42042, 0x2) pwritev2(r6, 0x0, 0x0, 0x6e45, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB="300000001800010000000000000000000200000000000006000000000c00090008000000"], 0x30}}, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x26}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}]}, 0x3c}}, 0x800) r8 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x80044940, &(0x7f0000000680)) setresuid(0x0, r5, 0x0) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) setrlimit(0x40000000000008, &(0x7f0000000000)) setsockopt$sock_linger(r9, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e20, @broadcast}, 0x20, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000200)='gre0\x00', 0x2000000000000, 0x6, 0xffff}) sendto$inet6(r9, 0x0, 0x0, 0x404c080, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 279.414295ms ago: executing program 0 (id=10246): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ppoll(&(0x7f0000000080)=[{r0, 0x1210}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) ioprio_set$pid(0x3, r1, 0x4004) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000140)={0x6, 0x1, 0x7, 0x8, 0x9, "2a7363aad533c871"}) 255.532947ms ago: executing program 2 (id=10247): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xfffffd96) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) r3 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0x1f}, 0x48, 0xffffffffffffffff) r4 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r4, r3, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x4, r2, r2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000001340)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) r6 = syz_open_dev$loop(&(0x7f0000000340), 0x3, 0x84000) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r6, 0x4c0a, &(0x7f0000000080)={r7, 0x0, {0x0, 0x0, 0x0, 0x8000000, 0xb, 0x0, 0x0, 0x0, 0x11, "4874ef095b775b5e51210c4037a557f800ff97aa6b42683995845c8c3ce42e76d4db19d512f6f28300", "eba9d749fdc2dedff9641c2773c54efce1fa87820dae06070446988b8770438b12e6b80c265fdce83841f0f230d1f4fe7b5ba021316c17fb5112d7d0f278e48a", "c41751ca16a23f839af552fb8500010000000000003203a6c188ec22bd7c4549", [0x0, 0x1]}}) keyctl$KEYCTL_MOVE(0x1e, r4, r4, r4, 0x0) ioctl$LOOP_GET_STATUS(r6, 0x4c07, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000340)={r5, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) ioctl$LOOP_SET_CAPACITY(r7, 0x4c07) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) io_setup(0x7, &(0x7f0000000280)=0x0) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioperm(0x8, 0x8000, 0x72de) rt_sigqueueinfo(0x0, 0x0, 0x0) io_submit(r8, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x9, 0x0, 0x0, 0x5, 0x0, r9, 0x0}]) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r10}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r9, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x14, &(0x7f0000000840), 0x0, 0x10, &(0x7f00000003c0), &(0x7f00000004c0), 0x8, 0xa4, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) 112.68315ms ago: executing program 2 (id=10248): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mlock2(&(0x7f0000003000/0xb000)=nil, 0xb000, 0x1) socket$rxrpc(0x21, 0x2, 0xa) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) r1 = eventfd(0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) read$eventfd(r1, &(0x7f0000000040), 0x8) syz_genetlink_get_family_id$nfc(&(0x7f00000000c0), r0) chdir(0x0) 112.34525ms ago: executing program 8 (id=10249): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@const={0x0, 0x2, 0x0, 0x13, 0x1}, @array={0x2, 0x0, 0x0, 0x3, 0x0, {0xfffffffe}}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3000002, 0x42032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) 111.98993ms ago: executing program 8 (id=10250): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r1 = syz_open_dev$usbfs(0x0, 0x80000000003, 0x101301) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/notes', 0x109040, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="0200a006002a17006000000002000020"]) close_range(r0, r1, 0x0) 96.966841ms ago: executing program 8 (id=10251): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x11, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x75}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='tlb_flush\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000100)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$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") r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r5, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x5f, 0xffffffffffffffff, {0x29}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r5, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x5f, 0xffffffffffffffff, {0x29}}, './file0\x00'}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = gettid() r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) r9 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000530404"], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) (async) sendmsg$AUDIT_USER_AVC(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000530404"], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file2\x00', 0x101080e, &(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES16=r6, @ANYRESOCT=r6], 0x1, 0x67e, &(0x7f0000001600)="$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") (async) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file2\x00', 0x101080e, &(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES16=r6, @ANYRESOCT=r6], 0x1, 0x67e, &(0x7f0000001600)="$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") r10 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000268000/0x4000)=nil, 0x4000, 0x1000002, 0x4016012, r10, 0x0) process_vm_writev(r6, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) (async) process_vm_writev(r6, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x1}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xff4d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) (async) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xff4d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) r12 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) fadvise64(r12, 0x0, 0x2, 0x3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 93.217792ms ago: executing program 1 (id=10252): io_uring_setup(0x66b, &(0x7f00000002c0)={0x0, 0x0, 0x100, 0x0, 0x10000}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) openat$binfmt_register(0xffffff9c, &(0x7f0000000180), 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r3, @ANYBLOB='\b\x00', @ANYBLOB="0a0001000000"], 0x64}}, 0x0) 275.46µs ago: executing program 1 (id=10253): time(0x0) 0s ago: executing program 1 (id=10254): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) mq_open(0xfffffffffffffffc, 0x1, 0x102, &(0x7f0000000000)={0x6, 0x401, 0x0, 0x5}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$EXT4_IOC_SETFSUUID(r0, 0x4008662c, &(0x7f0000000040)={0x0, 0x0, "0855189c1346d9cdaf57cbec829296d3"}) r1 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="380000000314010000000000000008000900020073797a310000000008004100736977001400330073797a6b616c6c657230"], 0x38}}, 0x0) kernel console output (not intermixed with test programs): t+0x3b9/0x650 [ 526.140285][T30480] asm_exc_page_fault+0x26/0x30 [ 526.145126][T30480] RIP: 0033:0x7f0946df18d6 [ 526.149536][T30480] Code: f0 72 6e 48 63 cd 48 01 c1 49 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 526.169126][T30480] RSP: 002b:00007f0945ba04a0 EFLAGS: 00010246 [ 526.175181][T30480] RAX: 0000000000000001 RBX: 00007f0945ba0540 RCX: 0000000000000101 [ 526.183130][T30480] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007f0945ba05e0 [ 526.191168][T30480] RBP: 0000000000000102 R08: 00007f093d781000 R09: 0000000000000000 [ 526.199118][T30480] R10: 0000000000000000 R11: 00007f0945ba0550 R12: 0000000000000001 [ 526.207068][T30480] R13: 00007f0946fb5bc0 R14: 0000000000000000 R15: 00007f0945ba05e0 [ 526.215030][T30480] [ 526.218285][T30480] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 526.231470][T30480] loop6: detected capacity change from 0 to 512 [ 526.244529][T30480] EXT4-fs (loop6): Cannot turn on journaled quota: type 0: error -2 [ 526.253021][T30480] EXT4-fs (loop6): Cannot turn on journaled quota: type 1: error -2 [ 526.264336][T30480] EXT4-fs (loop6): 1 truncate cleaned up [ 526.270890][T30480] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 526.297027][T30483] loop1: detected capacity change from 0 to 1024 [ 526.304043][T30483] EXT4-fs: Ignoring removed orlov option [ 526.309803][T30483] EXT4-fs: Ignoring removed nomblk_io_submit option [ 526.323378][T30480] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 526.337538][T30483] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 526.358223][ T29] kauditd_printk_skb: 878 callbacks suppressed [ 526.358241][ T29] audit: type=1326 audit(1731019639.661:89921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30475 comm="syz.1.9655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0bb8e0e719 code=0x7ffc0000 [ 526.388396][ T29] audit: type=1326 audit(1731019639.661:89922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30475 comm="syz.1.9655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0bb8e0e719 code=0x7ffc0000 [ 526.412184][ T29] audit: type=1326 audit(1731019639.661:89923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30475 comm="syz.1.9655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f0bb8e0e719 code=0x7ffc0000 [ 526.443989][ T29] audit: type=1326 audit(1731019639.751:89924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30475 comm="syz.1.9655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f0bb8e056e7 code=0x7ffc0000 [ 526.467610][ T29] audit: type=1326 audit(1731019639.751:89925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30475 comm="syz.1.9655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f0bb8daa099 code=0x7ffc0000 [ 526.491248][ T29] audit: type=1326 audit(1731019639.751:89926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30475 comm="syz.1.9655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f0bb8e0e719 code=0x7ffc0000 [ 526.514859][ T29] audit: type=1326 audit(1731019639.751:89927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30475 comm="syz.1.9655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f0bb8e056e7 code=0x7ffc0000 [ 526.538471][ T29] audit: type=1326 audit(1731019639.751:89928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30475 comm="syz.1.9655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f0bb8daa099 code=0x7ffc0000 [ 526.562146][ T29] audit: type=1326 audit(1731019639.751:89929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30475 comm="syz.1.9655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f0bb8e0e719 code=0x7ffc0000 [ 526.593542][ T29] audit: type=1326 audit(1731019639.901:89930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30475 comm="syz.1.9655" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f0bb8e056e7 code=0x7ffc0000 [ 526.916375][T30500] loop2: detected capacity change from 0 to 1024 [ 526.923581][T23318] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 526.925090][T30500] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 526.958492][T30500] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 526.974301][T30500] FAULT_INJECTION: forcing a failure. [ 526.974301][T30500] name failslab, interval 1, probability 0, space 0, times 0 [ 526.987078][T30500] CPU: 1 UID: 0 PID: 30500 Comm: syz.2.9663 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 526.997845][T30500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 527.007938][T30500] Call Trace: [ 527.011208][T30500] [ 527.014176][T30500] dump_stack_lvl+0xf2/0x150 [ 527.018816][T30500] dump_stack+0x15/0x20 [ 527.023041][T30500] should_fail_ex+0x223/0x230 [ 527.027801][T30500] ? __alloc_skb+0x10b/0x310 [ 527.032563][T30500] should_failslab+0x8f/0xb0 [ 527.037184][T30500] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 527.043010][T30500] __alloc_skb+0x10b/0x310 [ 527.047476][T30500] ? synchronize_rcu+0x46/0x320 [ 527.047506][T30500] selnl_notify+0x47/0x1d0 [ 527.047531][T30500] ? selnl_notify_setenforce+0x1e/0x50 [ 527.047638][T30500] selnl_notify_setenforce+0x31/0x50 [ 527.047731][T30500] sel_write_enforce+0x2a5/0x2e0 [ 527.047761][T30500] vfs_writev+0x3fb/0x880 [ 527.047784][T30500] ? __pfx_sel_write_enforce+0x10/0x10 [ 527.047812][T30500] ? mutex_lock+0xd/0x40 [ 527.047851][T30500] do_writev+0xf8/0x220 [ 527.047916][T30500] __x64_sys_writev+0x45/0x50 [ 527.047935][T30500] x64_sys_call+0x1f18/0x2d60 [ 527.047958][T30500] do_syscall_64+0xc9/0x1c0 [ 527.047978][T30500] ? clear_bhb_loop+0x55/0xb0 [ 527.048068][T30500] ? clear_bhb_loop+0x55/0xb0 [ 527.048089][T30500] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 527.048122][T30500] RIP: 0033:0x7f4d885de719 [ 527.048138][T30500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 527.048178][T30500] RSP: 002b:00007f4d87257038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 527.048198][T30500] RAX: ffffffffffffffda RBX: 00007f4d88795f80 RCX: 00007f4d885de719 [ 527.048213][T30500] RDX: 0000000000000001 RSI: 0000000020002800 RDI: 0000000000000005 [ 527.048226][T30500] RBP: 00007f4d87257090 R08: 0000000000000000 R09: 0000000000000000 [ 527.048240][T30500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 527.048258][T30500] R13: 0000000000000000 R14: 00007f4d88795f80 R15: 00007ffdc2445388 [ 527.048276][T30500] [ 527.048806][T30500] SELinux: OOM in selnl_notify [ 527.068174][T30500] SELinux: Context system_u:object_r:auditd_initrc_exec_t:s0 is not valid (left unmapped). [ 527.142309][T30520] loop6: detected capacity change from 0 to 128 [ 527.156118][T28924] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 527.230606][T30524] netlink: 56 bytes leftover after parsing attributes in process `syz.2.9673'. [ 527.230688][T30524] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9673'. [ 527.308803][T30526] FAULT_INJECTION: forcing a failure. [ 527.308803][T30526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 527.308829][T30526] CPU: 0 UID: 0 PID: 30526 Comm: syz.6.9674 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 527.308853][T30526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 527.308913][T30526] Call Trace: [ 527.308920][T30526] [ 527.308927][T30526] dump_stack_lvl+0xf2/0x150 [ 527.308955][T30526] dump_stack+0x15/0x20 [ 527.308976][T30526] should_fail_ex+0x223/0x230 [ 527.309009][T30526] should_fail+0xb/0x10 [ 527.309064][T30526] should_fail_usercopy+0x1a/0x20 [ 527.309082][T30526] _copy_from_user+0x1e/0xb0 [ 527.309101][T30526] copy_msghdr_from_user+0x54/0x2a0 [ 527.309205][T30526] __sys_sendmsg+0x171/0x270 [ 527.309244][T30526] __x64_sys_sendmsg+0x46/0x50 [ 527.309261][T30526] x64_sys_call+0x2689/0x2d60 [ 527.309324][T30526] do_syscall_64+0xc9/0x1c0 [ 527.309342][T30526] ? clear_bhb_loop+0x55/0xb0 [ 527.309366][T30526] ? clear_bhb_loop+0x55/0xb0 [ 527.309419][T30526] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 527.309454][T30526] RIP: 0033:0x7f0946f2e719 [ 527.309470][T30526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 527.309487][T30526] RSP: 