last executing test programs: 14m21.945914454s ago: executing program 32 (id=80): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x3e, &(0x7f0000000300)={@link_local, @random="2059249b3790", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "108114", 0x8, 0x11, 0x0, @empty, @mcast2, {[], {0x0, 0xe22, 0x8}}}}}}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000009200e9fff7ffffffffff0000000000000000"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f00000005c0)='fd', 0x0, r3) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r6, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r9 = syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x4, 0x1bc}, &(0x7f0000000680)=0x0, &(0x7f0000000280)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r10, 0x4, &(0x7f0000000080)=0x200, 0x0, 0x4) io_uring_enter(r9, 0xf000, 0x80004000, 0x4f, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r12, 0xc0a85352, &(0x7f0000000180)={{0x2, 0x4}, 'port0\x00', 0x10, 0x100000, 0x9, 0x4, 0x5, 0xef6, 0x508b15cc, 0x0, 0x6, 0x7e}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) syz_emit_ethernet(0x116, &(0x7f0000000900)={@broadcast, @multicast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x108, 0x300, 0x0, 0x0, 0x6c, 0x0, @private, @empty}, {{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [], "b488312e08a2a1023cebddabaa7b890a23c76c8d43f9b3932807d27c34235d6b44b0c6b006ef21718c786163ca3e5319e0c5daa472a4f9cefe4d950707d8667baf60d7a591aed4bef1b5805477e4a19bd91d55950cfbe1ef64bad78b91dd2fc317f38a7d6c1ef934fdc87abe2f827076346710b9284cdced28de617fd1b6631829c85cb8e0bf161fa1353cc4c190bc7a4dafa8aa4f208c7c68f1879d6574121c06319b934f947a0da99d8976311d38db"}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}, 0x0) r13 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000018c0)={0x228, 0x19, 0x1, 0x0, 0x0, {0x1d, 0xd601, 0x9}, [@nested={0x50, 0x11, 0x0, 0x1, [@typed={0x49, 0x121, 0x0, 0x0, @binary="c9a7befe6f6d645a1a11b81b2c4b101c7510e19fee6bb49f6cc7a2c50fd57c06db1a75df432aa833928a0772ff8f5e9ed3103bc77d35b296674f1fe35663c0d236fd88d7ba"}]}, @nested={0x1c4, 0x6, 0x0, 0x1, [@nested={0x1c0, 0x75, 0x0, 0x1, [@nested={0x1bc, 0x105, 0x0, 0x1, [@nested={0x1b5, 0xce, 0x0, 0x1, [@typed={0x8, 0x22, 0x0, 0x0, @ipv4=@multicast1}, @generic="9db6859cccae2434ff2e8f93db2df78257b0170f04b50b3be1e4c913ca056fe917b18f5222ac3d3541f98865f03144d0b08bebc32edca5884fdd79091323071734155332e8388f50ece0c5f03a29b281c639e10effac78129089df5ef6cfc31b315f5d873171723ff22203aab3e5053649597853a74ba2af1ee6beec35caed1a3ac803501167580d1c3d3c71cbe7b7d46bf41688a56358a6e631a860ce019d10f0b3d70c28acb57ccb7b8f82b6", @nested={0x4, 0x28}, @nested={0xf6, 0x34, 0x0, 0x1, [@typed={0xc, 0x64, 0x0, 0x0, @u64=0xffffffff}, @generic="7a431e14b1f1a68e36dc03a34062e7d7769c15282b2256f7d8eedf6b6ad2c5e36130414d2dbd0d2f7fb2bbe5f302f91393e8acdd6c271ec82350db17bc5949e057d10b852cb3189b656edeed0d13a6073db8c20c1fcc8b927e426b945589368aee18d98b1c894e7a9f36dea032c1f76e4a525238b810ea338be8e866db658b8a0f2a1848b4ef8a219f92ab3a008a1a590457625f67317bdf5464bba80680091dbcc96cf9ed1b71cbc47cfa9fbc58ca1542f14680759c632ce6f86beb148fcafaeedaf9f8bcf06401bf5588bff041092c8d68f9783fd68317f79fa459550f34c4cd7f5487b849"]}]}]}]}]}]}, 0x228}, 0x1, 0x0, 0x0, 0x5}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000010400000000000000080000ffff", @ANYRES32=0x0, @ANYBLOB="421c0000000000001c001280090001007866726d000000000c0002800800020003000000140003007866726d3000"/56], 0x50}}, 0x0) 12m47.21357597s ago: executing program 33 (id=1405): r0 = io_uring_setup(0x4d3f, &(0x7f0000000200)={0x0, 0xca6a, 0x40, 0x3, 0x6}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000019200)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES32], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000540)='kfree\x00', r1, 0x0, 0x4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_lsm={0x4, 0x3, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}}, &(0x7f0000000000)='GPL\x00'}, 0x94) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x1, 0x800001, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') pread64(r3, &(0x7f0000000200)=""/102400, 0x19000, 0x1000000000) 12m43.784669157s ago: executing program 34 (id=1443): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_read_part_table(0x1051, &(0x7f0000001280)="$eJzsz7EJwlAUBdAbTIIiSBp7LR3jD+Em9gouo87jJLY2kpg4gqQ4Bz58Hvc+eGEuXqmS/r3HwTLJ4vttk6yn4PNXuez2uZbzEK36eOmG1mab1Wms3kubqmtSp0lyO0zrUtc5Pv55IAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADM1ScAAP//gqkI3g==") bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@nl=@unspec}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x34, 0x4, 0x0, 0x0, 0x100, 0x33123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x7}, 0x0, 0x5, 0xffffffffffffffff, 0x9) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f00000000c0), 0xf00) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000020000000000000000000095"], &(0x7f0000000340)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x406, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) 12m42.431226504s ago: executing program 35 (id=1455): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x3, 0x0, 0x3, 0x11, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_key={0x3, 0x9, 0x80, 0x0, "1cdc0dca1d9f68846960e56de42944af"}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x7}}]}, 0x88}, 0x1, 0x7}, 0x0) 12m26.049793784s ago: executing program 36 (id=1546): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x88) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) 12m19.003063812s ago: executing program 37 (id=1593): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'gretap0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newqdisc={0x48, 0x24, 0xf0b, 0xfffffffc, 0x0, {0x60, 0x0, 0x0, r3, {0xfff2, 0x5}, {0xffff, 0xffff}, {0x5}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x18, 0x2, [@TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x3b9aca00}, @TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x4}]}}]}, 0x48}}, 0x0) socket$kcm(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000540)={0xff, 0x7, 0x1, 'queue0\x00', 0x3ff}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0000000200006c070000000900000000710000", @ANYRES32=r5, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYRESOCT=r2], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x23500d8, 0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 12m18.959903433s ago: executing program 38 (id=1594): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x9, 0x0, 0x7ffc0002}]}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x41, 0x2) r4 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f0000000040)) 12m13.633626547s ago: executing program 39 (id=1645): ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x1008014, &(0x7f00000000c0)=ANY=[], 0x4, 0x7d8, &(0x7f0000000a80)="$eJzs3U1oHOf5APBnFMlx5D/G5F/cYBxn7KTggKOsVolSkUOyWY3kSVa7YndVbEpJTSwHYTkJdkNrXxJTSNrSUnrqoYc019x6aym00EObU6E59NJbIKeSQr9IGwoqsx+yJGsl+Tupfz8hvbMzzzvvM6PVPDuSZjYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgEiq06XSeBK1vL5wIh2sOt1szG2xvL++X69r1nl23bgRSfEZu3fHJ3/vzvvClcX7iy9H4mD30cHYXTS749Ke/fue/v/hoX7/LRK6Xod3GJdEvFkkdfbU8vLi+WseJnZfc5db53u/vOYu/1opvs5m9bwV+VxlNkvzViOdmpwsPX58ppXO5LWsdbLVzubSajOrtBvN9Gj10XR8amoizcZONhbqs9OVWtaf+dRj5VJpMn1+bD6rNFuN+uPPR6t6PK/V8vpsJ6Zc+mYUMU8VT8QX8nbazipzaXpmaXlxYrtUi6DxzRbc033+HHxk30evf/i3pcXiCTloJUnviVkeHy+XxyefnHryqVJpuFwqr59R2iBWI2Ioooi4JU9aPkdu7gEcbsBQr/5HLfKox0KciHSTj5GoxnQ0oxFzxeM/jlwV0dOv/196/C+/32rctfW/X+UfuLL4QHTq/6Huo0OD6v+mud7OjwtxMS7F2TgVy7Eci3H+jme0zcfQja4hWfvo3/8XEfXIoxWNyGMuKjEbWaS9OWlMxWRMRilejOMxE61IYybyqEUWrTgZrWhH1nlGVaMZWVSiHY1oRhpHoxqPRhrjMRVTMRFpZDEWJ6MRC1GP2ZiOSmctZ2Kps98nNmS5/774xct/+OidYno1aHyrzSpezBVBf90iaCjK11D/V1aK1wsbI9T/u8CurRbegqM4XJ+Vfv0HAAAA/mclnd++F+f/I/FgZ2omr2VfvdNpAQAAADdR5y//B4tmpJh6MJLi/L+0SeQHtz03AAAA4OZIOtfYJRExGg91p87EUrwZi7HZLwEiYt/tThEAAAC4QZ2//x8qmtGINzoz+rdLGXD+DwAAAHzefGfQPfY/7N9jtzV/b/KrkYgYSS7Pn3gkOVcp4irn7un26zVfWV1je+ZAsre3kk4zOXxpTxIRw9XsYNK/++V/7u22H3e+Hhhe7T7oXv9Js7llArF1Ap1H8f043I05fLrT7Ol1GU66o4zO5LVsrNqoPd25JWLx2X79laVvRRSjf7c+tzeJM0vLi2Mvvbp8upPL5aL75XO9GyhedR/FLXJZ6e2BeHDzLR7pXIjRG3e0O25p7fYPdbsPbT1msnbMt+JIN+bIaLcd7S/pjrm7GHN87OnxqFT2DrWzE+3XV9ZsfS+L8dUtH1m75T/Zs8Mtfyse7sY8fPThbrNJFuV1WbxydRbltft/Z/tix1m8c/iNE//8bSPJJrbLYuIasli5J2JjFgB3ypnOXX+uVKH7OlXo05Wuov53625RrCrdgJ4dHGv/cWWU1VcZ/f5rat1wbKzuQ6sHxp1V95XoHtGPdmOOdl9PDB/YpK6UNjmiv7b02u96R/Qn3vvxT7926P2fdca9rrr+Xjzajek1cf9vBtTYYpt/sKGqvlv0eHfguK1audhfEd8491rsv3Dx0mNL5069vPjy4ivl8sRk6YlS6cnyrl7sSOcVwxaZAnD32v49dgZG9OtM8sSGs+o4vb7u3r/6LwVj8VK8GstxOo51rjaIiIc2H3d0zb8hHNvmrHV0zTu8HNvm3PJKbPnq2CQGxE6s2WNf/FGn+eSWfDsA4LY4sk0dTuLI+73QQa8QkmPbnHevr+Ubzo5jcC3fzJdv5c4AgLtE1vw4GW2/nTSb+fyL41NT45X28SxtNqovpM18ejZL83o7a1aPV+qzWTrfbLQb1f4vjqezVtpamJ9vNNvpTKOZxlArP9F55/e099bvrWyuUm/n1dZ8Lau0srTaqLcr1XY6nbeq6fzCc7W8dTxrdjq35rNqPpNXK+28UU9bjYVmNRtL01aWrQnMp7N6O5/Ji8l6Ot/M5yrNyxFRW5jL0umsVW3m8+1Gd4X9sfL6TKM511nt2NWb/+fbvb8B4LPgwsVLZ08tLy+ev76JP+0k+E5vIwCwnioNAAAAAAAAAAAAAACffRcuXjq7O5YXz+/rXwhQzL2BKwKvbeLeuOVD3LUTxTfyM5DGnZ34+jPPnB0U89wbDxzf2Xp6PynDse2lrm/vjdj18x925zw7OPjbvZ+/m7OlH0TEdXRfSTZZ9OlKd2LdYWLX7T8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDV/hsAAP//MMlb4Q==") prlimit64(0x0, 0xe, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc0ed000e, &(0x7f0000000200)={[{@jqfmt_vfsold}, {@orlov}, {@debug}, {@noload}, {@nombcache}, {@noblock_validity}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x8000}}]}, 0xfa, 0x47c, &(0x7f0000000a80)="$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") r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="0b00000073790101000000000000000000000000000af7f4f0c55de8ca0000000000000000000000000000000000000000f3c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000020000000000000030000000000000000000000004119202532aeecfcdbb73887feb3f14db126c935954a335f6469a793"], 0x138) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xe}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x18) write$UHID_DESTROY(r2, &(0x7f0000000340), 0x4) io_setup(0x200, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, 0x6c00, 0x1, 0x3) io_submit(0x0, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x2, 0x1, 0x0, r1, &(0x7f0000000000), 0x4000}]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x91) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r5}, 0x18) r6 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x8}, 0x18) r8 = fsmount(r6, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r8, &(0x7f0000000140)='./file0\x00') openat(r8, &(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x494b02, 0x52abe154ad664f9e) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) 12m13.172394306s ago: executing program 40 (id=1693): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2400, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) close(r0) 12m7.530829456s ago: executing program 41 (id=1659): syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000000000009500040000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1000) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x1000400, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c76657273696f6e3d3970323030309c752c00"]) socket$nl_generic(0x10, 0x3, 0x10) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000580)={&(0x7f00000004c0)=""/38, 0x26, 0x4, 0xcbd}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000038c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000770000000e000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='io_uring_register\x00', r4}, 0x18) r5 = io_uring_setup(0x1693, &(0x7f0000000080)={0x0, 0x9c08, 0x2, 0x2, 0x279}) io_uring_register$IORING_UNREGISTER_PBUF_RING(r5, 0x17, 0x0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r3}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYRESHEX=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$IPSET_CMD_ADD(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) 11m44.466351538s ago: executing program 4 (id=2075): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xb, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000281c0040000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe00000000b6090000002000a80700000050000058bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffff550000000800000018220000", @ANYRES32, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005d9800000000000056000000a80000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x11, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvfrom(r0, 0x0, 0x0, 0x734, 0x0, 0x0) 11m44.152519974s ago: executing program 1 (id=2082): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') fcntl$notify(r2, 0x402, 0x8) getdents64(r2, 0x0, 0x0) 11m44.133722554s ago: executing program 1 (id=2083): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000002, 0x4008032, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1, 0x0, 0x1000000000000}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0xfffffffffffffea7) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe82, 0x0, 0x0, 0x0}, 0x94) signalfd4(r3, &(0x7f00000001c0)={[0x7]}, 0x8, 0x80800) r4 = socket$igmp6(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r4, 0x29, 0x22, &(0x7f0000000080)={{0xa, 0x4e24, 0x101, @empty}, {0xa, 0x4e22, 0x0, @dev}, 0x0, {[0x0, 0x0, 0xfffffffc, 0x0, 0x899, 0x1]}}, 0x5c) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000080)=0x9, 0x8, 0x0) mbind(&(0x7f00005f7000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000070000000952793233c12eb1ad4aa4dd0442794e9bcdb3f880f4d97986cbeb2b3a9e5cec9bb"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) r6 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000240)={'syzkaller1\x00', @link_local}) write$tun(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="000086dd0500560008005400000060ec970001983a00fc000018c6ba35000000000000000700ff020000000000000000000000000001"], 0xfdef) 11m44.027784296s ago: executing program 1 (id=2084): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c04, &(0x7f0000000340), 0x1, 0x779, &(0x7f0000001900)="$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") r3 = open(&(0x7f00000005c0)='./bus\x00', 0x1e7042, 0x0) pwritev2(r3, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xffffffe4}], 0x1, 0x1400, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000380)={'tunl0\x00', 0x0, 0x1, 0x1, 0xb, 0x9, {{0x1d, 0x4, 0x3, 0x7, 0x74, 0x67, 0x0, 0x8, 0x29, 0x0, @broadcast, @empty, {[@rr={0x7, 0xb, 0xed, [@rand_addr=0x64010101, @multicast1]}, @cipso={0x86, 0x42, 0x2, [{0x7, 0xa, "6ae95a40af2f16d3"}, {0x5, 0x2}, {0x7, 0x10, "97169becd034e348ffaaefc69847"}, {0x2, 0xd, "2fcf42440a3c6669fc54c1"}, {0x0, 0x11, "ec92e46f1f0477a625bda0fbd0d59a"}, {0x0, 0x2}]}, @ssrr={0x89, 0x7, 0xa1, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xb, 0x6, [@multicast1, @empty]}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={0x0}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2, 0x31}, 0x48) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x66960000) r6 = syz_open_dev$evdev(&(0x7f0000000000), 0x1, 0x2002) readv(r6, &(0x7f00000000c0)=[{&(0x7f0000001000)=""/4096, 0x1000}], 0x1) write$evdev(r6, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x60, 0x12, 0x300, 0x70bd28, 0x25dfdbff, {0x2e, 0xf, 0x31, 0x6, {0x4e24, 0x4e21, [0x401, 0x8, 0x6, 0x3ff], [0x1, 0x8, 0xff, 0x1], r4, [0x6, 0x5]}, 0x2, 0xfffffff9}, [@INET_DIAG_REQ_BYTECODE={0x12, 0x1, "0ce98505f9bcda982dc3e1b34599"}]}, 0x60}, 0x1, 0x0, 0x0, 0x4008044}, 0x24800) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f00000006c0)=0x1, 0x4) 11m43.573106415s ago: executing program 4 (id=2087): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000180)="10030600e0ff020004004788aa96a13bb100001100007fca1a00", 0x10608, 0x0, &(0x7f0000000140)={0x11, 0x0, r4}, 0x14) 11m43.445238638s ago: executing program 4 (id=2089): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) readv(r2, &(0x7f0000000000)=[{&(0x7f0000001300)=""/238, 0xee}], 0x1) 11m43.125007074s ago: executing program 1 (id=2101): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c04, &(0x7f0000000340), 0x1, 0x779, &(0x7f0000001900)="$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") r3 = open(&(0x7f00000005c0)='./bus\x00', 0x1e7042, 0x0) pwritev2(r3, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xffffffe4}], 0x1, 0x1400, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000380)={'tunl0\x00', 0x0, 0x1, 0x1, 0xb, 0x9, {{0x1d, 0x4, 0x3, 0x7, 0x74, 0x67, 0x0, 0x8, 0x29, 0x0, @broadcast, @empty, {[@rr={0x7, 0xb, 0xed, [@rand_addr=0x64010101, @multicast1]}, @cipso={0x86, 0x42, 0x2, [{0x7, 0xa, "6ae95a40af2f16d3"}, {0x5, 0x2}, {0x7, 0x10, "97169becd034e348ffaaefc69847"}, {0x2, 0xd, "2fcf42440a3c6669fc54c1"}, {0x0, 0x11, "ec92e46f1f0477a625bda0fbd0d59a"}, {0x0, 0x2}]}, @ssrr={0x89, 0x7, 0xa1, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xb, 0x6, [@multicast1, @empty]}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={0x0}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2, 0x31}, 0x48) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x66960000) r6 = syz_open_dev$evdev(&(0x7f0000000000), 0x1, 0x2002) readv(r6, &(0x7f00000000c0)=[{&(0x7f0000001000)=""/4096, 0x1000}], 0x1) write$evdev(r6, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x60, 0x12, 0x300, 0x70bd28, 0x25dfdbff, {0x2e, 0xf, 0x31, 0x6, {0x4e24, 0x4e21, [0x401, 0x8, 0x6, 0x3ff], [0x1, 0x8, 0xff, 0x1], r4, [0x6, 0x5]}, 0x2, 0xfffffff9}, [@INET_DIAG_REQ_BYTECODE={0x12, 0x1, "0ce98505f9bcda982dc3e1b34599"}]}, 0x60}, 0x1, 0x0, 0x0, 0x4008044}, 0x24800) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f00000006c0)=0x1, 0x4) 11m42.609982054s ago: executing program 3 (id=2106): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth1_to_bond\x00', 0x0}) r3 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000300)={r0, r2, 0x25, 0x4}, 0x14) signalfd(r3, &(0x7f0000000000)={[0x545b]}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={r3, r4, 0x4, r0}, 0x10) 11m42.539494455s ago: executing program 3 (id=2110): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') fcntl$notify(r2, 0x402, 0x8) getdents64(r2, 0x0, 0x0) 11m42.513658736s ago: executing program 3 (id=2112): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r0, 0x4c81, 0xffffffffffffffb6) 11m42.465163947s ago: executing program 3 (id=2115): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r0, &(0x7f0000000300)="89b94782714c0a267b6de7869c4bd57983ae317f0d4638ccfe51aeceb4c8868ab6cb13715e551c9271d000dda23000e7aac61ac83584f02633ae6e698742b02c769a7a4cad6a84585efd3be640e9c302f8579bcaf93841289b09f001512df3b7bd3133bb4ffdf0e851415997783620973820c6e3bbba2f76dedccb21eb62fc90932b066391a9341b049e3742ffcced25e15f3c744da3c1f8a6f1b78e6994424534ab6e6942535dd3f7f55aea6d5236cff7aa23e8945bbf856fe32029d99a471b3b61aa743d12a55813917e77adb8b69404dd05a71dc54056f48b61ebfcad97a1ceaf10", &(0x7f0000000100)=""/121}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2400, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0x4}, 0x18) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents64(r4, 0x0, 0x0) 11m42.460996247s ago: executing program 4 (id=2116): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x2, 0x400000000000003, 0x20, 0x0, 0x13, 0x0, 0x0, 0x10, [@sadb_lifetime={0x4, 0x3, 0x0, 0x0, 0x100000000000000}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_lifetime={0x4, 0x4, 0x0, 0xfffffffffffffffe}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @private=0xa010102}}, @sadb_x_sec_ctx={0x1, 0x18, 0x5, 0x5f}]}, 0x98}}, 0x0) (fail_nth: 2) 11m42.135966863s ago: executing program 4 (id=2118): syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x400, &(0x7f00000029c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x8001}}, {@journal_dev={'journal_dev', 0x3d, 0x9676}}, {@errors_remount}, {@minixdf}, {@jqfmt_vfsv0}, {@usrjquota, 0x2e}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'ext4\x00'}}, {@fsname={'fsname', 0x3d, 'minixdf'}}], 0x2c}, 0x84, 0x45a, &(0x7f0000000480)="$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") r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/vlan/vlan1\x00') r1 = socket(0x2, 0x2, 0x1) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x1, 'vlan1\x00', {}, 0xc2c}) 11m42.135763233s ago: executing program 3 (id=2119): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth1_to_bond\x00', 0x0}) r3 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000300)={r0, r2, 0x25, 0x4}, 0x14) signalfd(r3, &(0x7f0000000000)={[0x545b]}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={r3, r4, 0x4, r0}, 0x10) 11m42.110761864s ago: executing program 1 (id=2120): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r0, &(0x7f0000000300)="89b94782714c0a267b6de7869c4bd57983ae317f0d4638ccfe51aeceb4c8868ab6cb13715e551c9271d000dda23000e7aac61ac83584f02633ae6e698742b02c769a7a4cad6a84585efd3be640e9c302f8579bcaf93841289b09f001512df3b7bd3133bb4ffdf0e851415997783620973820c6e3bbba2f76dedccb21eb62fc90932b066391a9341b049e3742ffcced25e15f3c744da3c1f8a6f1b78e6994424534ab6e6942535dd3f7f55aea6d5236cff7aa23e8945bbf856fe32029d99a471b3b61aa743d12a55813917e77adb8b69404dd05a71dc54056f48b61ebfcad97a1ceaf10", &(0x7f0000000100)=""/121}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2400, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0x4}, 0x18) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') fcntl$notify(r4, 0x402, 0x8) getdents64(r4, 0x0, 0x0) 11m42.046689095s ago: executing program 42 (id=2121): bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0000000200006c07000000090000"], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 11m41.961990857s ago: executing program 1 (id=2123): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') fcntl$notify(r2, 0x402, 0x8) getdents64(r2, 0x0, 0x0) 11m41.961894697s ago: executing program 43 (id=2123): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') fcntl$notify(r2, 0x402, 0x8) getdents64(r2, 0x0, 0x0) 11m41.961646847s ago: executing program 4 (id=2124): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) shutdown(r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xb, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000281c0040000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe00000000b6090000002000a80700000050000058bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffff550000000800000018220000", @ANYRES32, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005d9800000000000056000000a80000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x11, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvfrom(r0, 0x0, 0x0, 0x734, 0x0, 0x0) 11m41.956958677s ago: executing program 44 (id=2124): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) shutdown(r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xb, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000281c0040000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe00000000b6090000002000a80700000050000058bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffff550000000800000018220000", @ANYRES32, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005d9800000000000056000000a80000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x11, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvfrom(r0, 0x0, 0x0, 0x734, 0x0, 0x0) 11m41.915829757s ago: executing program 3 (id=2125): r0 = socket(0x2, 0x3, 0xff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000003c0)='rxrpc_notify_socket\x00', r1, 0x0, 0x2}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="020000000400000008"], 0x48) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) writev(r2, &(0x7f0000000940)=[{&(0x7f0000000200)='\f7', 0x2}, {&(0x7f0000000100)='0', 0x1}, {&(0x7f00000007c0)="f8079ee78c9711b36402abae104bad8870fe4f0df779249a3b835b1dfa8185cf76e13098a89383752048ec"}, {&(0x7f0000000800)="50563ab467b22c4008f83b8961076a"}], 0x10000000000002ff) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x800f00, &(0x7f00000000c0)={[{@usrjquota}, {@norecovery}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xffff}}, {@minixdf}, {@delalloc}, {@grpquota}, {@usrjquota}, {@journal_dev={'journal_dev', 0x3d, 0xdcc}}]}, 0x3, 0x464, &(0x7f0000000880)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="f838e2660700002c000000000700000085009e002a00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c00000002090101a8d0163ff82962d005000000180002001400018008000100ac14142c08000200ac1414bbc03c7066378d37cfa4a913ff786ba9ef4100872b226b8bf5d85f55ba4623cf4ee2b5625e7890a5bcc7047b4df6b5551c54a39ba486ccbcca94ac199538b1b1caabda4161cafe178a02b65a46ca75e74e9384c4b9f42f0d8a86517a733705af94f16b5792531e76d8b49d4017d185345433679a5080b745be143b0b7ed67e4d4fc783d43c3517c321ca0868cc6638777684c709bd96f5b997d6321ff97c140ec3aea09a105841472ec83814a37e98ac5f8566a2bfa639265142d7b3c65745656afac6ade700"/252], 0x2c}, 0x1, 0x0, 0x0, 0x20000005}, 0x60000010) fchdir(r1) open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000040)=0x5, 0x4) pread64(r3, &(0x7f0000000600)=""/30, 0x1e, 0x0) setsockopt$inet_int(r0, 0x0, 0x3, 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f00000005c0)=0x1, 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x20048080}, 0x805) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180)={0x1, 0x7fffffffffffffff, 0x9, 0xff, 0x7, 0x100000001, 0x0, 0x6}, &(0x7f00000001c0)={0xba, 0x55, 0x10000, 0x3, 0x943, 0x1000, 0xe, 0xfffffffffffffffa}, &(0x7f0000000200)={0x6, 0x6, 0x7fffffff, 0x8, 0x8, 0xfe8, 0x8, 0x53d4}, &(0x7f0000000400)={r4, r5+10000000}, &(0x7f0000000480)={&(0x7f0000000440)={[0x80]}, 0x8}) 11m41.915650628s ago: executing program 45 (id=2125): r0 = socket(0x2, 0x3, 0xff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000003c0)='rxrpc_notify_socket\x00', r1, 0x0, 0x2}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="020000000400000008"], 0x48) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) writev(r2, &(0x7f0000000940)=[{&(0x7f0000000200)='\f7', 0x2}, {&(0x7f0000000100)='0', 0x1}, {&(0x7f00000007c0)="f8079ee78c9711b36402abae104bad8870fe4f0df779249a3b835b1dfa8185cf76e13098a89383752048ec"}, {&(0x7f0000000800)="50563ab467b22c4008f83b8961076a"}], 0x10000000000002ff) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x800f00, &(0x7f00000000c0)={[{@usrjquota}, {@norecovery}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xffff}}, {@minixdf}, {@delalloc}, {@grpquota}, {@usrjquota}, {@journal_dev={'journal_dev', 0x3d, 0xdcc}}]}, 0x3, 