002b:00007f0945ba1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 527.309506][T30526] RAX: ffffffffffffffda RBX: 00007f09470e5f80 RCX: 00007f0946f2e719 [ 527.309568][T30526] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000005 [ 527.309580][T30526] RBP: 00007f0945ba1090 R08: 0000000000000000 R09: 0000000000000000 [ 527.309592][T30526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 527.309606][T30526] R13: 0000000000000000 R14: 00007f09470e5f80 R15: 00007ffde42ea508 [ 527.309624][T30526] [ 527.537428][T30534] loop6: detected capacity change from 0 to 8192 [ 527.575306][T30534] loop6: p1 p2 p3 p4 [ 527.631379][T30534] loop6: p2 start 4293394432 is beyond EOD, truncated [ 527.638244][T30534] loop6: p3 size 393472 extends beyond EOD, truncated [ 527.647113][T30534] loop6: p4 size 50331648 extends beyond EOD, truncated [ 527.675189][T30533] netlink: 56 bytes leftover after parsing attributes in process `syz.6.9677'. [ 527.687755][T30533] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9677'. [ 527.746050][T30546] loop6: detected capacity change from 0 to 256 [ 527.772960][T30546] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3344 sclass=netlink_route_socket pid=30546 comm=syz.6.9681 [ 527.810258][T30544] loop2: detected capacity change from 0 to 8192 [ 527.897839][T30549] x_tables: eb_tables: nflog.0 target: invalid size 80 (kernel) != (user) 0 [ 527.922771][T30552] netlink: 288 bytes leftover after parsing attributes in process `syz.6.9683'. [ 527.950484][T30552] wireguard0: entered promiscuous mode [ 527.956159][T30552] wireguard0: entered allmulticast mode [ 528.033486][T30557] loop2: detected capacity change from 0 to 1024 [ 528.040748][T30557] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 528.055717][T30557] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 528.086892][T30557] SELinux: Context system_u:object_r:unconfined_exec_t:s0 is not valid (left unmapped). [ 528.121058][T28924] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 528.249284][T30578] loop6: detected capacity change from 0 to 8192 [ 528.327722][T30585] usb usb9: usbfs: process 30585 (syz.2.9695) did not claim interface 0 before use [ 528.344724][T30585] loop2: detected capacity change from 0 to 1024 [ 528.367724][T30585] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 528.383336][T30585] EXT4-fs error (device loop2): ext4_empty_dir:3117: inode #11: block 623: comm syz.2.9695: Attempting to read directory block (623) that is past i_size (638464) [ 528.491827][T28924] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 528.529322][T30596] loop2: detected capacity change from 0 to 1024 [ 528.547359][T30596] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 528.626805][T30600] loop1: detected capacity change from 0 to 1024 [ 528.633587][T30600] EXT4-fs: Ignoring removed orlov option [ 528.639322][T30600] EXT4-fs: Ignoring removed nomblk_io_submit option [ 528.727257][T30600] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 528.903027][T30608] FAULT_INJECTION: forcing a failure. [ 528.903027][T30608] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 528.916177][T30608] CPU: 1 UID: 0 PID: 30608 Comm: syz.0.9701 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 528.926938][T30608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 528.936985][T30608] Call Trace: [ 528.940258][T30608] [ 528.943237][T30608] dump_stack_lvl+0xf2/0x150 [ 528.947844][T30608] dump_stack+0x15/0x20 [ 528.951999][T30608] should_fail_ex+0x223/0x230 [ 528.956680][T30608] should_fail+0xb/0x10 [ 528.960853][T30608] should_fail_usercopy+0x1a/0x20 [ 528.965886][T30608] _copy_to_user+0x20/0xa0 [ 528.970417][T30608] simple_read_from_buffer+0xa0/0x110 [ 528.975904][T30608] proc_fail_nth_read+0xf9/0x140 [ 528.980841][T30608] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 528.986383][T30608] vfs_read+0x1a2/0x700 [ 528.990633][T30608] ? __fget_files+0x1d4/0x210 [ 528.995309][T30608] ksys_read+0xeb/0x1b0 [ 528.999506][T30608] __x64_sys_read+0x42/0x50 [ 529.004013][T30608] x64_sys_call+0x27d3/0x2d60 [ 529.008741][T30608] do_syscall_64+0xc9/0x1c0 [ 529.013331][T30608] ? clear_bhb_loop+0x55/0xb0 [ 529.018040][T30608] ? clear_bhb_loop+0x55/0xb0 [ 529.022768][T30608] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 529.028671][T30608] RIP: 0033:0x7fe0fa5fd15c [ 529.033172][T30608] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 529.052781][T30608] RSP: 002b:00007fe0f9271030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 529.061193][T30608] RAX: ffffffffffffffda RBX: 00007fe0fa7b5f80 RCX: 00007fe0fa5fd15c [ 529.069221][T30608] RDX: 000000000000000f RSI: 00007fe0f92710a0 RDI: 0000000000000006 [ 529.077181][T30608] RBP: 00007fe0f9271090 R08: 0000000000000000 R09: 0000000000000000 [ 529.085234][T30608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 529.093234][T30608] R13: 0000000000000000 R14: 00007fe0fa7b5f80 R15: 00007ffe8b757928 [ 529.101208][T30608] [ 529.375271][T30638] tipc: Enabling of bearer rejected, failed to enable media [ 529.384400][T23318] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 529.394479][T28924] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 529.580313][T30661] loop2: detected capacity change from 0 to 164 [ 529.590647][T30661] bio_check_eod: 6218 callbacks suppressed [ 529.590660][T30661] syz.2.9721: attempt to access beyond end of device [ 529.590660][T30661] loop2: rw=524288, sector=263328, nr_sectors = 4 limit=164 [ 529.610686][T30661] syz.2.9721: attempt to access beyond end of device [ 529.610686][T30661] loop2: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 529.624651][T30661] syz.2.9721: attempt to access beyond end of device [ 529.624651][T30661] loop2: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 529.638155][T30661] syz.2.9721: attempt to access beyond end of device [ 529.638155][T30661] loop2: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 529.651958][T30661] syz.2.9721: attempt to access beyond end of device [ 529.651958][T30661] loop2: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 529.666402][T30661] syz.2.9721: attempt to access beyond end of device [ 529.666402][T30661] loop2: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 529.682970][T30661] syz.2.9721: attempt to access beyond end of device [ 529.682970][T30661] loop2: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 529.700897][T30661] syz.2.9721: attempt to access beyond end of device [ 529.700897][T30661] loop2: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 529.714536][T30661] syz.2.9721: attempt to access beyond end of device [ 529.714536][T30661] loop2: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 529.728069][T30661] syz.2.9721: attempt to access beyond end of device [ 529.728069][T30661] loop2: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 529.742063][T30652] chnl_net:caif_netlink_parms(): no params data found [ 529.754168][T16920] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 529.799295][T30652] bridge0: port 1(bridge_slave_0) entered blocking state [ 529.806436][T30652] bridge0: port 1(bridge_slave_0) entered disabled state [ 529.816543][T30652] bridge_slave_0: entered allmulticast mode [ 529.823059][T30652] bridge_slave_0: entered promiscuous mode [ 529.832968][T16920] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 529.843771][T30652] bridge0: port 2(bridge_slave_1) entered blocking state [ 529.851042][T30652] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.860976][T30652] bridge_slave_1: entered allmulticast mode [ 529.867605][T30652] bridge_slave_1: entered promiscuous mode [ 529.891653][T30652] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 529.902212][T16920] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 529.914916][T30652] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 529.938260][T16920] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 529.950326][T30652] team0: Port device team_slave_0 added [ 529.957944][T30652] team0: Port device team_slave_1 added [ 529.982804][T30652] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 529.989775][T30652] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 530.015815][T30652] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 530.027529][T30652] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 530.034503][T30652] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 530.060514][T30652] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 530.099806][T30652] hsr_slave_0: entered promiscuous mode [ 530.113393][T30652] hsr_slave_1: entered promiscuous mode [ 530.124026][T30652] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 530.134537][T30652] Cannot create hsr debugfs directory [ 530.526907][T16920] bond0 (unregistering): Released all slaves [ 530.563362][T16920] tipc: Left network mode [ 530.572768][T30691] __nla_validate_parse: 4 callbacks suppressed [ 530.572781][T30691] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9729'. [ 530.587973][T30691] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 530.595430][T30691] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 530.603429][T30691] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 530.611180][T30691] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 530.627583][T30692] netlink: 3 bytes leftover after parsing attributes in process `syz.6.9728'. [ 530.636812][T30692] 0ªX¹¦À: renamed from caif0 [ 530.642987][T30692] 0ªX¹¦À: entered allmulticast mode [ 530.648238][T30692] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 530.668668][T16920] hsr_slave_0: left promiscuous mode [ 530.674807][T16920] hsr_slave_1: left promiscuous mode [ 530.682343][T16920] veth1_macvtap: left promiscuous mode [ 530.687852][T16920] veth0_macvtap: left promiscuous mode [ 530.693354][T16920] veth1_vlan: left promiscuous mode [ 530.698579][T16920] veth0_vlan: left promiscuous mode [ 531.101896][T30652] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 531.110994][T30652] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 531.120312][T30652] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 531.129270][T30652] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 531.170448][T30652] 8021q: adding VLAN 0 to HW filter on device bond0 [ 531.184843][T30652] 8021q: adding VLAN 0 to HW filter on device team0 [ 531.194523][T16920] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.201685][T16920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.213171][T17615] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.220337][T17615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.290891][T30652] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 531.368379][T30652] veth0_vlan: entered promiscuous mode [ 531.378186][T30652] veth1_vlan: entered promiscuous mode [ 531.398346][T30652] veth0_macvtap: entered promiscuous mode [ 531.406439][T30652] veth1_macvtap: entered promiscuous mode [ 531.420425][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.430890][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.441005][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.451453][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.461265][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.471690][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.481511][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.492157][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.493047][ T29] kauditd_printk_skb: 1301 callbacks suppressed [ 531.493060][ T29] audit: type=1400 audit(1731019644.801:91232): avc: denied { ioctl } for pid=30730 comm="syz.0.9737" path="/dev/ptmx" dev="devtmpfs" ino=92 ioctlcmd=0x5420 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:mouse_device_t:s0" [ 531.502249][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.547651][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.557507][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.567957][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.577853][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.588288][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.598165][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.608595][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.618519][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.628925][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.638817][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.649256][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.659087][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.669693][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.679489][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 531.690039][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.701360][ T29] audit: type=1400 audit(1731019645.021:91233): avc: denied { create } for pid=30733 comm="syz.6.9738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 531.702202][T30652] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 531.729793][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.740407][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.750416][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.760888][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.770712][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.781151][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.791040][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.801465][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.811324][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.821750][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.831584][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.842010][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.851819][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.862232][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.872040][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.882471][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.892299][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.902713][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.912593][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.923101][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.932914][T30652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 531.943434][T30652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 531.953871][ T29] audit: type=1400 audit(1731019645.041:91234): avc: denied { setopt } for pid=30736 comm="syz.2.9739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 531.973467][ T29] audit: type=1400 audit(1731019645.051:91235): avc: denied { setopt } for pid=30733 comm="syz.6.9738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 531.997758][T30652] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 532.014340][T30652] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.023129][T30652] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.031908][T30652] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.040642][T30652] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.052171][ T29] audit: type=1400 audit(1731019645.371:91236): avc: denied { write } for pid=30743 comm="syz.8.9742" name="ptmx" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:mouse_device_t:s0" [ 