0x464, &(0x7f0000000880)="$eJzs28tvG8UfAPDvbl6/X18JpTxaCgQqRMQjadICPXABgcShCCQ4lGNI0qpq2qAmSLSqaECoXJBQJTgjjkj8Bdy4IOCE1CvcUaUKemnhFLTr3dR27dRpHTutPx9pkxnPrGfGs+Od3VkH0LNGsz9JxLaI+D0ihivR2gyjlX/Xr56b+efquZkkVlbe+SvJ8127em6mzFrut7WIjKUR6WdJUUitxTNnT0zPz8+dLuITSyc/mFg8c/b54yenj80dmzs1dejQwQOTL7049UJb2pm169qejxf27n7jvYtvzhy5+P4v32f13VakV7ejXUazhv+9kqtPe6rdhXXZ9qpw0t/ybpeGN6Q2tKovIrLuGsjH/3D0xY3OG47XP+1q5YANlZ2bhlZjp+qTl1eAe1gS3a4B0B3liT67/i23Dk4/uu7KK5ULoKzd14utktIfaZFnoO76tp1GI+LI8r/fZFts0H0IAIBqX8x8fTieazT/S+PBqnw7ijWUkYi4LyJ2RsT9EbErIh6IyPM+FBEPr7P8+qWhm+c/6eXbaliLsvnfy8XaVu38r5z9xUhfEduet38gOXp8fm5/8ZmMxcBQFp9co4wfX7v0ZbO06vlftmXll3PBoh6X+4dq95mdXprOJ6VtcOWTiD39jdqfrK4EJBGxOyL2rO+td5SB4898t7dZplu3fw2trzM1tfJtxNOV/l+OuvaXkrXXJyf+F/Nz+yfKo+Jmv/524e1m5d9R+9sg6/8ttcd/fZaRpHq9dnH9ZVz44/Om1zS3e/wPJu/m/TJYvPbR9NLS6cmIweRwHq95ferGvmW8zJ+1f2xf4/G/s9gnK+eRiMgO4kcj4rGIeLyo+xMR8WRE7Fuj/T+/2jxtM/T/bMPvv9Xjv67/1x/oO/HTD83Kb63/D+ahseKV/PvvFlqt4J18dgAAAHC3SPNn4JN0fDWcpuPjlWf4d8WWdH5hcenZowsfnpqtPCs/EgNpeadruOp+6GSyXLxjJT5V3Csu0w8U942/6vt/Hh+fWZif7XLboddtbTL+M3/2dbt2wIZrtI42NdiFigAdVz/+09ro+bc6WRmgo9rwHA1wl7rF+E87VQ+g85z/oXc1Gv/n6+LWAuDe5PwPvcv4h95l/EPvMv6hJ93J7/o3eyAi8h8lbJb63HZgaDN2U6Sboho9GYjY+LK6/c0EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQHv8FAAD//99q64A=") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="f838e2660700002c000000000700000085009e002a00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c00000002090101a8d0163ff82962d005000000180002001400018008000100ac14142c08000200ac1414bbc03c7066378d37cfa4a913ff786ba9ef4100872b226b8bf5d85f55ba4623cf4ee2b5625e7890a5bcc7047b4df6b5551c54a39ba486ccbcca94ac199538b1b1caabda4161cafe178a02b65a46ca75e74e9384c4b9f42f0d8a86517a733705af94f16b5792531e76d8b49d4017d185345433679a5080b745be143b0b7ed67e4d4fc783d43c3517c321ca0868cc6638777684c709bd96f5b997d6321ff97c140ec3aea09a105841472ec83814a37e98ac5f8566a2bfa639265142d7b3c65745656afac6ade700"/252], 0x2c}, 0x1, 0x0, 0x0, 0x20000005}, 0x60000010) fchdir(r1) open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000040)=0x5, 0x4) pread64(r3, &(0x7f0000000600)=""/30, 0x1e, 0x0) setsockopt$inet_int(r0, 0x0, 0x3, 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f00000005c0)=0x1, 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x20048080}, 0x805) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180)={0x1, 0x7fffffffffffffff, 0x9, 0xff, 0x7, 0x100000001, 0x0, 0x6}, &(0x7f00000001c0)={0xba, 0x55, 0x10000, 0x3, 0x943, 0x1000, 0xe, 0xfffffffffffffffa}, &(0x7f0000000200)={0x6, 0x6, 0x7fffffff, 0x8, 0x8, 0xfe8, 0x8, 0x53d4}, &(0x7f0000000400)={r4, r5+10000000}, &(0x7f0000000480)={&(0x7f0000000440)={[0x80]}, 0x8}) 2m49.934286764s ago: executing program 0 (id=10244): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x3, [@const={0x9, 0x0, 0x0, 0xa, 0x3}, @enum={0x3, 0x5, 0x0, 0x6, 0x4, [{0x10, 0x80000001}, {0x10, 0xffffffff}, {0x2, 0x6}, {0xe, 0x5}, {0xf, 0x9}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x2}}, @decl_tag={0x2, 0x0, 0x0, 0x11, 0x1, 0x8}, @type_tag={0x9, 0x0, 0x0, 0x12, 0xfffff001}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x5, 0x2}, {0x1}, {0x4, 0x1}, {0x1, 0x3}, {0x4, 0x1}, {0xe}, {0x4}, {0xa}, {0x9, 0x1}]}]}, {0x0, [0x30]}}, &(0x7f0000000680)=""/143, 0xe3, 0x8f, 0x0, 0x8}, 0x28) 2m49.887431774s ago: executing program 0 (id=10245): r0 = socket(0x10, 0x3, 0x8403) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x8, &(0x7f00000009c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x4f}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='+}[@\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='+}[@\x00') socket$netlink(0x10, 0x3, 0x0) (async) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) (async) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1345, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x80100, 0x0) close(r4) (async) close(r4) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000100)="89e7ee0000000000000004c988a8", 0xe}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r6 = socket$netlink(0x10, 0x3, 0x8000000004) setreuid(0x0, 0x0) (async) setreuid(0x0, 0x0) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x80201, 0x0) r8 = syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x10c3, 0x10, 0x3, 0x180000}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r9, r10, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}) (async) syz_io_uring_submit(r9, r10, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}) io_uring_enter(r8, 0x3516, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r7) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) (async) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) ptrace(0x11, r7) unshare(0x2040400) writev(r6, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000200040010000800014004000000", 0x58}], 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000440)={'ip_vti0\x00', 0x0, 0x40, 0x0, 0x8, 0x7, {{0x16, 0x4, 0x2, 0x1, 0x58, 0x66, 0x0, 0x2, 0x29, 0x0, @remote, @rand_addr=0x64010100, {[@lsrr={0x83, 0x1f, 0x8f, [@multicast1, @empty, @rand_addr=0x64010101, @broadcast, @remote, @loopback, @private=0xa010100]}, @ssrr={0x89, 0x23, 0x76, [@empty, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x2a}, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) sendmsg$FOU_CMD_GET(r5, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="04000000", @ANYRES16=0x0, @ANYBLOB="10022abd7000ffdbdf2503000000140007000000000000000000000000000000000008000b00", @ANYRES32=r11, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40804}, 0x8805) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904001f000000ff020002000a00000800040001000000", 0x24) 2m49.765042337s ago: executing program 0 (id=10248): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r0, 0x0, 0x401}, 0x11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="a1", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="1400000000000000010000000100", @ANYRES32=r1, @ANYBLOB="0000000014"], 0x30, 0x40400d1}}], 0x1, 0x15) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0xa86, 0x2) 2m49.753205937s ago: executing program 0 (id=10249): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000280)='kfree\x00', r1}, 0x18) r2 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4}, 0x40db, 0x0, 0x4, 0x8, 0xa, 0x100, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='cpu<=0||!') r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0x10, &(0x7f0000000380)=[{&(0x7f0000000480)="c3e972bd85a6d84136d6dd55048d3593a74f338ce6772ab9a6f64041c2f6fbbecdc08ebcd3192b6a53662dae7c8e9c665e80a5d0925f728dcac30c29793992e588952653d414cb8ccdabc38767fee819ec5af0c5ee936880fe8549b4ed347779cab4ffd4e0b62c53a1c01db28f2b3f91c34211c9353bc1dece61511917c2245fd66cb8dffeacb4d46d627c97b498bf1ff6b313bfbc9765457c831771d5eec7997ec242e4505f01c1bb3e069b2e630f42a2be86598a61", 0xb6}, {0x0}, {&(0x7f0000001600)}, {&(0x7f0000000340)="b768eb20304f2fdc5a9694a4867840d93170ca1a86406f", 0x17}], 0x4, 0x0, 0x0, 0x8010}, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb8000) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$eJzs3c9rXNUeAPDvnSRNm/a95MGD9+oqIGigdGJqbBVcVFyIYKGga9thMg01k0zJTEoTAlpEcCOouBB007U/6s6tP7b6X7gQS9W0WHEhkTu5t502M2mSJpnqfD5wM+fceyfnfOf+OGfmHu4NoGeNpn8KEYcj4t0kYjibn0TEQDPVH3Fybb1bK8vldEpidfXlX5LmOjdXlsvR8p7UwSzz/4j45q2II4X15dYXl2ZK1WplPsuPN2YvjNcXl46eny1NV6Yrc8cnJiePnXjqxPGdi/W375cOXXvvhcc/P/nHm/+7+s63SZyMQ9my1jh2ymiMZp/JQPoR3uX5nS6sy5JuV4BtSQ/NvrWjPA7HcPQ1UwDAP9nrEbEKAPSYRPsPAD0m/x3g5spyOZ+6+4vE3rr+XETsX4s/v765tqQ/u2a3v3kddOhmcteVkSQiRnag/NGI+PjLVz9Np9il65AA7bxxOSLOjoyuP/8n68YsbNUTGyzbl72O3jPf+Q/2zldp/+fpdv2/wu3+T7Tp/wy2OXa3477H/4EdKGQDaf/v2Zaxbbda4s+M9GW5fzX7fAPJufPVSnpu+3dEjMXAYJqf2KCMsRt/3ui0rLX/9+v7r32Slp++3lmj8FP/4N3vmSo1Sg8Sc6vrlyMe6W8Xf3J7+ycd+r+nN1nGi8+8/VGnZWn8abz5tD7+yEYn7Y7VKxGPtd3+d0a0JRuOTxxv7g7j+U7Rxhc/fDjUqfzW7Z9Oafn5d4G9kG7/oY3jH0lax2vWt17Gd1eGv+607P7xt9//9yWvNNN5P+JSqdGYn4jYl7y0fv6xO+/N8/n6afxjj7Y//jfa/9PvhGc3GX//tZ8/2378uyuNf2pL23/riau3Zvo6lb+57T/ZTI1lczZz/ttsBR/kswMAAAAAAAAAAAAAAAAAAAAAAACAzSpExKFICsXb6UKhWFx7hvd/Y6hQrdUbR87VFuamovms7JEYKOS3uhxuuR/qRHY//Dx/7J78kxHxn4j4YPBAkt9HcarLsQMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABA7mCH5/+nfhzsdu0AgF2zv9sVAAD2nPYfAHqP9h8Aeo/2HwB6j/YfAHqP9h8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBddvrUqXRa/X1luZzmpy4uLszULh6dqtRnirML5WK5Nn+hOF2rTVcrxXJt9n7/r1qrXZiMuYVL441KvTFeX1w6M1tbmGucOT9bmq6cqQzsSVQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAsDX1xaWZUrVamZfYRmL14ahG9xN92e70sNRnTxPJw1GNHU50+cQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8DfxVwAAAP//02Ii/w==") r5 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r5, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='ext4_mark_inode_dirty\x00', r0, 0x0, 0xc}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r7}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r9, 0x8946, &(0x7f0000000100)={'netdevsim0\x00', &(0x7f0000000040)=@ethtool_ringparam={0x10, 0x7f, 0x20000a2e, 0x0, 0x0, 0x2, 0x2000000, 0x0, 0x3000000}}) r10 = creat(0x0, 0x14c) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) epoll_ctl$EPOLL_CTL_MOD(r10, 0x3, r8, &(0x7f0000000300)) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x843}, 0x44040) sendmsg$NFT_BATCH(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a00110000060a0b04000000000000000002000000d4100480240001800b000100736f636b6574000014000280080002400000000308000140000000029c1001800a0001006d617463680000008c1002800a00010073746174650000000b000100726563656e7400005b000300240de55c7e19ba2d0bda197b61b75aabe0fd70b0ca4560ab2d0e8be38a624695253dfa6cae8799305bda20cf62b6ed9bc1ca5801aed8faacc5e04170c1c59b912dca41565911a6497e1e2de3ede03d056202fa53366947000800024000000000080002400000000004100300237a7f1371d167825283c76bea4a6935cf874876782d54ffb7c7c0551f89e8346def38843bf25a9c896ee3dd20184bd8e2103b725c8c120a90e9dc253aa1faf928de44aaafa7871de19b3bfc9beae44b2cf63b027f358363d769fbabd235e851182c2f2a2a8832891d5594fd6ab0006e49e3dc77e7aeefcc7f00b3ee600e935ffc91e359aebf3266ae56ed3f0284ed1fb960a2e4d77d006ed6d084e4aa3fae17452253ddd30ba894d0e97f27c8827fc72eb89c8677fb79edd412e0999e7c1d1c3437bba1876cf039620c2620506e884a3209d69bafd2095d9121f42dadc3562032f96d6b130e320d26dd5882a3d3e948202d89cb9f70a78922993a430730fabe6dae9b45dc4a9b8e7dcd9ea35c46afdaa8ea2928eec7985cffaa0d51bae69a8de7cc3638fa4f85431f7e5c78d8d77949f134719b2df72bc5b1fedf1cf2d03af0dd7cbcfd624f5c8309d2e0800f3d5f420a9c7ef09a747efbfcdd20a7d1d9672a0a319e56cbf15679d7f1533beb654b02e85d4fb1873ab3c2d023b5795afbfb60f01c40b919484f988ab1593196f63bf0a13f5ea20ca122709ff045733dfe0341b9a6c14d7e09af703848ed7d6ed5b622deafeb219b4e8039a85c976f851053b67d9fa15b70341eaaaf1467cbd5ddf5557d83930e291655c8a902263f67dac5c7c2ec7da95d5042df89e84501130a416fdb5f0547858e6fea67d2be55f3549e2fa8cc5b985682fb0acfb7bf783e74de81589d097566acac527c188f68fb5ef488d555af096a5f885ef891d8d7931140ab33304b5466de3d658025e15f732c0de391cb801c3a9d7817a19d4689451b67e7a12a394eee8b3fcd88f6b050bbc4fd83bc8ab0f0c101f6d17ec3490af13a0e37b153a716831ff10e40974773c5d499b8f221e28ba3e1d73d30b401d692a6d4dd702c8e9c462c53df8266d794d391f063cfe5e90e4994be040cdaece15d21492f37f4a84182026d86da33f3c0b35727ce4f0ed916aacdd89d8e3c590220867e9d9a5a16880960019daa6203c8da683df1e661dc41ce5b7d031e974129c354f97f2865d055265dbf18b00ecdef41c12186912e3dd8532e2340d3e7f986d8721ccde74552d294d070d01cb0515ef45c9012b9143f91e156e60f5ea338dfd683a82792acf05edc73bc1a7fecbe859aea3272a4a19c5e6299eb6342d9a885335d742e111b971f8de2269bb1dce04eba40dad5953c7016988a1abc9b26990c966b9fa56de6b29fb75a5ef67c8b1504f18bc8f503e78ba2660863108d9d0f204a3f1e8bed63bd0f82cea7883b0fd0f3a7cc96b1592c29f0eca3b05cb263e6e7d232d4fa004ed68382c790bae22c81bdbac44c5461d54a7432d87b44782e6fdf25fe59102b9fbf61515e8fa8c144b6b3fe1be66ebada1430d159f98b4f04949abe1558de304503e9e3f0cc1cf3640a7e27c696b226e9b24e5ed5cef7609d8c3bc5f7e300367d50d826d467cb9c6b577f962c299a6c89a0c207b27a1fe4847b263be9b10e964c2269a7371e901184e2a0ba9c4b6a130f554eaf1e534603c4eed190db5a0ed2a9e822edd2835336002e9bd9d18c1dfa6cb3eea288ecf65271541fc398c232729fb2d6c245dd96d42a8f956a8bf474fb1def1cfe40b857875462a9153137fb264f3cf280a36ee3366efd834c5822af576d7ff7acfbe649258299160f0eb437db937b187c2b70385362b4a2abcfb69185b13e988579990e7e2b3773f8c9fcfda709ebce9423e7bcdbbfa134b3bfb74b310e2a6342289bc05dc21b4859d2f9569b48775a5d24397cf22699672baf7927c31a534c7ea1f5d8f7e04567a071f6cda7cf2a3451cc5ca82a545e3f93edc6330f1094faa5fe71f507f66e780514cac4f48311a922094f2582e84c558f78db986f728ef0c5243b3d2752aea6f5b41b73cfe3647cac6e360355d1b43092b162eb3c0f813b501112563a2f87070ef69f73624c3f47be135808a6a4cf487b53ab7b46b230932da9543b390d0a661913b38621eb7ccc90bb5b384346dafd9347a4dc9cc3ae9e8b6b06b1bcdef331e0c08734caee8d0dd9d296982506d15357eae349744ca914a396e80b5fed6e4b0d4a7523773750f6f2e470159a932f28ffc0bfffe533ac52d7f734745aebdfec74d24aa4aeef1dac32eab1d6d02eb6c214f0845383c43963fd0d81ebdfd90d6b9affa979759a9dd6140e5cd705799d002cecc557a3f2435d0dcc10d4d69a34843decfdf2d2ce71e55835a73339beaa6c94eb83849e09b3e3031c959e2a17820b6be7570cdd735c71e192412ea132d1d66c8b67425d8232c3517a6597a1e10d792776b299698de7a80fb8dcafc292af1e3338900bfc020f46f939323d8c21ca0a322d6241c8691cd8ca4c3a66c01caec402647ec695763a2beae4025efc32176ad9ed55768585e59b700ebf3db2eb7acd036cdd82a07ddc2f95c5c9e809792594ec191c56e926226c59802dbc35ef82d9d601bf704167544f37ab3bf86afd3c455936bce54f21252cf545db6be2576e2b449781a1122ee6c9a81833d6586944c6d1c82760e6ffddb68f6d46d44d937bb83b50902e2bb432234fae1ddb033cec96c928ea6c618fc0d881f489ec9478cfe843f5372f00fd32b40ef3f505f65406033f8d421ecc166310073c9887c4c37eadbae40f1b2631bfda13d66b380fe799724763590e1188b6838fae2390ebff20a066eeaac1a9fe878da781aee4a5300bb433fdfc848f0eac3250485eb525d87759830dc5d1b4575ae2fd058961b96ec2a3791ed84eaafaf2e69920e7572fb162aa1b3cd9928607c036ac8364f96d39f389c3a2e040cfdfc59a43eece6f8cd8c1a1e8979563091ab94f16aebb67ca3f569bec8a88e05cbd33e50b92e37f3e44fad08dfe1259a9fdc0b098fcf7984ad6894eeccccb4c8f9f3bc09c3eb058dc29bd9cb0b5129cac8f13804c7779a6c1bcdf8803b17408667baa2507c0c3b76e3265eb568928d09f0de198cfb668e3d8746443ba8d99e61e1da9649ebfcac533ac171bf3c3e0c6e30679611d88277860d12f19ad635e85b5c307d4e870ae70b1ade7c65e0dbafc0155e5c350a083fa2a20835e8c64e07c901be4e0c34fb4e8a24f9d9fa0b7819b8d42f1af4ee5e789cca8e3e241db19a24410c93c743e342a948a452e2fe06135d0dcbe4461feb788383d2b8a21ced5431f6eb0d0ef8933278c1c5826c153aedd42de26bed3752c5a9157e3f3ce4ad95ecd25f2849c50147b83780458006b501e5797e81dca0df0e0b156aed4bde27498de8f9830be5739a984c4a38cbbca4e6cca6bcfd1856527b9d202beaab6cd0cfcc2cffc6d007933ae954395b68ac321b56fbbcbe1d042b82eb5ab78bf22136e77f2c53ad6deab214b3b469fa9da3c2eac1505e6517cd296232f7873e9e41b23c6c5c0bc08cf645c750cdc8a6b693e928939e7e75682054bb1ad9d43b1ef497a1c8cc22d67b8d98c1772f908c753c493e079c2cff2d4b854aa3ca853dc2de3d64eb1f153f9ece76cac4d4b559ec751f63fd404eadc12df7743122dfc8c9288ef72bd86604ef2858fa38859dd9178cb907f41a7fc58529d6dd95897d18b23bdd83decef117707322b523308b16601941b8db52707f08a25b2ceea451c7d77d8b9fb18497d813db16420911401ca109675fba09fc645b42351a6e3774d662e9b0a1d4b8f0612c054d5b39293a4a6414b3115167c1f121cbce0feeeebdf824012a47e72a2a1d674b3c2f672b07b05bd346c1874b275d2d2d5436b21c4958c75a588be4b51c583902d2b724dec14239ef6b7d056d841087f480a1e31eb648e1cde46f905e40cee1746bdbae412899a3a171a1a296e5afd1d20bc648bd73dc254edaab2fe23276eb29e7e875754c347a00da9b9542b527181145fcd7d7c65030125d6ab03dbd8d34dc04f28f1faf45b9a4d85f0c8a34ab0ef767fbac30cb769f65848219a2587bfa707851029f5377242a4596680de9f5f5cefbbf7fa17ebf2411a37609d7e647c2ebe5046582f744c5ed90d89d8d78edf80f53a9d5dbc9e2298e6da95695170b5cfe74adec23b9d0fbadc784cfc724eda88ecaf660b758773f01baafe3b0801bb6231386477f344dfed9030fb155ac06be46594744c218439e831cd4aa70de3332a0b7fc730c5505056c31153291a224be8b7e7fd750b97caf1aaf27a9f53464282b3f7a062c7a1ef523d93b6b5d0c6dd31cf7472665cd1abada98e0cdf634438a83f6bf8ab2b8017ff8399c0b7e575a34048c1adffca3da863c3d46f7a103322d5de896ba908e7cf4194ae1093ea325ad99972fdc634abe3a5156912b2f50a028a7c8ef2b3cbd30b2e8a39c1e46a185b77fcb2c2b87cd2645518f20a58d3d78b47c99b094350b5b343385a0b64885b765ba602627455bc06d54d4bca10382681650f99c3f63b4e17ed29651b3c65a9c2523cc0a37693c7c1cd931a653c0de9550db33fe26fbcdc89070ba8602643f98be014ff23a99471bcb7a78b494593dcfe1d498525884deb94d05d2c6dea6e5397567cb2623f7e2b7fec60e15de2302de29fbe6b799119b1d81622c009f7be6562fe63b2e68c4149e102f6bc055957a73a91f3c5e722e2618ee01ac203be5436170eebaa8cbd41b8f5bd8741e5117d6805d16bbb0e9a14eedc9e1b932b48bb19b36adffdba560e9703ad888eb4f49fd849a09653561050cfe6fabf2f92800df2272346e11ac9f08e27f8d93c38e50bd8cbfaf68409167cc47272ffd24735ab44599fa6961985a853b7d81ae35de63c5ba837abcef35c68b157535a3d146e5be915f7e4ca5ccfaea54570354a0041c42451c9d84ce999ad06096526f99a43db6d4644c8ab3afa5baf1ea43e6c45df8abf274a305a58521de0d095c5316321d3735cf357e6e3e22770847baaf396be5a23227ea15b749edd8ee65b65adddd0310ab5cf4f2476ee198ca1f3c021fb12f879c79337c729dad021377233f2d16019c28b9f25671208a71b49c0ad646a11a18861238db3db510d920eb9cfda6a0033c851bdb868311a31dedf869196337e8efd9c6762805f81f7fee941403e4385bb7d0a181409bab2e2fc030089cb0ff5c5459b668e3f8d454a088eab9299f31d5baf1914bba384d454242836466f4c5769cd1a3829113f216d77954c872a764818963441a9a89528084b576cbc6df009785e739285d77d28a2b9d3cfaaf72e6b5a209c4d7c9a05666b115b225830516d1a67b40fe0d1ee8ab00ef356fe49d0cd3a011acd4c92cead0f23b51de190419c4854d86c8d1add1e313e5dade1c62ffb671c765f3f44d108659e5b7976caeaeaba8717690f319433caa294ad9c20473f0b8359dc925a71be4b8dd9dffe7d37653c17e0d5254bf05ff33ceba7ed1b4ed86439dfded5f0f35a7d8c7f6f9a2dbd9b2d16680f2831fa4bcb0af402479a8df1e3f1fc0019480ca1cbd900dffe46979a2cf50efdddfb2c9c1470dc97528d8a632bdc5486111bfccefd3fc615ec77aa7186618085d0ca3e98c330c343ca72b708711d37f935e4684eb971241dda3b1f16216137cb9500b8e5f7ef46169b4eedfdfca081ba739fa16eb7cab2ac0be2dd3a44251a92d286b1822bde835bf49f66fcb274075aa5f95797de67e70d395c2f0c29e339c59c40ef375f6677105bf5fe9c855d4cbd36e9ea8bc376ae93f8e207f420b9e64eac28dd7e0e6f048273100dc55700cce014492cefe2e946d219e100d2fe32cd8a37eaad8e9e1b239e10629f0bd8990b37bb082e17cf77b7959b83d9a9fc87b880394a8fd0e864e8e41d77fd100001800b00010064796e73657400000900010073797a30000000000900020073797a32"], 0x1128}}, 0x20000000) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='devtmpfs\x00', 0x0, 0x0) 2m49.494175022s ago: executing program 0 (id=10256): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r0, 0x0, 0x0}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0x2}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r4}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x0, 0x0, 0x2) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 2m49.218987917s ago: executing program 0 (id=10259): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r0, 0x0, 0x401}, 0x11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="a1", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="1400000000000000010000000100", @ANYRES32=r1, @ANYBLOB="0000000014"], 0x30, 0x40400d1}}], 0x1, 0x15) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0xa86, 0x2) 2m49.169065318s ago: executing program 46 (id=10259): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r0, 0x0, 0x401}, 0x11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="a1", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="1400000000000000010000000100", @ANYRES32=r1, @ANYBLOB="0000000014"], 0x30, 0x40400d1}}], 0x1, 0x15) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0xa86, 0x2) 2m42.998763649s ago: executing program 7 (id=10332): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x22800, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000042000501"], 0x14}, 0x1, 0x0, 0x0, 0x68840}, 0x4) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002d000b12d25a80648c2594f90124fc60100c022300040000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 2m42.95020548s ago: executing program 7 (id=10334): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7}, 0x18) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000300)={0x0, 0xffffffffffffff36, &(0x7f0000000200)="952bb3e006ae9a4c3a"}) syz_open_dev$evdev(&(0x7f0000000240), 0x20000, 0x0) (fail_nth: 3) 2m42.193953915s ago: executing program 7 (id=10340): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300), 0x80, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',aname=a']) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x7}, [@exit]}, &(0x7f0000000000)='GPL\x00'}, 0x94) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0xf}, 0x1c) listen(r2, 0xcca) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r8, &(0x7f0000000080)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x3, [@const={0x9, 0x0, 0x0, 0xa, 0x3}, @enum={0x3, 0x5, 0x0, 0x6, 0x4, [{0x10, 0x80000001}, {0x10, 0xffffffff}, {0x2, 0x6}, {0xe, 0x5}, {0xf, 0x9}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x2}}, @decl_tag={0x2, 0x0, 0x0, 0x11, 0x1, 0x8}, @type_tag={0x9, 0x0, 0x0, 0x12, 0xfffff001}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x5, 0x2}, {0x1}, {0x4, 0x1}, {0x1, 0x3}, {0x4, 0x1}, {0xe}, {0x4}, {0xa}, {0x9, 0x1}]}]}, {0x0, [0x30]}}, &(0x7f0000000680)=""/143, 0xe3, 0x8f, 0x0, 0x8}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x7, 0x9, 0xdc, 0x69480, 0x1, 0x200, '\x00', 0x0, r10, 0x5, 0x5, 0x4}, 0x50) r11 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), r0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), r9) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r9, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r11, @ANYRESOCT=r3], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r12 = socket(0x400000000010, 0x3, 0x0) r13 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r12, &(0x7f00000012c0)={0x0, 0x4e, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r14, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0xa30e, 0x1, 0xfffffffa}}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r12, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=@newtfilter={0x44, 0x2c, 0xd3f, 0x70b524, 0x25dfdbf9, {0x0, 0x0, 0x0, r14, {0xfff3, 0xffe0}, {0x0, 0xfff1}, {0xfff3, 0x1}}, [@filter_kind_options=@f_flow={{0x9}, {0x14, 0x2, [@TCA_FLOW_KEYS={0x8, 0x1, 0x1}, @TCA_FLOW_PERTURB={0x8, 0xc, 0xfffffffd}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4008849}, 0xc884) 2m42.094505167s ago: executing program 7 (id=10341): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000280)='kfree\x00', r1}, 0x18) r2 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4}, 0x40db, 0x0, 0x4, 0x8, 0xa, 0x100, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='cpu<=0||!') r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0x10, &(0x7f0000000380)=[{&(0x7f0000000480)="c3e972bd85a6d84136d6dd55048d3593a74f338ce6772ab9a6f64041c2f6fbbecdc08ebcd3192b6a53662dae7c8e9c665e80a5d0925f728dcac30c29793992e588952653d414cb8ccdabc38767fee819ec5af0c5ee936880fe8549b4ed347779cab4ffd4e0b62c53a1c01db28f2b3f91c34211c9353bc1dece61511917c2245fd66cb8dffeacb4d46d627c97b498bf1ff6b313bfbc9765457c831771d5eec7997ec242e4505f01c1bb3e069b2e630f42a2be86598a61", 0xb6}, {0x0}, {&(0x7f0000001600)}, {&(0x7f0000000340)="b768eb20304f2fdc5a9694a4867840d93170ca1a86406f", 0x17}], 0x4, 0x0, 0x0, 0x8010}, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb8000) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$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") r5 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r5, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='ext4_mark_inode_dirty\x00', r0, 0x0, 0xc}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r7}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r9, 0x8946, &(0x7f0000000100)={'netdevsim0\x00', &(0x7f0000000040)=@ethtool_ringparam={0x10, 0x7f, 0x20000a2e, 0x0, 0x0, 0x2, 0x2000000, 0x0, 0x3000000}}) r10 = creat(0x0, 0x14c) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) epoll_ctl$EPOLL_CTL_MOD(r10, 0x3, r8, &(0x7f0000000300)) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x843}, 0x44040) sendmsg$NFT_BATCH(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a00110000060a0b04000000000000000002000000d4100480240001800b000100736f636b6574000014000280080002400000000308000140000000029c1001800a0001006d617463680000008c1002800a00010073746174650000000b000100726563656e7400005b000300240de55c7e19ba2d0bda197b61b75aabe0fd70b0ca4560ab2d0e8be38a624695253dfa6cae8799305bda20cf62b6ed9bc1ca5801aed8faacc5e04170c1c59b912dca41565911a6497e1e2de3ede03d056202fa53366947000800024000000000080002400000000004100300237a7f1371d167825283c76bea4a6935cf874876782d54ffb7c7c0551f89e8346def38843bf25a9c896ee3dd20184bd8e2103b725c8c120a90e9dc253aa1faf928de44aaafa7871de19b3bfc9beae44b2cf63b027f358363d769fbabd235e851182c2f2a2a8832891d5594fd6ab0006e49e3dc77e7aeefcc7f00b3ee600e935ffc91e359aebf3266ae56ed3f0284ed1fb960a2e4d77d006ed6d084e4aa3fae17452253ddd30ba894d0e97f27c8827fc72eb89c8677fb79edd412e0999e7c1d1c3437bba1876cf039620c2620506e884a3209d69bafd2095d9121f42dadc3562032f96d6b130e320d26dd5882a3d3e948202d89cb9f70a78922993a430730fabe6dae9b45dc4a9b8e7dcd9ea35c46afdaa8ea2928eec7985cffaa0d51bae69a8de7cc3638fa4f85431f7e5c78d8d77949f134719b2df72bc5b1fedf1cf2d03af0dd7cbcfd624f5c8309d2e0800f3d5f420a9c7ef09a747efbfcdd20a7d1d9672a0a319e56cbf15679d7f1533beb654b02e85d4fb1873ab3c2d023b5795afbfb60f01c40b919484f988ab1593196f63bf0a13f5ea20ca122709ff045733dfe0341b9a6c14d7e09af703848ed7d6ed5b622deafeb219b4e8039a85c976f851053b67d9fa15b70341eaaaf1467cbd5ddf5557d83930e291655c8a902263f67dac5c7c2ec7da95d5042df89e84501130a416fdb5f0547858e6fea67d2be55f3549e2fa8cc5b985682fb0acfb7bf783e74de81589d097566acac527c188f68fb5ef488d555af096a5f885ef891d8d7931140ab33304b5466de3d658025e15f732c0de391cb801c3a9d7817a19d4689451b67e7a12a394eee8b3fcd88f6b050bbc4fd83bc8ab0f0c101f6d17ec3490af13a0e37b153a716831ff10e40974773c5d499b8f221e28ba3e1d73d30b401d692a6d4dd702c8e9c462c53df8266d794d391f063cfe5e90e4994be040cdaece15d21492f37f4a84182026d86da33f3c0b35727ce4f0ed916aacdd89d8e3c590220867e9d9a5a16880960019daa6203c8da683df1e661dc41ce5b7d031e974129c354f97f2865d055265dbf18b00ecdef41c12186912e3dd8532e2340d3e7f986d8721ccde74552d294d070d01cb0515ef45c9012b9143f91e156e60f5ea338dfd683a82792acf05edc73bc1a7fecbe859aea3272a4a19c5e6299eb6342d9a885335d742e111b971f8de2269bb1dce04eba40dad5953c7016988a1abc9b26990c966b9fa56de6b29fb75a5ef67c8b1504f18bc8f503e78ba2660863108d9d0f204a3f1e8bed63bd0f82cea7883b0fd0f3a7cc96b1592c29f0eca3b05cb263e6e7d232d4fa004ed68382c790bae22c81bdbac44c5461d54a7432d87b44782e6fdf25fe59102b9fbf61515e8fa8c144b6b3fe1be66ebada1430d159f98b4f04949abe1558de304503e9e3f0cc1cf3640a7e27c696b226e9b24e5ed5cef7609d8c3bc5f7e300367d50d826d467cb9c6b577f962c299a6c89a0c207b27a1fe4847b263be9b10e964c2269a7371e901184e2a0ba9c4b6a130f554eaf1e534603c4eed190db5a0ed2a9e822edd2835336002e9bd9d18c1dfa6cb3eea288ecf65271541fc398c232729fb2d6c245dd96d42a8f956a8bf474fb1def1cfe40b857875462a9153137fb264f3cf280a36ee3366efd834c5822af576d7ff7acfbe649258299160f0eb437db937b187c2b70385362b4a2abcfb69185b13e988579990e7e2b3773f8c9fcfda709ebce9423e7bcdbbfa134b3bfb74b310e2a6342289bc05dc21b4859d2f9569b48775a5d24397cf22699672baf7927c31a534c7ea1f5d8f7e04567a071f6cda7cf2a3451cc5ca82a545e3f93edc6330f1094faa5fe71f507f66e780514cac4f48311a922094f2582e84c558f78db986f728ef0c5243b3d2752aea6f5b41b73cfe3647cac6e360355d1b43092b162eb3c0f813b501112563a2f87070ef69f73624c3f47be135808a6a4cf487b53ab7b46b230932da9543b390d0a661913b38621eb7ccc90bb5b384346dafd9347a4dc9cc3ae9e8b6b06b1bcdef331e0c08734caee8d0dd9d296982506d15357eae349744ca914a396e80b5fed6e4b0d4a7523773750f6f2e470159a932f28ffc0bfffe533ac52d7f734745aebdfec74d24aa4aeef1dac32eab1d6d02eb6c214f0845383c43963fd0d81ebdfd90d6b9affa979759a9dd6140e5cd705799d002cecc557a3f2435d0dcc10d4d69a34843decfdf2d2ce71e55835a73339beaa6c94eb83849e09b3e3031c959e2a17820b6be7570cdd735c71e192412ea132d1d66c8b67425d8232c3517a6597a1e10d792776b299698de7a80fb8dcafc292af1e3338900bfc020f46f939323d8c21ca0a322d6241c8691cd8ca4c3a66c01caec402647ec695763a2beae4025efc32176ad9ed55768585e59b700ebf3db2eb7acd036cdd82a07ddc2f95c5c9e809792594ec191c56e926226c59802dbc35ef82d9d601bf704167544f37ab3bf86afd3c455936bce54f21252cf545db6be2576e2b449781a1122ee6c9a81833d6586944c6d1c82760e6ffddb68f6d46d44d937bb83b50902e2bb432234fae1ddb033cec96c928ea6c618fc0d881f489ec9478cfe843f5372f00fd32b40ef3f505f65406033f8d421ecc166310073c9887c4c37eadbae40f1b2631bfda13d66b380fe799724763590e1188b6838fae2390ebff20a066eeaac1a9fe878da781aee4a5300bb433fdfc848f0eac3250485eb525d87759830dc5d1b4575ae2fd058961b96ec2a3791ed84eaafaf2e69920e7572fb162aa1b3cd9928607c036ac8364f96d39f389c3a2e040cfdfc59a43eece6f8cd8c1a1e8979563091ab94f16aebb67ca3f569bec8a88e05cbd33e50b92e37f3e44fad08dfe1259a9fdc0b098fcf7984ad6894eeccccb4c8f9f3bc09c3eb058dc29bd9cb0b5129cac8f13804c7779a6c1bcdf8803b17408667baa2507c0c3b76e3265eb568928d09f0de198cfb668e3d8746443ba8d99e61e1da9649ebfcac533ac171bf3c3e0c6e30679611d88277860d12f19ad635e85b5c307d4e870ae70b1ade7c65e0dbafc0155e5c350a083fa2a20835e8c64e07c901be4e0c34fb4e8a24f9d9fa0b7819b8d42f1af4ee5e789cca8e3e241db19a24410c93c743e342a948a452e2fe06135d0dcbe4461feb788383d2b8a21ced5431f6eb0d0ef8933278c1c5826c153aedd42de26bed3752c5a9157e3f3ce4ad95ecd25f2849c50147b83780458006b501e5797e81dca0df0e0b156aed4bde27498de8f9830be5739a984c4a38cbbca4e6cca6bcfd1856527b9d202beaab6cd0cfcc2cffc6d007933ae954395b68ac321b56fbbcbe1d042b82eb5ab78bf22136e77f2c53ad6deab214b3b469fa9da3c2eac1505e6517cd296232f7873e9e41b23c6c5c0bc08cf645c750cdc8a6b693e928939e7e75682054bb1ad9d43b1ef497a1c8cc22d67b8d98c1772f908c753c493e079c2cff2d4b854aa3ca853dc2de3d64eb1f153f9ece76cac4d4b559ec751f63fd404eadc12df7743122dfc8c9288ef72bd86604ef2858fa38859dd9178cb907f41a7fc58529d6dd95897d18b23bdd83decef117707322b523308b16601941b8db52707f08a25b2ceea451c7d77d8b9fb18497d813db16420911401ca109675fba09fc645b42351a6e3774d662e9b0a1d4b8f0612c054d5b39293a4a6414b3115167c1f121cbce0feeeebdf824012a47e72a2a1d674b3c2f672b07b05bd346c1874b275d2d2d5436b21c4958c75a588be4b51c583902d2b724dec14239ef6b7d056d841087f480a1e31eb648e1cde46f905e40cee1746bdbae412899a3a171a1a296e5afd1d20bc648bd73dc254edaab2fe23276eb29e7e875754c347a00da9b9542b527181145fcd7d7c65030125d6ab03dbd8d34dc04f28f1faf45b9a4d85f0c8a34ab0ef767fbac30cb769f65848219a2587bfa707851029f5377242a4596680de9f5f5cefbbf7fa17ebf2411a37609d7e647c2ebe5046582f744c5ed90d89d8d78edf80f53a9d5dbc9e2298e6da95695170b5cfe74adec23b9d0fbadc784cfc724eda88ecaf660b758773f01baafe3b0801bb6231386477f344dfed9030fb155ac06be46594744c218439e831cd4aa70de3332a0b7fc730c5505056c31153291a224be8b7e7fd750b97caf1aaf27a9f53464282b3f7a062c7a1ef523d93b6b5d0c6dd31cf7472665cd1abada98e0cdf634438a83f6bf8ab2b8017ff8399c0b7e575a34048c1adffca3da863c3d46f7a103322d5de896ba908e7cf4194ae1093ea325ad99972fdc634abe3a5156912b2f50a028a7c8ef2b3cbd30b2e8a39c1e46a185b77fcb2c2b87cd2645518f20a58d3d78b47c99b094350b5b343385a0b64885b765ba602627455bc06d54d4bca10382681650f99c3f63b4e17ed29651b3c65a9c2523cc0a37693c7c1cd931a653c0de9550db33fe26fbcdc89070ba8602643f98be014ff23a99471bcb7a78b494593dcfe1d498525884deb94d05d2c6dea6e5397567cb2623f7e2b7fec60e15de2302de29fbe6b799119b1d81622c009f7be6562fe63b2e68c4149e102f6bc055957a73a91f3c5e722e2618ee01ac203be5436170eebaa8cbd41b8f5bd8741e5117d6805d16bbb0e9a14eedc9e1b932b48bb19b36adffdba560e9703ad888eb4f49fd849a09653561050cfe6fabf2f92800df2272346e11ac9f08e27f8d93c38e50bd8cbfaf68409167cc47272ffd24735ab44599fa6961985a853b7d81ae35de63c5ba837abcef35c68b157535a3d146e5be915f7e4ca5ccfaea54570354a0041c42451c9d84ce999ad06096526f99a43db6d4644c8ab3afa5baf1ea43e6c45df8abf274a305a58521de0d095c5316321d3735cf357e6e3e22770847baaf396be5a23227ea15b749edd8ee65b65adddd0310ab5cf4f2476ee198ca1f3c021fb12f879c79337c729dad021377233f2d16019c28b9f25671208a71b49c0ad646a11a18861238db3db510d920eb9cfda6a0033c851bdb868311a31dedf869196337e8efd9c6762805f81f7fee941403e4385bb7d0a181409bab2e2fc030089cb0ff5c5459b668e3f8d454a088eab9299f31d5baf1914bba384d454242836466f4c5769cd1a3829113f216d77954c872a764818963441a9a89528084b576cbc6df009785e739285d77d28a2b9d3cfaaf72e6b5a209c4d7c9a05666b115b225830516d1a67b40fe0d1ee8ab00ef356fe49d0cd3a011acd4c92cead0f23b51de190419c4854d86c8d1add1e313e5dade1c62ffb671c765f3f44d108659e5b7976caeaeaba8717690f319433caa294ad9c20473f0b8359dc925a71be4b8dd9dffe7d37653c17e0d5254bf05ff33ceba7ed1b4ed86439dfded5f0f35a7d8c7f6f9a2dbd9b2d16680f2831fa4bcb0af402479a8df1e3f1fc0019480ca1cbd900dffe46979a2cf50efdddfb2c9c1470dc97528d8a632bdc5486111bfccefd3fc615ec77aa7186618085d0ca3e98c330c343ca72b708711d37f935e4684eb971241dda3b1f16216137cb9500b8e5f7ef46169b4eedfdfca081ba739fa16eb7cab2ac0be2dd3a44251a92d286b1822bde835bf49f66fcb274075aa5f95797de67e70d395c2f0c29e339c59c40ef375f6677105bf5fe9c855d4cbd36e9ea8bc376ae93f8e207f420b9e64eac28dd7e0e6f048273100dc55700cce014492cefe2e946d219e100d2fe32cd8a37eaad8e9e1b239e10629f0bd8990b37bb082e17cf77b7959b83d9a9fc87b880394a8fd0e864e8e41d77fd100001800b00010064796e73657400000900010073797a30000000000900020073797a32"], 0x1128}}, 0x20000000) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='devtmpfs\x00', 0x0, 0x0) 2m41.846793132s ago: executing program 7 (id=10343): r0 = socket$netlink(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'bond0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r3}, &(0x7f0000000600), &(0x7f0000000640)='%pS \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x55, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='block_bio_remap\x00', r4}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000c343cb8405407424894a046bfc7c967a67470aebbc997b8109a0de29fafdf98b77ab5504b42c3362fe9d1e0833b7ae444742b8328b237fbe57235abe42d645021744ab148789b0445bcfcc5920b7efe41164da18926c48e6760a1d34c0e9e2b58e51fb8157e069c8264fa38422c944123157666ef9f1b7bd8eb44d521d0582e4d9", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') syz_emit_ethernet(0x193, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@mpls_uc={0x8847, {[{0xb157}, {0x9, 0x0, 0x1}, {0x1, 0x0, 0x1}], @ipv6=@dccp_packet={0x8, 0x6, "fb4e0b", 0x151, 0x21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, {[@dstopts={0x2c, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0x9}, @pad1, @padn]}, @fragment={0x2f, 0x0, 0xf7, 0x1, 0x0, 0x2, 0x66}, @fragment={0x33, 0x0, 0x9, 0x0, 0x0, 0x18, 0x64}, @srh={0x5c, 0x8, 0x4, 0x4, 0x9, 0x58, 0x8, [@remote, @mcast2, @empty, @private0={0xfc, 0x0, '\x00', 0x1}]}], {{0x4e20, 0x4e22, 0x4, 0x1, 0x8, 0x0, 0x0, 0x6, 0x7, "5f938b", 0x8, "a073bc"}, "26ca657eec5a0be684a36cb753e8f52cdafb14c431f241d4a45cc88a57aa1654f6d24871dbd43d411bb2646398a20a5e7321d088ab99fe2c0bb7690272c6c259d6c90ad5184ea96cbb8786c1b0f80df6e2d09c6670d43710533e7a0ccf01d338fc3f5aa899dd8f3beddc8d230943987edd3439f0d097f4b10a67e4c0344d7e32c558ba215d2ad2115fd0d0ef249c6b8111b712ccd844fe5a1fd5ff2829d770282f8ba33be02f345eeba145a425a724d145f27969390e11510fc62ebc1f23c110ef27ee8f7ff599212ab95157f09a46120c"}}}}}}}, &(0x7f0000000000)={0x1, 0x4, [0xbc8, 0x8ec, 0x219, 0x46f]}) preadv(r6, &(0x7f0000000100)=[{&(0x7f0000000140)=""/197, 0xc5}], 0x1, 0x36, 0x0) socket(0x2a, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x62, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={0x0, 0xd}, 0x604a, 0xe3b, 0x2, 0x0, 0x2, 0x240, 0xfffd, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) pipe(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r7 = gettid() process_vm_writev(r7, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 2m41.559806648s ago: executing program 7 (id=10345): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x50) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x1000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000005c0)={[{@fat=@check_strict}, {@nodots}, {@fat=@usefree}, {@nodots}, {@fat=@usefree}, {@dots}, {@dots}, {@dots}, {@nodots}, {@fat=@showexec}, {@nodots}, {@fat=@dos1xfloppy}, {@fat=@allow_utime={'allow_utime', 0x3d, 0xf}}, {@nodots}]}, 0x1, 0x23d, &(0x7f0000000a40)="$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") r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb, 0xfffffffe, 0x0, 0x0, 0x3}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) r3 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) symlinkat(&(0x7f0000000c80)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00') getxattr(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES16=r2, @ANYRESHEX=r1], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket(0x2a, 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newtfilter={0x9c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xfffa}, {}, {0x5, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0x6c, 0x2, [@TCA_FLOWER_ACT={0x54, 0x3, [@m_connmark={0x50, 0x1, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffff8, 0xfff, 0x0, 0x5, 0xb}, 0x3}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}]}, @TCA_FLOWER_KEY_ARP_SHA={0xa, 0x3f, @local}, @TCA_FLOWER_KEY_ARP_TIP_MASK={0x8}]}}]}, 0x9c}}, 0x24000000) r4 = socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffffffffbbbbbbbbbbbb86dd6000000000183a00fe8000000000000000000000000000bbff020000000000000000000000000001f900907800000000ff0200000000000000000000000000012a8fa4b08055e9c8c861ca37b142b2e48286d952613ffe5a6cf26fea763e045545107a02258b50692be4a10d260f23eaadc41f02481f0645e3452be038968a612c5df48d1ffb552f77c702ac8491f443b5023e6f7d7f682961c7cc2cc4a4ac8a16360dc654ad9e9f657d893eb03a41825dc55b7e1246aa65294cec1ed13733ca67e990e2db5165b038bbb169bc01a5518d2f0702a620491c6f6c65c3bc19"], 0x0) sendmmsg(r4, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x1328}}], 0x1, 0x0) fsmount(r3, 0x0, 0x0) r5 = syz_open_dev$usbfs(0x0, 0x74, 0x101201) syz_usbip_server_init(0x3) syz_usbip_server_init(0x3) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) r6 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x5, 0xb, &(0x7f00000020c0)=ANY=[@ANYBLOB="18000000900c0000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000004000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) ftruncate(r6, 0x200) sendfile(r6, r6, 0x0, 0x800000009) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) 2m41.559566858s ago: executing program 47 (id=10345): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x50) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x1000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000005c0)={[{@fat=@check_strict}, {@nodots}, {@fat=@usefree}, {@nodots}, {@fat=@usefree}, {@dots}, {@dots}, {@dots}, {@nodots}, {@fat=@showexec}, {@nodots}, {@fat=@dos1xfloppy}, {@fat=@allow_utime={'allow_utime', 0x3d, 0xf}}, {@nodots}]}, 0x1, 0x23d, &(0x7f0000000a40)="$eJzs3cFq1EAcBvB/220be7Fn8RDw4qmobxBkBTEgrOSgJwPVSytCeome9jF8Bh/Jx+ipt4hN6NZUPUjadJvfD5Z87MfAzGVnDzO77x9+Ojr8fPKx+fEtkiSNWcQyziL2YzO2orXRPTfP805ctgwAYN0sFmU29hwY0MbVt6oqK7cjYvdKU3y/mUkBAAAAAAAAAAAwNOf/AWB6nP+/+6oqK/e672+/c/4fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGM9Z09xv/vEae34AwPDs/wAwPfZ/AJge+z8ATM+bt+9eZXk+X6RpEnG6rIu6aJ9t/+JlPn+SnttfjTqt62K7y/n8adun/X6vG//sj/1OPH7U9r+656/zXr8bh9e9eAAAAAAAAAAAAAAAAAAAALglDtILvfv9W21/8Le+TZd+H6B3f38WD2Y3tgwAAAAAAAAAAAAAAAAAAABYaydfvh6Vx8cfKkG4CPfiP0YlcTsmLwwSxv5kAgAAAAAAAAAAAAAAAACA6Vld+h17JgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwntX//19fGHuNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwDT8DAAA//8GmZGk") r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb, 0xfffffffe, 0x0, 0x0, 0x3}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) r3 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) symlinkat(&(0x7f0000000c80)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00') getxattr(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES16=r2, @ANYRESHEX=r1], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket(0x2a, 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newtfilter={0x9c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xfffa}, {}, {0x5, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0x6c, 0x2, [@TCA_FLOWER_ACT={0x54, 0x3, [@m_connmark={0x50, 0x1, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffff8, 0xfff, 0x0, 0x5, 0xb}, 0x3}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}]}, @TCA_FLOWER_KEY_ARP_SHA={0xa, 0x3f, @local}, @TCA_FLOWER_KEY_ARP_TIP_MASK={0x8}]}}]}, 0x9c}}, 0x24000000) r4 = socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffffffffbbbbbbbbbbbb86dd6000000000183a00fe8000000000000000000000000000bbff020000000000000000000000000001f900907800000000ff0200000000000000000000000000012a8fa4b08055e9c8c861ca37b142b2e48286d952613ffe5a6cf26fea763e045545107a02258b50692be4a10d260f23eaadc41f02481f0645e3452be038968a612c5df48d1ffb552f77c702ac8491f443b5023e6f7d7f682961c7cc2cc4a4ac8a16360dc654ad9e9f657d893eb03a41825dc55b7e1246aa65294cec1ed13733ca67e990e2db5165b038bbb169bc01a5518d2f0702a620491c6f6c65c3bc19"], 0x0) sendmmsg(r4, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x1328}}], 0x1, 0x0) fsmount(r3, 0x0, 0x0) r5 = syz_open_dev$usbfs(0x0, 0x74, 0x101201) syz_usbip_server_init(0x3) syz_usbip_server_init(0x3) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) r6 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x5, 0xb, &(0x7f00000020c0)=ANY=[@ANYBLOB="18000000900c0000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000004000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) ftruncate(r6, 0x200) sendfile(r6, r6, 0x0, 0x800000009) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) 2.212414227s ago: executing program 9 (id=13075): socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1, @perf_bp={0x0, 0x224ef61b12363fa4}, 0x0, 0x4, 0x5, 0xffffffffffffffff, 0x8, 0x3, 0x1, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mount(&(0x7f0000000080)=@rnullb, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='nfsd\x00', 0x800010, &(0x7f0000000200)='.#]\x00') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}]}, 0x4c}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0) fcntl$lock(r3, 0x5, &(0x7f0000000040)={0x300, 0x1, 0x42, 0xfffffffffffffffc}) fsetxattr$security_evm(r3, &(0x7f0000000280), &(0x7f0000000380)=@sha1={0x1, "09d8ab60cd8cc2e8013d1ce6dc9c81f74864f337"}, 0x15, 0x2) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r4, 0x0, 0xf, &(0x7f0000000340)=0xfffffffffffffff9, 0x4) r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) lremovexattr(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)=@random={'system.', '\x00'}) sendmsg$nl_xfrm(r3, &(0x7f0000000680)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000480)=@newae={0x1f4, 0x1e, 0x20, 0x70bd27, 0x25dfdc01, {{@in=@dev={0xac, 0x14, 0x14, 0x41}, 0x4d4, 0x2, 0x32}, @in6=@local, 0x5, 0x3505}, [@replay_esn_val={0x20, 0x17, {0x1, 0x70bd2b, 0x70bd2b, 0x70bd2a, 0x70bd27, 0x6, [0x8]}}, @XFRMA_IF_ID={0x8, 0x1f, 0x1}, @algo_crypt={0x11c, 0x2, {{'ctr(twofish)\x00'}, 0x6a0, "bb457ea26ea2449e160105b6965333953cf3634df2a344d36f2e4479a7a5c2045d15f923af2f4317547e267af60efc251fadab68f79cd1d4fead9b6fbea6756ec2b558f93f8afacdcdd43ba7a44bd49fef491a4301633a2e8134f8dbab6e04d291c66076a3906f71986e0e08585c41ad70401941952d4f681e0ab6df0a2aef4877bee9ffc7f1ae3653b9df127c4b20582bc4651a2a2db8a076bc04c3370f89cd807fc91e2650438e61e7ecae575118bc5a820c98e7cbe4125874df9d3c67bb864d6469631fb12c2718fba21b6eea6819dec543e6"}}, @replay_thresh={0x8, 0xb, 0x8}, @user_kmaddress={0x2c, 0x13, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in=@broadcast}}, @tfcpad={0x8, 0x16, 0x4}, @replay_val={0x10, 0xa, {0x70bd27, 0x70bd2a, 0x9}}, @lifetime_val={0x24, 0x9, {0x1, 0x6, 0x1, 0x4}}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x40840}, 0x884) setsockopt$sock_timeval(r5, 0x1, 0x42, 0x0, 0x0) listen(r5, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000003c0), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x0, @loopback}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000240)=[@in={0x2, 0x0, @loopback}, @in6={0xa, 0x4e21, 0x8001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8}], 0x2c) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_enter(0xffffffffffffffff, 0x3516, 0x0, 0x4, 0x0, 0x0) 1.52944999s ago: executing program 6 (id=13080): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000340)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0x66, &(0x7f00000007c0)={@broadcast, @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x300, 0x0, 0x0, 0x6c, 0x0, @private}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x2, {0x0, 0x1}}}}}}}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x220040c8, &(0x7f0000000140)={0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00'}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8805}, 0x0) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x4c, &(0x7f000002eff0)={0x133, &(0x7f0000000000)=[{}]}, 0x10) recvmmsg(r6, &(0x7f0000007340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r9 = dup(r8) write$P9_RLERRORu(r9, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r9, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x101, 0x0, 0x0, 0x41100, 0x59, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) write$binfmt_elf64(r9, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r9]) r10 = open(&(0x7f0000000300)='./file0\x00', 0x145142, 0x102) write$bt_hci(r10, &(0x7f0000000380)=ANY=[], 0x20000) 1.52853789s ago: executing program 6 (id=13083): r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9}]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)={0x0, 0x1cf, 0x9a}, 0x8) 1.52821206s ago: executing program 9 (id=13084): r0 = io_uring_setup(0x1694, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x6}, 0x18) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 1.52634302s ago: executing program 9 (id=13087): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000020000000900010073797a30000000002c000000030a01010000000000000000020000000900010073797a30000000000900030073797a32000000003a000000030a03000000000000000000020000000900010073797a300000000009000300"], 0xa0}}, 0x8040) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0185879, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x972, &(0x7f0000006680)) syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x818018, &(0x7f0000000300)={[{@minixdf}, {@grpjquota}]}, 0x1, 0x72d, &(0x7f00000014c0)="$eJzs3U1rXNUbAPDn3mb+k38bTQQVX0AqihVLJ01sKV1ZF6KbYqDgNg3JJMRMemNmpjahi3TlVkRRcKPfwY0rxbUfwK+gIFrioq5G7rykbTrTjnWSgczvB3fmOffe4TlnJpwHcoY5AYysk/lDGvF8RMwlEZPt80lEFJrRWMSl1n27t28u5kcSjcaVP5LmPXk77nlN7kRE7ETEcxHxUyHidPpg3urW9tpCpVLebLena+sb09Wt7TOr6wsr5ZXytYvnzs2eu3D+4sXBjfWN9z94tnT+nYnv55bnT838+l0Sl2Kife3ecQxS6z0p5G/hfd49iGRDlAy7AzyWsYg41n5+JibjWDMCAI6yRjGiAQCMmET9B4AR0/k/QGdt76DWwXr5/e2IGO+Wf6y9ZjbeXIc8vpvctzKRRMTUYXaUI2nnVkRcnTr54N9f8sCa7b91dhAd5ED9mM8/l7rNP+ne/BNd5p/xzncn/qPe89/d/Md6zH9zfeZ478V61jP/rYgXxrrlT/byJz3yX+0z/w93lv7uda3xbcRrXetPcl+u3t8PmV5erZTPth675zhZv/nhw8Z/vEf+nUeMf6PP8U989vLPOw/J//orD//8u+XPa+Knfeb/pPDWF72u5fmXeoz/UZ//N33mv/DSR9t93goAAAAAAAAAAAAAAAAAAAAAAAAAAABHQhoRE5Gkpb04TUul1h7eT8fxtJJVa6eXs/q1pWjulT0VhbTzU8uTrXaSt2fav8ffac8249299psR8VREfF78f7NdWswqS8MePAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0ndi3//9fxdb+/wDAETc+7A4AAIdO/QeA0aP+A8DoUf8BYPSo/wAwetR/ABg9j1H/iwfRDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABGxtzly/nR2L19czFvL13fqq9l188slatrpfX6Ymkx29worWTZSqVcWszW978+2deuZNnG7GzUb0zXytXadHVre349q1+rza+uL6yU58uFQxsZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPRvonkkaSki0macpqVSxBMRMRWFZHm1Uj4bEU9GxC/FQjFvzwy70wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwYNWt7bWFSqW8KRAIBHvBsGcmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOHx3N/0edk8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYJjS35KIyI9Tk69O7L/6v+ROsfkcER9/feXLGwu12uZMfv7PvfO1r9rnZ4fRfwDgUTp1ulPHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKCb6tb22kKlUt5sBXcaLXfPDCAY9hgBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABicfwIAAP//wLPUPg==") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x15, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x40, r5, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}]}, 0x40}, 0x1, 0x0, 0x0, 0x44}, 0x44810) dup(0xffffffffffffffff) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0xfffffffffbfffff5]}, 0x8, 0x0) readv(r6, &(0x7f0000000200)=[{&(0x7f0000000080)=""/59, 0x3b}, {&(0x7f0000000300)=""/69, 0x45}, {0x0}, {0x0}], 0x4) tkill(0x0, 0x8) gettid() r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r7}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) 1.437750932s ago: executing program 5 (id=13094): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socket$packet(0x11, 0xa, 0x300) (async, rerun: 64) r1 = socket$packet(0x11, 0x3, 0x300) (rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'veth0_to_batadv\x00', 0x0}) (async) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(r1, &(0x7f00000000c0)="3f031c000302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) syz_emit_ethernet(0x32, &(0x7f00000001c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb000000000000080045"], 0x0) (async) syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000400)='./file0\x00', 0x8205, &(0x7f0000000380)={[{@jqfmt_vfsv1}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@abort}], [{@euid_eq}, {@subj_type={'subj_type', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}, 0x1, 0x625, &(0x7f0000000c80)="$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") (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000700)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="31832abd7000000000001900000018000180140002"], 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x4886) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x8000, 0x80, 0x101, 0x9, {{0x18, 0x4, 0x1, 0x5, 0x60, 0x67, 0x0, 0xd, 0x2f, 0x0, @multicast1, @broadcast, {[@rr={0x7, 0x7, 0xdb, [@remote]}, @lsrr={0x83, 0x13, 0x5f, [@remote, @dev={0xac, 0x14, 0x14, 0x31}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @rr={0x7, 0x13, 0x3d, [@multicast1, @dev={0xac, 0x14, 0x14, 0x3a}, @rand_addr=0x64010101, @rand_addr=0x64010100]}, @generic={0x86, 0xb, "31333553174909c8d8"}, @ssrr={0x89, 0xf, 0xa1, [@loopback, @local, @loopback]}, @ra={0x94, 0x4, 0x1}]}}}}}) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'syztnl0\x00', &(0x7f00000001c0)={'erspan0\x00', 0x0, 0x8000, 0x7800, 0x6, 0x0, {{0x1d, 0x4, 0x2, 0x8, 0x74, 0x64, 0x0, 0x9, 0x4, 0x0, @loopback, @multicast2, {[@ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x96, [@loopback]}, @ssrr={0x89, 0x7, 0x4a, [@multicast1]}, @cipso={0x86, 0x4d, 0xffffffffffffffff, [{0x945aec3d7e821c87, 0x12, "fc61518be67c8f2a44d314a1a327cdc5"}, {0x0, 0xa, "9b0d757824d26635"}, {0x6, 0x8, "700236503b7c"}, {0x1, 0xd, "5e8492c1178afe61b2739e"}, {0x0, 0xb, "e4e50fd4e5e07f6ef9"}, {0x7, 0xb, "bc786dd0fc566912fc"}]}]}}}}}) (async) r7 = socket(0x10, 0x2, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r11}, 0x10) renameat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0, 0x8) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0xf, "0000000000000000000f00000e00"}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) (async) r14 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r14, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x8, 0x5, 0x100, @vifc_lcl_ifindex=r13, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x2010, r4, 0xf47d1000) 1.251943405s ago: executing program 5 (id=13096): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000900)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x9, 0x80002}, 0x0, 0x10000, 0x8, 0x7, 0x0, 0xfffffffb, 0x402, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x2008042, &(0x7f00000000c0), 0x1, 0x571, &(0x7f0000000780)="$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") setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_access\x00', &(0x7f0000001440)=ANY=[@ANYBLOB="0200000001000000000000000400050000000000100000000000000020"], 0x24, 0x3) 1.212363357s ago: executing program 5 (id=13099): r0 = io_uring_setup(0x1694, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x6}, 0x18) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 1.155930737s ago: executing program 2 (id=13100): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x2, 0x7ffc0002}]}) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) munlockall() 1.138830998s ago: executing program 5 (id=13101): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) r2 = socket$pptp(0x18, 0x1, 0x2) close_range(r2, 0xffffffffffffffff, 0x0) 980.985271ms ago: executing program 2 (id=13102): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) preadv(r1, 0x0, 0x0, 0xc1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000000101010300000000000000000a0000030c0019800800010008000000100001800c0002"], 0x30}, 0x1, 0x0, 0x0, 0x8008001}, 0x24008854) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x4c, 0x24, 0xd0f, 0x0, 0x4, {0x60, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x1c, 0x2, [@TCA_CAKE_ATM={0x8, 0x4, 0x2}, @TCA_CAKE_SPLIT_GSO={0x8}, @TCA_CAKE_FWMARK={0x8, 0x12, 0x8}]}}]}, 0x4c}}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendto$packet(r5, &(0x7f0000000180)="0b0312002e0064000200475400f6a13bb1000000086086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x8100, r6}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a58000000060a01040000f6ffffff00000a0000040900010073797a31000000002c000480280001800d00010073796e70726f78790000000014000280080003400000000505000200010000000900020073797a32"], 0x80}, 0x1, 0x0, 0x0, 0x4000850}, 0x24044010) openat2(r8, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)={0x101603, 0x3, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r8, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095", @ANYRES32=r8, @ANYRES16, @ANYRESDEC=r7, @ANYRESDEC=r0, @ANYRES16=r9, @ANYRESDEC=r1, @ANYRES16=r2, @ANYRESHEX=r10, @ANYRESHEX=r1, @ANYRES16=r1], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) vmsplice(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000280)="c7d59e6318", 0x5}], 0x1, 0x7) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000280), 0x0}, 0x20) 920.226332ms ago: executing program 5 (id=13104): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000020}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff60) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000640)=@isdn, 0x80, &(0x7f0000000040)=[{&(0x7f0000000cc0)=""/210, 0xd2}, {&(0x7f0000000a00)=""/203, 0xcb}, {&(0x7f00000006c0)=""/68, 0x44}, {&(0x7f0000000c40)=""/90, 0x5a}], 0x4, &(0x7f0000000380)=""/28, 0x1c}, 0x40000000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x511e36599023629, 0x100040, 0x1b35, 0x4, 0x2, 0x2, 0x0, 0x0, 0x5, 0x1}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f00000004c0)={{0x80}, 'port0\x00', 0x8, 0x100c75, 0x7fff, 0x4, 0x1ff, 0x0, 0x0, 0x0, 0x6}) setitimer(0x1000000, 0x0, 0x0) 859.352973ms ago: executing program 2 (id=13106): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty, 0xffffffff}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fdinfo/4\x00') preadv(r0, &(0x7f0000001600)=[{&(0x7f0000000040)=""/35, 0x2b}], 0x1, 0x0, 0x0) 859.011153ms ago: executing program 6 (id=13107): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000004"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000060a0b040000000000000000020000002c0004802800018007000100637400001c0002800800014000000002080002400000000b05000300000000000900010073797a30000000000900020073797a320000000014000000110001"], 0x80}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="016f07000100fe000000140000004600003f00000000008490783f1414aa0000000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="ba0000009078001809c400050200000000000000000002d58838068b91000000"], 0xfd6c) getsockopt(r1, 0x1, 0x8, &(0x7f0000001040)=""/4096, &(0x7f0000002040)=0x1000) r5 = getpid() syz_pidfd_open(r5, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x24, 0x1, 0x0, 0xfc, 0x0, 0x3, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffefffe, 0x0, @perf_bp={&(0x7f0000000100), 0x9}, 0x0, 0x10000, 0x8, 0x7, 0x0, 0xffffffeb, 0x402, 0x0, 0x0, 0x0, 0x2}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x2008042, &(0x7f0000002080)={[{@sysvgroups}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@minixdf}, {@nogrpid}, {@noblock_validity}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'fscontextT\xcc\xd0\xbd^\x94\x0e\x15\xb8D\rN/\xa40i\xf4\xa3\xe2\x9fT<\xfd\xbb\x89`\x90j\x91\xb7\x97b\xb2\xcf?U\x1f\x10\xda[WjL\x8e\x86I\x8e^\x9dl8sl\xd9\xbf\x17\x84[\xa6\xe8\x7fbF*\x8c&F\x14\x94\x908W\x04pf\xb2.