532.094989][ T29] audit: type=1400 audit(1731019645.401:91237): avc: denied { create } for pid=30745 comm="syz.6.9741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 532.115302][ T29] audit: type=1400 audit(1731019645.401:91238): avc: denied { write } for pid=30745 comm="syz.6.9741" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 532.161430][ T29] audit: type=1400 audit(1731019645.471:91239): avc: denied { mounton } for pid=30652 comm="syz-executor" path="/root/syzkaller.FO0lU6/syz-tmp" dev="sda1" ino=2018 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 532.186130][ T29] audit: type=1400 audit(1731019645.471:91240): avc: denied { mount } for pid=30652 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 532.208668][ T29] audit: type=1400 audit(1731019645.471:91241): avc: denied { mount } for pid=30652 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 532.238291][T30752] FAULT_INJECTION: forcing a failure. [ 532.238291][T30752] name failslab, interval 1, probability 0, space 0, times 0 [ 532.250991][T30752] CPU: 1 UID: 0 PID: 30752 Comm: syz.2.9744 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 532.261812][T30752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 532.271975][T30752] Call Trace: [ 532.275247][T30752] [ 532.278177][T30752] dump_stack_lvl+0xf2/0x150 [ 532.282826][T30752] dump_stack+0x15/0x20 [ 532.286987][T30752] should_fail_ex+0x223/0x230 [ 532.291710][T30752] ? mas_alloc_nodes+0x1d3/0x4a0 [ 532.296652][T30752] should_failslab+0x8f/0xb0 [ 532.301246][T30752] kmem_cache_alloc_noprof+0x4c/0x290 [ 532.306680][T30752] mas_alloc_nodes+0x1d3/0x4a0 [ 532.311449][T30752] mas_preallocate+0x449/0x650 [ 532.316224][T30752] __split_vma+0x244/0x6a0 [ 532.320647][T30752] vma_modify+0x217/0xcd0 [ 532.325011][T30752] ? kstrtoull+0x110/0x140 [ 532.329430][T30752] vma_modify_policy+0xeb/0x120 [ 532.334368][T30752] mbind_range+0x1d8/0x490 [ 532.338766][T30752] __se_sys_set_mempolicy_home_node+0x35e/0x540 [ 532.344991][T30752] __x64_sys_set_mempolicy_home_node+0x55/0x70 [ 532.351237][T30752] x64_sys_call+0x1782/0x2d60 [ 532.355952][T30752] do_syscall_64+0xc9/0x1c0 [ 532.360462][T30752] ? clear_bhb_loop+0x55/0xb0 [ 532.365128][T30752] ? clear_bhb_loop+0x55/0xb0 [ 532.369865][T30752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 532.375852][T30752] RIP: 0033:0x7f4d885de719 [ 532.380294][T30752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 532.399972][T30752] RSP: 002b:00007f4d87257038 EFLAGS: 00000246 ORIG_RAX: 00000000000001c2 [ 532.408374][T30752] RAX: ffffffffffffffda RBX: 00007f4d88795f80 RCX: 00007f4d885de719 [ 532.416389][T30752] RDX: 0000000000000000 RSI: 000000000000a000 RDI: 0000000020349000 [ 532.424374][T30752] RBP: 00007f4d87257090 R08: 0000000000000000 R09: 0000000000000000 [ 532.432497][T30752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 532.440454][T30752] R13: 0000000000000000 R14: 00007f4d88795f80 R15: 00007ffdc2445388 [ 532.448489][T30752] [ 532.520434][T30766] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9748'. [ 532.648390][T30782] loop2: detected capacity change from 0 to 512 [ 532.656717][T30782] EXT4-fs error (device loop2): ext4_orphan_get:1388: inode #15: comm syz.2.9752: casefold flag without casefold feature [ 532.669492][T30782] EXT4-fs error (device loop2): ext4_orphan_get:1393: comm syz.2.9752: couldn't read orphan inode 15 (err -117) [ 532.681739][T30782] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 532.708140][T30782] netlink: 20 bytes leftover after parsing attributes in process `syz.2.9752'. [ 532.745054][T28924] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 532.775834][T30793] loop2: detected capacity change from 0 to 128 [ 532.820177][T30797] FAULT_INJECTION: forcing a failure. [ 532.820177][T30797] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 532.833273][T30797] CPU: 0 UID: 0 PID: 30797 Comm: syz.2.9755 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 532.844115][T30797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 532.854220][T30797] Call Trace: [ 532.857476][T30797] [ 532.860387][T30797] dump_stack_lvl+0xf2/0x150 [ 532.864964][T30797] dump_stack+0x15/0x20 [ 532.869213][T30797] should_fail_ex+0x223/0x230 [ 532.873950][T30797] should_fail+0xb/0x10 [ 532.878149][T30797] should_fail_usercopy+0x1a/0x20 [ 532.883156][T30797] _copy_from_user+0x1e/0xb0 [ 532.887770][T30797] copy_msghdr_from_user+0x54/0x2a0 [ 532.893149][T30797] __sys_sendmmsg+0x21a/0x500 [ 532.897869][T30797] __x64_sys_sendmmsg+0x57/0x70 [ 532.902704][T30797] x64_sys_call+0xa49/0x2d60 [ 532.907306][T30797] do_syscall_64+0xc9/0x1c0 [ 532.911801][T30797] ? clear_bhb_loop+0x55/0xb0 [ 532.916458][T30797] ? clear_bhb_loop+0x55/0xb0 [ 532.921151][T30797] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 532.927273][T30797] RIP: 0033:0x7f4d885de719 [ 532.931667][T30797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 532.951269][T30797] RSP: 002b:00007f4d87257038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 532.959683][T30797] RAX: ffffffffffffffda RBX: 00007f4d88795f80 RCX: 00007f4d885de719 [ 532.967642][T30797] RDX: 0000000000000001 RSI: 0000000020003a00 RDI: 0000000000000003 [ 532.975684][T30797] RBP: 00007f4d87257090 R08: 0000000000000000 R09: 0000000000000000 [ 532.983635][T30797] R10: 000000000000c0c0 R11: 0000000000000246 R12: 0000000000000001 [ 532.991636][T30797] R13: 0000000000000000 R14: 00007f4d88795f80 R15: 00007ffdc2445388 [ 532.999666][T30797] [ 533.047391][T30799] No such timeout policy "syz0" [ 533.083626][T30803] FAULT_INJECTION: forcing a failure. [ 533.083626][T30803] name failslab, interval 1, probability 0, space 0, times 0 [ 533.096463][T30803] CPU: 0 UID: 0 PID: 30803 Comm: syz.2.9758 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 533.107232][T30803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 533.117387][T30803] Call Trace: [ 533.120749][T30803] [ 533.123665][T30803] dump_stack_lvl+0xf2/0x150 [ 533.128311][T30803] dump_stack+0x15/0x20 [ 533.132515][T30803] should_fail_ex+0x223/0x230 [ 533.137222][T30803] ? kobject_get_path+0x85/0x160 [ 533.142406][T30803] should_failslab+0x8f/0xb0 [ 533.147113][T30803] __kmalloc_noprof+0xa5/0x370 [ 533.151875][T30803] kobject_get_path+0x85/0x160 [ 533.156760][T30803] kobject_uevent_env+0x1b9/0x550 [ 533.161821][T30803] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 533.167631][T30803] ? device_pm_check_callbacks+0x632/0x650 [ 533.173480][T30803] kobject_uevent+0x1c/0x30 [ 533.177981][T30803] device_del+0x6fa/0x780 [ 533.182299][T30803] del_gendisk+0x4c6/0x600 [ 533.186860][T30803] loop_control_ioctl+0x3ae/0x440 [ 533.191871][T30803] ? __pfx_loop_control_ioctl+0x10/0x10 [ 533.197439][T30803] __se_sys_ioctl+0xcd/0x140 [ 533.202017][T30803] __x64_sys_ioctl+0x43/0x50 [ 533.206654][T30803] x64_sys_call+0x15cc/0x2d60 [ 533.211405][T30803] do_syscall_64+0xc9/0x1c0 [ 533.215905][T30803] ? clear_bhb_loop+0x55/0xb0 [ 533.220579][T30803] ? clear_bhb_loop+0x55/0xb0 [ 533.225241][T30803] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 533.231220][T30803] RIP: 0033:0x7f4d885de719 [ 533.235623][T30803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 533.255216][T30803] RSP: 002b:00007f4d87257038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 533.263765][T30803] RAX: ffffffffffffffda RBX: 00007f4d88795f80 RCX: 00007f4d885de719 [ 533.271843][T30803] RDX: 0000000000000002 RSI: 0000000000004c81 RDI: 0000000000000006 [ 533.279807][T30803] RBP: 00007f4d87257090 R08: 0000000000000000 R09: 0000000000000000 [ 533.287779][T30803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 533.295765][T30803] R13: 0000000000000000 R14: 00007f4d88795f80 R15: 00007ffdc2445388 [ 533.303878][T30803] [ 533.357845][T30807] loop6: detected capacity change from 0 to 2048 [ 533.363264][T30805] FAULT_INJECTION: forcing a failure. [ 533.363264][T30805] name failslab, interval 1, probability 0, space 0, times 0 [ 533.376922][T30805] CPU: 1 UID: 0 PID: 30805 Comm: syz.2.9759 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 533.387697][T30805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 533.387709][T30805] Call Trace: [ 533.387715][T30805] [ 533.387726][T30805] dump_stack_lvl+0xf2/0x150 [ 533.387749][T30805] dump_stack+0x15/0x20 [ 533.387766][T30805] should_fail_ex+0x223/0x230 [ 533.387847][T30805] ? __alloc_skb+0x10b/0x310 [ 533.387875][T30805] should_failslab+0x8f/0xb0 [ 533.387898][T30805] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 533.387984][T30805] __alloc_skb+0x10b/0x310 [ 533.388007][T30805] audit_log_start+0x368/0x6b0 [ 533.388028][T30805] audit_seccomp+0x4b/0x130 [ 533.388044][T30805] __seccomp_filter+0x6fa/0x1180 [ 533.388206][T30805] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 533.388229][T30805] ? vfs_write+0x596/0x920 [ 533.388273][T30805] ? __schedule+0x6fa/0x930 [ 533.388437][T30805] __secure_computing+0x9f/0x1c0 [ 533.388465][T30805] syscall_trace_enter+0xd1/0x1f0 [ 533.388494][T30805] do_syscall_64+0xaa/0x1c0 [ 533.388511][T30805] ? clear_bhb_loop+0x55/0xb0 [ 533.388528][T30805] ? clear_bhb_loop+0x55/0xb0 [ 533.388573][T30805] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 533.388603][T30805] RIP: 0033:0x7f4d885de719 [ 533.388616][T30805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 533.388633][T30805] RSP: 002b:00007f4d87257038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 533.388685][T30805] RAX: ffffffffffffffda RBX: 00007f4d88795f80 RCX: 00007f4d885de719 [ 533.388696][T30805] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000007 [ 533.388707][T30805] RBP: 00007f4d87257090 R08: 0000000000000000 R09: 0000000000000000 [ 533.388759][T30805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 533.388770][T30805] R13: 0000000000000000 R14: 00007f4d88795f80 R15: 00007ffdc2445388 [ 533.388784][T30805] [ 533.538449][T30807] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 533.619974][T30818] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9764'. [ 533.648299][T30820] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 533.656313][T30820] vhci_hcd: invalid port number 23 [ 533.686627][T30823] netlink: 8 bytes leftover after parsing attributes in process `syz.8.9763'. [ 533.700983][T30822] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 533.762052][T30822] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 533.837477][T30836] FAULT_INJECTION: forcing a failure. [ 533.837477][T30836] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 533.850617][T30836] CPU: 0 UID: 0 PID: 30836 Comm: syz.1.9769 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 533.861378][T30836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 533.871425][T30836] Call Trace: [ 533.874696][T30836] [ 533.877658][T30836] dump_stack_lvl+0xf2/0x150 [ 533.882264][T30836] dump_stack+0x15/0x20 [ 533.886414][T30836] should_fail_ex+0x223/0x230 [ 533.891170][T30836] should_fail+0xb/0x10 [ 533.895365][T30836] should_fail_usercopy+0x1a/0x20 [ 533.900426][T30836] _copy_from_iter+0xd5/0xd00 [ 533.905145][T30836] ? kmalloc_reserve+0x16e/0x190 [ 533.910162][T30836] ? __build_skb_around+0x196/0x1f0 [ 533.915456][T30836] ? __alloc_skb+0x21f/0x310 [ 533.920047][T30836] ? __virt_addr_valid+0x1ed/0x250 [ 533.925185][T30836] ? __check_object_size+0x364/0x520 [ 533.930554][T30836] netlink_sendmsg+0x460/0x6e0 [ 533.935317][T30836] ? __pfx_netlink_sendmsg+0x10/0x10 [ 533.940597][T30836] __sock_sendmsg+0x140/0x180 [ 533.945421][T30836] ____sys_sendmsg+0x312/0x410 [ 533.950180][T30836] __sys_sendmsg+0x1d9/0x270 [ 533.954800][T30836] __x64_sys_sendmsg+0x46/0x50 [ 533.959555][T30836] x64_sys_call+0x2689/0x2d60 [ 533.964233][T30836] do_syscall_64+0xc9/0x1c0 [ 533.968770][T30836] ? clear_bhb_loop+0x55/0xb0 [ 533.973504][T30836] ? clear_bhb_loop+0x55/0xb0 [ 533.978170][T30836] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 533.984075][T30836] RIP: 0033:0x7f196427e719 [ 533.988558][T30836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 534.008169][T30836] RSP: 002b:00007f1962ef7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 534.016574][T30836] RAX: ffffffffffffffda RBX: 00007f1964435f80 RCX: 00007f196427e719 [ 534.024554][T30836] RDX: 0000000024000000 RSI: 0000000020000400 RDI: 0000000000000003 [ 534.032525][T30836] RBP: 00007f1962ef7090 R08: 0000000000000000 R09: 0000000000000000 [ 534.040502][T30836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 534.048468][T30836] R13: 0000000000000000 R14: 00007f1964435f80 R15: 00007ffc535ebbe8 [ 534.056446][T30836] [ 534.139249][T30822] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.169365][T30848] FAULT_INJECTION: forcing a failure. [ 534.169365][T30848] name failslab, interval 1, probability 0, space 0, times 0 [ 534.182002][T30848] CPU: 0 UID: 0 PID: 30848 Comm: syz.1.9772 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 534.192760][T30848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 534.202810][T30848] Call Trace: [ 534.206123][T30848] [ 534.209049][T30848] dump_stack_lvl+0xf2/0x150 [ 534.213655][T30848] dump_stack+0x15/0x20 [ 534.217844][T30848] should_fail_ex+0x223/0x230 [ 534.222549][T30848] ? kobject_get_path+0x85/0x160 [ 534.227489][T30848] should_failslab+0x8f/0xb0 [ 534.232069][T30848] __kmalloc_noprof+0xa5/0x370 [ 534.236830][T30848] kobject_get_path+0x85/0x160 [ 534.241651][T30848] kobject_uevent_env+0x1b9/0x550 [ 534.246673][T30848] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 534.252532][T30848] ? device_pm_check_callbacks+0x632/0x650 [ 534.258391][T30848] kobject_uevent+0x1c/0x30 [ 534.262878][T30848] device_del+0x6fa/0x780 [ 534.267422][T30848] del_gendisk+0x4c6/0x600 [ 534.271847][T30848] loop_control_ioctl+0x3ae/0x440 [ 534.276928][T30848] ? __pfx_loop_control_ioctl+0x10/0x10 [ 534.282483][T30848] __se_sys_ioctl+0xcd/0x140 [ 534.287130][T30848] __x64_sys_ioctl+0x43/0x50 [ 534.291727][T30848] x64_sys_call+0x15cc/0x2d60 [ 534.296461][T30848] do_syscall_64+0xc9/0x1c0 [ 534.300955][T30848] ? clear_bhb_loop+0x55/0xb0 [ 534.305655][T30848] ? clear_bhb_loop+0x55/0xb0 [ 534.310500][T30848] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 534.316386][T30848] RIP: 0033:0x7f196427e719 [ 534.320833][T30848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 534.340516][T30848] RSP: 002b:00007f1962ef7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 534.348934][T30848] RAX: ffffffffffffffda RBX: 00007f1964435f80 RCX: 00007f196427e719 [ 534.356983][T30848] RDX: 000000000000001e RSI: 0000000000004c81 RDI: 0000000000000003 [ 534.364940][T30848] RBP: 00007f1962ef7090 R08: 0000000000000000 R09: 0000000000000000 [ 534.372906][T30848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 534.380933][T30848] R13: 0000000000000000 R14: 00007f1964435f80 R15: 00007ffc535ebbe8 [ 534.389040][T30848] [ 534.428086][T30822] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.443103][T29978] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 534.483908][T30822] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 534.498393][T30822] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 534.513122][T30822] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 534.525123][T30822] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 