\xd3\xd0\xc1~\xcf\x18\x1f\x90\x99\xc8g\xc2&[\xb5\x00'/114}}, {@audit}, {@flag='rw'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}, 0x1, 0x571, &(0x7f0000000780)="$eJzs3c+PG1cdAPDvzP5yk7SbQA9QAQlQCCiKnXXaqOql5QJCVSVExQFxSJddZ7XEjkPsLd0lUrd/A0ggcYI/gQMSB6SeOHDjiMQBEOWAVCACJUgcBs3Yu+ts7MSNvXaz/nykybyZN+Pve/bOvOdnxy+AmXUuInYjYjEi3oyI5e7+pLvEq50lP+7undtr9+7cXksiy974Z1Lk5/ui55zcye5jliLim1+L+G7yYNzW9s711Xq9dqu7XWk3blZa2zsXNxurG7WN2o1q9crKlUsvXX6xOra6nm388oOvbr72rd/8+tPv/373yz/Mi3Wqm9dbj3HqVH1hP05uPiJeO4pgUzDXXS9OuRw8njQiPhYRnyuu/+WYK/46AYDjLMuWI1vu3QYAjru0GANL0nJEpGm3E1DujOE9GyfSerPVvnCtuXVjvTNWdjoW0mub9dqlM0t//H5x8EKSb68UeUV+sV09tH05Is5ExI+Xniq2y2vN+vp0ujwAMPNO9rb/EfGfpTQtl4c6tc+negDAE6M07QIAABOn/QeA2aP9B4DZM0T73/2wf/fIywIATIb3/wAwe7T/ADB7tP8AMFO+8frr+ZLd6/7+9fpb21vXm29dXK+1rpcbW2vlteatm+WNZnOj+M2exqMer95s3lx5IbberrRrrXaltb1ztdHcutG+Wvyu99XawkRqBQA8zJmz7/0hiYjdl58qluiZy0FbDcdbOsajgCfL3Cgn6yDAE81sXzC7hmrCi07C7468LMB09P0x71Lf5P1++iGC+J4RfKSc/+Tw4//meIbjxcg+zK7HG/9/ZezlACbvscf//zzecgCTl2XJ4Tn/F/ezAIBjaYSv8GXvjKsTAkzVoybzHsvn/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHDMnIqI70WSlou5wNP837Rcjng6Ik7HQnJts167FBHPxNmIWFjKt1emXWgAYETp35Pu/F/nl58/dTh3MfnvUrGOiB/87I2fvL3abt9ayff/a3//0t70YdWD80aYVxAAGN5fhzmoaL+r3XXPG/m7d26v7S1HWMYHfPCV/clH1+7duV0snZz5yLIsiygVfYkT/05ivntOKSKei4i5McTffTciPtGv/kkxNnK6O/Npb/zoxn56ovHT++KnRV5nnT99Hx9DWWDWvJfff149fP3NFVfWueKI/td/qbhDja64/5Ui9u59B/e/veu9VJTmcPz8mj83bIwXfvv1B3Zmy528dyOem+8XP9mPnwyI//yQ8f/0qc/86JUBednPI85H//i9sSrtxs1Ka3vn4mZjdaO2UbtRrV5ZuXLppcsvVivFGHVlb6T6Qf94+cIzg8qW1//EgPidV/7kofov7p/7hSHr/4v/vfmdzx5sLh2O/6XP93/9ny3W/Z//vE384pDxV0/8auD03Xn89QH1f9Trf2HI+O//bWd9yEMBgAlobe9cX63Xa7dGSuTvQj/8WVmWvZOX4SHH5NnDPeBed3G06vwlisTB05JEEqM/P/cn8s7YMAcvjFyd+xJ7wyXjrk6fxPx+X3G8j/zth/+1DEosjhI0HXstHicRp7uJu5MKOpXbETBBBxf9tEsCAAAAAAAAAAAAAAAMMon/wzTtOgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHB8/T8AAP//Z1e+LQ==") r6 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r6, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @objref={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0xa}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0xffffffffffffff84, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x74}}, 0x20004010) setsockopt$inet_mtu(r6, 0x0, 0xa, &(0x7f0000000280)=0x4, 0x4) sendmmsg$inet(r6, &(0x7f0000003500)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=ANY=[], 0x98}}], 0x1, 0x40012) syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r9 = getegid() mount$9p_fd(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000280), 0x800020, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r9}}]}}) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) 848.213893ms ago: executing program 2 (id=13108): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = socket(0x2, 0x80805, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_io_uring_setup(0x110, &(0x7f0000000140)={0x0, 0xd83d, 0x38402, 0x1, 0x384, 0x0, r1}, &(0x7f0000000480)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0xc, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x842a}}) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_eee={0x45, 0x7, 0x800081, 0x1, 0xfffffffe, 0x8, 0x8, 0x0, [0x3, 0x9]}}) io_uring_enter(r2, 0xdb4, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) 847.877523ms ago: executing program 8 (id=13109): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) listen(r0, 0x3) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a8435", 0x14, 0x6, 0x0, @empty, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x4, 0x5, 0xc2}}}}}}}, 0x0) (fail_nth: 1) 810.748294ms ago: executing program 2 (id=13110): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={r2, 0x72, "f56f5a51a6f1fff7d7854cddff7a4b40fbeb8ae143b26482f223e7d70acded30b3f882237ec4b9932415bd38217ad736ae0db85d4e6c37cf830f7d2157c80a17079232668c34d17b5f5ec4b3a229615495a3ce9d7331e1d8f7cb252cc2e2e01e145b97e3b5e4cb306454301c065e9b77de65"}, &(0x7f0000000340)=0x7a) 810.500514ms ago: executing program 8 (id=13111): r0 = io_uring_setup(0x1694, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d90000000000"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x6}, 0x18) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 809.995864ms ago: executing program 9 (id=13112): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x2, 0x7ffc0002}]}) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) munlockall() 778.839515ms ago: executing program 6 (id=13113): r0 = epoll_create(0x3ff) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0000000}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000280)={0x2000000, 0x100002000000}) 778.459485ms ago: executing program 6 (id=13114): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r1 = socket$inet(0xa, 0x801, 0x84) listen(r1, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0x207, @mcast2, 0x3}]}, &(0x7f00000001c0)=0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000540), r3) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="bbfb2bbd7000fddbdf21670000000800c400020000000800c3"], 0x24}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x8, 0x1) r6 = socket$inet_smc(0x2b, 0x1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r8, 0x0, 0x7}, 0x18) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x20080, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r9, 0x3312, 0x7) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r6, &(0x7f0000000280)={0x2, 0x0, @loopback}, 0x10) close(r6) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) fsync(0xffffffffffffffff) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000340)='kfree\x00', r11, 0x0, 0x6}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) 775.100125ms ago: executing program 8 (id=13115): prctl$PR_SET_NAME(0xf, &(0x7f0000000040)=']-[}\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000900)={0x0, 0x2f, &(0x7f0000000400)=[{&(0x7f0000000800)=""/208, 0xd0}], 0x1, 0x0, 0xfffffffffffffe8f, 0x500}, 0x0) 754.266016ms ago: executing program 8 (id=13116): r0 = socket(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000b00)=ANY=[@ANYBLOB="1400000010000100000000000000ffff0a00000a14000000110b010000000000000000000200000a"], 0x28}}, 0x4000000) 734.602786ms ago: executing program 9 (id=13117): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) preadv(r1, 0x0, 0x0, 0xc1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000000101010300000000000000000a0000030c0019800800010008000000100001800c0002"], 0x30}, 0x1, 0x0, 0x0, 0x8008001}, 0x24008854) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x4c, 0x24, 0xd0f, 0x0, 0x4, {0x60, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x1c, 0x2, [@TCA_CAKE_ATM={0x8, 0x4, 0x2}, @TCA_CAKE_SPLIT_GSO={0x8}, @TCA_CAKE_FWMARK={0x8, 0x12, 0x8}]}}]}, 0x4c}}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendto$packet(r5, &(0x7f0000000180)="0b0312002e0064000200475400f6a13bb1000000086086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x8100, r6}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a58000000060a01040000f6ffffff00000a0000040900010073797a31000000002c000480280001800d00010073796e70726f78790000000014000280080003400000000505000200010000000900020073797a32"], 0x80}, 0x1, 0x0, 0x0, 0x4000850}, 0x24044010) openat2(r8, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)={0x101603, 0x3, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r8, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095", @ANYRES32=r8, @ANYRES16, @ANYRESDEC=r7, @ANYRESDEC=r0, @ANYRES16=r9, @ANYRESDEC=r1, @ANYRES16=r2, @ANYRESHEX=r10, @ANYRESHEX=r1, @ANYRES16=r1], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) vmsplice(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000280)="c7d59e6318", 0x5}], 0x1, 0x7) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000280), 0x0}, 0x20) 723.126536ms ago: executing program 8 (id=13118): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty, 0xffffffff}, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fdinfo/4\x00') preadv(r0, &(0x7f0000001600)=[{&(0x7f0000000040)=""/35, 0x2b}], 0x1, 0x0, 0x0) 692.074346ms ago: executing program 8 (id=13119): r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x30) bpf$MAP_CREATE(0x0, 0x0, 0x48) timer_create(0xfffffffffffffffd, 0x0, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x4, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000007c0)={0x400000000000000, 0x0, &(0x7f0000000700)={&(0x7f0000001900)=ANY=[@ANYBLOB="020f000015000000000000000000000005000500000000000a00000000000000000000000000000000432e0000000000000000000000000008001200000002000000f1edc4ea00000600000000000000000000000000000000000000000000000000000000000000fc01000000000000000000000000810005000600000000000a00000000000000ff0200000000000000000000000000010000000000000000010018"], 0xa8}}, 0x40080) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000000)={{}, {r3, r4+10000000}}, 0x0) timer_create(0x4, 0x0, &(0x7f0000000040)=0x0) timer_settime(r5, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, 0x0) syz_read_part_table(0x407c, &(0x7f0000008140)="$eJzs079KemEYB/BHh98ParHoAt4tAqnjnySnqGhoMAenxgoLQQzSwqWlu+mSuoCuw8AM5FSDFgTx+UzPOd/3efku7+rL00FEFHbuBr1x5BQjYjKd9osRhYioz5JC/ujwutc/v+j237aK+ZiFlb74//A4G/4tfufmWsRpioiV0fPG0Xfa8Uf83zqb/5xMfXzfyzk5bKX2cStljUa1U6mmd7VUyz7fyLJsLvmhGktZL3Wuxum+ezvs3QzS7natnNqXo1TZK6dKs1n/xWYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPDKDhwIAAAAAAD5vzZCVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVFXbgQAAAAAAAyP+1EaqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqwA8cCAAAAAML8rZPo3AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAG4FAAD//xQHINw=") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x4000002}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYRES64, @ANYRESOCT=r3, @ANYBLOB="6e77f9b6b8276c49d817228a240ed20603b709a0c6f07830fa8eb4e8938fc3655e7f5074921f7fd162", @ANYRES16=0x0], 0x0, 0x28, 0x0, 0x5, 0x5}, 0x28) msgget$private(0x0, 0x790) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r6, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x2) chmod(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14a) 691.776236ms ago: executing program 6 (id=13120): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5e8, &(0x7f0000001200)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc5fffffd) r6 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r6, &(0x7f0000004200)='t', 0x1) sendfile(r6, r2, 0x0, 0x3ffff) sendfile(r6, r2, 0x0, 0x7ffff000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000200), &(0x7f0000000240)=r1}, 0x20) 459.759471ms ago: executing program 9 (id=13121): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0b000000050000000400000032a9000009"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) getrusage(0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000100)=0x4, 0x4) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) writev(r3, &(0x7f0000000780)=[{&(0x7f0000000040)="2eb282a43a3dcb197a37bfd3d433095ae36cc62a4796c9ad0e6b73ffa69227d6aecf7cf9b4661d7fe51f4ab51f7909bb291182dbf446970f", 0x38}, {&(0x7f00000001c0)="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", 0xff}, {&(0x7f0000000300)="a4d6bbc0ddd6a4719a75819c582408f8bc46d7b6b004484ebae22fac08dc0c38d767cc4b1f965555ac9bed368e43f9460bd9e98624bba045bcae2734f3b0fee435f7894b75a701e810250f74a7b1ee9ddef2b20f8913b202cc1850b96c52f57e92ae4ac8b34adebf5c48120def378e38a31206680f621fabee2d2d672168f69695ded5977bef7c039a22bf4c5f6cb5546b3b234c1aca02a27b9ea1d9b461552da1a150d4d104", 0xa6}, {&(0x7f0000000440)="e02d04ec24a08e96c575f4dd27073ed763ad09c466cf4c58d613f4f877fc83c9b5e32868487b36ffbecbb5dff6061be71620f77400bb9ec53c1dc71df58f76aa1d7e627802bf8fe1d6f7d06daf2a5305ad222db07da5435b297608c6695969cd4d2a46c420efbb7cbcb1dbe46a60ae38f20d1e3caf3019d5f4758939543e851ad45d676bdbb13f41314b38114adeeb1f5aaa59aa8de98b6de188b8031d6f06623b93467fa9d077edf0219ace519b478020982873435fae4d57b2d7805d4c09d9d5f77f5d8d0526e2dcd14b13563d", 0xce}, {&(0x7f00000000c0)="61e44878a9da9ba8f937ac30b9c73bb23196fa0c0176fcc74c6637d24d0ada8babbfdb5bc431d8fd916581c98f51d4b9e5e671785b", 0x35}, {&(0x7f0000000580)="da457f592ba0ceb5e39612c18ce0a4b71c06b7822e819b8450e60627d3cc1a69886aae8e585f5d90b2fe70c6c2bc36b3d72a107805e55cc053af75c8184e0ca3b36ce31bb25096eae1a3ae1f021d808dd323223b2058a304556f7178620373956c79f85bf70e15ea5e341a83c7a0c991f066b75fa203f431e3584f3ab3a160810b42e1d6c411f8d15fd4cfe8199c0f72cf551a46f9c671cd47d0159a345367919868909d89e523c8dc06407f4f744ea8b1fe7172c236bd02bcf04c7b3b1bf4240e62dbc9ab07ec0981ff5b69c5dc8daf28f1e268abe9dba96bef2741bfb4b3852f1df34c757576", 0xe7}, {&(0x7f0000000740)="46f8f1366d8513c20d38bb5e2fe9ff5270c9f8a2248a0d1b7933cb5b692573523967f6edd6", 0x25}], 0x7) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0x1c) r5 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$fou(&(0x7f000000dbc0), 0xffffffffffffffff) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r9, 0x84, 0x20, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000b00)=0x8, 0x4) sendmsg$FOU_CMD_ADD(r7, &(0x7f000000dc80)={0x0, 0x0, &(0x7f000000dc40)={&(0x7f000000dc00)={0x1c, r8, 0x121, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000940)={'gre0\x00', &(0x7f0000000880)={'syztnl1\x00', 0x0, 0x10, 0x1, 0x0, 0x5, {{0x1b, 0x4, 0x1, 0x7, 0x6c, 0x65, 0x0, 0xac, 0x4, 0x0, @empty, @empty, {[@noop, @ssrr={0x89, 0x17, 0xcf, [@multicast1, @loopback, @broadcast, @remote, @remote]}, @timestamp={0x44, 0x8, 0x68, 0x0, 0x8, [0x1]}, @end, @timestamp_addr={0x44, 0x2c, 0xfd, 0x1, 0x7, [{@local}, {@rand_addr=0x64010102, 0x11}, {@rand_addr=0x64010101, 0x1}, {@local, 0x4}, {@empty, 0x7ff}]}, @ra={0x94, 0x4, 0x1}, @generic={0x85, 0x5, "be0a49"}, @noop]}}}}}) sendmsg$FOU_CMD_ADD(r6, &(0x7f0000000a40)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x44, r8, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_IFINDEX={0x8, 0xb, r10}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x137b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x4e20}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x40800) socket$netlink(0x10, 0x3, 0x15) 106.141158ms ago: executing program 5 (id=13122): mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x20132, 0xffffffffffffffff, 0x391e1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x3) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=[0x7], &(0x7f0000000500), 0x0, 0x100000}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000005c0)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4}}, {@grpid}]}, 0x1, 0x4f2, &(0x7f0000000600)="$eJzs3U1vG1sZAODXzpeTm97kXu4CENBSCgVVdRK3jaouoKwQQpUQXYLUhsSNothxFDulCV2k/wGJSqxgyQ9g3RV7Ngh2bMoCiY8I1FRiYTTjSeomdpOSNI7i55FGM+eMM+85ieec+nXtE0DfuhQRWxExHBEPI2Iiq89lW9xtbcnjXm0/nd/Zfjqfi2bz/j9z6fmkLtp+JvFRds1CRPzoexE/zR2MW9/YXJ6rVMprWXmqUV2dqm9sXl+qzi2WF8srpdLszOz07Ru3SifW14vV4ezoyy//sPWtnyfNGs9q2vtxklpdH9qLE9nv/AcfIlgPDETEYPb8yVzoZXt4P/mI+DQiLqf3/0QMpH9NAOA8azYnojnRXgYAzrt8mgPL5YtZLmA88vlisZXD+yzG8pVavXHtUW19ZaGVK5uMofyjpUp5OssVTsZQLinPpMdvyqV95RsR8UlE/GJkNC0X52uVhV7+wwcA+thH++b//4y05n8A4Jwr9LoBAMCpM/8DQP8x/wNA/zH/A0D/Mf8DQP8x/wNA/zH/A0Bf+eG9e8nW3Mm+/3rh8cb6cu3x9YVyfblYXZ8vztfWVouLtdpi+p091cOuV6nVVmduxvqTyW+v1htT9Y3NB9Xa+krjQfq93g/KQ6fSKwDgXT65+OLPuYjYujOabtG2loO5Gs63fK8bAPTMQK8bAPSM1b6gfx3jNb70AJwTHZbofUshIkb3VzabzeaHaxLwgV39gvw/9Ku2/L//BQx9Rv4f+lfX/P+BF/vAedNs5o665n8c9YEAwNkmxw90ef//02z/2+zNgZ8s7H/E8/0VPlEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABA/9hd/7eYrdwxHvl8sRhxISImYyj3aKlSno6IjyPiTyNDI0l5psdtBgCOK/+3XLb+19WJK+P7zw7nXo+k+4j42a/u//LJXKOx9sek/l979Y3nWX2pF+0HAA6zO0+n+7YX8q+2n87vbqfZnr9/NyIKrfg728Oxsxd/MAbTfSGGImLs37ms3JJry10cx9aziPh8p/7nYjzNgbRWPt0fP4l94VTj59+Kn0/PtfbJ7+JzJ9AW6DcvkvHnbqf7Lx+X0n3n+7+QjlDHl41/yaXmd9Ix8E383fFvoMv4d+moMW7+/vuto9GD555FfHEwYjf2Ttv4sxs/1yX+lYOX6+gvX/rK5W7nmr+OuBqd47fHmmpUV6fqG5vXl6pzi+XF8kqpNDszO337xq3SVJqjnuo+G/zjzrWPu51L+j/WJX7hkP5//Wjdj9/89+GPv/qO+N/8Wqf4+fjsHfGTOfEbR4w/N/a7QrdzSfyFLv0/7O9/7YjxX/5188Cy4QBA79Q3NpfnKpXymgMHZ/8gecqegWZ0PPjOacUajvf6qWbz/4rVbcQ4iawbcBbs3fQR8brXjQEAAAAAAAAAAAAAADo6jU8s9bqPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnF//CwAA//8wuNJ1") r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x8, 0x3, 0x4a8, 0x0, 0xffffffff, 0xffffffff, 0x150, 0xffffffff, 0x3d8, 0xffffffff, 0xffffffff, 0x3d8, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0x128, 0x150, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x41, 0x1ff, 0x6, 0xb0e2, 0x10001, 0x84e, 0xfffffffb, 0x18, 0x8}, {0x1}}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x508) syz_emit_ethernet(0x76, &(0x7f0000000800)={@local, @local, @val={@val={0x88a8, 0x0, 0x0, 0x1}}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "ff00f5", 0x38, 0x6, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, {[@hopopts={0x3c, 0x2, '\x00', [@ra={0x5, 0x2, 0x9}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xf}}}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x10, 0xfffc, 0x0, 0x8, {[@sack={0x5, 0x2}]}}}}}}}}, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000a80)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x6, @loopback, 0x1ff}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e20, 0x7, @mcast2, 0x7}, 0x1c, 0x0}}], 0x2, 0xbaa0df33228ea4c5) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r5) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r6 = syz_open_procfs(r3, &(0x7f00000001c0)='smaps_rollup\x00') syz_usb_disconnect(0xffffffffffffffff) read$watch_queue(r6, &(0x7f0000000240)=""/180, 0xb4) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc0189374, 0x0) syz_io_uring_setup(0x10b, &(0x7f0000000580)={0x0, 0xd736, 0x8, 0x3, 0xbffffffa}, &(0x7f00000003c0)=0x0, &(0x7f0000000340)) socket$nl_route(0x10, 0x3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f00000002c0)=0x9, 0x0, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0xf, 0x3, 0x4, 0x6, 0x40060, r0, 0x5, '\x00', r9, r0, 0x3, 0x4, 0x3}, 0x50) r10 = openat$cgroup_ro(r8, &(0x7f0000000340)='cgroup.kill\x00', 0x300, 0x0) read$eventfd(r10, &(0x7f0000000340), 0x8) 0s ago: executing program 2 (id=13123): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000020000000900010073797a30000000002c000000030a01010000000000000000020000000900010073797a30000000000900030073797a32000000003a000000030a03000000000000000000020000000900010073797a300000000009000300"], 0xa0}}, 0x8040) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0185879, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x972, &(0x7f0000006680)) syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x818018, &(0x7f0000000300)={[{@minixdf}, {@grpjquota}]}, 0x1, 0x72d, &(0x7f00000014c0)="$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") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x15, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x40, r5, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}]}, 0x40}, 0x1, 0x0, 0x0, 0x44}, 0x44810) dup(0xffffffffffffffff) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0xfffffffffbfffff5]}, 0x8, 0x0) readv(r6, &(0x7f0000000200)=[{&(0x7f0000000080)=""/59, 0x3b}, {&(0x7f0000000300)=""/69, 0x45}, {0x0}, {0x0}], 0x4) tkill(0x0, 0x8) gettid() r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r7}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) kernel console output (not intermixed with test programs): usy [ 850.014487][ T4776] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 850.744869][ T4791] netlink: 'syz.5.12120': attribute type 4 has an invalid length. [ 850.752834][ T4791] netlink: 17 bytes leftover after parsing attributes in process `syz.5.12120'. [ 850.841689][ T4797] netlink: 20 bytes leftover after parsing attributes in process `syz.2.12126'. [ 850.875869][ T4797] vhci_hcd: invalid port number 96 [ 850.881053][ T4797] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 850.894268][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 850.894280][ T29] audit: type=1326 audit(2000003471.701:61275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4796 comm="syz.2.12126" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x0 [ 851.083438][ T4804] x_tables: ip_tables: recent.0 match: invalid size 216 (kernel) != (user) 4096 [ 851.097517][ T29] audit: type=1326 audit(2000003471.921:61276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.6.12128" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30da8eebe9 code=0x7ffc0000 [ 851.144908][ T29] audit: type=1326 audit(2000003471.942:61277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.6.12128" exe="/root/syz-executor" sig=0 arch=c000003e syscall=305 compat=0 ip=0x7f30da8eebe9 code=0x7ffc0000 [ 851.168806][ T29] audit: type=1326 audit(2000004239.950:61278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.6.12128" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30da8eebe9 code=0x7ffc0000 [ 851.192482][ T29] audit: type=1326 audit(2000004239.950:61279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.6.12128" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30da8eebe9 code=0x7ffc0000 [ 851.216110][ T29] audit: type=1326 audit(2000004239.950:61280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.6.12128" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f30da8eebe9 code=0x7ffc0000 [ 851.239686][ T29] audit: type=1326 audit(2000004239.950:61281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.6.12128" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30da8eebe9 code=0x7ffc0000 [ 851.263361][ T29] audit: type=1326 audit(2000004239.950:61282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.6.12128" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30da8eebe9 code=0x7ffc0000 [ 851.286973][ T29] audit: type=1326 audit(2000004239.950:61283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.6.12128" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f30da8eebe9 code=0x7ffc0000 [ 851.310598][ T29] audit: type=1326 audit(2000004239.950:61284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.6.12128" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30da8eebe9 code=0x7ffc0000 [ 851.682935][ T4811] netlink: 14 bytes leftover after parsing attributes in process `syz.6.12131'. [ 852.544702][ T4824] netlink: 'syz.5.12136': attribute type 6 has an invalid length. [ 852.635910][ T4825] siw: device registration error -23 [ 852.981190][ T4852] netlink: 14 bytes leftover after parsing attributes in process `syz.5.12148'. [ 853.021803][ T4843] lo speed is unknown, defaulting to 1000 [ 853.632973][ T4876] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 853.647326][ T4876] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 853.861041][ T4878] siw: device registration error -23 [ 853.913469][T10972] vhci_hcd: vhci_device speed not set [ 853.974373][ T4903] netlink: 16 bytes leftover after parsing attributes in process `syz.5.12165'. [ 854.107151][ T4918] netlink: 14 bytes leftover after parsing attributes in process `syz.5.12173'. [ 854.320483][ T4930] netlink: 16 bytes leftover after parsing attributes in process `syz.8.12178'. [ 854.489744][ T4942] netlink: 196 bytes leftover after parsing attributes in process `syz.9.12184'. [ 854.618317][ T4943] tls_set_device_offload: netdev not found [ 854.801785][ T4956] netlink: 'syz.9.12189': attribute type 10 has an invalid length. [ 854.809871][ T4956] netlink: 40 bytes leftover after parsing attributes in process `syz.9.12189'. [ 854.824711][ T4956] team0: Port device geneve1 added [ 854.874191][ T4962] netlink: 16 bytes leftover after parsing attributes in process `syz.9.12191'. [ 855.002895][ T4978] netlink: 'syz.5.12198': attribute type 6 has an invalid length. [ 855.223786][ T4995] netlink: 16 bytes leftover after parsing attributes in process `syz.9.12205'. [ 855.262358][ T4999] netlink: 14 bytes leftover after parsing attributes in process `syz.9.12207'. [ 855.345317][ T5009] netlink: 'syz.2.12212': attribute type 6 has an invalid length. [ 855.553546][ T5018] random: crng reseeded on system resumption [ 855.691670][ T29] kauditd_printk_skb: 212 callbacks suppressed [ 855.691687][ T29] audit: type=1400 audit(2000005012.738:61497): avc: denied { prog_load } for pid=5027 