534.580372][T30866] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9780'. [ 534.706879][T30873] loop6: detected capacity change from 0 to 256 [ 534.971300][T30877] netlink: 12 bytes leftover after parsing attributes in process `syz.6.9783'. [ 535.029479][T30887] loop6: detected capacity change from 0 to 128 [ 535.030757][T30881] netlink: 12 bytes leftover after parsing attributes in process `syz.8.9786'. [ 535.036421][T30887] FAT-fs (loop6): bogus number of reserved sectors [ 535.048114][T30881] vlan2: entered promiscuous mode [ 535.051301][T30887] FAT-fs (loop6): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 535.056356][T30881] bridge0: entered promiscuous mode [ 535.065588][T30887] FAT-fs (loop6): Can't find a valid FAT filesystem [ 535.076484][T30887] loop6: detected capacity change from 0 to 128 [ 535.084053][T30881] bridge0: left promiscuous mode [ 535.087824][T30887] netlink: 'syz.6.9789': attribute type 1 has an invalid length. [ 535.096811][T30887] netlink: 'syz.6.9789': attribute type 1 has an invalid length. [ 535.104531][T30887] netlink: 'syz.6.9789': attribute type 1 has an invalid length. [ 535.205927][T30895] netlink: 40 bytes leftover after parsing attributes in process `syz.8.9792'. [ 535.229832][T30897] netlink: 'syz.8.9793': attribute type 12 has an invalid length. [ 535.318734][T30907] netdevsim netdevsim6 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 535.327702][T30907] netdevsim netdevsim6 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 535.336630][T30907] netdevsim netdevsim6 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 535.345488][T30907] netdevsim netdevsim6 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 535.354435][T30907] geneve2: entered promiscuous mode [ 535.359799][T30907] geneve2: entered allmulticast mode [ 535.367260][T30910] tipc: Enabling of bearer rejected, failed to enable media [ 535.579935][T30932] tipc: Started in network mode [ 535.584969][T30932] tipc: Node identity 002d0000000000000000000000000001, cluster identity 4711 [ 535.593906][T30932] tipc: Enabling of bearer rejected, failed to enable media [ 535.643734][T30938] FAULT_INJECTION: forcing a failure. [ 535.643734][T30938] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 535.656914][T30938] CPU: 1 UID: 0 PID: 30938 Comm: syz.1.9809 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 535.667694][T30938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 535.677820][T30938] Call Trace: [ 535.681183][T30938] [ 535.684112][T30938] dump_stack_lvl+0xf2/0x150 [ 535.688710][T30938] dump_stack+0x15/0x20 [ 535.692866][T30938] should_fail_ex+0x223/0x230 [ 535.697562][T30938] should_fail+0xb/0x10 [ 535.701736][T30938] should_fail_usercopy+0x1a/0x20 [ 535.706763][T30938] _copy_from_user+0x1e/0xb0 [ 535.711493][T30938] snd_seq_ioctl+0x11b/0x2a0 [ 535.716122][T30938] ? __pfx_snd_seq_ioctl+0x10/0x10 [ 535.721280][T30938] __se_sys_ioctl+0xcd/0x140 [ 535.725957][T30938] __x64_sys_ioctl+0x43/0x50 [ 535.730585][T30938] x64_sys_call+0x15cc/0x2d60 [ 535.735322][T30938] do_syscall_64+0xc9/0x1c0 [ 535.739838][T30938] ? clear_bhb_loop+0x55/0xb0 [ 535.744624][T30938] ? clear_bhb_loop+0x55/0xb0 [ 535.749307][T30938] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 535.755298][T30938] RIP: 0033:0x7f196427e719 [ 535.759803][T30938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 535.779469][T30938] RSP: 002b:00007f1962ef7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 535.787883][T30938] RAX: ffffffffffffffda RBX: 00007f1964435f80 RCX: 00007f196427e719 [ 535.795870][T30938] RDX: 0000000020000080 RSI: 000000004058534c RDI: 0000000000000004 [ 535.803838][T30938] RBP: 00007f1962ef7090 R08: 0000000000000000 R09: 0000000000000000 [ 535.811812][T30938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 535.819958][T30938] R13: 0000000000000000 R14: 00007f1964435f80 R15: 00007ffc535ebbe8 [ 535.828008][T30938] [ 536.133562][T30953] tipc: Enabling of bearer rejected, failed to enable media [ 536.270541][T30961] __nla_validate_parse: 1 callbacks suppressed [ 536.270555][T30961] netlink: 40 bytes leftover after parsing attributes in process `syz.8.9818'. [ 536.316006][T30963] netlink: 40 bytes leftover after parsing attributes in process `syz.6.9819'. [ 536.401445][T30979] sctp: [Deprecated]: syz.8.9826 (pid 30979) Use of struct sctp_assoc_value in delayed_ack socket option. [ 536.401445][T30979] Use struct sctp_sack_info instead [ 536.540969][ T29] kauditd_printk_skb: 938 callbacks suppressed [ 536.540982][ T29] audit: type=1326 audit(1731019649.851:92178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30989 comm="syz.0.9830" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0fa5fe719 code=0x0 [ 536.570834][ T29] audit: type=1326 audit(1731019649.881:92179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30991 comm="syz.6.9831" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 536.575562][T30992] netlink: 40 bytes leftover after parsing attributes in process `syz.6.9831'. [ 536.594459][ T29] audit: type=1326 audit(1731019649.881:92180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30991 comm="syz.6.9831" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 536.627681][ T29] audit: type=1326 audit(1731019649.881:92181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30991 comm="syz.6.9831" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 536.651331][ T29] audit: type=1326 audit(1731019649.881:92182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30991 comm="syz.6.9831" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 536.674960][ T29] audit: type=1326 audit(1731019649.881:92183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30991 comm="syz.6.9831" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 536.698521][ T29] audit: type=1326 audit(1731019649.881:92184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30991 comm="syz.6.9831" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 536.722802][T30993] netlink: 16186 bytes leftover after parsing attributes in process `syz.8.9828'. [ 536.724711][ T29] audit: type=1326 audit(1731019649.881:92185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30991 comm="syz.6.9831" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 536.755622][ T29] audit: type=1326 audit(1731019649.881:92186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30991 comm="syz.6.9831" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 536.779221][ T29] audit: type=1326 audit(1731019649.881:92187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30991 comm="syz.6.9831" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 536.804533][T31001] team_slave_0: entered allmulticast mode [ 536.822814][T31003] syz.6.9835[31003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 536.822866][T31003] syz.6.9835[31003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 536.834697][T31003] syz.6.9835[31003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 536.852590][T31003] loop6: detected capacity change from 0 to 1024 [ 536.870660][T31003] EXT4-fs: Ignoring removed oldalloc option [ 536.876982][T31003] EXT4-fs (loop6): stripe (3) is not aligned with cluster size (16), stripe is disabled [ 536.896879][T31003] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 536.920522][T29978] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 536.938664][T31009] syz.6.9836[31009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 536.938797][T31009] syz.6.9836[31009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 536.950331][T31009] syz.6.9836[31009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 536.995087][T31013] netlink: 8 bytes leftover after parsing attributes in process `syz.6.9838'. [ 537.060726][T31023] netlink: 40 bytes leftover after parsing attributes in process `syz.1.9843'. [ 537.107591][T31031] FAULT_INJECTION: forcing a failure. [ 537.107591][T31031] name failslab, interval 1, probability 0, space 0, times 0 [ 537.120286][T31031] CPU: 1 UID: 0 PID: 31031 Comm: syz.1.9847 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 537.131167][T31031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 537.141212][T31031] Call Trace: [ 537.144478][T31031] [ 537.147518][T31031] dump_stack_lvl+0xf2/0x150 [ 537.152199][T31031] dump_stack+0x15/0x20 [ 537.156343][T31031] should_fail_ex+0x223/0x230 [ 537.161080][T31031] ? alloc_pipe_info+0xb0/0x360 [ 537.166099][T31031] should_failslab+0x8f/0xb0 [ 537.170701][T31031] __kmalloc_cache_noprof+0x4b/0x2a0 [ 537.175984][T31031] alloc_pipe_info+0xb0/0x360 [ 537.180661][T31031] splice_direct_to_actor+0x60f/0x670 [ 537.186082][T31031] ? kstrtouint_from_user+0xb0/0xe0 [ 537.191347][T31031] ? __pfx_direct_splice_actor+0x10/0x10 [ 537.197028][T31031] ? 0xffffffff81000000 [ 537.201266][T31031] ? selinux_file_permission+0x22a/0x360 [ 537.206891][T31031] ? __rcu_read_unlock+0x4e/0x70 [ 537.211841][T31031] ? avc_policy_seqno+0x15/0x20 [ 537.216754][T31031] ? selinux_file_permission+0x22a/0x360 [ 537.222503][T31031] do_splice_direct+0xd7/0x150 [ 537.227265][T31031] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 537.233159][T31031] do_sendfile+0x39b/0x970 [ 537.237575][T31031] __x64_sys_sendfile64+0x110/0x150 [ 537.242823][T31031] x64_sys_call+0xed5/0x2d60 [ 537.247426][T31031] do_syscall_64+0xc9/0x1c0 [ 537.252006][T31031] ? clear_bhb_loop+0x55/0xb0 [ 537.256671][T31031] ? clear_bhb_loop+0x55/0xb0 [ 537.261355][T31031] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 537.267356][T31031] RIP: 0033:0x7f196427e719 [ 537.271757][T31031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 537.291425][T31031] RSP: 002b:00007f1962ef7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 537.299824][T31031] RAX: ffffffffffffffda RBX: 00007f1964435f80 RCX: 00007f196427e719 [ 537.307809][T31031] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 537.315765][T31031] RBP: 00007f1962ef7090 R08: 0000000000000000 R09: 0000000000000000 [ 537.323750][T31031] R10: 000000000000e066 R11: 0000000000000246 R12: 0000000000000001 [ 537.331707][T31031] R13: 0000000000000000 R14: 00007f1964435f80 R15: 00007ffc535ebbe8 [ 537.339707][T31031] [ 537.369308][T31030] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9846'. [ 537.459054][T31049] FAULT_INJECTION: forcing a failure. [ 537.459054][T31049] name failslab, interval 1, probability 0, space 0, times 0 [ 537.471685][T31049] CPU: 1 UID: 0 PID: 31049 Comm: syz.1.9851 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 537.482510][T31049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 537.492609][T31049] Call Trace: [ 537.495877][T31049] [ 537.498796][T31049] dump_stack_lvl+0xf2/0x150 [ 537.503406][T31049] dump_stack+0x15/0x20 [ 537.507586][T31049] should_fail_ex+0x223/0x230 [ 537.512292][T31049] ? alloc_pipe_info+0xb0/0x360 [ 537.517131][T31049] should_failslab+0x8f/0xb0 [ 537.521755][T31049] __kmalloc_cache_noprof+0x4b/0x2a0 [ 537.527036][T31049] alloc_pipe_info+0xb0/0x360 [ 537.531703][T31049] splice_direct_to_actor+0x60f/0x670 [ 537.537083][T31049] ? kstrtouint_from_user+0xb0/0xe0 [ 537.542286][T31049] ? __pfx_direct_splice_actor+0x10/0x10 [ 537.547920][T31049] ? 0xffffffff81000000 [ 537.552062][T31049] ? selinux_file_permission+0x22a/0x360 [ 537.557688][T31049] ? __rcu_read_unlock+0x4e/0x70 [ 537.562818][T31049] ? avc_policy_seqno+0x15/0x20 [ 537.567668][T31049] ? selinux_file_permission+0x22a/0x360 [ 537.573302][T31049] do_splice_direct+0xd7/0x150 [ 537.578132][T31049] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 537.584019][T31049] do_sendfile+0x39b/0x970 [ 537.588518][T31049] __x64_sys_sendfile64+0x110/0x150 [ 537.593709][T31049] x64_sys_call+0xed5/0x2d60 [ 537.598301][T31049] do_syscall_64+0xc9/0x1c0 [ 537.602807][T31049] ? clear_bhb_loop+0x55/0xb0 [ 537.607473][T31049] ? clear_bhb_loop+0x55/0xb0 [ 537.612153][T31049] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 537.618076][T31049] RIP: 0033:0x7f196427e719 [ 537.622488][T31049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 537.642229][T31049] RSP: 002b:00007f1962ed6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 537.650632][T31049] RAX: ffffffffffffffda RBX: 00007f1964436058 RCX: 00007f196427e719 [ 537.658594][T31049] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000005 [ 537.666550][T31049] RBP: 00007f1962ed6090 R08: 0000000000000000 R09: 0000000000000000 [ 537.674523][T31049] R10: 000000000000e066 R11: 0000000000000246 R12: 0000000000000001 [ 537.682486][T31049] R13: 0000000000000000 R14: 00007f1964436058 R15: 00007ffc535ebbe8 [ 537.690511][T31049] [ 537.770081][T31056] netlink: 40 bytes leftover after parsing attributes in process `syz.6.9855'. [ 538.300613][T31081] netlink: 40 bytes leftover after parsing attributes in process `syz.8.9867'. [ 538.350301][T31085] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 538.350930][T31083] tipc: Enabling of bearer rejected, failed to enable media [ 538.415275][T31089] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 538.422751][T31089] vhci_hcd: invalid port number 23 [ 538.439998][ T3377] IPVS: starting estimator thread 0... [ 538.440147][T31092] IPVS: lc: UDP 0.0.0.0:0 - no destination available [ 538.521079][T31098] netlink: 8 bytes leftover after parsing attributes in process `syz.8.9874'. [ 538.536424][T31093] IPVS: using max 3024 ests per chain, 151200 per kthread [ 538.617913][T31105] can0: slcan on ttyS3. [ 538.642942][T31110] netlink: 'syz.8.9878': attribute type 15 has an invalid length. [ 538.686941][T31106] can0 (unregistered): slcan off ttyS3. [ 538.731679][T31117] tipc: Enabling of bearer rejected, failed to enable media [ 538.736160][T31120] FAULT_INJECTION: forcing a failure. [ 538.736160][T31120] name failslab, interval 1, probability 0, space 0, times 0 [ 538.752591][T31120] CPU: 0 UID: 0 PID: 31120 Comm: syz.6.9883 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 538.763354][T31120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 538.773407][T31120] Call Trace: [ 538.776673][T31120] [ 538.779589][T31120] dump_stack_lvl+0xf2/0x150 [ 538.784171][T31120] dump_stack+0x15/0x20 [ 538.788316][T31120] should_fail_ex+0x223/0x230 [ 538.792987][T31120] ? inet_getpeer+0x40c/0x7a0 [ 538.797653][T31120] should_failslab+0x8f/0xb0 [ 538.802235][T31120] kmem_cache_alloc_noprof+0x4c/0x290 [ 538.807601][T31120] inet_getpeer+0x40c/0x7a0 [ 538.812096][T31120] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 538.817899][T31120] ip4_frag_init+0xf1/0x140 [ 538.822394][T31120] inet_frag_find+0x3c2/0xd20 [ 538.827056][T31120] ? __pfx_ip4_obj_cmpfn+0x10/0x10 [ 538.832162][T31120] ip_defrag+0x16f/0x11a0 [ 538.836483][T31120] ? __rcu_read_unlock+0x34/0x70 [ 538.841414][T31120] ? ip_route_input_noref+0x6a/0xa0 [ 538.846601][T31120] ip_local_deliver+0xab/0x1d0 [ 538.851362][T31120] ? __pfx_ip_local_deliver+0x10/0x10 [ 538.856726][T31120] ip_rcv_finish+0x193/0x1b0 [ 538.861306][T31120] ? __pfx_ip_rcv+0x10/0x10 [ 538.865799][T31120] ip_rcv+0x64/0x140 [ 538.869682][T31120] ? __pfx_ip_rcv_finish+0x10/0x10 [ 538.874786][T31120] __netif_receive_skb_core+0x1d82/0x2310 [ 538.880527][T31120] ? __skb_flow_dissect+0x3d34/0x3fe0 [ 538.885900][T31120] __netif_receive_skb+0x5a/0x280 [ 538.890910][T31120] netif_receive_skb+0x4a/0x320 [ 538.895747][T31120] ? tun_rx_batched+0xba/0x410 [ 538.900501][T31120] tun_rx_batched+0xf0/0x410 [ 538.905084][T31120] tun_get_user+0x1eaf/0x24e0 [ 538.909752][T31120] ? _parse_integer+0x27/0x30 [ 538.914420][T31120] ? ref_tracker_alloc+0x1f5/0x2f0 [ 538.919527][T31120] tun_chr_write_iter+0x188/0x240 [ 538.924547][T31120] vfs_write+0x77f/0x920 [ 538.928785][T31120] ? __pfx_kfree_link+0x10/0x10 [ 538.933628][T31120] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 538.939166][T31120] ksys_write+0xeb/0x1b0 [ 538.943400][T31120] __x64_sys_write+0x42/0x50 [ 538.947985][T31120] x64_sys_call+0x27dd/0x2d60 [ 538.952651][T31120] do_syscall_64+0xc9/0x1c0 [ 538.957142][T31120] ? clear_bhb_loop+0x55/0xb0 [ 538.961806][T31120] ? clear_bhb_loop+0x55/0xb0 [ 538.966470][T31120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 538.972359][T31120] RIP: 0033:0x7f0946f2d1ff [ 538.976759][T31120] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 538.996354][T31120] RSP: 002b:00007f0945ba1000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 539.004755][T31120] RAX: ffffffffffffffda RBX: 00007f09470e5f80 RCX: 00007f0946f2d1ff [ 539.012720][T31120] RDX: 000000000000002a RSI: 0000000020000140 RDI: 00000000000000c8 [ 539.020686][T31120] RBP: 00007f0945ba1090 R08: 0000000000000000 R09: 0000000000000000 [ 539.028656][T31120] R10: 000000000000002a R11: 0000000000000293 R12: 0000000000000001 [ 539.036790][T31120] R13: 0000000000000000 R14: 00007f09470e5f80 R15: 00007ffde42ea508 [ 539.044753][T31120] [ 539.257681][T31127] netlink: 'syz.2.9884': attribute type 4 has an invalid length. [ 539.738262][T31164] tipc: Enabling of bearer rejected, failed to enable media [ 540.060079][T31171] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 540.081613][T31175] FAULT_INJECTION: forcing a failure. [ 540.081613][T31175] name failslab, interval 1, probability 0, space 0, times 0 [ 540.094380][T31175] CPU: 0 UID: 0 PID: 31175 Comm: syz.0.9902 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 540.105224][T31175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 540.115316][T31175] Call Trace: [ 540.118577][T31175] [ 540.121497][T31175] dump_stack_lvl+0xf2/0x150 [ 540.126069][T31175] dump_stack+0x15/0x20 [ 540.130284][T31175] should_fail_ex+0x223/0x230 [ 540.135035][T31175] ? audit_log_start+0x34c/0x6b0 [ 540.139980][T31175] should_failslab+0x8f/0xb0 [ 540.144548][T31175] kmem_cache_alloc_noprof+0x4c/0x290 [ 540.149941][T31175] audit_log_start+0x34c/0x6b0 [ 540.154743][T31175] audit_seccomp+0x4b/0x130 [ 540.159280][T31175] __seccomp_filter+0x6fa/0x1180 [ 540.164271][T31175] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 540.169951][T31175] ? vfs_write+0x596/0x920 [ 540.174431][T31175] ? __rcu_read_unlock+0x4e/0x70 [ 540.179469][T31175] ? __fget_files+0x1d4/0x210 [ 540.184167][T31175] __secure_computing+0x9f/0x1c0 [ 540.189091][T31175] syscall_trace_enter+0xd1/0x1f0 [ 540.194108][T31175] ? fpregs_assert_state_consistent+0x83/0xa0 [ 540.200185][T31175] do_syscall_64+0xaa/0x1c0 [ 540.204719][T31175] ? clear_bhb_loop+0x55/0xb0 [ 540.209376][T31175] ? clear_bhb_loop+0x55/0xb0 [ 540.214074][T31175] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 540.220021][T31175] RIP: 0033:0x7fe0fa5fe719 [ 540.224415][T31175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 540.244178][T31175] RSP: 002b:00007fe0f9271038 EFLAGS: 00000246 ORIG_RAX: 0000000000000129 [ 540.252763][T31175] RAX: ffffffffffffffda RBX: 00007fe0fa7b5f80 RCX: 00007fe0fa5fe719 [ 540.260815][T31175] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 540.268780][T31175] RBP: 00007fe0f9271090 R08: 0000000000000000 R09: 0000000000000000 [ 540.276764][T31175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 540.284780][T31175] R13: 0000000000000000 R14: 00007fe0fa7b5f80 R15: 00007ffe8b757928 [ 540.292736][T31175] [ 540.590564][T31212] bond1: entered promiscuous mode [ 540.595679][T31212] bond1: entered allmulticast mode [ 540.601092][T31212] 8021q: adding VLAN 0 to HW filter on device bond1 [ 540.612272][T31212] bond1 (unregistering): Released all slaves [ 540.793204][T31244] FAULT_INJECTION: forcing a failure. [ 540.793204][T31244] name failslab, interval 1, probability 0, space 0, times 0 [ 540.805969][T31244] CPU: 0 UID: 0 PID: 31244 Comm: +}[@ Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 540.816291][T31244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 540.826381][T31244] Call Trace: [ 540.829680][T31244] [ 540.832607][T31244] dump_stack_lvl+0xf2/0x150 [ 540.837201][T31244] dump_stack+0x15/0x20 [ 540.841433][T31244] should_fail_ex+0x223/0x230 [ 540.846127][T31244] ? getname_flags+0x81/0x3b0 [ 540.850816][T31244] should_failslab+0x8f/0xb0 [ 540.855515][T31244] kmem_cache_alloc_noprof+0x4c/0x290 [ 540.860950][T31244] ? fput+0x14e/0x190 [ 540.864934][T31244] getname_flags+0x81/0x3b0 [ 540.869531][T31244] getname+0x17/0x20 [ 540.873459][T31244] __x64_sys_execve+0x40/0x70 [ 540.878149][T31244] x64_sys_call+0x1277/0x2d60 [ 540.882844][T31244] do_syscall_64+0xc9/0x1c0 [ 540.887414][T31244] ? clear_bhb_loop+0x55/0xb0 [ 540.892097][T31244] ? clear_bhb_loop+0x55/0xb0 [ 540.896854][T31244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 540.902785][T31244] RIP: 0033:0x7f4d885de719 [ 540.907211][T31244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 540.926868][T31244] RSP: 002b:00007f4d87257038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 540.935286][T31244] RAX: ffffffffffffffda RBX: 00007f4d88795f80 RCX: 00007f4d885de719 [ 540.943263][T31244] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 540.951234][T31244] RBP: 00007f4d87257090 R08: 0000000000000000 R09: 0000000000000000 [ 540.959265][T31244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 540.967238][T31244] R13: 0000000000000000 R14: 00007f4d88795f80 R15: 00007ffdc2445388 [ 540.975205][T31244] [ 540.991751][T31250] FAULT_INJECTION: forcing a failure. [ 540.991751][T31250] name failslab, interval 1, probability 0, space 0, times 0 [ 541.004426][T31250] CPU: 0 UID: 0 PID: 31250 Comm: syz.6.9927 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 541.015227][T31250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 541.025320][T31250] Call Trace: [ 541.028638][T31250] [ 541.031611][T31250] dump_stack_lvl+0xf2/0x150 [ 541.036216][T31250] dump_stack+0x15/0x20 [ 541.040434][T31250] should_fail_ex+0x223/0x230 [ 541.045167][T31250] ? alloc_vfsmnt+0x2b/0x300 [ 541.049776][T31250] should_failslab+0x8f/0xb0 [ 541.054425][T31250] kmem_cache_alloc_noprof+0x4c/0x290 [ 541.060037][T31250] ? kfree+0x247/0x2f0 [ 541.064113][T31250] alloc_vfsmnt+0x2b/0x300 [ 541.068528][T31250] clone_mnt+0x45/0x7a0 [ 541.072679][T31250] copy_tree+0xba/0x7f0 [ 541.076989][T31250] ? proc_alloc_inum+0x4c/0x70 [ 541.081758][T31250] copy_mnt_ns+0x11e/0x5f0 [ 541.086298][T31250] ? create_new_namespaces+0x3c/0x430 [ 541.091680][T31250] ? kmem_cache_alloc_noprof+0x1a6/0x290 [ 541.097313][T31250] create_new_namespaces+0x89/0x430 [ 541.102514][T31250] ? security_capable+0x81/0x90 [ 541.107396][T31250] unshare_nsproxy_namespaces+0xe6/0x120 [ 541.113108][T31250] ksys_unshare+0x3c9/0x6e0 [ 541.117869][T31250] __x64_sys_unshare+0x1f/0x30 [ 541.122632][T31250] x64_sys_call+0x2c8d/0x2d60 [ 541.127304][T31250] do_syscall_64+0xc9/0x1c0 [ 541.132045][T31250] ? clear_bhb_loop+0x55/0xb0 [ 541.136718][T31250] ? clear_bhb_loop+0x55/0xb0 [ 541.141423][T31250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 541.147410][T31250] RIP: 0033:0x7f0946f2e719 [ 541.151945][T31250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 541.171565][T31250] RSP: 002b:00007f0945ba1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 541.179965][T31250] RAX: ffffffffffffffda RBX: 00007f09470e5f80 RCX: 00007f0946f2e719 [ 541.187929][T31250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022020400 [ 541.195964][T31250] RBP: 00007f0945ba1090 R08: 0000000000000000 R09: 0000000000000000 [ 541.204004][T31250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 541.211962][T31250] R13: 0000000000000000 R14: 00007f09470e5f80 R15: 00007ffde42ea508 [ 541.220013][T31250] [ 541.381567][T31272] __nla_validate_parse: 5 callbacks suppressed [ 541.381581][T31272] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9934'. [ 541.392924][T31264] block device autoloading is deprecated and will be removed. [ 541.396794][T31272] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 541.411796][T31272] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 541.412420][T31264] FAULT_INJECTION: forcing a failure. [ 541.412420][T31264] name failslab, interval 1, probability 0, space 0, times 0 [ 541.431611][T31264] CPU: 1 UID: 0 PID: 31264 Comm: syz.0.9932 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 541.442431][T31264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 541.452495][T31264] Call Trace: [ 541.455767][T31264] [ 541.458698][T31264] dump_stack_lvl+0xf2/0x150 [ 541.463293][T31264] dump_stack+0x15/0x20 [ 541.467450][T31264] should_fail_ex+0x223/0x230 [ 541.472140][T31264] ? __d_alloc+0x3d/0x340 [ 541.476478][T31264] should_failslab+0x8f/0xb0 [ 541.481162][T31264] kmem_cache_alloc_lru_noprof+0x51/0x2a0 [ 541.487106][T31264] __d_alloc+0x3d/0x340 [ 541.491304][T31264] d_alloc_parallel+0x54/0xc80 [ 541.496102][T31264] ? __rcu_read_unlock+0x4e/0x70 [ 541.501049][T31264] ? __d_lookup+0x342/0x370 [ 541.505559][T31264] ? inode_permission+0xbf/0x300 [ 541.510677][T31264] __lookup_slow+0x8d/0x250 [ 541.515196][T31264] lookup_one_len+0xea/0x1a0 [ 541.519851][T31264] start_creating+0x139/0x230 [ 541.524535][T31264] __debugfs_create_file+0x73/0x300 [ 541.529741][T31264] debugfs_create_file+0x49/0x60 [ 541.534749][T31264] do_blk_trace_setup+0x2d2/0x4d0 [ 541.539864][T31264] blk_trace_ioctl+0x24f/0x370 [ 541.544630][T31264] ? do_vfs_ioctl+0x96e/0x1530 [ 541.549415][T31264] blkdev_ioctl+0x281/0x450 [ 541.553976][T31264] ? __pfx_blkdev_ioctl+0x10/0x10 [ 541.559009][T31264] __se_sys_ioctl+0xcd/0x140 [ 541.563671][T31264] __x64_sys_ioctl+0x43/0x50 [ 541.568299][T31264] x64_sys_call+0x15cc/0x2d60 [ 541.573039][T31264] do_syscall_64+0xc9/0x1c0 [ 541.577547][T31264] ? clear_bhb_loop+0x55/0xb0 [ 541.582288][T31264] ? clear_bhb_loop+0x55/0xb0 [ 541.586965][T31264] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 541.592927][T31264] RIP: 0033:0x7fe0fa5fe719 [ 541.597355][T31264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 541.599369][ T29] kauditd_printk_skb: 1287 callbacks suppressed [ 541.599381][ T29] audit: type=1326 audit(1731019654.691:93473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31271 comm="syz.8.9934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f9a0edae719 code=0x7ffc0000 [ 541.616987][T31264] RSP: 002b:00007fe0f9271038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 541.617010][T31264] RAX: ffffffffffffffda RBX: 00007fe0fa7b5f80 RCX: 00007fe0fa5fe719 [ 541.617022][T31264] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 000000000000000d [ 541.617036][T31264] RBP: 00007fe0f9271090 R08: 0000000000000000 R09: 0000000000000000 [ 541.617048][T31264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 541.617060][T31264] R13: 0000000000000000 R14: 00007fe0fa7b5f80 R15: 00007ffe8b757928 [ 541.617081][T31264] [ 541.705191][T31272] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 541.712691][T31272] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 541.726945][T31279] syz.2.9936[31279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.727080][T31279] syz.2.9936[31279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.741223][T31281] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 541.741988][T31279] syz.2.9936[31279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.783383][T31283] loop1: detected capacity change from 0 to 164 [ 541.803694][T31283] /dev/loop1: Can't open blockdev [ 541.803896][ T29] audit: type=1400 audit(1731019655.111:93474): avc: denied { read } for pid=31278 comm="syz.2.9936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 541.828682][ T29] audit: type=1400 audit(1731019655.131:93475): avc: granted { setsecparam } for pid=31280 comm="syz.6.9937" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 541.828729][ T29] audit: type=1326 audit(1731019655.151:93476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31271 comm="syz.8.9934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0edae719 code=0x7ffc0000 [ 541.828751][ T29] audit: type=1326 audit(1731019655.151:93477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31271 comm="syz.8.9934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0edae719 code=0x7ffc0000 [ 541.932630][T31291] FAULT_INJECTION: forcing a failure. [ 541.932630][T31291] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 541.945758][T31291] CPU: 0 UID: 0 PID: 31291 Comm: syz.2.9941 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 541.956508][T31291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 541.966624][T31291] Call Trace: [ 541.969895][T31291] [ 541.972822][T31291] dump_stack_lvl+0xf2/0x150 [ 541.977411][T31291] dump_stack+0x15/0x20 [ 541.981614][T31291] should_fail_ex+0x223/0x230 [ 541.986289][T31291] should_fail+0xb/0x10 [ 541.990472][T31291] should_fail_usercopy+0x1a/0x20 [ 541.995485][T31291] _copy_from_user+0x1e/0xb0 [ 542.000070][T31291] get_user_ifreq+0x8c/0x160 [ 542.004712][T31291] sock_ioctl+0x576/0x640 [ 542.009062][T31291] ? __pfx_sock_ioctl+0x10/0x10 [ 542.013975][T31291] __se_sys_ioctl+0xcd/0x140 [ 542.018571][T31291] __x64_sys_ioctl+0x43/0x50 [ 542.023167][T31291] x64_sys_call+0x15cc/0x2d60 [ 542.028017][T31291] do_syscall_64+0xc9/0x1c0 [ 542.032519][T31291] ? clear_bhb_loop+0x55/0xb0 [ 542.037259][T31291] ? clear_bhb_loop+0x55/0xb0 [ 542.041926][T31291] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 542.047822][T31291] RIP: 0033:0x7f4d885de719 [ 542.052266][T31291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 542.071873][T31291] RSP: 002b:00007f4d87257038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 542.080289][T31291] RAX: ffffffffffffffda RBX: 00007f4d88795f80 RCX: 00007f4d885de719 [ 542.088284][T31291] RDX: 0000000020000900 RSI: 00000000000089f1 RDI: 0000000000000007 [ 542.096263][T31291] RBP: 00007f4d87257090 R08: 0000000000000000 R09: 0000000000000000 [ 542.104292][T31291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.112298][T31291] R13: 0000000000000000 R14: 00007f4d88795f80 R15: 00007ffdc2445388 [ 542.120379][T31291] [ 542.247158][ T29] audit: type=1326 audit(1731019655.501:93478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.8.9940" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0edae719 code=0x7ffc0000 [ 542.270968][ T29] audit: type=1326 audit(1731019655.501:93479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.8.9940" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0edae719 code=0x7ffc0000 [ 542.294770][ T29] audit: type=1326 audit(1731019655.501:93480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.8.9940" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f9a0edae719 code=0x7ffc0000 [ 542.318687][ T29] audit: type=1326 audit(1731019655.511:93481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.8.9940" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9a0eda56e7 code=0x7ffc0000 [ 542.342204][ T29] audit: type=1326 audit(1731019655.511:93482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.8.9940" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9a0ed4a099 code=0x7ffc0000 [ 542.422737][T31299] FAULT_INJECTION: forcing a failure. [ 542.422737][T31299] name failslab, interval 1, probability 0, space 0, times 0 [ 542.435578][T31299] CPU: 1 UID: 0 PID: 31299 Comm: syz.2.9943 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 542.446523][T31299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 542.456587][T31299] Call Trace: [ 542.459861][T31299] [ 542.462789][T31299] dump_stack_lvl+0xf2/0x150 [ 542.467389][T31299] dump_stack+0x15/0x20 [ 542.471549][T31299] should_fail_ex+0x223/0x230 [ 542.476231][T31299] ? call_usermodehelper_setup+0x72/0x190 [ 542.482161][T31299] should_failslab+0x8f/0xb0 [ 542.486748][T31299] __kmalloc_cache_noprof+0x4b/0x2a0 [ 542.492130][T31299] call_usermodehelper_setup+0x72/0x190 [ 542.497684][T31299] ? __pfx_free_modprobe_argv+0x10/0x10 [ 542.503235][T31299] __request_module+0x25a/0x3e0 [ 542.508119][T31299] ? strncmp+0x34/0x70 [ 542.512238][T31299] get_fs_type+0x11b/0x320 [ 542.516657][T31299] __se_sys_fsopen+0x7c/0x1c0 [ 542.521386][T31299] __x64_sys_fsopen+0x31/0x40 [ 542.526091][T31299] x64_sys_call+0x2765/0x2d60 [ 542.530797][T31299] do_syscall_64+0xc9/0x1c0 [ 542.535373][T31299] ? clear_bhb_loop+0x55/0xb0 [ 542.540134][T31299] ? clear_bhb_loop+0x55/0xb0 [ 542.544837][T31299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 542.550775][T31299] RIP: 0033:0x7f4d885de719 [ 542.555183][T31299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 542.574788][T31299] RSP: 002b:00007f4d87257038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ae [ 542.583196][T31299] RAX: ffffffffffffffda RBX: 00007f4d88795f80 RCX: 00007f4d885de719 [ 542.591157][T31299] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000020000000 [ 542.599118][T31299] RBP: 00007f4d87257090 R08: 0000000000000000 R09: 0000000000000000 [ 542.607129][T31299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.615158][T31299] R13: 0000000000000000 R14: 00007f4d88795f80 R15: 00007ffdc2445388 [ 542.623145][T31299] [ 542.668508][T31303] loop1: detected capacity change from 0 to 512 [ 542.686202][T31301] tipc: Enabling of bearer rejected, failed to enable media [ 542.721356][T31303] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 542.739906][T31303] ext4 filesystem being mounted at /50/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 542.801430][T31316] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 542.826164][T31316] vhci_hcd: invalid port number 23 [ 542.880575][T30652] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 542.918669][T31331] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9958'. [ 542.927737][T31331] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 542.935207][T31331] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 542.952510][T31331] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 542.960079][T31331] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 542.985224][T31340] netlink: 8 bytes leftover after parsing attributes in process `syz.6.9961'. [ 543.003917][T31336] netlink: 8 bytes leftover after parsing attributes in process `syz.8.9960'. [ 543.120251][T31355] netlink: 12 bytes leftover after parsing attributes in process `syz.8.9965'. [ 543.135226][T31359] netlink: 132 bytes leftover after parsing attributes in process `syz.6.9967'. [ 543.341421][T31388] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9979'. [ 543.458558][T31395] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9982'. [ 543.591929][T31405] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9987'. [ 543.742412][T31418] xt_TCPMSS: Only works on TCP SYN packets [ 543.788284][T31429] veth1_macvtap: left promiscuous mode [ 543.793795][T31429] macsec0: entered allmulticast mode [ 543.810129][T31429] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 543.817726][T31429] vhci_hcd: default hub control req: 4012 v0007 i0006 l0 [ 543.937216][T31446] netlink: 4 bytes leftover after parsing attributes in process `syz.0.10003'. [ 544.202942][T31465] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 544.213764][T31465] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 544.463442][T31496] FAULT_INJECTION: forcing a failure. [ 544.463442][T31496] name failslab, interval 1, probability 0, space 0, times 0 [ 544.476187][T31496] CPU: 1 UID: 0 PID: 31496 Comm: syz.2.10021 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 544.487109][T31496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 544.497210][T31496] Call Trace: [ 544.500468][T31496] [ 544.503382][T31496] dump_stack_lvl+0xf2/0x150 [ 544.508063][T31496] dump_stack+0x15/0x20 [ 544.512207][T31496] should_fail_ex+0x223/0x230 [ 544.516880][T31496] ? __d_alloc+0x3d/0x340 [ 544.521277][T31496] should_failslab+0x8f/0xb0 [ 544.525858][T31496] kmem_cache_alloc_lru_noprof+0x51/0x2a0 [ 544.531563][T31496] __d_alloc+0x3d/0x340 [ 544.535715][T31496] d_alloc_parallel+0x54/0xc80 [ 544.540564][T31496] ? selinux_inode_permission+0x341/0x410 [ 544.546294][T31496] ? lockref_get_not_dead+0x118/0x1b0 [ 544.551662][T31496] ? down_read+0x171/0x4b0 [ 544.556064][T31496] __lookup_slow+0x8d/0x250 [ 544.560574][T31496] lookup_slow+0x3c/0x60 [ 544.564800][T31496] walk_component+0x1f5/0x230 [ 544.569456][T31496] ? path_lookupat+0xfd/0x2b0 [ 544.574175][T31496] path_lookupat+0x10a/0x2b0 [ 544.578750][T31496] filename_lookup+0x127/0x300 [ 544.583506][T31496] kern_path+0x39/0x110 [ 544.587642][T31496] create_local_trace_uprobe+0x55/0x2d0 [ 544.593191][T31496] perf_uprobe_init+0xc2/0x140 [ 544.597934][T31496] perf_uprobe_event_init+0xe2/0x140 [ 544.603200][T31496] perf_try_init_event+0xcb/0x4f0 [ 544.608215][T31496] ? perf_event_alloc+0xabf/0x1750 [ 544.613360][T31496] perf_event_alloc+0xaca/0x1750 [ 544.618286][T31496] __se_sys_perf_event_open+0x840/0x21f0 [ 544.623970][T31496] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 544.629646][T31496] ? vfs_write+0x596/0x920 [ 544.634095][T31496] ? __rcu_read_unlock+0x4e/0x70 [ 544.639023][T31496] ? __fget_files+0x1d4/0x210 [ 544.643686][T31496] __x64_sys_perf_event_open+0x67/0x80 [ 544.649183][T31496] x64_sys_call+0x18d7/0x2d60 [ 544.653863][T31496] do_syscall_64+0xc9/0x1c0 [ 544.658433][T31496] ? clear_bhb_loop+0x55/0xb0 [ 544.663099][T31496] ? clear_bhb_loop+0x55/0xb0 [ 544.667779][T31496] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.673734][T31496] RIP: 0033:0x7f4d885de719 [ 544.678139][T31496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 544.697793][T31496] RSP: 002b:00007f4d87257038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 544.706185][T31496] RAX: ffffffffffffffda RBX: 00007f4d88795f80 RCX: 00007f4d885de719 [ 544.714137][T31496] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 544.722128][T31496] RBP: 00007f4d87257090 R08: 0000000000000000 R09: 0000000000000000 [ 544.730080][T31496] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 544.738032][T31496] R13: 0000000000000000 R14: 00007f4d88795f80 R15: 00007ffdc2445388 [ 544.746065][T31496] [ 544.795487][T31504] netlink: 'syz.6.10025': attribute type 4 has an invalid length. [ 544.853234][T31498] syzkaller0: entered promiscuous mode [ 544.858760][T31498] syzkaller0: entered allmulticast mode [ 545.019340][T31520] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 545.029567][T31520] vhci_hcd: invalid port number 23 [ 545.719022][T31552] FAULT_INJECTION: forcing a failure. [ 545.719022][T31552] name failslab, interval 1, probability 0, space 0, times 0 [ 545.731847][T31552] CPU: 0 UID: 0 PID: 31552 Comm: syz.2.10041 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 545.742694][T31552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 545.749086][T31554] FAULT_INJECTION: forcing a failure. [ 545.749086][T31554] name failslab, interval 1, probability 0, space 0, times 0 [ 545.752734][T31552] Call Trace: [ 545.752742][T31552] [ 545.771664][T31552] dump_stack_lvl+0xf2/0x150 [ 545.776359][T31552] dump_stack+0x15/0x20 [ 545.780511][T31552] should_fail_ex+0x223/0x230 [ 545.785297][T31552] ? audit_log_d_path+0x96/0x250 [ 545.790305][T31552] should_failslab+0x8f/0xb0 [ 545.794889][T31552] __kmalloc_cache_noprof+0x4b/0x2a0 [ 545.800173][T31552] audit_log_d_path+0x96/0x250 [ 545.804979][T31552] ? get_file_rcu+0xeb/0x100 [ 545.809645][T31552] ? __rcu_read_unlock+0x4e/0x70 [ 545.814642][T31552] audit_log_d_path_exe+0x42/0x70 [ 545.819818][T31552] audit_log_task+0x155/0x180 [ 545.824496][T31552] audit_seccomp+0x68/0x130 [ 545.829107][T31552] __seccomp_filter+0x6fa/0x1180 [ 545.834039][T31552] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 545.839714][T31552] ? vfs_write+0x596/0x920 [ 545.844133][T31552] ? __rcu_read_unlock+0x4e/0x70 [ 545.849107][T31552] ? __fget_files+0x1d4/0x210 [ 545.853772][T31552] __secure_computing+0x9f/0x1c0 [ 545.858768][T31552] syscall_trace_enter+0xd1/0x1f0 [ 545.863812][T31552] ? fpregs_assert_state_consistent+0x83/0xa0 [ 545.869946][T31552] do_syscall_64+0xaa/0x1c0 [ 545.874444][T31552] ? clear_bhb_loop+0x55/0xb0 [ 545.879111][T31552] ? clear_bhb_loop+0x55/0xb0 [ 545.883785][T31552] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 545.889805][T31552] RIP: 0033:0x7f4d885dd15c [ 545.894205][T31552] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 545.913815][T31552] RSP: 002b:00007f4d87257030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 545.922321][T31552] RAX: ffffffffffffffda RBX: 00007f4d88795f80 RCX: 00007f4d885dd15c [ 545.930284][T31552] RDX: 000000000000000f RSI: 00007f4d872570a0 RDI: 0000000000000005 [ 545.938257][T31552] RBP: 00007f4d87257090 R08: 0000000000000000 R09: 0000000000000000 [ 545.946218][T31552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 545.954221][T31552] R13: 0000000000000000 R14: 00007f4d88795f80 R15: 00007ffdc2445388 [ 545.962220][T31552] [ 545.965235][T31554] CPU: 1 UID: 0 PID: 31554 Comm: syz.1.10042 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 545.976121][T31554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 545.986172][T31554] Call Trace: [ 545.989498][T31554] [ 545.992421][T31554] dump_stack_lvl+0xf2/0x150 [ 545.997096][T31554] dump_stack+0x15/0x20 [ 546.001253][T31554] should_fail_ex+0x223/0x230 [ 546.006033][T31554] ? __alloc_skb+0x10b/0x310 [ 546.010690][T31554] should_failslab+0x8f/0xb0 [ 546.015293][T31554] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 546.021105][T31554] __alloc_skb+0x10b/0x310 [ 546.025508][T31554] netlink_alloc_large_skb+0xad/0xe0 [ 546.030873][T31554] netlink_sendmsg+0x3b4/0x6e0 [ 546.035807][T31554] ? __pfx_netlink_sendmsg+0x10/0x10 [ 546.041089][T31554] __sock_sendmsg+0x140/0x180 [ 546.045747][T31554] ____sys_sendmsg+0x312/0x410 [ 546.050499][T31554] __sys_sendmsg+0x1d9/0x270 [ 546.055156][T31554] __x64_sys_sendmsg+0x46/0x50 [ 546.059914][T31554] x64_sys_call+0x2689/0x2d60 [ 546.064685][T31554] do_syscall_64+0xc9/0x1c0 [ 546.069168][T31554] ? clear_bhb_loop+0x55/0xb0 [ 546.073831][T31554] ? clear_bhb_loop+0x55/0xb0 [ 546.078516][T31554] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 546.084419][T31554] RIP: 0033:0x7f196427e719 [ 546.088815][T31554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 546.108413][T31554] RSP: 002b:00007f1962ef7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 546.116986][T31554] RAX: ffffffffffffffda RBX: 00007f1964435f80 RCX: 00007f196427e719 [ 546.125026][T31554] RDX: 0000000000000080 RSI: 00000000200003c0 RDI: 0000000000000004 [ 546.133007][T31554] RBP: 00007f1962ef7090 R08: 0000000000000000 R09: 0000000000000000 [ 546.140979][T31554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 546.148947][T31554] R13: 0000000000000000 R14: 00007f1964435f80 R15: 00007ffc535ebbe8 [ 546.156922][T31554] [ 546.177978][T31563] FAULT_INJECTION: forcing a failure. [ 546.177978][T31563] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 546.182618][T31565] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 546.191071][T31563] CPU: 1 UID: 0 PID: 31563 Comm: syz.1.10044 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 546.209314][T31563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 546.219362][T31563] Call Trace: [ 546.222642][T31563] [ 546.225563][T31563] dump_stack_lvl+0xf2/0x150 [ 546.230161][T31563] dump_stack+0x15/0x20 [ 546.234307][T31563] should_fail_ex+0x223/0x230 [ 546.239046][T31563] should_fail+0xb/0x10 [ 546.243222][T31563] should_fail_usercopy+0x1a/0x20 [ 546.248353][T31563] strncpy_from_user+0x25/0x210 [ 546.253292][T31563] ? kmem_cache_alloc_noprof+0x10c/0x290 [ 546.258928][T31563] getname_flags+0xb0/0x3b0 [ 546.263481][T31563] getname+0x17/0x20 [ 546.267374][T31563] do_sys_openat2+0x67/0x120 [ 546.272048][T31563] __x64_sys_openat+0xf3/0x120 [ 546.276884][T31563] x64_sys_call+0x1025/0x2d60 [ 546.283738][T31563] do_syscall_64+0xc9/0x1c0 [ 546.288323][T31563] ? clear_bhb_loop+0x55/0xb0 [ 546.293062][T31563] ? clear_bhb_loop+0x55/0xb0 [ 546.297758][T31563] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 546.303660][T31563] RIP: 0033:0x7f196427d0b0 [ 546.308064][T31563] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 19 8f 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 6c 8f 02 00 8b 44 [ 546.327743][T31563] RSP: 002b:00007f1962ef6f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 546.336147][T31563] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f196427d0b0 [ 546.344189][T31563] RDX: 0000000000000002 RSI: 00007f1962ef6fa0 RDI: 00000000ffffff9c [ 546.352179][T31563] RBP: 00007f1962ef6fa0 R08: 0000000000000000 R09: 0000000000000000 [ 546.360136][T31563] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 546.368116][T31563] R13: 0000000000000000 R14: 00007f1964435f80 R15: 00007ffc535ebbe8 [ 546.376217][T31563] [ 546.420896][T31571] veth1_macvtap: left promiscuous mode [ 546.426499][T31571] macsec0: entered allmulticast mode [ 546.441034][T31574] __nla_validate_parse: 8 callbacks suppressed [ 546.441049][T31574] netlink: 288 bytes leftover after parsing attributes in process `syz.0.10049'. [ 546.454572][T31576] FAULT_INJECTION: forcing a failure. [ 546.454572][T31576] name failslab, interval 1, probability 0, space 0, times 0 [ 546.466339][T31568] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10047'. [ 546.469005][T31576] CPU: 1 UID: 0 PID: 31576 Comm: syz.1.10050 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 546.488745][T31576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 546.498796][T31576] Call Trace: [ 546.502061][T31576] [ 546.504977][T31576] dump_stack_lvl+0xf2/0x150 [ 546.509568][T31576] dump_stack+0x15/0x20 [ 546.513734][T31576] should_fail_ex+0x223/0x230 [ 546.518409][T31576] ? audit_log_start+0x34c/0x6b0 [ 546.523373][T31576] should_failslab+0x8f/0xb0 [ 546.527954][T31576] kmem_cache_alloc_noprof+0x4c/0x290 [ 546.533332][T31576] audit_log_start+0x34c/0x6b0 [ 546.538085][T31576] audit_seccomp+0x4b/0x130 [ 546.542574][T31576] __seccomp_filter+0x6fa/0x1180 [ 546.547594][T31576] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 546.553230][T31576] ? vfs_write+0x596/0x920 [ 546.557707][T31576] ? __schedule+0x6fa/0x930 [ 546.562283][T31576] __secure_computing+0x9f/0x1c0 [ 546.567292][T31576] syscall_trace_enter+0xd1/0x1f0 [ 546.572343][T31576] do_syscall_64+0xaa/0x1c0 [ 546.576952][T31576] ? clear_bhb_loop+0x55/0xb0 [ 546.581662][T31576] ? clear_bhb_loop+0x55/0xb0 [ 546.586326][T31576] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 546.592244][T31576] RIP: 0033:0x7f196427e719 [ 546.596686][T31576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 546.616293][T31576] RSP: 002b:00007f1962ef7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000de [ 546.624707][T31576] RAX: ffffffffffffffda RBX: 00007f1964435f80 RCX: 00007f196427e719 [ 546.632712][T31576] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 546.640699][T31576] RBP: 00007f1962ef7090 R08: 0000000000000000 R09: 0000000000000000 [ 546.648691][T31576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 546.656655][T31576] R13: 0000000000000000 R14: 00007f1964435f80 R15: 00007ffc535ebbe8 [ 546.664616][T31576] [ 546.667847][T31576] audit_log_lost: 1130 callbacks suppressed [ 546.667857][T31576] audit: audit_lost=49 audit_rate_limit=0 audit_backlog_limit=64 [ 546.681872][T31576] audit: out of memory in audit_log_start [ 546.684147][ T29] audit: type=1326 audit(1731019659.981:94613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31567 comm="syz.6.10047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 546.711536][ T29] audit: type=1326 audit(1731019659.981:94614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31567 comm="syz.6.10047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=179 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 546.713935][T31578] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 546.735207][ T29] audit: type=1326 audit(1731019659.981:94615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31567 comm="syz.6.10047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 546.742667][T31578] vhci_hcd: invalid port number 23 [ 546.766114][ T29] audit: type=1326 audit(1731019659.981:94616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31567 comm="syz.6.10047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=117 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 546.766171][ T29] audit: type=1326 audit(1731019659.981:94617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31567 comm="syz.6.10047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 546.819289][ T29] audit: type=1326 audit(1731019659.981:94618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31567 comm="syz.6.10047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 546.842921][ T29] audit: type=1326 audit(1731019659.981:94619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31567 comm="syz.6.10047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 546.866935][ T29] audit: type=1326 audit(1731019659.981:94620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31567 comm="syz.6.10047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=160 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 546.926697][T31588] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10055'. [ 546.943533][T31592] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 547.019410][T31600] FAULT_INJECTION: forcing a failure. [ 547.019410][T31600] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 547.032613][T31600] CPU: 1 UID: 0 PID: 31600 Comm: syz.0.10058 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 547.043574][T31600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 547.047489][T31605] netlink: 8 bytes leftover after parsing attributes in process `syz.8.10062'. [ 547.053652][T31600] Call Trace: [ 547.053662][T31600] [ 547.053669][T31600] dump_stack_lvl+0xf2/0x150 [ 547.073419][T31600] dump_stack+0x15/0x20 [ 547.077627][T31600] should_fail_ex+0x223/0x230 [ 547.082315][T31600] should_fail+0xb/0x10 [ 547.086477][T31600] should_fail_usercopy+0x1a/0x20 [ 547.091496][T31600] _copy_from_user+0x1e/0xb0 [ 547.096250][T31600] mptcp_setsockopt+0x165d/0x2410 [ 547.101273][T31600] sock_common_setsockopt+0x64/0x80 [ 547.106489][T31600] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 547.112457][T31600] __sys_setsockopt+0x1cc/0x240 [ 547.117338][T31600] __x64_sys_setsockopt+0x66/0x80 [ 547.122440][T31600] x64_sys_call+0x278d/0x2d60 [ 547.127371][T31600] do_syscall_64+0xc9/0x1c0 [ 547.131920][T31600] ? clear_bhb_loop+0x55/0xb0 [ 547.136587][T31600] ? clear_bhb_loop+0x55/0xb0 [ 547.141257][T31600] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 547.147148][T31600] RIP: 0033:0x7fe0fa5fe719 [ 547.151568][T31600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 547.171443][T31600] RSP: 002b:00007fe0f9250038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 547.179912][T31600] RAX: ffffffffffffffda RBX: 00007fe0fa7b6058 RCX: 00007fe0fa5fe719 [ 547.187918][T31600] RDX: 0000000000000009 RSI: 0000000000000001 RDI: 0000000000000003 [ 547.195931][T31600] RBP: 00007fe0f9250090 R08: 0000000000000004 R09: 0000000000000000 [ 547.203889][T31600] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 547.211851][T31600] R13: 0000000000000001 R14: 00007fe0fa7b6058 R15: 00007ffe8b757928 [ 547.219858][T31600] [ 547.242062][T31607] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10063'. [ 547.361454][T31612] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 547.368876][T31612] vhci_hcd: invalid port number 23 [ 547.402118][T31614] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10065'. [ 547.723761][T31639] ref_ctr_offset mismatch. inode: 0x5a9 offset: 0x0 ref_ctr_offset(old): 0x82 ref_ctr_offset(new): 0x0 [ 547.724728][T31638] netlink: 'syz.6.10075': attribute type 4 has an invalid length. [ 547.751977][T31638] netlink: 52 bytes leftover after parsing attributes in process `syz.6.10075'. [ 547.768371][T31638] netlink: 52 bytes leftover after parsing attributes in process `syz.6.10075'. [ 547.789309][T31638] netlink: 52 bytes leftover after parsing attributes in process `syz.6.10075'. [ 547.839031][T31645] xt_CT: No such helper "pptp" [ 547.884373][T31660] FAULT_INJECTION: forcing a failure. [ 547.884373][T31660] name failslab, interval 1, probability 0, space 0, times 0 [ 547.897071][T31660] CPU: 1 UID: 0 PID: 31660 Comm: syz.6.10084 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 547.907953][T31660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 547.918004][T31660] Call Trace: [ 547.921290][T31660] [ 547.924226][T31660] dump_stack_lvl+0xf2/0x150 [ 547.928832][T31660] dump_stack+0x15/0x20 [ 547.932997][T31660] should_fail_ex+0x223/0x230 [ 547.937769][T31660] ? io_rsrc_data_alloc+0x43/0x1a0 [ 547.942914][T31660] should_failslab+0x8f/0xb0 [ 547.947588][T31660] __kmalloc_cache_noprof+0x4b/0x2a0 [ 547.953049][T31660] io_rsrc_data_alloc+0x43/0x1a0 [ 547.958027][T31660] ? 0xffffffff81000000 [ 547.962188][T31660] io_sqe_buffers_register+0xdf/0x450 [ 547.967641][T31660] ? should_fail_ex+0xd7/0x230 [ 547.972468][T31660] io_register_rsrc+0x1b9/0x1f0 [ 547.977326][T31660] __se_sys_io_uring_register+0x68f/0x1280 [ 547.983146][T31660] __x64_sys_io_uring_register+0x55/0x70 [ 547.988806][T31660] x64_sys_call+0x202/0x2d60 [ 547.993506][T31660] do_syscall_64+0xc9/0x1c0 [ 547.998142][T31660] ? clear_bhb_loop+0x55/0xb0 [ 548.002824][T31660] ? clear_bhb_loop+0x55/0xb0 [ 548.007578][T31660] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 548.013538][T31660] RIP: 0033:0x7f0946f2e719 [ 548.018021][T31660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 548.037724][T31660] RSP: 002b:00007f0945ba1038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 548.046198][T31660] RAX: ffffffffffffffda RBX: 00007f09470e5f80 RCX: 00007f0946f2e719 [ 548.054194][T31660] RDX: 0000000020001c80 RSI: 000000000000000f RDI: 0000000000000006 [ 548.062159][T31660] RBP: 00007f0945ba1090 R08: 0000000000000000 R09: 0000000000000000 [ 548.070131][T31660] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000001 [ 548.078200][T31660] R13: 0000000000000000 R14: 00007f09470e5f80 R15: 00007ffde42ea508 [ 548.086233][T31660] [ 548.145966][T31669] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 548.153467][T31669] vhci_hcd: invalid port number 23 [ 548.200006][T31677] FAULT_INJECTION: forcing a failure. [ 548.200006][T31677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 548.213089][T31677] CPU: 0 UID: 0 PID: 31677 Comm: syz.6.10092 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 548.223996][T31677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 548.234090][T31677] Call Trace: [ 548.237352][T31677] [ 548.240265][T31677] dump_stack_lvl+0xf2/0x150 [ 548.244850][T31677] dump_stack+0x15/0x20 [ 548.249001][T31677] should_fail_ex+0x223/0x230 [ 548.253730][T31677] should_fail+0xb/0x10 [ 548.257964][T31677] should_fail_usercopy+0x1a/0x20 [ 548.263049][T31677] _copy_to_user+0x20/0xa0 [ 548.267530][T31677] simple_read_from_buffer+0xa0/0x110 [ 548.272981][T31677] proc_fail_nth_read+0xf9/0x140 [ 548.277908][T31677] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 548.283489][T31677] vfs_read+0x1a2/0x700 [ 548.287806][T31677] ? __fget_files+0x1d4/0x210 [ 548.292500][T31677] ksys_read+0xeb/0x1b0 [ 548.296673][T31677] __x64_sys_read+0x42/0x50 [ 548.301470][T31677] x64_sys_call+0x27d3/0x2d60 [ 548.306140][T31677] do_syscall_64+0xc9/0x1c0 [ 548.310650][T31677] ? clear_bhb_loop+0x55/0xb0 [ 548.315332][T31677] ? clear_bhb_loop+0x55/0xb0 [ 548.320067][T31677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 548.326058][T31677] RIP: 0033:0x7f0946f2d15c [ 548.330459][T31677] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 548.350220][T31677] RSP: 002b:00007f0945ba1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 548.358749][T31677] RAX: ffffffffffffffda RBX: 00007f09470e5f80 RCX: 00007f0946f2d15c [ 548.366744][T31677] RDX: 000000000000000f RSI: 00007f0945ba10a0 RDI: 000000000000001e [ 548.374711][T31677] RBP: 00007f0945ba1090 R08: 0000000000000000 R09: 0000000000000000 [ 548.382688][T31677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 548.390647][T31677] R13: 0000000000000000 R14: 00007f09470e5f80 R15: 00007ffde42ea508 [ 548.398604][T31677] [ 548.532175][T31691] ref_ctr_offset mismatch. inode: 0x4e2 offset: 0x0 ref_ctr_offset(old): 0x82 ref_ctr_offset(new): 0x0 [ 548.605817][T31698] FAULT_INJECTION: forcing a failure. [ 548.605817][T31698] name failslab, interval 1, probability 0, space 0, times 0 [ 548.618508][T31698] CPU: 1 UID: 0 PID: 31698 Comm: syz.8.10102 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 548.629383][T31698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 548.639434][T31698] Call Trace: [ 548.642784][T31698] [ 548.645766][T31698] dump_stack_lvl+0xf2/0x150 [ 548.650337][T31698] dump_stack+0x15/0x20 [ 548.654516][T31698] should_fail_ex+0x223/0x230 [ 548.659181][T31698] ? sidtab_sid2str_get+0xb8/0x140 [ 548.664272][T31698] should_failslab+0x8f/0xb0 [ 548.668868][T31698] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 548.675254][T31698] ? vsnprintf+0xdd8/0xe30 [ 548.679802][T31698] kmemdup_noprof+0x2a/0x60 [ 548.684367][T31698] sidtab_sid2str_get+0xb8/0x140 [ 548.689312][T31698] security_sid_to_context_core+0x1eb/0x2f0 [ 548.695326][T31698] security_sid_to_context+0x27/0x30 [ 548.700616][T31698] selinux_secid_to_secctx+0x22/0x30 [ 548.705891][T31698] security_secid_to_secctx+0x48/0x90 [ 548.711341][T31698] audit_log_task_context+0x8c/0x1b0 [ 548.716719][T31698] audit_log_task+0xfb/0x180 [ 548.721298][T31698] audit_seccomp+0x68/0x130 [ 548.725843][T31698] __seccomp_filter+0x6fa/0x1180 [ 548.730774][T31698] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 548.736412][T31698] ? vfs_write+0x596/0x920 [ 548.740835][T31698] ? __schedule+0x6fa/0x930 [ 548.745380][T31698] __secure_computing+0x9f/0x1c0 [ 548.750319][T31698] syscall_trace_enter+0xd1/0x1f0 [ 548.755351][T31698] do_syscall_64+0xaa/0x1c0 [ 548.759857][T31698] ? clear_bhb_loop+0x55/0xb0 [ 548.764604][T31698] ? clear_bhb_loop+0x55/0xb0 [ 548.769330][T31698] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 548.775254][T31698] RIP: 0033:0x7f9a0edae719 [ 548.779680][T31698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 548.799312][T31698] RSP: 002b:00007f9a0da21038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 548.807892][T31698] RAX: ffffffffffffffda RBX: 00007f9a0ef65f80 RCX: 00007f9a0edae719 [ 548.815888][T31698] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000003 [ 548.823846][T31698] RBP: 00007f9a0da21090 R08: 0000000000000000 R09: 0000000000000000 [ 548.831950][T31698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 548.839962][T31698] R13: 0000000000000000 R14: 00007f9a0ef65f80 R15: 00007ffe205cfb08 [ 548.847992][T31698] [ 548.853165][T31698] netlink: 'syz.8.10102': attribute type 4 has an invalid length. [ 549.019595][T31729] veth1_macvtap: left promiscuous mode [ 549.025144][T31729] macsec0: entered allmulticast mode [ 549.090322][T31742] FAULT_INJECTION: forcing a failure. [ 549.090322][T31742] name failslab, interval 1, probability 0, space 0, times 0 [ 549.103004][T31742] CPU: 1 UID: 0 PID: 31742 Comm: syz.8.10122 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 549.113859][T31742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 549.124017][T31742] Call Trace: [ 549.127417][T31742] [ 549.130338][T31742] dump_stack_lvl+0xf2/0x150 [ 549.134932][T31742] dump_stack+0x15/0x20 [ 549.139082][T31742] should_fail_ex+0x223/0x230 [ 549.143855][T31742] ? sctp_association_new+0x71/0x1130 [ 549.149221][T31742] should_failslab+0x8f/0xb0 [ 549.153816][T31742] __kmalloc_cache_noprof+0x4b/0x2a0 [ 549.159173][T31742] ? __list_add_valid_or_report+0x36/0xc0 [ 549.164885][T31742] sctp_association_new+0x71/0x1130 [ 549.170127][T31742] sctp_connect_new_asoc+0x1b0/0x3b0 [ 549.175487][T31742] sctp_sendmsg+0xf05/0x1920 [ 549.180082][T31742] ? __pfx_sctp_sendmsg+0x10/0x10 [ 549.185178][T31742] inet_sendmsg+0xc5/0xd0 [ 549.189510][T31742] __sock_sendmsg+0x102/0x180 [ 549.194214][T31742] __sys_sendto+0x1d6/0x260 [ 549.198761][T31742] __x64_sys_sendto+0x78/0x90 [ 549.203462][T31742] x64_sys_call+0x2959/0x2d60 [ 549.208131][T31742] do_syscall_64+0xc9/0x1c0 [ 549.212684][T31742] ? clear_bhb_loop+0x55/0xb0 [ 549.217384][T31742] ? clear_bhb_loop+0x55/0xb0 [ 549.222076][T31742] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 549.228084][T31742] RIP: 0033:0x7f9a0edae719 [ 549.232574][T31742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.252193][T31742] RSP: 002b:00007f9a0da21038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 549.260613][T31742] RAX: ffffffffffffffda RBX: 00007f9a0ef65f80 RCX: 00007f9a0edae719 [ 549.268577][T31742] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000006 [ 549.276586][T31742] RBP: 00007f9a0da21090 R08: 0000000020000000 R09: 000000000000001c [ 549.284596][T31742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.292564][T31742] R13: 0000000000000000 R14: 00007f9a0ef65f80 R15: 00007ffe205cfb08 [ 549.300535][T31742] [ 549.345697][T31747] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10124'. [ 549.430693][T31757] FAULT_INJECTION: forcing a failure. [ 549.430693][T31757] name failslab, interval 1, probability 0, space 0, times 0 [ 549.443382][T31757] CPU: 0 UID: 0 PID: 31757 Comm: syz.6.10129 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 549.454391][T31757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 549.464474][T31757] Call Trace: [ 549.467763][T31757] [ 549.470690][T31757] dump_stack_lvl+0xf2/0x150 [ 549.475345][T31757] dump_stack+0x15/0x20 [ 549.479506][T31757] should_fail_ex+0x223/0x230 [ 549.484195][T31757] ? copy_fs_struct+0x31/0x110 [ 549.489030][T31757] should_failslab+0x8f/0xb0 [ 549.493622][T31757] kmem_cache_alloc_noprof+0x4c/0x290 [ 549.499069][T31757] copy_fs_struct+0x31/0x110 [ 549.503673][T31757] ksys_unshare+0x2c0/0x6e0 [ 549.503732][T31757] ? ksys_write+0x17a/0x1b0 [ 549.503769][T31757] __x64_sys_unshare+0x1f/0x30 [ 549.503791][T31757] x64_sys_call+0x2c8d/0x2d60 [ 549.503826][T31757] do_syscall_64+0xc9/0x1c0 [ 549.503849][T31757] ? clear_bhb_loop+0x55/0xb0 [ 549.503869][T31757] ? clear_bhb_loop+0x55/0xb0 [ 549.503888][T31757] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 549.503917][T31757] RIP: 0033:0x7f0946f2e719 [ 549.504006][T31757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.504026][T31757] RSP: 002b:00007f0945ba1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 549.504076][T31757] RAX: ffffffffffffffda RBX: 00007f09470e5f80 RCX: 00007f0946f2e719 [ 549.504088][T31757] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020040600 [ 549.504100][T31757] RBP: 00007f0945ba1090 R08: 0000000000000000 R09: 0000000000000000 [ 549.504111][T31757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.504158][T31757] R13: 0000000000000000 R14: 00007f09470e5f80 R15: 00007ffde42ea508 [ 549.504176][T31757] [ 549.532166][T31759] 9pnet_fd: Insufficient options for proto=fd [ 549.607257][T31755] 9pnet_fd: Insufficient options for proto=fd [ 549.679091][T31775] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 549.687749][T31775] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 549.768279][T31789] FAULT_INJECTION: forcing a failure. [ 549.768279][T31789] name failslab, interval 1, probability 0, space 0, times 0 [ 549.781414][T31789] CPU: 0 UID: 0 PID: 31789 Comm: syz.8.10140 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 549.792345][T31789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 549.802518][T31789] Call Trace: [ 549.805781][T31789] [ 549.808699][T31789] dump_stack_lvl+0xf2/0x150 [ 549.813315][T31789] dump_stack+0x15/0x20 [ 549.817491][T31789] should_fail_ex+0x223/0x230 [ 549.822165][T31789] ? __sigqueue_alloc+0xf6/0x180 [ 549.827101][T31789] should_failslab+0x8f/0xb0 [ 549.831677][T31789] kmem_cache_alloc_noprof+0x4c/0x290 [ 549.837122][T31789] __sigqueue_alloc+0xf6/0x180 [ 549.841880][T31789] __send_signal_locked+0x139/0x700 [ 549.847070][T31789] send_signal_locked+0x28f/0x3a0 [ 549.852094][T31789] ? avc_has_perm_noaudit+0x1cc/0x210 [ 549.857467][T31789] do_send_sig_info+0x9f/0xf0 [ 549.862210][T31789] group_send_sig_info+0x6d/0x90 [ 549.867153][T31789] bpf_send_signal_common+0x1a5/0x230 [ 549.872641][T31789] bpf_send_signal+0x19/0x30 [ 549.877220][T31789] bpf_prog_c3f41664225ce077+0x23/0x2a [ 549.882668][T31789] bpf_trace_run10+0x150/0x210 [ 549.887484][T31789] ? bpf_map_alloc_percpu+0xad/0x210 [ 549.892917][T31789] ? bpf_map_alloc_percpu+0xad/0x210 [ 549.898257][T31789] __bpf_trace_percpu_alloc_percpu+0x4e/0x70 [ 549.904239][T31789] ? bpf_map_alloc_percpu+0xad/0x210 [ 549.909515][T31789] pcpu_alloc_noprof+0xe56/0x10a0 [ 549.914590][T31789] bpf_map_alloc_percpu+0xad/0x210 [ 549.919789][T31789] htab_map_alloc+0x44d/0x8e0 [ 549.924455][T31789] map_create+0x850/0xb70 [ 549.928837][T31789] __sys_bpf+0x667/0x7a0 [ 549.933127][T31789] __x64_sys_bpf+0x43/0x50 [ 549.937669][T31789] x64_sys_call+0x2625/0x2d60 [ 549.942377][T31789] do_syscall_64+0xc9/0x1c0 [ 549.947126][T31789] ? clear_bhb_loop+0x55/0xb0 [ 549.951805][T31789] ? clear_bhb_loop+0x55/0xb0 [ 549.956477][T31789] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 549.962407][T31789] RIP: 0033:0x7f9a0edae719 [ 549.966812][T31789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.986438][T31789] RSP: 002b:00007f9a0da21038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 549.994882][T31789] RAX: ffffffffffffffda RBX: 00007f9a0ef65f80 RCX: 00007f9a0edae719 [ 550.002840][T31789] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000000 [ 550.010812][T31789] RBP: 00007f9a0da21090 R08: 0000000000000000 R09: 0000000000000000 [ 550.018867][T31789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 550.026913][T31789] R13: 0000000000000000 R14: 00007f9a0ef65f80 R15: 00007ffe205cfb08 [ 550.034896][T31789] [ 550.111308][T31803] netem: change failed [ 551.095224][T31853] ieee802154 phy0 wpan0: encryption failed: -22 [ 551.262172][T31878] ref_ctr_offset mismatch. inode: 0x34e offset: 0x0 ref_ctr_offset(old): 0x82 ref_ctr_offset(new): 0x0 [ 551.425915][T31902] vlan2: entered promiscuous mode [ 551.555226][T31928] xt_TPROXY: Can be used only with -p tcp or -p udp [ 551.563810][T31928] FAULT_INJECTION: forcing a failure. [ 551.563810][T31928] name failslab, interval 1, probability 0, space 0, times 0 [ 551.576583][T31928] CPU: 1 UID: 0 PID: 31928 Comm: +}[@ Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 551.586828][T31928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 551.596880][T31928] Call Trace: [ 551.600207][T31928] [ 551.603136][T31928] dump_stack_lvl+0xf2/0x150 [ 551.607784][T31928] dump_stack+0x15/0x20 [ 551.612014][T31928] should_fail_ex+0x223/0x230 [ 551.616793][T31928] ? shmem_initxattrs+0x1b7/0x2f0 [ 551.621818][T31928] should_failslab+0x8f/0xb0 [ 551.626421][T31928] __kmalloc_noprof+0xa5/0x370 [ 551.631220][T31928] shmem_initxattrs+0x1b7/0x2f0 [ 551.636077][T31928] ? __pfx_shmem_initxattrs+0x10/0x10 [ 551.641588][T31928] security_inode_init_security+0x257/0x330 [ 551.647549][T31928] shmem_mknod+0xa8/0x180 [ 551.651921][T31928] shmem_mkdir+0x33/0x70 [ 551.656220][T31928] vfs_mkdir+0x1f4/0x320 [ 551.660540][T31928] do_mkdirat+0x12f/0x2a0 [ 551.664969][T31928] __x64_sys_mkdir+0x42/0x50 [ 551.669578][T31928] x64_sys_call+0x2729/0x2d60 [ 551.674360][T31928] do_syscall_64+0xc9/0x1c0 [ 551.678939][T31928] ? clear_bhb_loop+0x55/0xb0 [ 551.683650][T31928] ? clear_bhb_loop+0x55/0xb0 [ 551.688355][T31928] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 551.694281][T31928] RIP: 0033:0x7f9a0edae719 [ 551.698817][T31928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 551.718491][T31928] RSP: 002b:00007f9a0da00038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 551.726922][T31928] RAX: ffffffffffffffda RBX: 00007f9a0ef66058 RCX: 00007f9a0edae719 [ 551.734894][T31928] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 551.742885][T31928] RBP: 00007f9a0da00090 R08: 0000000000000000 R09: 0000000000000000 [ 551.750860][T31928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 551.758876][T31928] R13: 0000000000000000 R14: 00007f9a0ef66058 R15: 00007ffe205cfb08 [ 551.766916][T31928] [ 551.770420][ T29] kauditd_printk_skb: 1632 callbacks suppressed [ 551.770435][ T29] audit: type=1326 audit(1731019665.081:96252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31890 comm="syz.6.10172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f0946f256e7 code=0x7ffc0000 [ 551.802590][ T29] audit: type=1326 audit(1731019665.081:96253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31890 comm="syz.6.10172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f0946eca099 code=0x7ffc0000 [ 551.826316][ T29] audit: type=1326 audit(1731019665.081:96254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31890 comm="syz.6.10172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f0946f256e7 code=0x7ffc0000 [ 551.849951][ T29] audit: type=1326 audit(1731019665.081:96255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31890 comm="syz.6.10172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f0946eca099 code=0x7ffc0000 [ 551.873763][ T29] audit: type=1326 audit(1731019665.081:96256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31890 comm="syz.6.10172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 551.897424][ T29] audit: type=1326 audit(1731019665.091:96257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31890 comm="syz.6.10172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f0946f256e7 code=0x7ffc0000 [ 551.921067][ T29] audit: type=1326 audit(1731019665.091:96258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31890 comm="syz.6.10172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f0946eca099 code=0x7ffc0000 [ 551.944623][ T29] audit: type=1326 audit(1731019665.091:96259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31890 comm="syz.6.10172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f0946f2e719 code=0x7ffc0000 [ 551.968323][ T29] audit: type=1326 audit(1731019665.091:96260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31890 comm="syz.6.10172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f0946f256e7 code=0x7ffc0000 [ 551.991887][ T29] audit: type=1326 audit(1731019665.091:96261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31890 comm="syz.6.10172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f0946eca099 code=0x7ffc0000 [ 552.070944][T31995] IPVS: Unknown mcast interface: pimreg1 [ 552.101435][T32000] __nla_validate_parse: 7 callbacks suppressed [ 552.101448][T32000] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10180'. [ 552.367956][T32024] netlink: 'syz.0.10187': attribute type 4 has an invalid length. [ 552.411507][T32032] netlink: 288 bytes leftover after parsing attributes in process `syz.0.10192'. [ 552.486954][T32035] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10194'. [ 552.499447][T32035] vlan2: entered promiscuous mode [ 552.580872][T32057] netlink: 256 bytes leftover after parsing attributes in process `syz.6.10200'. [ 552.667717][T32071] netlink: 288 bytes leftover after parsing attributes in process `syz.8.10206'. [ 552.807578][T32086] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 552.820739][T32086] vhci_hcd: invalid port number 23 [ 552.875865][T32089] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10214'. [ 552.888241][T32089] vlan2: entered promiscuous mode [ 552.916130][T32097] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10218'. [ 553.132326][T32120] FAULT_INJECTION: forcing a failure. [ 553.132326][T32120] name failslab, interval 1, probability 0, space 0, times 0 [ 553.145120][T32120] CPU: 0 UID: 0 PID: 32120 Comm: syz.1.10228 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 553.155972][T32120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 553.166015][T32120] Call Trace: [ 553.169284][T32120] [ 553.172214][T32120] dump_stack_lvl+0xf2/0x150 [ 553.176866][T32120] dump_stack+0x15/0x20 [ 553.181175][T32120] should_fail_ex+0x223/0x230 [ 553.185862][T32120] ? sidtab_sid2str_get+0xb8/0x140 [ 553.190966][T32120] should_failslab+0x8f/0xb0 [ 553.195591][T32120] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 553.202023][T32120] ? vsnprintf+0xdd8/0xe30 [ 553.206436][T32120] kmemdup_noprof+0x2a/0x60 [ 553.210955][T32120] sidtab_sid2str_get+0xb8/0x140 [ 553.215899][T32120] security_sid_to_context_core+0x1eb/0x2f0 [ 553.221852][T32120] security_sid_to_context+0x27/0x30 [ 553.227165][T32120] selinux_secid_to_secctx+0x22/0x30 [ 553.232531][T32120] security_secid_to_secctx+0x48/0x90 [ 553.237956][T32120] audit_log_task_context+0x8c/0x1b0 [ 553.243306][T32120] audit_log_task+0xfb/0x180 [ 553.247888][T32120] audit_seccomp+0x68/0x130 [ 553.252442][T32120] __seccomp_filter+0x6fa/0x1180 [ 553.257378][T32120] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 553.263004][T32120] ? vfs_write+0x596/0x920 [ 553.267415][T32120] ? __rcu_read_unlock+0x4e/0x70 [ 553.272397][T32120] ? __fget_files+0x1d4/0x210 [ 553.277126][T32120] __secure_computing+0x9f/0x1c0 [ 553.282059][T32120] syscall_trace_enter+0xd1/0x1f0 [ 553.287077][T32120] ? fpregs_assert_state_consistent+0x83/0xa0 [ 553.293151][T32120] do_syscall_64+0xaa/0x1c0 [ 553.297644][T32120] ? clear_bhb_loop+0x55/0xb0 [ 553.302373][T32120] ? clear_bhb_loop+0x55/0xb0 [ 553.307037][T32120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 553.312931][T32120] RIP: 0033:0x7f196427e719 [ 553.317334][T32120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 553.336929][T32120] RSP: 002b:00007f1962ef7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 553.345328][T32120] RAX: ffffffffffffffda RBX: 00007f1964435f80 RCX: 00007f196427e719 [ 553.353322][T32120] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000007 [ 553.361323][T32120] RBP: 00007f1962ef7090 R08: 0000000000000000 R09: 0000000000000000 [ 553.369365][T32120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 553.377756][T32120] R13: 0000000000000000 R14: 00007f1964435f80 R15: 00007ffc535ebbe8 [ 553.385721][T32120] [ 553.389599][T32120] netlink: 'syz.1.10228': attribute type 4 has an invalid length. [ 553.404226][T32123] xt_TPROXY: Can be used only with -p tcp or -p udp [ 553.429087][T32126] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10229'. [ 553.514437][T32139] veth0_vlan: entered allmulticast mode [ 553.978377][T32154] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10240'. [ 553.989895][T32154] vlan2: entered promiscuous mode [ 554.159875][T32174] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10245'. [ 554.351113][T32190] vlan2: entered promiscuous mode [ 554.393245][T32193] ================================================================== [ 554.401336][T32193] BUG: KCSAN: data-race in _copy_from_iter / _copy_from_iter [ 554.408715][T32193] [ 554.411383][T32193] write to 0xffff88814b576000 of 4096 bytes by task 32191 on cpu 0: [ 554.419364][T32193] _copy_from_iter+0x133/0xd00 [ 554.423347][T32197] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 554.424114][T32193] copy_page_from_iter+0x14f/0x280 [ 554.436317][T32193] process_vm_rw+0x5d6/0x8c0 [ 554.440907][T32193] __x64_sys_process_vm_writev+0x7a/0x90 [ 554.446552][T32193] x64_sys_call+0x1a4/0x2d60 [ 554.451129][T32193] do_syscall_64+0xc9/0x1c0 [ 554.455616][T32193] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 554.461517][T32193] [ 554.463829][T32193] write to 0xffff88814b576000 of 4096 bytes by task 32193 on cpu 1: [ 554.471790][T32193] _copy_from_iter+0x133/0xd00 [ 554.476548][T32193] copy_page_from_iter+0x14f/0x280 [ 554.481644][T32193] process_vm_rw+0x5d6/0x8c0 [ 554.486227][T32193] __x64_sys_process_vm_writev+0x7a/0x90 [ 554.491841][T32193] x64_sys_call+0x1a4/0x2d60 [ 554.496416][T32193] do_syscall_64+0xc9/0x1c0 [ 554.500898][T32193] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 554.506784][T32193] [ 554.509094][T32193] Reported by Kernel Concurrency Sanitizer on: [ 554.515234][T32193] CPU: 1 UID: 0 PID: 32193 Comm: syz.8.10251 Not tainted 6.12.0-rc6-syzkaller-00110-gff7afaeca1a1 #0 [ 554.526074][T32193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 554.536124][T32193] ================================================================== [ 558.365594][ T29] kauditd_printk_skb: 616 callbacks suppressed [ 558.365610][ T29] audit: type=1400 audit(1731019671.681:96874): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 558.395504][ T29] audit: type=1400 audit(1731019671.681:96875): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1