comm="syz.8.12220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 855.717356][ T29] audit: type=1400 audit(2000005012.738:61498): avc: denied { bpf } for pid=5027 comm="syz.8.12220" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 855.738507][ T29] audit: type=1400 audit(2000005012.738:61499): avc: denied { perfmon } for pid=5027 comm="syz.8.12220" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 855.826324][ T29] audit: type=1400 audit(2000005012.738:61500): avc: denied { prog_run } for pid=5027 comm="syz.8.12220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 855.845522][ T29] audit: type=1400 audit(2000005012.790:61501): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.155 dest=41420 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 855.870657][ T29] audit: type=1400 audit(2000005012.832:61502): avc: denied { map_create } for pid=5029 comm="syz.8.12221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 855.890229][ T29] audit: type=1400 audit(2000005012.832:61503): avc: denied { map_read map_write } for pid=5029 comm="syz.8.12221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 855.910292][ T29] audit: type=1400 audit(2000005012.864:61504): avc: denied { create } for pid=5031 comm="syz.8.12222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 855.970277][ T5038] netlink: 'syz.8.12225': attribute type 6 has an invalid length. [ 855.986251][ T29] audit: type=1326 audit(2000005012.906:61505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5034 comm="syz.5.12223" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1b45d0ebe9 code=0x7ffc0000 [ 856.009913][ T29] audit: type=1326 audit(2000005012.906:61506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5034 comm="syz.5.12223" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1b45d0ebe9 code=0x7ffc0000 [ 856.248128][ T5047] FAULT_INJECTION: forcing a failure. [ 856.248128][ T5047] name failslab, interval 1, probability 0, space 0, times 0 [ 856.260987][ T5047] CPU: 0 UID: 0 PID: 5047 Comm: syz.8.12228 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 856.261029][ T5047] Tainted: [W]=WARN [ 856.261035][ T5047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 856.261047][ T5047] Call Trace: [ 856.261054][ T5047] [ 856.261061][ T5047] __dump_stack+0x1d/0x30 [ 856.261098][ T5047] dump_stack_lvl+0xe8/0x140 [ 856.261124][ T5047] dump_stack+0x15/0x1b [ 856.261144][ T5047] should_fail_ex+0x265/0x280 [ 856.261165][ T5047] should_failslab+0x8c/0xb0 [ 856.261276][ T5047] kmem_cache_alloc_noprof+0x50/0x310 [ 856.261311][ T5047] ? skb_clone+0x151/0x1f0 [ 856.261354][ T5047] skb_clone+0x151/0x1f0 [ 856.261432][ T5047] __netlink_deliver_tap+0x2c9/0x500 [ 856.261460][ T5047] netlink_unicast+0x66b/0x690 [ 856.261480][ T5047] netlink_sendmsg+0x58b/0x6b0 [ 856.261502][ T5047] ? __pfx_netlink_sendmsg+0x10/0x10 [ 856.261550][ T5047] __sock_sendmsg+0x142/0x180 [ 856.261584][ T5047] ____sys_sendmsg+0x31e/0x4e0 [ 856.261655][ T5047] ___sys_sendmsg+0x17b/0x1d0 [ 856.261699][ T5047] __x64_sys_sendmsg+0xd4/0x160 [ 856.261861][ T5047] x64_sys_call+0x191e/0x2ff0 [ 856.261884][ T5047] do_syscall_64+0xd2/0x200 [ 856.261976][ T5047] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 856.262009][ T5047] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 856.262036][ T5047] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 856.262063][ T5047] RIP: 0033:0x7f86fb29ebe9 [ 856.262136][ T5047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 856.262169][ T5047] RSP: 002b:00007f86f9d07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 856.262191][ T5047] RAX: ffffffffffffffda RBX: 00007f86fb4d5fa0 RCX: 00007f86fb29ebe9 [ 856.262219][ T5047] RDX: 0000000000000004 RSI: 0000200000000300 RDI: 0000000000000007 [ 856.262230][ T5047] RBP: 00007f86f9d07090 R08: 0000000000000000 R09: 0000000000000000 [ 856.262240][ T5047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 856.262251][ T5047] R13: 00007f86fb4d6038 R14: 00007f86fb4d5fa0 R15: 00007ffdcf9e5e68 [ 856.262268][ T5047] [ 856.501869][ T5050] __nla_validate_parse: 1 callbacks suppressed [ 856.501936][ T5050] netlink: 16 bytes leftover after parsing attributes in process `syz.6.12229'. [ 856.503120][ T5051] netlink: 14 bytes leftover after parsing attributes in process `syz.2.12230'. [ 856.845916][ T5077] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 856.854705][ T5077] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 856.856227][ T5076] lo speed is unknown, defaulting to 1000 [ 856.904088][ T5076] FAULT_INJECTION: forcing a failure. [ 856.904088][ T5076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 856.917315][ T5076] CPU: 0 UID: 0 PID: 5076 Comm: syz.6.12240 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 856.917353][ T5076] Tainted: [W]=WARN [ 856.917416][ T5076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 856.917428][ T5076] Call Trace: [ 856.917434][ T5076] [ 856.917441][ T5076] __dump_stack+0x1d/0x30 [ 856.917463][ T5076] dump_stack_lvl+0xe8/0x140 [ 856.917486][ T5076] dump_stack+0x15/0x1b [ 856.917506][ T5076] should_fail_ex+0x265/0x280 [ 856.917566][ T5076] should_fail+0xb/0x20 [ 856.917583][ T5076] should_fail_usercopy+0x1a/0x20 [ 856.917659][ T5076] _copy_to_user+0x20/0xa0 [ 856.917688][ T5076] simple_read_from_buffer+0xb5/0x130 [ 856.917715][ T5076] proc_fail_nth_read+0x10e/0x150 [ 856.917742][ T5076] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 856.917820][ T5076] vfs_read+0x1a5/0x770 [ 856.917852][ T5076] ksys_read+0xda/0x1a0 [ 856.917879][ T5076] __x64_sys_read+0x40/0x50 [ 856.917965][ T5076] x64_sys_call+0x27bc/0x2ff0 [ 856.918034][ T5076] do_syscall_64+0xd2/0x200 [ 856.918064][ T5076] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 856.918095][ T5076] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 856.918152][ T5076] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 856.918178][ T5076] RIP: 0033:0x7f30da8ed5fc [ 856.918195][ T5076] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 856.918258][ T5076] RSP: 002b:00007f30d934f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 856.918279][ T5076] RAX: ffffffffffffffda RBX: 00007f30dab25fa0 RCX: 00007f30da8ed5fc [ 856.918293][ T5076] RDX: 000000000000000f RSI: 00007f30d934f0a0 RDI: 0000000000000007 [ 856.918310][ T5076] RBP: 00007f30d934f090 R08: 0000000000000000 R09: 0000000000000000 [ 856.918364][ T5076] R10: 0000000000000034 R11: 0000000000000246 R12: 0000000000000001 [ 856.918380][ T5076] R13: 00007f30dab26038 R14: 00007f30dab25fa0 R15: 00007ffcd33c4e78 [ 856.918404][ T5076] [ 857.350699][ T5085] netlink: 'syz.6.12241': attribute type 4 has an invalid length. [ 857.358710][ T5085] netlink: 17 bytes leftover after parsing attributes in process `syz.6.12241'. [ 858.212836][ T5117] netlink: 'syz.2.12256': attribute type 6 has an invalid length. [ 858.861978][ T5140] netlink: 'syz.2.12267': attribute type 6 has an invalid length. [ 859.174993][ T5128] lo speed is unknown, defaulting to 1000 [ 859.346865][ T5150] siw: device registration error -23 [ 859.433187][ T5162] netlink: 180 bytes leftover after parsing attributes in process `syz.8.12277'. [ 859.855287][ T5197] FAULT_INJECTION: forcing a failure. [ 859.855287][ T5197] name failslab, interval 1, probability 0, space 0, times 0 [ 859.861471][ T5195] lo speed is unknown, defaulting to 1000 [ 859.868311][ T5197] CPU: 0 UID: 0 PID: 5197 Comm: syz.8.12290 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 859.868355][ T5197] Tainted: [W]=WARN [ 859.868363][ T5197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 859.868378][ T5197] Call Trace: [ 859.868385][ T5197] [ 859.868393][ T5197] __dump_stack+0x1d/0x30 [ 859.868444][ T5197] dump_stack_lvl+0xe8/0x140 [ 859.868468][ T5197] dump_stack+0x15/0x1b [ 859.868489][ T5197] should_fail_ex+0x265/0x280 [ 859.868527][ T5197] should_failslab+0x8c/0xb0 [ 859.868556][ T5197] __kmalloc_node_noprof+0xa9/0x410 [ 859.868612][ T5197] ? __vmalloc_node_range_noprof+0x3f9/0xe00 [ 859.868672][ T5197] __vmalloc_node_range_noprof+0x3f9/0xe00 [ 859.868784][ T5197] ? __rcu_read_unlock+0x4f/0x70 [ 859.868840][ T5197] ? avc_has_perm_noaudit+0x1b1/0x200 [ 859.868872][ T5197] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 859.868934][ T5197] __vmalloc_noprof+0x83/0xc0 [ 859.868982][ T5197] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 859.869014][ T5197] bpf_prog_alloc_no_stats+0x47/0x3a0 [ 859.869045][ T5197] ? bpf_prog_alloc+0x2a/0x150 [ 859.869075][ T5197] bpf_prog_alloc+0x3c/0x150 [ 859.869163][ T5197] bpf_prog_create_from_user+0x7d/0x260 [ 859.869191][ T5197] ? __pfx_seccomp_check_filter+0x10/0x10 [ 859.869221][ T5197] do_seccomp+0x5ef/0xa40 [ 859.869245][ T5197] __x64_sys_seccomp+0x40/0x50 [ 859.869262][ T5197] x64_sys_call+0x2ad4/0x2ff0 [ 859.869344][ T5197] do_syscall_64+0xd2/0x200 [ 859.869378][ T5197] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 859.869405][ T5197] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 859.869456][ T5197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.869533][ T5197] RIP: 0033:0x7f86fb29ebe9 [ 859.869551][ T5197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 859.869575][ T5197] RSP: 002b:00007f86f9d07038 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 859.869646][ T5197] RAX: ffffffffffffffda RBX: 00007f86fb4d5fa0 RCX: 00007f86fb29ebe9 [ 859.869661][ T5197] RDX: 00002000000000c0 RSI: 000000000000000c RDI: 0000000000000001 [ 859.869676][ T5197] RBP: 00007f86f9d07090 R08: 0000000000000000 R09: 0000000000000000 [ 859.869690][ T5197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.869705][ T5197] R13: 00007f86fb4d6038 R14: 00007f86fb4d5fa0 R15: 00007ffdcf9e5e68 [ 859.869725][ T5197] [ 859.869735][ T5197] syz.8.12290: vmalloc error: size 4096, failed to allocated page array size 8, mode:0x400dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO), nodemask=(null) [ 860.098087][ T5209] netlink: 'syz.9.12280': attribute type 4 has an invalid length. [ 860.098366][ T5197] ,cpuset= [ 860.106373][ T5209] netlink: 17 bytes leftover after parsing attributes in process `syz.9.12280'. [ 860.109341][ T5197] /,mems_allowed=0 [ 860.109371][ T5197] CPU: 0 UID: 0 PID: 5197 Comm: syz.8.12290 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 860.109411][ T5197] Tainted: [W]=WARN [ 860.109420][ T5197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 860.109498][ T5197] Call Trace: [ 860.109506][ T5197] [ 860.109526][ T5197] __dump_stack+0x1d/0x30 [ 860.109551][ T5197] dump_stack_lvl+0xe8/0x140 [ 860.109574][ T5197] dump_stack+0x15/0x1b [ 860.109593][ T5197] warn_alloc+0x12b/0x1a0 [ 860.109657][ T5197] ? should_failslab+0x8c/0xb0 [ 860.109689][ T5197] __vmalloc_node_range_noprof+0x497/0xe00 [ 860.109736][ T5197] ? __rcu_read_unlock+0x4f/0x70 [ 860.109770][ T5197] ? avc_has_perm_noaudit+0x1b1/0x200 [ 860.109801][ T5197] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 860.109833][ T5197] __vmalloc_noprof+0x83/0xc0 [ 860.109869][ T5197] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 860.109923][ T5197] bpf_prog_alloc_no_stats+0x47/0x3a0 [ 860.109954][ T5197] ? bpf_prog_alloc+0x2a/0x150 [ 860.109984][ T5197] bpf_prog_alloc+0x3c/0x150 [ 860.110015][ T5197] bpf_prog_create_from_user+0x7d/0x260 [ 860.110079][ T5197] ? __pfx_seccomp_check_filter+0x10/0x10 [ 860.110113][ T5197] do_seccomp+0x5ef/0xa40 [ 860.110213][ T5197] __x64_sys_seccomp+0x40/0x50 [ 860.110241][ T5197] x64_sys_call+0x2ad4/0x2ff0 [ 860.110271][ T5197] do_syscall_64+0xd2/0x200 [ 860.110438][ T5197] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 860.110470][ T5197] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 860.110568][ T5197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 860.110597][ T5197] RIP: 0033:0x7f86fb29ebe9 [ 860.110617][ T5197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 860.110702][ T5197] RSP: 002b:00007f86f9d07038 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 860.110727][ T5197] RAX: ffffffffffffffda RBX: 00007f86fb4d5fa0 RCX: 00007f86fb29ebe9 [ 860.110745][ T5197] RDX: 00002000000000c0 RSI: 000000000000000c RDI: 0000000000000001 [ 860.110773][ T5197] RBP: 00007f86f9d07090 R08: 0000000000000000 R09: 0000000000000000 [ 860.110789][ T5197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 860.110806][ T5197] R13: 00007f86fb4d6038 R14: 00007f86fb4d5fa0 R15: 00007ffdcf9e5e68 [ 860.110912][ T5197] [ 860.110921][ T5197] Mem-Info: [ 860.374866][ T5197] active_anon:6673 inactive_anon:2 isolated_anon:0 [ 860.374866][ T5197] active_file:12390 inactive_file:13351 isolated_file:0 [ 860.374866][ T5197] unevictable:0 dirty:333 writeback:0 [ 860.374866][ T5197] slab_reclaimable:3770 slab_unreclaimable:19352 [ 860.374866][ T5197] mapped:32440 shmem:3579 pagetables:1585 [ 860.374866][ T5197] sec_pagetables:0 bounce:0 [ 860.374866][ T5197] kernel_misc_reclaimable:0 [ 860.374866][ T5197] free:1798797 free_pcp:66130 free_cma:0 [ 860.420232][ T5197] Node 0 active_anon:26692kB inactive_anon:8kB active_file:49560kB inactive_file:53404kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:129760kB dirty:1332kB writeback:0kB shmem:14316kB kernel_stack:5600kB pagetables:6340kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 860.447661][ T5197] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 860.476407][ T5197] lowmem_reserve[]: 0 2883 7862 7862 [ 860.481814][ T5197] Node 0 DMA32 free:2949192kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2952824kB mlocked:0kB bounce:0kB free_pcp:3632kB local_pcp:100kB free_cma:0kB [ 860.512129][ T5197] lowmem_reserve[]: 0 0 4978 4978 [ 860.517260][ T5197] Node 0 Normal free:4230636kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB free_highatomic:0KB active_anon:26692kB inactive_anon:8kB active_file:49560kB inactive_file:53404kB unevictable:0kB writepending:1332kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:260884kB local_pcp:223260kB free_cma:0kB [ 860.526442][ T29] kauditd_printk_skb: 240 callbacks suppressed [ 860.526466][ T29] audit: type=1400 audit(2000005017.819:61747): avc: denied { create } for pid=5194 comm="syz.2.12292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 860.549522][ T5197] lowmem_reserve[]: 0 0 0 0 [ 860.549579][ T5197] Node 0 [ 860.572807][ T29] audit: type=1400 audit(2000005017.851:61748): avc: denied { ioctl } for pid=5194 comm="syz.2.12292" path="socket:[158162]" dev="sockfs" ino=158162 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 860.575382][ T5197] DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 860.619906][ T5197] Node 0 DMA32: 2*4kB (M) 2*8kB (M) 3*16kB (M) 2*32kB (M) 3*64kB (M) 4*128kB (M) 3*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949192kB [ 860.630825][ T29] audit: type=1400 audit(2000005017.924:61749): avc: denied { mounton } for pid=5194 comm="syz.2.12292" path="/169/file0" dev="tmpfs" ino=905 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 860.636379][ T5197] Node 0 Normal: 3119*4kB (UME) 4116*8kB (UME) 2047*16kB (UME) 1541*32kB (UME) 1442*64kB (UME) 1487*128kB (UME) 1118*256kB (UME) 825*512kB (UME) 733*1024kB (UM) 73*2048kB (UME) 540*4096kB (UM) = 4230636kB [ 860.679732][ T5197] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 860.689046][ T5197] 29387 total pagecache pages [ 860.693731][ T5197] 30 pages in swap cache [ 860.697981][ T5197] Free swap = 123972kB [ 860.702131][ T5197] Total swap = 124996kB [ 860.706300][ T5197] 2097051 pages RAM [ 860.710109][ T5197] 0 pages HighMem/MovableOnly [ 860.714815][ T5197] 80445 pages reserved [ 860.798695][ T5218] lo speed is unknown, defaulting to 1000 [ 860.823184][ T5221] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 860.850202][ T5221] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 860.860548][ T5218] veth0_vlan: left promiscuous mode [ 860.898476][ T5229] netlink: 'syz.5.12301': attribute type 6 has an invalid length. [ 860.909773][ T5223] FAULT_INJECTION: forcing a failure. [ 860.909773][ T5223] name failslab, interval 1, probability 0, space 0, times 0 [ 860.922553][ T5223] CPU: 0 UID: 0 PID: 5223 Comm: syz.6.12297 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 860.922583][ T5223] Tainted: [W]=WARN [ 860.922589][ T5223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 860.922600][ T5223] Call Trace: [ 860.922611][ T5223] [ 860.922619][ T5223] __dump_stack+0x1d/0x30 [ 860.922643][ T5223] dump_stack_lvl+0xe8/0x140 [ 860.922665][ T5223] dump_stack+0x15/0x1b [ 860.922684][ T5223] should_fail_ex+0x265/0x280 [ 860.922708][ T5223] ? __se_sys_memfd_create+0x1cc/0x590 [ 860.922775][ T5223] should_failslab+0x8c/0xb0 [ 860.922797][ T5223] __kmalloc_cache_noprof+0x4c/0x320 [ 860.922865][ T5223] ? fput+0x8f/0xc0 [ 860.922899][ T5223] __se_sys_memfd_create+0x1cc/0x590 [ 860.922981][ T5223] __x64_sys_memfd_create+0x31/0x40 [ 860.923006][ T5223] x64_sys_call+0x2abe/0x2ff0 [ 860.923030][ T5223] do_syscall_64+0xd2/0x200 [ 860.923063][ T5223] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 860.923114][ T5223] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 860.923161][ T5223] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 860.923209][ T5223] RIP: 0033:0x7f30da8eebe9 [ 860.923227][ T5223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 860.923247][ T5223] RSP: 002b:00007f30d932de18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 860.923269][ T5223] RAX: ffffffffffffffda RBX: 0000000000000b77 RCX: 00007f30da8eebe9 [ 860.923348][ T5223] RDX: 00007f30d932def0 RSI: 0000000000000000 RDI: 00007f30da9727e8 [ 860.923359][ T5223] RBP: 0000200000000c40 R08: 00007f30d932dbb7 R09: 00007f30d932de40 [ 860.923444][ T5223] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000bc0 [ 860.923455][ T5223] R13: 00007f30d932def0 R14: 00007f30d932deb0 R15: 0000200000000c00 [ 860.923472][ T5223] [ 861.139749][ T5232] lo speed is unknown, defaulting to 1000 [ 861.173751][ T5234] netlink: 16 bytes leftover after parsing attributes in process `syz.6.12303'. [ 861.435109][ T29] audit: type=1326 audit(2000005018.764:61750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5248 comm="syz.2.12308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 861.474065][ T29] audit: type=1326 audit(2000005018.796:61751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5248 comm="syz.2.12308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=38 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 861.497671][ T29] audit: type=1326 audit(2000005018.796:61752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5248 comm="syz.2.12308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 861.521322][ T29] audit: type=1326 audit(2000005018.796:61753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5248 comm="syz.2.12308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 861.545057][ T29] audit: type=1326 audit(2000005018.796:61754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5248 comm="syz.2.12308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 861.568674][ T29] audit: type=1326 audit(2000005018.796:61755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5248 comm="syz.2.12308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 861.592390][ T29] audit: type=1400 audit(2000005018.796:61756): avc: denied { write } for pid=5248 comm="syz.2.12308" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 861.984899][ T5276] netlink: 16 bytes leftover after parsing attributes in process `syz.5.12316'. [ 862.213612][ T5278] netlink: 8 bytes leftover after parsing attributes in process `syz.2.12318'. [ 862.222729][ T5278] netlink: 312 bytes leftover after parsing attributes in process `syz.2.12318'. [ 862.231951][ T5278] netlink: 8 bytes leftover after parsing attributes in process `syz.2.12318'. [ 862.312627][ T5291] pim6reg1: entered promiscuous mode [ 862.318184][ T5291] pim6reg1: entered allmulticast mode [ 862.427090][ T5301] netlink: 16 bytes leftover after parsing attributes in process `syz.2.12329'. [ 862.443411][ T5293] siw: device registration error -23 [ 862.660365][ T5308] lo speed is unknown, defaulting to 1000 [ 863.341000][ T5334] netlink: 16 bytes leftover after parsing attributes in process `syz.2.12341'. [ 863.388535][ T5338] serio: Serial port ptm0 [ 863.530275][ T5332] siw: device registration error -23 [ 863.558896][ T5350] netlink: 14 bytes leftover after parsing attributes in process `syz.2.12348'. [ 863.760663][ T5364] netlink: 16 bytes leftover after parsing attributes in process `syz.5.12353'. [ 863.789590][ T5366] netlink: 'syz.6.12354': attribute type 6 has an invalid length. [ 863.906283][ T5370] netlink: 60 bytes leftover after parsing attributes in process `syz.6.12356'. [ 863.915372][ T5370] IPVS: Unknown mcast interface: ve [ 864.220830][ T5380] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 864.239808][ T5380] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 864.584713][ T5391] netlink: 16 bytes leftover after parsing attributes in process `syz.5.12365'. [ 864.680105][ T5393] netlink: 'syz.5.12366': attribute type 6 has an invalid length. [ 864.875474][ T5403] FAULT_INJECTION: forcing a failure. [ 864.875474][ T5403] name failslab, interval 1, probability 0, space 0, times 0 [ 864.888165][ T5403] CPU: 0 UID: 0 PID: 5403 Comm: syz.5.12372 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 864.888207][ T5403] Tainted: [W]=WARN [ 864.888216][ T5403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 864.888232][ T5403] Call Trace: [ 864.888240][ T5403] [ 864.888249][ T5403] __dump_stack+0x1d/0x30 [ 864.888321][ T5403] dump_stack_lvl+0xe8/0x140 [ 864.888346][ T5403] dump_stack+0x15/0x1b [ 864.888364][ T5403] should_fail_ex+0x265/0x280 [ 864.888391][ T5403] should_failslab+0x8c/0xb0 [ 864.888423][ T5403] kmem_cache_alloc_noprof+0x50/0x310 [ 864.888469][ T5403] ? alloc_empty_file+0x76/0x200 [ 864.888498][ T5403] ? mntput+0x4b/0x80 [ 864.888534][ T5403] alloc_empty_file+0x76/0x200 [ 864.888581][ T5403] path_openat+0x68/0x2170 [ 864.888607][ T5403] ? _parse_integer_limit+0x170/0x190 [ 864.888639][ T5403] ? kstrtoull+0x111/0x140 [ 864.888665][ T5403] ? kstrtouint+0x76/0xc0 [ 864.888693][ T5403] do_filp_open+0x109/0x230 [ 864.888721][ T5403] do_sys_openat2+0xa6/0x110 [ 864.888831][ T5403] __x64_sys_openat+0xf2/0x120 [ 864.888863][ T5403] x64_sys_call+0x2e9c/0x2ff0 [ 864.888883][ T5403] do_syscall_64+0xd2/0x200 [ 864.888918][ T5403] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 864.888940][ T5403] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 864.889038][ T5403] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 864.889065][ T5403] RIP: 0033:0x7f1b45d0ebe9 [ 864.889084][ T5403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 864.889139][ T5403] RSP: 002b:00007f1b4476f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 864.889164][ T5403] RAX: ffffffffffffffda RBX: 00007f1b45f45fa0 RCX: 00007f1b45d0ebe9 [ 864.889180][ T5403] RDX: 0000000000084d03 RSI: 0000200000000380 RDI: ffffffffffffff9c [ 864.889197][ T5403] RBP: 00007f1b4476f090 R08: 0000000000000000 R09: 0000000000000000 [ 864.889258][ T5403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 864.889274][ T5403] R13: 00007f1b45f46038 R14: 00007f1b45f45fa0 R15: 00007ffdd3e83758 [ 864.889298][ T5403] [ 865.257731][ T5417] netlink: 'syz.2.12377': attribute type 6 has an invalid length. [ 865.295401][ T29] kauditd_printk_skb: 3910 callbacks suppressed [ 865.295416][ T29] audit: type=1326 audit(2000005022.827:65667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5360 comm="syz.8.12352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f86fb23adb9 code=0x7ffc0000 [ 865.330066][ T5422] audit: audit_backlog=65 > audit_backlog_limit=64 [ 865.336638][ T5422] audit: audit_lost=24 audit_rate_limit=0 audit_backlog_limit=64 [ 865.338717][ T29] audit: type=1326 audit(2000005022.827:65668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5360 comm="syz.8.12352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f86fb295ba7 code=0x7ffc0000 [ 865.344466][ T5422] audit: backlog limit exceeded [ 865.345147][ T5422] random: crng reseeded on system resumption [ 865.367958][ T29] audit: type=1326 audit(2000005022.827:65669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5360 comm="syz.8.12352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f86fb23adb9 code=0x7ffc0000 [ 865.368026][ T29] audit: type=1326 audit(2000005022.827:65670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5360 comm="syz.8.12352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f86fb295ba7 code=0x7ffc0000 [ 865.368055][ T29] audit: type=1326 audit(2000005022.827:65671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5360 comm="syz.8.12352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f86fb23adb9 code=0x7ffc0000 [ 865.368083][ T29] audit: type=1326 audit(2000005022.827:65672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5360 comm="syz.8.12352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f86fb295ba7 code=0x7ffc0000 [ 865.473148][ T29] audit: type=1326 audit(2000005022.827:65673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5360 comm="syz.8.12352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f86fb23adb9 code=0x7ffc0000 [ 865.516129][ T5430] net_ratelimit: 1 callbacks suppressed [ 865.516144][ T5430] netlink: zone id is out of range [ 865.526922][ T5430] netlink: zone id is out of range [ 865.532136][ T5430] netlink: zone id is out of range [ 866.339843][ T5483] wireguard0: entered promiscuous mode [ 866.345477][ T5483] wireguard0: entered allmulticast mode [ 866.386572][ T5487] tipc: Started in network mode [ 866.391533][ T5487] tipc: Node identity ac14140f, cluster identity 4711 [ 866.398696][ T5487] tipc: New replicast peer: 255.255.255.83 [ 866.404612][ T5487] tipc: Enabled bearer , priority 10 [ 867.259765][ T5530] nfs: Unknown parameter '´^' [ 867.308317][ T5540] __nla_validate_parse: 1 callbacks suppressed [ 867.308333][ T5540] netlink: 300 bytes leftover after parsing attributes in process `syz.6.12428'. [ 867.364206][ T5543] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 867.374674][ T5543] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 867.476338][T10977] tipc: Node number set to 2886997007 [ 867.678659][ T5560] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 867.727920][ T5560] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 867.787819][ T5560] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 867.836431][ T5560] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 867.892106][ T3715] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 867.903448][ T3724] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 867.914366][ T3724] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 867.926084][ T3724] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 867.968546][ T5565] nfs: Unknown parameter '´^' [ 868.201847][ T5585] FAULT_INJECTION: forcing a failure. [ 868.201847][ T5585] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 868.215056][ T5585] CPU: 1 UID: 0 PID: 5585 Comm: syz.5.12441 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 868.215154][ T5585] Tainted: [W]=WARN [ 868.215160][ T5585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 868.215171][ T5585] Call Trace: [ 868.215177][ T5585] [ 868.215184][ T5585] __dump_stack+0x1d/0x30 [ 868.215215][ T5585] dump_stack_lvl+0xe8/0x140 [ 868.215232][ T5585] dump_stack+0x15/0x1b [ 868.215245][ T5585] should_fail_ex+0x265/0x280 [ 868.215265][ T5585] should_fail+0xb/0x20 [ 868.215280][ T5585] should_fail_usercopy+0x1a/0x20 [ 868.215299][ T5585] copy_folio_from_iter_atomic+0x278/0x11b0 [ 868.215330][ T5585] ? shmem_write_begin+0xa8/0x190 [ 868.215353][ T5585] ? shmem_write_begin+0xe1/0x190 [ 868.215371][ T5585] generic_perform_write+0x2c2/0x490 [ 868.215396][ T5585] shmem_file_write_iter+0xc5/0xf0 [ 868.215447][ T5585] do_iter_readv_writev+0x499/0x540 [ 868.215478][ T5585] vfs_writev+0x2df/0x8b0 [ 868.215563][ T5585] ? mutex_lock+0xd/0x30 [ 868.215584][ T5585] do_writev+0xe7/0x210 [ 868.215612][ T5585] __x64_sys_writev+0x45/0x50 [ 868.215635][ T5585] x64_sys_call+0x1e9a/0x2ff0 [ 868.215712][ T5585] do_syscall_64+0xd2/0x200 [ 868.215739][ T5585] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 868.215762][ T5585] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 868.215787][ T5585] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 868.215939][ T5585] RIP: 0033:0x7f1b45d0ebe9 [ 868.215954][ T5585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 868.215971][ T5585] RSP: 002b:00007f1b4474e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 868.215988][ T5585] RAX: ffffffffffffffda RBX: 00007f1b45f46090 RCX: 00007f1b45d0ebe9 [ 868.216000][ T5585] RDX: 0000000000000001 RSI: 0000200000000140 RDI: 0000000000000004 [ 868.216011][ T5585] RBP: 00007f1b4474e090 R08: 0000000000000000 R09: 0000000000000000 [ 868.216022][ T5585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 868.216033][ T5585] R13: 00007f1b45f46128 R14: 00007f1b45f46090 R15: 00007ffdd3e83758 [ 868.216144][ T5585] [ 868.598194][ T5592] tipc: Started in network mode [ 868.603383][ T5592] tipc: Node identity c234175730e9, cluster identity 4711 [ 868.610698][ T5592] tipc: Enabled bearer , priority 0 [ 868.711363][ T5600] netlink: 16 bytes leftover after parsing attributes in process `syz.2.12451'. [ 869.372288][ T5620] netlink: 48 bytes leftover after parsing attributes in process `syz.2.12458'. [ 869.381445][ T5620] netlink: 48 bytes leftover after parsing attributes in process `syz.2.12458'. [ 869.453232][ T5618] FAULT_INJECTION: forcing a failure. [ 869.453232][ T5618] name failslab, interval 1, probability 0, space 0, times 0 [ 869.465930][ T5618] CPU: 1 UID: 0 PID: 5618 Comm: syz.6.12457 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 869.465966][ T5618] Tainted: [W]=WARN [ 869.465971][ T5618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 869.465983][ T5618] Call Trace: [ 869.465991][ T5618] [ 869.466000][ T5618] __dump_stack+0x1d/0x30 [ 869.466030][ T5618] dump_stack_lvl+0xe8/0x140 [ 869.466051][ T5618] dump_stack+0x15/0x1b [ 869.466069][ T5618] should_fail_ex+0x265/0x280 [ 869.466095][ T5618] should_failslab+0x8c/0xb0 [ 869.466121][ T5618] kmem_cache_alloc_noprof+0x50/0x310 [ 869.466152][ T5618] ? getname_flags+0x80/0x3b0 [ 869.466182][ T5618] getname_flags+0x80/0x3b0 [ 869.466278][ T5618] do_sys_openat2+0x60/0x110 [ 869.466380][ T5618] __x64_sys_openat+0xf2/0x120 [ 869.466410][ T5618] x64_sys_call+0x2e9c/0x2ff0 [ 869.466430][ T5618] do_syscall_64+0xd2/0x200 [ 869.466532][ T5618] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 869.466579][ T5618] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 869.466609][ T5618] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 869.466690][ T5618] RIP: 0033:0x7f30da8eebe9 [ 869.466711][ T5618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 869.466770][ T5618] RSP: 002b:00007f30d934f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 869.466791][ T5618] RAX: ffffffffffffffda RBX: 00007f30dab25fa0 RCX: 00007f30da8eebe9 [ 869.466806][ T5618] RDX: 0000000000000042 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 869.466819][ T5618] RBP: 00007f30d934f090 R08: 0000000000000000 R09: 0000000000000000 [ 869.466902][ T5618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 869.466915][ T5618] R13: 00007f30dab26038 R14: 00007f30dab25fa0 R15: 00007ffcd33c4e78 [ 869.466931][ T5618] [ 869.647405][ T2957] tipc: Node number set to 4074575703 [ 869.704834][ T5629] netlink: 16 bytes leftover after parsing attributes in process `syz.9.12462'. [ 869.745328][ T5638] netlink: 'syz.9.12466': attribute type 6 has an invalid length. [ 869.758691][ T5634] netlink: 8 bytes leftover after parsing attributes in process `syz.5.12464'. [ 869.802157][ T5646] netlink: 20 bytes leftover after parsing attributes in process `syz.6.12467'. [ 869.819887][ T5648] FAULT_INJECTION: forcing a failure. [ 869.819887][ T5648] name failslab, interval 1, probability 0, space 0, times 0 [ 869.832588][ T5648] CPU: 1 UID: 0 PID: 5648 Comm: syz.2.12471 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 869.832628][ T5648] Tainted: [W]=WARN [ 869.832705][ T5648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 869.832718][ T5648] Call Trace: [ 869.832784][ T5648] [ 869.832791][ T5648] __dump_stack+0x1d/0x30 [ 869.832812][ T5648] dump_stack_lvl+0xe8/0x140 [ 869.832834][ T5648] dump_stack+0x15/0x1b [ 869.832857][ T5648] should_fail_ex+0x265/0x280 [ 869.832883][ T5648] should_failslab+0x8c/0xb0 [ 869.832948][ T5648] kmem_cache_alloc_noprof+0x50/0x310 [ 869.833005][ T5648] ? skb_clone+0x151/0x1f0 [ 869.833037][ T5648] skb_clone+0x151/0x1f0 [ 869.833060][ T5648] __netlink_deliver_tap+0x2c9/0x500 [ 869.833094][ T5648] netlink_unicast+0x66b/0x690 [ 869.833179][ T5648] netlink_sendmsg+0x58b/0x6b0 [ 869.833209][ T5648] ? __pfx_netlink_sendmsg+0x10/0x10 [ 869.833233][ T5648] __sock_sendmsg+0x142/0x180 [ 869.833314][ T5648] ____sys_sendmsg+0x31e/0x4e0 [ 869.833355][ T5648] ___sys_sendmsg+0x17b/0x1d0 [ 869.833390][ T5648] __x64_sys_sendmsg+0xd4/0x160 [ 869.833458][ T5648] x64_sys_call+0x191e/0x2ff0 [ 869.833485][ T5648] do_syscall_64+0xd2/0x200 [ 869.833515][ T5648] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 869.833544][ T5648] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 869.833571][ T5648] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 869.833674][ T5648] RIP: 0033:0x7f8514b0ebe9 [ 869.833690][ T5648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 869.833710][ T5648] RSP: 002b:00007f8513577038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 869.833729][ T5648] RAX: ffffffffffffffda RBX: 00007f8514d45fa0 RCX: 00007f8514b0ebe9 [ 869.833791][ T5648] RDX: 0000000000000880 RSI: 0000200000000640 RDI: 0000000000000003 [ 869.833803][ T5648] RBP: 00007f8513577090 R08: 0000000000000000 R09: 0000000000000000 [ 869.833815][ T5648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 869.833827][ T5648] R13: 00007f8514d46038 R14: 00007f8514d45fa0 R15: 00007fffa5411e88 [ 869.833845][ T5648] [ 870.049876][ T5646] vhci_hcd: invalid port number 96 [ 870.055098][ T5646] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 870.108463][ T29] kauditd_printk_skb: 764 callbacks suppressed [ 870.108481][ T29] audit: type=1400 audit(2000005027.867:66438): avc: denied { name_connect } for pid=5649 comm="syz.9.12472" dest=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 870.155794][ T29] audit: type=1400 audit(2000005027.930:66439): avc: denied { accept } for pid=5649 comm="syz.9.12472" laddr=fe80::13 lport=49866 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 870.189611][ T29] audit: type=1326 audit(2000005027.961:66440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.2.12476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 870.213445][ T29] audit: type=1326 audit(2000005027.961:66441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.2.12476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 870.237267][ T29] audit: type=1400 audit(2000005027.961:66442): avc: denied { create } for pid=5649 comm="syz.9.12472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 870.262309][ T29] audit: type=1326 audit(2000005027.993:66443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.2.12476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 870.285981][ T29] audit: type=1326 audit(2000005027.993:66444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.2.12476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 870.293806][ T5664] netlink: 16 bytes leftover after parsing attributes in process `syz.8.12477'. [ 870.309585][ T29] audit: type=1326 audit(2000005027.993:66445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.2.12476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 870.342360][ T29] audit: type=1326 audit(2000005027.993:66446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.2.12476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 870.366264][ T29] audit: type=1326 audit(2000005027.993:66447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.2.12476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 870.473358][ T5669] siw: device registration error -23 [ 870.575986][ T5678] lo speed is unknown, defaulting to 1000 [ 870.577724][ T5680] netlink: 14 bytes leftover after parsing attributes in process `syz.2.12484'. [ 872.321725][ T5737] netlink: 16 bytes leftover after parsing attributes in process `syz.5.12507'. [ 872.486815][ T5749] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 872.487131][T10985] IPVS: starting estimator thread 0... [ 872.581761][ T5751] IPVS: using max 2496 ests per chain, 124800 per kthread [ 872.861668][ T5778] netlink: 'syz.9.12523': attribute type 6 has an invalid length. [ 872.924221][ T5786] netlink: 20 bytes leftover after parsing attributes in process `syz.9.12527'. [ 872.957707][ T5791] netlink: 'syz.8.12529': attribute type 10 has an invalid length. [ 872.966327][ T5791] syz_tun: entered promiscuous mode [ 872.978636][ T5791] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 873.009934][ T5793] netlink: 32 bytes leftover after parsing attributes in process `syz.5.12530'. [ 873.073947][ T5807] netlink: 14 bytes leftover after parsing attributes in process `syz.5.12535'. [ 873.311794][ T5815] netlink: 14 bytes leftover after parsing attributes in process `syz.8.12539'. [ 874.287412][ T5846] netlink: 'syz.2.12551': attribute type 6 has an invalid length. [ 874.715524][ T5861] netlink: 8 bytes leftover after parsing attributes in process `syz.8.12557'. [ 874.724641][ T5861] netlink: 12 bytes leftover after parsing attributes in process `syz.8.12557'. [ 874.733686][ T5861] netlink: 'syz.8.12557': attribute type 18 has an invalid length. [ 874.744914][ T3715] netdevsim netdevsim8 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 874.744951][ T5861] netlink: 8 bytes leftover after parsing attributes in process `syz.8.12557'. [ 874.744972][ T5861] netlink: 12 bytes leftover after parsing attributes in process `syz.8.12557'. [ 874.754033][ T3715] netdevsim netdevsim8 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 874.762620][ T5861] netlink: 'syz.8.12557': attribute type 18 has an invalid length. [ 874.788523][ T3715] netdevsim netdevsim8 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 874.797346][ T3715] netdevsim netdevsim8 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 874.954827][ T5871] netlink: 'syz.8.12562': attribute type 6 has an invalid length. [ 875.009893][ T29] kauditd_printk_skb: 293 callbacks suppressed [ 875.009931][ T29] audit: type=1400 audit(2000005033.012:66741): avc: denied { append } for pid=5876 comm="syz.8.12565" name="001" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 875.056837][ T5879] netlink: 20 bytes leftover after parsing attributes in process `syz.8.12566'. [ 875.070230][ T29] audit: type=1400 audit(2000005033.085:66742): avc: denied { read } for pid=5878 comm="syz.8.12566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 875.126713][ T29] audit: type=1326 audit(2000005033.148:66743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5847 comm="syz.2.12552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 875.150446][ T29] audit: type=1326 audit(2000005033.148:66744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5847 comm="syz.2.12552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 875.389642][ T5898] netlink: 'syz.2.12571': attribute type 4 has an invalid length. [ 875.597277][ T29] audit: type=1400 audit(2000005033.631:66745): avc: denied { read write } for pid=5903 comm="syz.6.12577" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 875.621189][ T29] audit: type=1400 audit(2000005033.631:66746): avc: denied { open } for pid=5903 comm="syz.6.12577" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 875.651800][ T29] audit: type=1400 audit(2000005033.694:66747): avc: denied { ioctl } for pid=5903 comm="syz.6.12577" path="socket:[160624]" dev="sockfs" ino=160624 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 875.682325][ T29] audit: type=1400 audit(2000005033.726:66748): avc: denied { ioctl } for pid=5903 comm="syz.6.12577" path="socket:[160626]" dev="sockfs" ino=160626 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 875.707586][ T29] audit: type=1400 audit(2000005033.726:66749): avc: denied { ioctl } for pid=5903 comm="syz.6.12577" path="/dev/nvram" dev="devtmpfs" ino=98 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 875.732861][ T29] audit: type=1400 audit(2000005033.726:66750): avc: denied { ioctl } for pid=5903 comm="syz.6.12577" path="socket:[160627]" dev="sockfs" ino=160627 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 875.903100][ T5916] siw: device registration error -23 [ 876.272323][ T5934] sctp: [Deprecated]: syz.6.12590 (pid 5934) Use of int in max_burst socket option. [ 876.272323][ T5934] Use struct sctp_assoc_value instead [ 876.432705][ T5946] netlink: 'syz.6.12595': attribute type 6 has an invalid length. [ 876.656927][ T5965] netlink: 'syz.9.12600': attribute type 10 has an invalid length. [ 876.684442][ T5965] syz_tun: entered promiscuous mode [ 876.727927][ T5965] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 876.921346][ T5978] siw: device registration error -23 [ 877.008522][ T5988] tipc: Enabling of bearer rejected, already enabled [ 877.135295][ T5997] netlink: 'syz.6.12615': attribute type 6 has an invalid length. [ 877.158714][ T5999] __nla_validate_parse: 2 callbacks suppressed [ 877.158728][ T5999] netlink: 24 bytes leftover after parsing attributes in process `syz.5.12616'. [ 877.295375][ T6008] siw: device registration error -23 [ 877.321717][ T6014] netlink: 360 bytes leftover after parsing attributes in process `syz.5.12623'. [ 877.475120][ T9] hid_parser_main: 18 callbacks suppressed [ 877.475170][ T9] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 877.518099][ T6019] lo speed is unknown, defaulting to 1000 [ 877.547340][ T9] hid-generic 0000:0000:0000.0051: hidraw0: HID v0.00 Device [syz1] on syz0 [ 877.676744][ T6033] netlink: 'syz.9.12628': attribute type 6 has an invalid length. [ 877.720533][ T6037] netlink: 24 bytes leftover after parsing attributes in process `syz.9.12630'. [ 877.880417][ T6045] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 877.979295][ T6052] netlink: 'syz.9.12636': attribute type 13 has an invalid length. [ 878.029907][ T6052] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 878.056945][ T6055] netlink: 'syz.5.12635': attribute type 4 has an invalid length. [ 878.064900][ T6055] netlink: 17 bytes leftover after parsing attributes in process `syz.5.12635'. [ 878.162381][ T6064] netlink: 'syz.6.12640': attribute type 6 has an invalid length. [ 878.503830][ T6081] infiniband !yz!: set down [ 878.508484][ T6081] infiniband !yz!: added team_slave_0 [ 878.516822][ T6072] netlink: 'syz.8.12645': attribute type 7 has an invalid length. [ 878.524707][ T6072] netlink: 8 bytes leftover after parsing attributes in process `syz.8.12645'. [ 878.606580][ T6081] RDS/IB: !yz!: added [ 878.610866][ T6081] smc: adding ib device !yz! with port count 1 [ 878.617189][ T6081] smc: ib device !yz! port 1 has pnetid [ 878.667734][ T6094] netlink: 24 bytes leftover after parsing attributes in process `syz.9.12642'. [ 879.050709][ T6125] FAULT_INJECTION: forcing a failure. [ 879.050709][ T6125] name failslab, interval 1, probability 0, space 0, times 0 [ 879.063521][ T6125] CPU: 1 UID: 0 PID: 6125 Comm: syz.8.12664 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 879.063655][ T6125] Tainted: [W]=WARN [ 879.063661][ T6125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 879.063672][ T6125] Call Trace: [ 879.063678][ T6125] [ 879.063723][ T6125] __dump_stack+0x1d/0x30 [ 879.063758][ T6125] dump_stack_lvl+0xe8/0x140 [ 879.063810][ T6125] dump_stack+0x15/0x1b [ 879.063828][ T6125] should_fail_ex+0x265/0x280 [ 879.063848][ T6125] should_failslab+0x8c/0xb0 [ 879.063919][ T6125] kmem_cache_alloc_node_noprof+0x57/0x320 [ 879.064042][ T6125] ? __alloc_skb+0x101/0x320 [ 879.064066][ T6125] __alloc_skb+0x101/0x320 [ 879.064089][ T6125] alloc_skb_with_frags+0x7d/0x470 [ 879.064132][ T6125] ? xa_load+0xb1/0xe0 [ 879.064162][ T6125] ? should_fail_ex+0xdb/0x280 [ 879.064180][ T6125] ? ref_tracker_alloc+0x1f2/0x2f0 [ 879.064223][ T6125] sock_alloc_send_pskb+0x43a/0x4f0 [ 879.064427][ T6125] ? __rcu_read_unlock+0x4f/0x70 [ 879.064446][ T6125] isotp_sendmsg+0x5a8/0xbf0 [ 879.064480][ T6125] ? __pfx_isotp_sendmsg+0x10/0x10 [ 879.064539][ T6125] __sock_sendmsg+0x142/0x180 [ 879.064595][ T6125] ____sys_sendmsg+0x345/0x4e0 [ 879.064618][ T6125] ___sys_sendmsg+0x17b/0x1d0 [ 879.064661][ T6125] __sys_sendmmsg+0x178/0x300 [ 879.064701][ T6125] __x64_sys_sendmmsg+0x57/0x70 [ 879.064797][ T6125] x64_sys_call+0x1c4a/0x2ff0 [ 879.064822][ T6125] do_syscall_64+0xd2/0x200 [ 879.064907][ T6125] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 879.064956][ T6125] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 879.065004][ T6125] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 879.065023][ T6125] RIP: 0033:0x7f86fb29ebe9 [ 879.065037][ T6125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 879.065052][ T6125] RSP: 002b:00007f86f9d07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 879.065091][ T6125] RAX: ffffffffffffffda RBX: 00007f86fb4d5fa0 RCX: 00007f86fb29ebe9 [ 879.065106][ T6125] RDX: 0000000000000001 RSI: 0000200000000280 RDI: 0000000000000003 [ 879.065166][ T6125] RBP: 00007f86f9d07090 R08: 0000000000000000 R09: 0000000000000000 [ 879.065176][ T6125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 879.065187][ T6125] R13: 00007f86fb4d6038 R14: 00007f86fb4d5fa0 R15: 00007ffdcf9e5e68 [ 879.065238][ T6125] [ 879.367470][ T6134] FAULT_INJECTION: forcing a failure. [ 879.367470][ T6134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 879.380749][ T6134] CPU: 0 UID: 0 PID: 6134 Comm: syz.8.12668 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 879.380801][ T6134] Tainted: [W]=WARN [ 879.380807][ T6134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 879.380821][ T6134] Call Trace: [ 879.380828][ T6134] [ 879.380837][ T6134] __dump_stack+0x1d/0x30 [ 879.380864][ T6134] dump_stack_lvl+0xe8/0x140 [ 879.380932][ T6134] dump_stack+0x15/0x1b [ 879.381020][ T6134] should_fail_ex+0x265/0x280 [ 879.381046][ T6134] should_fail+0xb/0x20 [ 879.381063][ T6134] should_fail_usercopy+0x1a/0x20 [ 879.381163][ T6134] _copy_from_user+0x1c/0xb0 [ 879.381191][ T6134] kstrtouint_from_user+0x69/0xf0 [ 879.381214][ T6134] ? 0xffffffff81000000 [ 879.381297][ T6134] ? selinux_file_permission+0x1e4/0x320 [ 879.381319][ T6134] proc_fail_nth_write+0x50/0x160 [ 879.381345][ T6134] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 879.381385][ T6134] vfs_write+0x266/0x960 [ 879.381409][ T6134] ? vfs_read+0x4e6/0x770 [ 879.381520][ T6134] ? __rcu_read_unlock+0x4f/0x70 [ 879.381550][ T6134] ? __fget_files+0x184/0x1c0 [ 879.381575][ T6134] ksys_write+0xda/0x1a0 [ 879.381595][ T6134] __x64_sys_write+0x40/0x50 [ 879.381644][ T6134] x64_sys_call+0x27fe/0x2ff0 [ 879.381669][ T6134] do_syscall_64+0xd2/0x200 [ 879.381699][ T6134] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 879.381721][ T6134] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 879.381794][ T6134] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 879.381820][ T6134] RIP: 0033:0x7f86fb29d69f [ 879.381834][ T6134] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 879.381851][ T6134] RSP: 002b:00007f86f9d07030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 879.381868][ T6134] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f86fb29d69f [ 879.381881][ T6134] RDX: 0000000000000001 RSI: 00007f86f9d070a0 RDI: 0000000000000006 [ 879.381897][ T6134] RBP: 00007f86f9d07090 R08: 0000000000000000 R09: 0000000000000000 [ 879.382039][ T6134] R10: 000000000000004a R11: 0000000000000293 R12: 0000000000000001 [ 879.382096][ T6134] R13: 00007f86fb4d6038 R14: 00007f86fb4d5fa0 R15: 00007ffdcf9e5e68 [ 879.382118][ T6134] [ 879.626212][ T6132] netlink: 24 bytes leftover after parsing attributes in process `syz.6.12669'. [ 879.938273][ T29] kauditd_printk_skb: 248 callbacks suppressed [ 879.938287][ T29] audit: type=1326 audit(2000005038.198:66997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6157 comm="syz.8.12680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 879.968231][ T29] audit: type=1326 audit(2000005038.198:66998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6157 comm="syz.8.12680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 879.992222][ T29] audit: type=1326 audit(2000005038.198:66999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6157 comm="syz.8.12680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=74 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 880.016068][ T29] audit: type=1326 audit(2000005038.198:67000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6157 comm="syz.8.12680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 880.039881][ T29] audit: type=1326 audit(2000005038.198:67001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6157 comm="syz.8.12680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 880.214746][ T29] audit: type=1326 audit(2000005038.198:67002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6157 comm="syz.8.12680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 880.238726][ T29] audit: type=1326 audit(2000005038.198:67003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6157 comm="syz.8.12680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 880.262549][ T29] audit: type=1326 audit(2000005038.198:67004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6157 comm="syz.8.12680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 880.263313][ T6161] lo speed is unknown, defaulting to 1000 [ 880.286561][ T29] audit: type=1326 audit(2000005038.198:67005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6157 comm="syz.8.12680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 880.316292][ T29] audit: type=1326 audit(2000005038.198:67006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6157 comm="syz.8.12680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 880.477028][ T6165] netlink: 16 bytes leftover after parsing attributes in process `syz.6.12684'. [ 880.754215][ T6187] siw: device registration error -23 [ 881.063167][ T6209] SELinux: ebitmap: truncated map [ 881.071565][ T6209] SELinux: failed to load policy [ 881.146619][ T6216] netlink: 20 bytes leftover after parsing attributes in process `syz.2.12705'. [ 881.193475][ T6216] vhci_hcd: invalid port number 96 [ 881.198752][ T6216] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 881.220048][ T6223] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 881.318771][ T6232] FAULT_INJECTION: forcing a failure. [ 881.318771][ T6232] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 881.331917][ T6232] CPU: 1 UID: 0 PID: 6232 Comm: syz.8.12711 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 881.331960][ T6232] Tainted: [W]=WARN [ 881.331968][ T6232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 881.331983][ T6232] Call Trace: [ 881.331990][ T6232] [ 881.331998][ T6232] __dump_stack+0x1d/0x30 [ 881.332023][ T6232] dump_stack_lvl+0xe8/0x140 [ 881.332046][ T6232] dump_stack+0x15/0x1b [ 881.332066][ T6232] should_fail_ex+0x265/0x280 [ 881.332103][ T6232] should_fail+0xb/0x20 [ 881.332124][ T6232] should_fail_usercopy+0x1a/0x20 [ 881.332217][ T6232] _copy_to_user+0x20/0xa0 [ 881.332254][ T6232] simple_read_from_buffer+0xb5/0x130 [ 881.332304][ T6232] proc_fail_nth_read+0x10e/0x150 [ 881.332410][ T6232] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 881.332506][ T6232] vfs_read+0x1a5/0x770 [ 881.332534][ T6232] ? __rcu_read_unlock+0x4f/0x70 [ 881.332585][ T6232] ? __fget_files+0x184/0x1c0 [ 881.332635][ T6232] ksys_read+0xda/0x1a0 [ 881.332665][ T6232] __x64_sys_read+0x40/0x50 [ 881.332701][ T6232] x64_sys_call+0x27bc/0x2ff0 [ 881.332728][ T6232] do_syscall_64+0xd2/0x200 [ 881.332809][ T6232] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 881.332874][ T6232] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 881.332984][ T6232] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 881.333009][ T6232] RIP: 0033:0x7f86fb29d5fc [ 881.333027][ T6232] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 881.333049][ T6232] RSP: 002b:00007f86f9d07030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 881.333074][ T6232] RAX: ffffffffffffffda RBX: 00007f86fb4d5fa0 RCX: 00007f86fb29d5fc [ 881.333147][ T6232] RDX: 000000000000000f RSI: 00007f86f9d070a0 RDI: 0000000000000003 [ 881.333162][ T6232] RBP: 00007f86f9d07090 R08: 0000000000000000 R09: 0000000000000000 [ 881.333175][ T6232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 881.333188][ T6232] R13: 00007f86fb4d6038 R14: 00007f86fb4d5fa0 R15: 00007ffdcf9e5e68 [ 881.333212][ T6232] [ 881.608314][ T6239] netlink: 8 bytes leftover after parsing attributes in process `syz.5.12714'. [ 881.668589][ T6243] vhci_hcd: invalid port number 96 [ 881.673802][ T6243] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 881.792158][ T6250] FAULT_INJECTION: forcing a failure. [ 881.792158][ T6250] name failslab, interval 1, probability 0, space 0, times 0 [ 881.804893][ T6250] CPU: 0 UID: 0 PID: 6250 Comm: syz.6.12719 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 881.804928][ T6250] Tainted: [W]=WARN [ 881.804935][ T6250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 881.804949][ T6250] Call Trace: [ 881.804957][ T6250] [ 881.804979][ T6250] __dump_stack+0x1d/0x30 [ 881.805018][ T6250] dump_stack_lvl+0xe8/0x140 [ 881.805033][ T6250] dump_stack+0x15/0x1b [ 881.805045][ T6250] should_fail_ex+0x265/0x280 [ 881.805065][ T6250] should_failslab+0x8c/0xb0 [ 881.805199][ T6250] kmem_cache_alloc_noprof+0x50/0x310 [ 881.805222][ T6250] ? alloc_empty_file+0x76/0x200 [ 881.805254][ T6250] alloc_empty_file+0x76/0x200 [ 881.805324][ T6250] path_openat+0x68/0x2170 [ 881.805457][ T6250] ? _parse_integer_limit+0x170/0x190 [ 881.805517][ T6250] ? _parse_integer+0x27/0x40 [ 881.805532][ T6250] ? kstrtoull+0x111/0x140 [ 881.805548][ T6250] ? kstrtouint+0x76/0xc0 [ 881.805565][ T6250] do_filp_open+0x109/0x230 [ 881.805610][ T6250] do_sys_openat2+0xa6/0x110 [ 881.805636][ T6250] __x64_sys_open+0xe6/0x110 [ 881.805730][ T6250] x64_sys_call+0x1457/0x2ff0 [ 881.805747][ T6250] do_syscall_64+0xd2/0x200 [ 881.805771][ T6250] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 881.805790][ T6250] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 881.805870][ T6250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 881.805894][ T6250] RIP: 0033:0x7f30da8eebe9 [ 881.805908][ T6250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 881.805956][ T6250] RSP: 002b:00007f30d934f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 881.806002][ T6250] RAX: ffffffffffffffda RBX: 00007f30dab25fa0 RCX: 00007f30da8eebe9 [ 881.806012][ T6250] RDX: 0000000000000020 RSI: 000000000014927e RDI: 00002000000001c0 [ 881.806022][ T6250] RBP: 00007f30d934f090 R08: 0000000000000000 R09: 0000000000000000 [ 881.806031][ T6250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 881.806041][ T6250] R13: 00007f30dab26038 R14: 00007f30dab25fa0 R15: 00007ffcd33c4e78 [ 881.806057][ T6250] [ 882.066905][ T6256] FAULT_INJECTION: forcing a failure. [ 882.066905][ T6256] name failslab, interval 1, probability 0, space 0, times 0 [ 882.079804][ T6256] CPU: 0 UID: 0 PID: 6256 Comm: syz.6.12722 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 882.079895][ T6256] Tainted: [W]=WARN [ 882.079903][ T6256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 882.079982][ T6256] Call Trace: [ 882.079989][ T6256] [ 882.079998][ T6256] __dump_stack+0x1d/0x30 [ 882.080023][ T6256] dump_stack_lvl+0xe8/0x140 [ 882.080046][ T6256] dump_stack+0x15/0x1b [ 882.080065][ T6256] should_fail_ex+0x265/0x280 [ 882.080150][ T6256] should_failslab+0x8c/0xb0 [ 882.080200][ T6256] kmem_cache_alloc_noprof+0x50/0x310 [ 882.080252][ T6256] ? audit_log_start+0x365/0x6c0 [ 882.080296][ T6256] audit_log_start+0x365/0x6c0 [ 882.080458][ T6256] audit_seccomp+0x48/0x100 [ 882.080533][ T6256] ? __seccomp_filter+0x68c/0x10d0 [ 882.080597][ T6256] __seccomp_filter+0x69d/0x10d0 [ 882.080627][ T6256] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 882.080668][ T6256] ? vfs_write+0x7e8/0x960 [ 882.080704][ T6256] __secure_computing+0x82/0x150 [ 882.080729][ T6256] syscall_trace_enter+0xcf/0x1e0 [ 882.080761][ T6256] do_syscall_64+0xac/0x200 [ 882.080799][ T6256] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 882.080864][ T6256] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 882.080899][ T6256] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 882.080928][ T6256] RIP: 0033:0x7f30da8eebe9 [ 882.080947][ T6256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 882.080971][ T6256] RSP: 002b:00007f30d934f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 882.081013][ T6256] RAX: ffffffffffffffda RBX: 00007f30dab25fa0 RCX: 00007f30da8eebe9 [ 882.081028][ T6256] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 882.081042][ T6256] RBP: 00007f30d934f090 R08: 0000000000000000 R09: 0000000000000000 [ 882.081058][ T6256] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 882.081070][ T6256] R13: 00007f30dab26038 R14: 00007f30dab25fa0 R15: 00007ffcd33c4e78 [ 882.081090][ T6256] [ 882.470194][ T6279] __nla_validate_parse: 2 callbacks suppressed [ 882.470211][ T6279] netlink: 16 bytes leftover after parsing attributes in process `syz.6.12732'. [ 882.523218][ T6284] netlink: 'syz.6.12734': attribute type 13 has an invalid length. [ 882.619768][ T6284] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 882.695574][ T6304] netlink: 14 bytes leftover after parsing attributes in process `syz.9.12743'. [ 883.749193][ T6335] FAULT_INJECTION: forcing a failure. [ 883.749193][ T6335] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 883.762338][ T6335] CPU: 1 UID: 0 PID: 6335 Comm: syz.6.12756 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 883.762414][ T6335] Tainted: [W]=WARN [ 883.762422][ T6335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 883.762433][ T6335] Call Trace: [ 883.762438][ T6335] [ 883.762445][ T6335] __dump_stack+0x1d/0x30 [ 883.762464][ T6335] dump_stack_lvl+0xe8/0x140 [ 883.762480][ T6335] dump_stack+0x15/0x1b [ 883.762569][ T6335] should_fail_ex+0x265/0x280 [ 883.762588][ T6335] should_fail+0xb/0x20 [ 883.762603][ T6335] should_fail_usercopy+0x1a/0x20 [ 883.762634][ T6335] _copy_from_user+0x1c/0xb0 [ 883.762666][ T6335] __sys_connect+0xd0/0x2b0 [ 883.762697][ T6335] __x64_sys_connect+0x3f/0x50 [ 883.762716][ T6335] x64_sys_call+0x2c08/0x2ff0 [ 883.762736][ T6335] do_syscall_64+0xd2/0x200 [ 883.762761][ T6335] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 883.762806][ T6335] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 883.762859][ T6335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 883.762880][ T6335] RIP: 0033:0x7f30da8eebe9 [ 883.762896][ T6335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 883.762913][ T6335] RSP: 002b:00007f30d934f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 883.762933][ T6335] RAX: ffffffffffffffda RBX: 00007f30dab25fa0 RCX: 00007f30da8eebe9 [ 883.762943][ T6335] RDX: 000000000000006e RSI: 0000200000000200 RDI: 0000000000000006 [ 883.762954][ T6335] RBP: 00007f30d934f090 R08: 0000000000000000 R09: 0000000000000000 [ 883.762965][ T6335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 883.762979][ T6335] R13: 00007f30dab26038 R14: 00007f30dab25fa0 R15: 00007ffcd33c4e78 [ 883.763074][ T6335] [ 883.793344][ T6336] 9pnet_fd: Insufficient options for proto=fd [ 883.940717][ T6337] bridge2: entered promiscuous mode [ 883.963694][ T6303] syz.9.12743 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 883.974613][ T6303] CPU: 0 UID: 0 PID: 6303 Comm: syz.9.12743 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 883.974676][ T6303] Tainted: [W]=WARN [ 883.974693][ T6303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 883.974708][ T6303] Call Trace: [ 883.974714][ T6303] [ 883.974723][ T6303] __dump_stack+0x1d/0x30 [ 883.974748][ T6303] dump_stack_lvl+0xe8/0x140 [ 883.974771][ T6303] dump_stack+0x15/0x1b [ 883.974787][ T6303] dump_header+0x81/0x220 [ 883.974857][ T6303] oom_kill_process+0x342/0x400 [ 883.974891][ T6303] out_of_memory+0x979/0xb80 [ 883.974931][ T6303] try_charge_memcg+0x5e6/0x9e0 [ 883.974961][ T6303] charge_memcg+0x51/0xc0 [ 883.974983][ T6303] mem_cgroup_swapin_charge_folio+0xcc/0x150 [ 883.975077][ T6303] __read_swap_cache_async+0x1df/0x350 [ 883.975119][ T6303] swap_cluster_readahead+0x277/0x3e0 [ 883.975171][ T6303] swapin_readahead+0xde/0x6f0 [ 883.975207][ T6303] ? __filemap_get_folio+0x4f7/0x6b0 [ 883.975325][ T6303] ? __rcu_read_unlock+0x34/0x70 [ 883.975347][ T6303] ? swap_cache_get_folio+0x77/0x200 [ 883.975383][ T6303] do_swap_page+0x301/0x2430 [ 883.975422][ T6303] ? css_rstat_updated+0xb7/0x240 [ 883.975533][ T6303] ? __pfx_default_wake_function+0x10/0x10 [ 883.975560][ T6303] handle_mm_fault+0x9a5/0x2c20 [ 883.975613][ T6303] do_user_addr_fault+0x636/0x1090 [ 883.975731][ T6303] exc_page_fault+0x62/0xa0 [ 883.975760][ T6303] asm_exc_page_fault+0x26/0x30 [ 883.975831][ T6303] RIP: 0033:0x7f533e38da2c [ 883.975844][ T6303] Code: 23 83 c0 01 44 39 d0 75 dc 48 89 f0 25 ff 1f 00 00 49 89 34 c1 41 88 3c 00 31 c0 c3 66 90 41 38 3c 10 74 0b 41 88 3c 10 31 c0 <49> 89 34 d1 c3 b8 01 00 00 00 c3 66 0f 1f 84 00 00 00 00 00 48 83 [ 883.975859][ T6303] RSP: 002b:00007fff5f7f91a8 EFLAGS: 00010246 [ 883.975873][ T6303] RAX: 0000000000000000 RBX: 00007f533f235720 RCX: ffffffff81edc608 [ 883.975884][ T6303] RDX: 0000000000000608 RSI: ffffffff81edc608 RDI: 0000000000000005 [ 883.975895][ T6303] RBP: ffffffff81edc608 R08: 00007f533e6f0000 R09: 00007f533e6f2000 [ 883.975945][ T6303] R10: 0000000081edc60c R11: 0000000000000005 R12: 0000000000000005 [ 883.975959][ T6303] R13: 0000000000000000 R14: ffffffff81edc327 R15: 0000000000000007 [ 883.976026][ T6303] ? _copy_from_user+0x17/0xb0 [ 883.976060][ T6303] ? errseq_set+0x8/0xd0 [ 883.976086][ T6303] ? errseq_set+0x8/0xd0 [ 883.976191][ T6303] ? errseq_set+0x8/0xd0 [ 883.976218][ T6303] [ 883.976226][ T6303] memory: usage 307200kB, limit 307200kB, failcnt 3071 [ 884.212995][ T6303] memory+swap: usage 307712kB, limit 9007199254740988kB, failcnt 0 [ 884.220929][ T6303] kmem: usage 302796kB, limit 9007199254740988kB, failcnt 0 [ 884.228247][ T6303] Memory cgroup stats for /syz9: [ 884.277925][ T6303] cache 0 [ 884.285953][ T6303] rss 4509696 [ 884.289277][ T6303] shmem 0 [ 884.292216][ T6303] mapped_file 0 [ 884.295683][ T6303] dirty 0 [ 884.298638][ T6303] writeback 0 [ 884.301920][ T6303] workingset_refault_anon 2002 [ 884.306698][ T6303] workingset_refault_file 960 [ 884.311383][ T6303] swap 524288 [ 884.314725][ T6303] swapcached 0 [ 884.318149][ T6303] pgpgin 859373 [ 884.321682][ T6303] pgpgout 858272 [ 884.325217][ T6303] pgfault 763427 [ 884.328780][ T6303] pgmajfault 1279 [ 884.332425][ T6303] inactive_anon 0 [ 884.336092][ T6303] active_anon 0 [ 884.339555][ T6303] inactive_file 4509696 [ 884.343706][ T6303] active_file 0 [ 884.347177][ T6303] unevictable 0 [ 884.350714][ T6303] hierarchical_memory_limit 314572800 [ 884.356104][ T6303] hierarchical_memsw_limit 9223372036854771712 [ 884.362270][ T6303] total_cache 0 [ 884.365742][ T6303] total_rss 4509696 [ 884.369575][ T6303] total_shmem 0 [ 884.373033][ T6303] total_mapped_file 0 [ 884.377106][ T6303] total_dirty 0 [ 884.380736][ T6303] total_writeback 0 [ 884.384649][ T6303] total_workingset_refault_anon 2002 [ 884.389938][ T6303] total_workingset_refault_file 960 [ 884.395164][ T6303] total_swap 524288 [ 884.398984][ T6303] total_swapcached 0 [ 884.402894][ T6303] total_pgpgin 859373 [ 884.406916][ T6303] total_pgpgout 858272 [ 884.410983][ T6303] total_pgfault 763427 [ 884.415063][ T6303] total_pgmajfault 1279 [ 884.419256][ T6303] total_inactive_anon 0 [ 884.423436][ T6303] total_active_anon 0 [ 884.427495][ T6303] total_inactive_file 4509696 [ 884.432186][ T6303] total_active_file 0 [ 884.436173][ T6303] total_unevictable 0 [ 884.440180][ T6303] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz9,task_memcg=/syz9,task=syz.9.12743,pid=6303,uid=0 [ 884.455013][ T6303] Memory cgroup out of memory: Killed process 6303 (syz.9.12743) total-vm:96008kB, anon-rss:5488kB, file-rss:22492kB, shmem-rss:0kB, UID:0 pgtables:148kB oom_score_adj:0 [ 884.759340][ T29] kauditd_printk_skb: 272 callbacks suppressed [ 884.759390][ T29] audit: type=1400 audit(2000005043.259:67277): avc: denied { unmount } for pid=6356 comm="syz.6.12764" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 884.794506][ T6363] netlink: 14 bytes leftover after parsing attributes in process `syz.8.12767'. [ 884.843814][ T6364] veth0_to_team: entered allmulticast mode [ 884.946625][ T6367] netlink: 20 bytes leftover after parsing attributes in process `syz.5.12768'. [ 884.984752][ T6367] vhci_hcd: invalid port number 96 [ 884.989911][ T6367] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 885.011314][ T29] audit: type=1326 audit(2000005043.521:67278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6366 comm="syz.5.12768" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1b45d0ebe9 code=0x0 [ 885.298719][ T29] audit: type=1400 audit(2000005043.826:67279): avc: denied { unlink } for pid=3182 comm="syz-executor" name="file1" dev="tmpfs" ino=1376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 885.343819][ T6372] netlink: 20 bytes leftover after parsing attributes in process `syz.6.12770'. [ 885.375931][ T29] audit: type=1400 audit(2000005043.910:67280): avc: denied { name_connect } for pid=6373 comm="syz.2.12771" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 885.397350][ T6372] vhci_hcd: invalid port number 96 [ 885.402615][ T6372] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 885.411242][ T29] audit: type=1326 audit(2000005043.941:67281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6371 comm="syz.6.12770" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f30da8eebe9 code=0x0 [ 885.817888][ T29] audit: type=1326 audit(2000005044.361:67282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6387 comm="syz.9.12777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f533e4cebe9 code=0x7ffc0000 [ 885.841731][ T29] audit: type=1326 audit(2000005044.361:67283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6387 comm="syz.9.12777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f533e4cebe9 code=0x7ffc0000 [ 885.865540][ T29] audit: type=1326 audit(2000005044.361:67284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6387 comm="syz.9.12777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f533e4cebe9 code=0x7ffc0000 [ 885.889155][ T29] audit: type=1326 audit(2000005044.361:67285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6387 comm="syz.9.12777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f533e4cebe9 code=0x7ffc0000 [ 885.912905][ T29] audit: type=1326 audit(2000005044.361:67286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6387 comm="syz.9.12777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f533e4cebe9 code=0x7ffc0000 [ 886.089026][ T6409] netlink: 'syz.8.12788': attribute type 13 has an invalid length. [ 886.089075][ T6411] netlink: 'syz.9.12787': attribute type 6 has an invalid length. [ 886.123448][ T6409] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 886.269217][ T6434] FAULT_INJECTION: forcing a failure. [ 886.269217][ T6434] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 886.282435][ T6434] CPU: 0 UID: 0 PID: 6434 Comm: syz.2.12797 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 886.282462][ T6434] Tainted: [W]=WARN [ 886.282468][ T6434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 886.282478][ T6434] Call Trace: [ 886.282483][ T6434] [ 886.282489][ T6434] __dump_stack+0x1d/0x30 [ 886.282506][ T6434] dump_stack_lvl+0xe8/0x140 [ 886.282597][ T6434] dump_stack+0x15/0x1b [ 886.282659][ T6434] should_fail_ex+0x265/0x280 [ 886.282676][ T6434] should_fail+0xb/0x20 [ 886.282690][ T6434] should_fail_usercopy+0x1a/0x20 [ 886.282708][ T6434] _copy_from_iter+0xd2/0xe80 [ 886.282767][ T6434] ? __build_skb_around+0x1a0/0x200 [ 886.282784][ T6434] ? __alloc_skb+0x24c/0x320 [ 886.282800][ T6434] tipc_msg_build+0x4f4/0x840 [ 886.282842][ T6434] tipc_send_group_bcast+0x5a4/0x6c0 [ 886.282968][ T6434] ? __pfx_woken_wake_function+0x10/0x10 [ 886.282991][ T6434] __tipc_sendmsg+0x186/0x1b00 [ 886.283018][ T6434] ? avc_has_perm+0xf7/0x180 [ 886.283076][ T6434] ? selinux_socket_sendmsg+0x175/0x1b0 [ 886.283107][ T6434] ? _raw_spin_unlock_bh+0x36/0x40 [ 886.283124][ T6434] ? lock_sock_nested+0x112/0x140 [ 886.283245][ T6434] tipc_sendmsg+0x3e/0x60 [ 886.283260][ T6434] ? __pfx_tipc_sendmsg+0x10/0x10 [ 886.283334][ T6434] __sock_sendmsg+0x142/0x180 [ 886.283359][ T6434] ____sys_sendmsg+0x345/0x4e0 [ 886.283431][ T6434] ___sys_sendmsg+0x17b/0x1d0 [ 886.283463][ T6434] __sys_sendmmsg+0x178/0x300 [ 886.283493][ T6434] __x64_sys_sendmmsg+0x57/0x70 [ 886.283520][ T6434] x64_sys_call+0x1c4a/0x2ff0 [ 886.283538][ T6434] do_syscall_64+0xd2/0x200 [ 886.283562][ T6434] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 886.283583][ T6434] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 886.283618][ T6434] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 886.283636][ T6434] RIP: 0033:0x7f8514b0ebe9 [ 886.283649][ T6434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 886.283665][ T6434] RSP: 002b:00007f8513577038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 886.283684][ T6434] RAX: ffffffffffffffda RBX: 00007f8514d45fa0 RCX: 00007f8514b0ebe9 [ 886.283695][ T6434] RDX: 0400000000000181 RSI: 00002000000030c0 RDI: 0000000000000003 [ 886.283706][ T6434] RBP: 00007f8513577090 R08: 0000000000000000 R09: 0000000000000000 [ 886.283716][ T6434] R10: 9200000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 886.283726][ T6434] R13: 00007f8514d46038 R14: 00007f8514d45fa0 R15: 00007fffa5411e88 [ 886.283752][ T6434] [ 886.546572][ T6438] netlink: 'syz.8.12799': attribute type 13 has an invalid length. [ 886.564344][ T6441] netlink: 'syz.2.12801': attribute type 6 has an invalid length. [ 886.572436][ T6438] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 886.868713][ T6463] netlink: 5 bytes leftover after parsing attributes in process `syz.2.12811'. [ 886.880265][ T6463] 0ªî{X¹¦: renamed from gretap0 (while UP) [ 886.898961][ T6463] 0ªî{X¹¦: entered allmulticast mode [ 886.904910][ T6463] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 886.929378][ T6466] siw: device registration error -23 [ 887.039273][ T6486] netlink: 16 bytes leftover after parsing attributes in process `syz.2.12820'. [ 887.389246][ T6511] lo speed is unknown, defaulting to 1000 [ 887.501880][ T6531] netlink: 24 bytes leftover after parsing attributes in process `syz.9.12840'. [ 887.715426][ T6535] netdevsim netdevsim9 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 887.725287][ T6535] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 887.794624][ T6535] netdevsim netdevsim9 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 887.804500][ T6535] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 887.860459][ T6535] netdevsim netdevsim9 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 887.870402][ T6535] netdevsim netdevsim9 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 887.889305][ T6544] netlink: 16 bytes leftover after parsing attributes in process `syz.5.12845'. [ 887.937217][ T6535] netdevsim netdevsim9 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 887.947100][ T6535] netdevsim netdevsim9 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 888.015190][ T6548] netlink: 'syz.5.12847': attribute type 13 has an invalid length. [ 888.048405][ T6548] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 888.090807][ T3724] netdevsim netdevsim9 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 888.099090][ T3724] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 888.113765][ T3724] netdevsim netdevsim9 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 888.122064][ T3724] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 888.135829][ T3724] netdevsim netdevsim9 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 888.144119][ T3724] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 888.157226][ T3724] netdevsim netdevsim9 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 888.165558][ T3724] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 888.208696][ T6558] netlink: 24 bytes leftover after parsing attributes in process `syz.2.12851'. [ 888.376543][ T6575] netlink: 'syz.6.12860': attribute type 13 has an invalid length. [ 888.405571][ T6575] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 888.464684][ T6584] netlink: 24 bytes leftover after parsing attributes in process `syz.6.12864'. [ 888.724463][ T6618] netlink: 12 bytes leftover after parsing attributes in process `syz.2.12878'. [ 888.733613][ T6618] netlink: 24 bytes leftover after parsing attributes in process `syz.2.12878'. [ 888.803709][ T6622] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12880'. [ 888.829974][ T6632] vxcan1: tx address claim with different name [ 888.988960][ T6649] netlink: 16 bytes leftover after parsing attributes in process `syz.2.12892'. [ 889.073053][ T6659] netlink: 8 bytes leftover after parsing attributes in process `syz.8.12897'. [ 889.082155][ T6659] netlink: 20 bytes leftover after parsing attributes in process `syz.8.12897'. [ 890.139265][ T29] kauditd_printk_skb: 494 callbacks suppressed [ 890.139281][ T29] audit: type=1400 audit(2000005048.907:67781): avc: denied { setopt } for pid=6716 comm="syz.6.12923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 890.197127][ T6717] netdevsim netdevsim6 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 890.207447][ T6717] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.265205][ T6734] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48421 sclass=netlink_route_socket pid=6734 comm=syz.2.12931 [ 890.280783][ T29] audit: type=1400 audit(2000005049.054:67782): avc: denied { ioctl } for pid=6735 comm="syz.8.12932" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 890.322546][ T6717] netdevsim netdevsim6 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 890.332957][ T6717] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.347561][ T6742] netlink: 'syz.8.12934': attribute type 6 has an invalid length. [ 890.419647][ T6717] netdevsim netdevsim6 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 890.430040][ T6717] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.487345][ T6760] netlink: 'syz.2.12944': attribute type 13 has an invalid length. [ 890.501192][ T6717] netdevsim netdevsim6 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 890.511681][ T6717] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.551056][ T6760] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 890.576409][T30690] netdevsim netdevsim6 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 890.584821][T30690] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.597250][ T3715] netdevsim netdevsim6 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 890.600186][ T29] audit: type=1400 audit(2000005049.390:67783): avc: denied { watch watch_reads } for pid=6761 comm="syz.9.12945" path="/541" dev="tmpfs" ino=2853 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 890.605483][ T3715] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.642345][ T3715] netdevsim netdevsim6 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 890.650785][ T3715] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.661820][ T3715] netdevsim netdevsim6 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 890.670155][ T3715] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.682169][ T29] audit: type=1400 audit(2000005049.474:67784): avc: denied { create } for pid=6768 comm="syz.2.12947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 890.705238][ T29] audit: type=1400 audit(2000005049.495:67785): avc: denied { ioctl } for pid=6768 comm="syz.2.12947" path="socket:[163633]" dev="sockfs" ino=163633 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 890.757288][ T6774] program syz.2.12948 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 890.766904][ T6774] FAULT_INJECTION: forcing a failure. [ 890.766904][ T6774] name failslab, interval 1, probability 0, space 0, times 0 [ 890.779585][ T6774] CPU: 1 UID: 0 PID: 6774 Comm: syz.2.12948 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 890.779672][ T6774] Tainted: [W]=WARN [ 890.779760][ T6774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 890.779776][ T6774] Call Trace: [ 890.779784][ T6774] [ 890.779793][ T6774] __dump_stack+0x1d/0x30 [ 890.779814][ T6774] dump_stack_lvl+0xe8/0x140 [ 890.779933][ T6774] dump_stack+0x15/0x1b [ 890.779949][ T6774] should_fail_ex+0x265/0x280 [ 890.779971][ T6774] should_failslab+0x8c/0xb0 [ 890.779996][ T6774] __kmalloc_noprof+0xa5/0x3e0 [ 890.780023][ T6774] ? bio_kmalloc+0x41/0x50 [ 890.780128][ T6774] bio_kmalloc+0x41/0x50 [ 890.780158][ T6774] blk_rq_map_kern+0x160/0x5c0 [ 890.780224][ T6774] scsi_ioctl+0x12c0/0x14d0 [ 890.780250][ T6774] ? avc_has_perm+0xf7/0x180 [ 890.780282][ T6774] ? file_has_perm+0x324/0x370 [ 890.780304][ T6774] ? do_vfs_ioctl+0x866/0xe10 [ 890.780325][ T6774] sg_ioctl+0xdf6/0x1360 [ 890.780393][ T6774] ? __pfx_sg_ioctl+0x10/0x10 [ 890.780429][ T6774] __se_sys_ioctl+0xce/0x140 [ 890.780448][ T6774] __x64_sys_ioctl+0x43/0x50 [ 890.780466][ T6774] x64_sys_call+0x1816/0x2ff0 [ 890.780560][ T6774] do_syscall_64+0xd2/0x200 [ 890.780589][ T6774] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 890.780614][ T6774] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 890.780672][ T6774] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 890.780694][ T6774] RIP: 0033:0x7f8514b0ebe9 [ 890.780709][ T6774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 890.780727][ T6774] RSP: 002b:00007f8513577038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 890.780747][ T6774] RAX: ffffffffffffffda RBX: 00007f8514d45fa0 RCX: 00007f8514b0ebe9 [ 890.780760][ T6774] RDX: 0000200000000080 RSI: 0000000000000001 RDI: 0000000000000004 [ 890.780849][ T6774] RBP: 00007f8513577090 R08: 0000000000000000 R09: 0000000000000000 [ 890.780861][ T6774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 890.780874][ T6774] R13: 00007f8514d46038 R14: 00007f8514d45fa0 R15: 00007fffa5411e88 [ 890.780894][ T6774] [ 891.008605][ T6778] netlink: 'syz.2.12950': attribute type 6 has an invalid length. [ 891.036163][ T6781] FAULT_INJECTION: forcing a failure. [ 891.036163][ T6781] name failslab, interval 1, probability 0, space 0, times 0 [ 891.048903][ T6781] CPU: 1 UID: 0 PID: 6781 Comm: syz.2.12952 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 891.048939][ T6781] Tainted: [W]=WARN [ 891.048947][ T6781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 891.048961][ T6781] Call Trace: [ 891.048968][ T6781] [ 891.048977][ T6781] __dump_stack+0x1d/0x30 [ 891.049036][ T6781] dump_stack_lvl+0xe8/0x140 [ 891.049058][ T6781] dump_stack+0x15/0x1b [ 891.049127][ T6781] should_fail_ex+0x265/0x280 [ 891.049182][ T6781] should_failslab+0x8c/0xb0 [ 891.049211][ T6781] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 891.049263][ T6781] ? __d_alloc+0x3d/0x340 [ 891.049305][ T6781] __d_alloc+0x3d/0x340 [ 891.049338][ T6781] d_alloc+0x2e/0x100 [ 891.049401][ T6781] lookup_one_qstr_excl+0x99/0x250 [ 891.049437][ T6781] filename_create+0x149/0x230 [ 891.049462][ T6781] kern_path_create+0x37/0x130 [ 891.049489][ T6781] unix_bind+0x1fd/0x920 [ 891.049511][ T6781] __sys_bind+0x1d1/0x2a0 [ 891.049557][ T6781] __x64_sys_bind+0x3f/0x50 [ 891.049616][ T6781] x64_sys_call+0x2b6e/0x2ff0 [ 891.049641][ T6781] do_syscall_64+0xd2/0x200 [ 891.049726][ T6781] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 891.049773][ T6781] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 891.049807][ T6781] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 891.049834][ T6781] RIP: 0033:0x7f8514b0ebe9 [ 891.049851][ T6781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 891.049912][ T6781] RSP: 002b:00007f8513577038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 891.050002][ T6781] RAX: ffffffffffffffda RBX: 00007f8514d45fa0 RCX: 00007f8514b0ebe9 [ 891.050018][ T6781] RDX: 000000000000006e RSI: 00002000000001c0 RDI: 0000000000000006 [ 891.050082][ T6781] RBP: 00007f8513577090 R08: 0000000000000000 R09: 0000000000000000 [ 891.050098][ T6781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.050109][ T6781] R13: 00007f8514d46038 R14: 00007f8514d45fa0 R15: 00007fffa5411e88 [ 891.050210][ T6781] [ 891.292237][ T29] audit: type=1400 audit(2000005050.115:67786): avc: denied { mounton } for pid=6785 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 891.375905][ T1449] syz_tun (unregistering): left allmulticast mode [ 891.382854][ T6797] FAULT_INJECTION: forcing a failure. [ 891.382854][ T6797] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 891.396163][ T6797] CPU: 0 UID: 0 PID: 6797 Comm: syz.2.12956 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 891.396201][ T6797] Tainted: [W]=WARN [ 891.396208][ T6797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 891.396220][ T6797] Call Trace: [ 891.396226][ T6797] [ 891.396233][ T6797] __dump_stack+0x1d/0x30 [ 891.396286][ T6797] dump_stack_lvl+0xe8/0x140 [ 891.396311][ T6797] dump_stack+0x15/0x1b [ 891.396327][ T6797] should_fail_ex+0x265/0x280 [ 891.396367][ T6797] should_fail+0xb/0x20 [ 891.396412][ T6797] should_fail_usercopy+0x1a/0x20 [ 891.396443][ T6797] _copy_from_iter+0xd2/0xe80 [ 891.396546][ T6797] ? __build_skb_around+0x1a0/0x200 [ 891.396573][ T6797] ? __alloc_skb+0x223/0x320 [ 891.396609][ T6797] netlink_sendmsg+0x471/0x6b0 [ 891.396653][ T6797] ? __pfx_netlink_sendmsg+0x10/0x10 [ 891.396730][ T6797] __sock_sendmsg+0x142/0x180 [ 891.396758][ T6797] ____sys_sendmsg+0x31e/0x4e0 [ 891.396788][ T6797] ___sys_sendmsg+0x17b/0x1d0 [ 891.396824][ T6797] __x64_sys_sendmsg+0xd4/0x160 [ 891.396909][ T6797] x64_sys_call+0x191e/0x2ff0 [ 891.396934][ T6797] do_syscall_64+0xd2/0x200 [ 891.396962][ T6797] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 891.396985][ T6797] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 891.397176][ T6797] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 891.397198][ T6797] RIP: 0033:0x7f8514b0ebe9 [ 891.397212][ T6797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 891.397241][ T6797] RSP: 002b:00007f8513577038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 891.397263][ T6797] RAX: ffffffffffffffda RBX: 00007f8514d45fa0 RCX: 00007f8514b0ebe9 [ 891.397278][ T6797] RDX: 0000000028040000 RSI: 00002000000002c0 RDI: 0000000000000003 [ 891.397335][ T6797] RBP: 00007f8513577090 R08: 0000000000000000 R09: 0000000000000000 [ 891.397348][ T6797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.397387][ T6797] R13: 00007f8514d46038 R14: 00007f8514d45fa0 R15: 00007fffa5411e88 [ 891.397409][ T6797] [ 891.639529][ T29] audit: type=1400 audit(2000005050.472:67787): avc: denied { write } for pid=6802 comm="syz.2.12959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 891.693026][ T29] audit: type=1400 audit(2000005050.535:67788): avc: denied { read } for pid=6806 comm="syz.2.12960" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 891.716548][ T29] audit: type=1400 audit(2000005050.535:67789): avc: denied { open } for pid=6806 comm="syz.2.12960" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 891.731405][ T6785] lo speed is unknown, defaulting to 1000 [ 891.746448][ T6808] audit: audit_lost=27 audit_rate_limit=0 audit_backlog_limit=64 [ 891.867997][ T6785] chnl_net:caif_netlink_parms(): no params data found [ 891.913575][ T6826] netlink: 'syz.8.12957': attribute type 4 has an invalid length. [ 891.939890][ T6785] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.947170][ T6785] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.954497][ T6785] bridge_slave_0: entered allmulticast mode [ 891.961185][ T6785] bridge_slave_0: entered promiscuous mode [ 891.968260][ T6785] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.975396][ T6785] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.982583][ T6785] bridge_slave_1: entered allmulticast mode [ 891.989421][ T6785] bridge_slave_1: entered promiscuous mode [ 892.014759][ T6785] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 892.033973][ T6785] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 892.063538][ T6785] team0: Port device team_slave_0 added [ 892.071540][ T6785] team0: Port device team_slave_1 added [ 892.095804][ T6785] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 892.102826][ T6785] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 892.128857][ T6785] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 892.155579][ T6785] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 892.162591][ T6785] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 892.188698][ T6785] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 892.203833][ T6835] can0: slcan on ttyS3. [ 892.229574][ T6785] hsr_slave_0: entered promiscuous mode [ 892.236152][ T6785] hsr_slave_1: entered promiscuous mode [ 892.242050][ T6836] can0 (unregistered): slcan off ttyS3. [ 892.278517][ T6785] debugfs: 'hsr0' already exists in 'hsr' [ 892.284293][ T6785] Cannot create hsr debugfs directory [ 892.310134][ T6838] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6838 comm=syz.5.12968 [ 892.354989][ T6838] __nla_validate_parse: 14 callbacks suppressed [ 892.355007][ T6838] netlink: 36 bytes leftover after parsing attributes in process `syz.5.12968'. [ 892.404803][ T6839] FAULT_INJECTION: forcing a failure. [ 892.404803][ T6839] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 892.418035][ T6839] CPU: 0 UID: 0 PID: 6839 Comm: syz.5.12968 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 892.418104][ T6839] Tainted: [W]=WARN [ 892.418111][ T6839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 892.418126][ T6839] Call Trace: [ 892.418136][ T6839] [ 892.418147][ T6839] __dump_stack+0x1d/0x30 [ 892.418171][ T6839] dump_stack_lvl+0xe8/0x140 [ 892.418194][ T6839] dump_stack+0x15/0x1b [ 892.418280][ T6839] should_fail_ex+0x265/0x280 [ 892.418330][ T6839] should_fail+0xb/0x20 [ 892.418384][ T6839] should_fail_usercopy+0x1a/0x20 [ 892.418475][ T6839] _copy_to_user+0x20/0xa0 [ 892.418500][ T6839] simple_read_from_buffer+0xb5/0x130 [ 892.418569][ T6839] proc_fail_nth_read+0x10e/0x150 [ 892.418602][ T6839] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 892.418699][ T6839] vfs_read+0x1a5/0x770 [ 892.418724][ T6839] ? __rcu_read_unlock+0x4f/0x70 [ 892.418749][ T6839] ? __fget_files+0x184/0x1c0 [ 892.418824][ T6839] ksys_read+0xda/0x1a0 [ 892.418850][ T6839] __x64_sys_read+0x40/0x50 [ 892.418876][ T6839] x64_sys_call+0x27bc/0x2ff0 [ 892.418901][ T6839] do_syscall_64+0xd2/0x200 [ 892.418981][ T6839] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 892.419009][ T6839] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 892.419058][ T6839] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 892.419118][ T6839] RIP: 0033:0x7f1b45d0d5fc [ 892.419137][ T6839] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 892.419212][ T6839] RSP: 002b:00007f1b4474e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 892.419294][ T6839] RAX: ffffffffffffffda RBX: 00007f1b45f46090 RCX: 00007f1b45d0d5fc [ 892.419309][ T6839] RDX: 000000000000000f RSI: 00007f1b4474e0a0 RDI: 0000000000000005 [ 892.419323][ T6839] RBP: 00007f1b4474e090 R08: 0000000000000000 R09: 0000000000000000 [ 892.419338][ T6839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 892.419352][ T6839] R13: 00007f1b45f46128 R14: 00007f1b45f46090 R15: 00007ffdd3e83758 [ 892.419420][ T6839] [ 892.685932][ T6842] netlink: 24 bytes leftover after parsing attributes in process `syz.5.12969'. [ 892.740529][ T6785] netdevsim netdevsim6 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 892.750376][ T6785] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 892.842553][ T6785] netdevsim netdevsim6 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 892.852407][ T6785] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 892.918229][ T6785] netdevsim netdevsim6 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 892.928233][ T6785] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 892.946771][ T6857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6857 comm=syz.2.12976 [ 892.959965][ T6857] netlink: 12 bytes leftover after parsing attributes in process `syz.2.12976'. [ 893.000470][ T6857] FAULT_INJECTION: forcing a failure. [ 893.000470][ T6857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 893.003144][ T6785] netdevsim netdevsim6 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 893.013651][ T6857] CPU: 0 UID: 0 PID: 6857 Comm: syz.2.12976 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 893.013729][ T6857] Tainted: [W]=WARN [ 893.013738][ T6857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 893.013754][ T6857] Call Trace: [ 893.013763][ T6857] [ 893.013798][ T6857] __dump_stack+0x1d/0x30 [ 893.013826][ T6857] dump_stack_lvl+0xe8/0x140 [ 893.013851][ T6857] dump_stack+0x15/0x1b [ 893.013873][ T6857] should_fail_ex+0x265/0x280 [ 893.013899][ T6857] should_fail+0xb/0x20 [ 893.013974][ T6857] should_fail_usercopy+0x1a/0x20 [ 893.014001][ T6857] _copy_from_iter+0xd2/0xe80 [ 893.014034][ T6857] ? __build_skb_around+0x1a0/0x200 [ 893.014059][ T6857] ? __alloc_skb+0x223/0x320 [ 893.014086][ T6857] netlink_sendmsg+0x471/0x6b0 [ 893.014190][ T6857] ? __pfx_netlink_sendmsg+0x10/0x10 [ 893.014267][ T6857] __sock_sendmsg+0x142/0x180 [ 893.014303][ T6857] ____sys_sendmsg+0x31e/0x4e0 [ 893.014341][ T6857] ___sys_sendmsg+0x17b/0x1d0 [ 893.014402][ T6857] __x64_sys_sendmsg+0xd4/0x160 [ 893.014500][ T6857] x64_sys_call+0x191e/0x2ff0 [ 893.014530][ T6857] do_syscall_64+0xd2/0x200 [ 893.014632][ T6857] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 893.014666][ T6857] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 893.014741][ T6857] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 893.014801][ T6857] RIP: 0033:0x7f8514b0ebe9 [ 893.014821][ T6857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 893.014845][ T6857] RSP: 002b:00007f8513577038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 893.014870][ T6857] RAX: ffffffffffffffda RBX: 00007f8514d45fa0 RCX: 00007f8514b0ebe9 [ 893.014888][ T6857] RDX: 0000000000002000 RSI: 0000200000000000 RDI: 0000000000000004 [ 893.014958][ T6857] RBP: 00007f8513577090 R08: 0000000000000000 R09: 0000000000000000 [ 893.014974][ T6857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 893.014989][ T6857] R13: 00007f8514d46038 R14: 00007f8514d45fa0 R15: 00007fffa5411e88 [ 893.015056][ T6857] [ 893.228153][ T6785] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 893.250127][ T6857] netlink: 8 bytes leftover after parsing attributes in process `syz.2.12976'. [ 893.259258][ T6857] netlink: 24 bytes leftover after parsing attributes in process `syz.2.12976'. [ 893.422645][ T6865] netlink: 16 bytes leftover after parsing attributes in process `syz.5.12979'. [ 893.714053][ T6886] netlink: 4 bytes leftover after parsing attributes in process `syz.9.12987'. [ 893.810243][ T6899] netlink: 14 bytes leftover after parsing attributes in process `syz.9.12992'. [ 894.156782][ T6915] netlink: 80 bytes leftover after parsing attributes in process `syz.8.12997'. [ 894.274310][ T6915] netlink: 32 bytes leftover after parsing attributes in process `syz.8.12997'. [ 894.485289][ T6942] FAULT_INJECTION: forcing a failure. [ 894.485289][ T6942] name failslab, interval 1, probability 0, space 0, times 0 [ 894.498100][ T6942] CPU: 0 UID: 0 PID: 6942 Comm: syz.8.13008 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 894.498166][ T6942] Tainted: [W]=WARN [ 894.498175][ T6942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 894.498189][ T6942] Call Trace: [ 894.498197][ T6942] [ 894.498216][ T6942] __dump_stack+0x1d/0x30 [ 894.498241][ T6942] dump_stack_lvl+0xe8/0x140 [ 894.498263][ T6942] dump_stack+0x15/0x1b [ 894.498282][ T6942] should_fail_ex+0x265/0x280 [ 894.498363][ T6942] should_failslab+0x8c/0xb0 [ 894.498401][ T6942] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 894.498439][ T6942] ? sidtab_sid2str_get+0xa0/0x130 [ 894.498516][ T6942] kmemdup_noprof+0x2b/0x70 [ 894.498543][ T6942] sidtab_sid2str_get+0xa0/0x130 [ 894.498570][ T6942] security_sid_to_context_core+0x1eb/0x2e0 [ 894.498612][ T6942] security_sid_to_context+0x27/0x40 [ 894.498629][ T6942] selinux_lsmprop_to_secctx+0x67/0xf0 [ 894.498664][ T6942] security_lsmprop_to_secctx+0x43/0x80 [ 894.498696][ T6942] audit_log_task_context+0x77/0x190 [ 894.498810][ T6942] audit_log_task+0xf4/0x250 [ 894.498896][ T6942] audit_seccomp+0x61/0x100 [ 894.498918][ T6942] ? __seccomp_filter+0x68c/0x10d0 [ 894.498943][ T6942] __seccomp_filter+0x69d/0x10d0 [ 894.498969][ T6942] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 894.499027][ T6942] ? vfs_write+0x7e8/0x960 [ 894.499051][ T6942] ? __rcu_read_unlock+0x4f/0x70 [ 894.499070][ T6942] ? __fget_files+0x184/0x1c0 [ 894.499125][ T6942] __secure_computing+0x82/0x150 [ 894.499170][ T6942] syscall_trace_enter+0xcf/0x1e0 [ 894.499197][ T6942] do_syscall_64+0xac/0x200 [ 894.499230][ T6942] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 894.499308][ T6942] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 894.499391][ T6942] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 894.499415][ T6942] RIP: 0033:0x7f86fb29ebe9 [ 894.499431][ T6942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 894.499447][ T6942] RSP: 002b:00007f86f9d07038 EFLAGS: 00000246 ORIG_RAX: 000000000000013e [ 894.499493][ T6942] RAX: ffffffffffffffda RBX: 00007f86fb4d5fa0 RCX: 00007f86fb29ebe9 [ 894.499505][ T6942] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 894.499519][ T6942] RBP: 00007f86f9d07090 R08: 0000000000000000 R09: 0000000000000000 [ 894.499532][ T6942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 894.499546][ T6942] R13: 00007f86fb4d6038 R14: 00007f86fb4d5fa0 R15: 00007ffdcf9e5e68 [ 894.499639][ T6942] [ 894.765828][ T6945] netlink: 'syz.2.13002': attribute type 4 has an invalid length. [ 894.804532][ T6950] netdevsim netdevsim8: Direct firmware load for ./file0/file1 failed with error -2 [ 895.062436][ T29] kauditd_printk_skb: 118 callbacks suppressed [ 895.062454][ T29] audit: type=1326 audit(2000005054.073:67904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6959 comm="syz.8.13015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 895.098582][ T29] audit: type=1326 audit(2000005054.115:67905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6959 comm="syz.8.13015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 895.122079][ T29] audit: type=1326 audit(2000005054.115:67906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6959 comm="syz.8.13015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 895.145675][ T29] audit: type=1326 audit(2000005054.115:67907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6959 comm="syz.8.13015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 895.169246][ T29] audit: type=1326 audit(2000005054.115:67908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6959 comm="syz.8.13015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=193 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 895.192941][ T29] audit: type=1326 audit(2000005054.115:67909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6959 comm="syz.8.13015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 895.216580][ T29] audit: type=1326 audit(2000005054.115:67910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6959 comm="syz.8.13015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 895.240735][ T29] audit: type=1326 audit(2000005054.115:67911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6959 comm="syz.8.13015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 895.264319][ T29] audit: type=1326 audit(2000005054.115:67912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6959 comm="syz.8.13015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 895.288006][ T29] audit: type=1326 audit(2000005054.115:67913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6959 comm="syz.8.13015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86fb29ebe9 code=0x7ffc0000 [ 895.470588][ T6971] siw: device registration error -23 [ 895.511148][ T6785] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 895.530194][ T6785] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 895.557241][ T6785] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 895.566768][ T6785] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 895.632686][ T31] bridge_slave_1: left allmulticast mode [ 895.638356][ T31] bridge_slave_1: left promiscuous mode [ 895.644016][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 895.661316][ T31] bridge_slave_0: left allmulticast mode [ 895.666994][ T31] bridge_slave_0: left promiscuous mode [ 895.672844][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 895.793783][ T31] gretap0 (unregistering): left allmulticast mode [ 895.962345][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 895.982463][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 896.003546][ T31] bond0 (unregistering): (slave team0): Releasing backup interface [ 896.023842][ T31] bond0 (unregistering): Released all slaves [ 896.032505][ T31] bond1 (unregistering): Released all slaves [ 896.062941][ T31] tipc: Disabling bearer [ 896.067921][ T31] tipc: Left network mode [ 896.111542][ T6785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 896.132817][ T6785] 8021q: adding VLAN 0 to HW filter on device team0 [ 896.157112][ T31] hsr_slave_0: left promiscuous mode [ 896.166140][ T31] hsr_slave_1: left promiscuous mode [ 896.185443][ T31] veth1_macvtap: left promiscuous mode [ 896.192422][ T31] veth0_macvtap: left promiscuous mode [ 896.208216][ T31] veth1_vlan: left promiscuous mode [ 896.223097][ T6991] FAULT_INJECTION: forcing a failure. [ 896.223097][ T6991] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 896.236264][ T6991] CPU: 0 UID: 0 PID: 6991 Comm: syz.8.13027 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 896.236304][ T6991] Tainted: [W]=WARN [ 896.236312][ T6991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 896.236328][ T6991] Call Trace: [ 896.236381][ T6991] [ 896.236390][ T6991] __dump_stack+0x1d/0x30 [ 896.236441][ T6991] dump_stack_lvl+0xe8/0x140 [ 896.236458][ T6991] dump_stack+0x15/0x1b [ 896.236482][ T6991] should_fail_ex+0x265/0x280 [ 896.236504][ T6991] should_fail+0xb/0x20 [ 896.236520][ T6991] should_fail_usercopy+0x1a/0x20 [ 896.236547][ T6991] _copy_from_user+0x1c/0xb0 [ 896.236579][ T6991] ___sys_sendmsg+0xc1/0x1d0 [ 896.236619][ T6991] __x64_sys_sendmsg+0xd4/0x160 [ 896.236714][ T6991] x64_sys_call+0x191e/0x2ff0 [ 896.236740][ T6991] do_syscall_64+0xd2/0x200 [ 896.236792][ T6991] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 896.236902][ T6991] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 896.236933][ T6991] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 896.237034][ T6991] RIP: 0033:0x7f86fb29ebe9 [ 896.237052][ T6991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 896.237074][ T6991] RSP: 002b:00007f86f9d07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 896.237098][ T6991] RAX: ffffffffffffffda RBX: 00007f86fb4d5fa0 RCX: 00007f86fb29ebe9 [ 896.237114][ T6991] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 896.237170][ T6991] RBP: 00007f86f9d07090 R08: 0000000000000000 R09: 0000000000000000 [ 896.237181][ T6991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 896.237217][ T6991] R13: 00007f86fb4d6038 R14: 00007f86fb4d5fa0 R15: 00007ffdcf9e5e68 [ 896.237248][ T6991] [ 896.476882][ T31] pim6reg (unregistering): left allmulticast mode [ 896.523006][ T31] team0 (unregistering): Port device team_slave_1 removed [ 896.533297][ T31] team0 (unregistering): Port device team_slave_0 removed [ 896.593681][ T6997] IPv6: Can't replace route, no match found [ 896.607223][ T3724] bridge0: port 1(bridge_slave_0) entered blocking state [ 896.614316][ T3724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 896.643238][ T7000] vlan1: entered allmulticast mode [ 896.648646][ T7000] dummy0: entered allmulticast mode [ 896.689955][ T3724] bridge0: port 2(bridge_slave_1) entered blocking state [ 896.697102][ T3724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 896.741841][ T6785] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 896.752283][ T6785] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 896.897338][ T6785] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 897.141585][ T7026] __nla_validate_parse: 5 callbacks suppressed [ 897.141603][ T7026] netlink: 16 bytes leftover after parsing attributes in process `syz.2.13034'. [ 897.160692][ T6785] veth0_vlan: entered promiscuous mode [ 897.173998][ T6785] veth1_vlan: entered promiscuous mode [ 897.197245][ T6785] veth0_macvtap: entered promiscuous mode [ 897.208434][ T6785] veth1_macvtap: entered promiscuous mode [ 897.220995][ T7028] netlink: 'syz.2.13035': attribute type 6 has an invalid length. [ 897.222281][ T6785] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 897.242528][ T6785] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 897.255293][ T3724] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 897.271313][ T3724] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 897.289185][ T3724] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 897.334862][ T3724] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 897.474287][ T7050] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7050 comm=syz.6.13040 [ 897.544374][ T7058] netlink: 'syz.9.13046': attribute type 6 has an invalid length. [ 897.686577][ T7065] netlink: 24 bytes leftover after parsing attributes in process `syz.8.13044'. [ 897.702683][ T7062] netlink: 212 bytes leftover after parsing attributes in process `syz.5.13047'. [ 897.744298][ T7054] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7054 comm=]-[} [ 897.796072][ T7081] netlink: 14 bytes leftover after parsing attributes in process `syz.6.13055'. [ 897.825344][ T7085] netlink: 'syz.9.13057': attribute type 2 has an invalid length. [ 897.917811][ T7079] siw: device registration error -23 [ 898.370855][ T7110] FAULT_INJECTION: forcing a failure. [ 898.370855][ T7110] name failslab, interval 1, probability 0, space 0, times 0 [ 898.383764][ T7110] CPU: 0 UID: 0 PID: 7110 Comm: syz.8.13068 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 898.383832][ T7110] Tainted: [W]=WARN [ 898.383838][ T7110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 898.383849][ T7110] Call Trace: [ 898.383856][ T7110] [ 898.383863][ T7110] __dump_stack+0x1d/0x30 [ 898.383883][ T7110] dump_stack_lvl+0xe8/0x140 [ 898.383904][ T7110] dump_stack+0x15/0x1b [ 898.383934][ T7110] should_fail_ex+0x265/0x280 [ 898.383965][ T7110] should_failslab+0x8c/0xb0 [ 898.384032][ T7110] __kmalloc_noprof+0xa5/0x3e0 [ 898.384056][ T7110] ? genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 898.384090][ T7110] genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 898.384183][ T7110] genl_family_rcv_msg_doit+0x48/0x1b0 [ 898.384217][ T7110] ? selinux_capable+0x31/0x40 [ 898.384250][ T7110] ? security_capable+0x83/0x90 [ 898.384276][ T7110] ? ns_capable+0x7d/0xb0 [ 898.384302][ T7110] genl_rcv_msg+0x422/0x460 [ 898.384327][ T7110] ? __pfx_batadv_pre_doit+0x10/0x10 [ 898.384433][ T7110] ? __pfx_batadv_netlink_tp_meter_start+0x10/0x10 [ 898.384453][ T7110] ? __pfx_batadv_post_doit+0x10/0x10 [ 898.384471][ T7110] netlink_rcv_skb+0x120/0x220 [ 898.384511][ T7110] ? __pfx_genl_rcv_msg+0x10/0x10 [ 898.384550][ T7110] genl_rcv+0x28/0x40 [ 898.384573][ T7110] netlink_unicast+0x5c0/0x690 [ 898.384606][ T7110] netlink_sendmsg+0x58b/0x6b0 [ 898.384662][ T7110] ? __pfx_netlink_sendmsg+0x10/0x10 [ 898.384689][ T7110] __sock_sendmsg+0x142/0x180 [ 898.384764][ T7110] ____sys_sendmsg+0x31e/0x4e0 [ 898.384787][ T7110] ___sys_sendmsg+0x17b/0x1d0 [ 898.384826][ T7110] __x64_sys_sendmsg+0xd4/0x160 [ 898.384858][ T7110] x64_sys_call+0x191e/0x2ff0 [ 898.384877][ T7110] do_syscall_64+0xd2/0x200 [ 898.384964][ T7110] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 898.384992][ T7110] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 898.385072][ T7110] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 898.385097][ T7110] RIP: 0033:0x7f86fb29ebe9 [ 898.385111][ T7110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 898.385127][ T7110] RSP: 002b:00007f86f9d07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 898.385144][ T7110] RAX: ffffffffffffffda RBX: 00007f86fb4d5fa0 RCX: 00007f86fb29ebe9 [ 898.385195][ T7110] RDX: 0000000020040084 RSI: 0000200000003140 RDI: 0000000000000004 [ 898.385242][ T7110] RBP: 00007f86f9d07090 R08: 0000000000000000 R09: 0000000000000000 [ 898.385253][ T7110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 898.385296][ T7110] R13: 00007f86fb4d6038 R14: 00007f86fb4d5fa0 R15: 00007ffdcf9e5e68 [ 898.385315][ T7110] [ 899.281629][ T7140] netfs: Couldn't get user pages (rc=-14) [ 899.416501][ T7144] siw: device registration error -23 [ 899.470622][ T7157] netlink: 14 bytes leftover after parsing attributes in process `syz.9.13087'. [ 899.812019][ T7180] netlink: 60 bytes leftover after parsing attributes in process `syz.2.13095'. [ 899.821148][ T7180] netlink: 60 bytes leftover after parsing attributes in process `syz.2.13095'. [ 899.862746][ T7180] netlink: 60 bytes leftover after parsing attributes in process `syz.2.13095'. [ 899.871953][ T7180] netlink: 60 bytes leftover after parsing attributes in process `syz.2.13095'. [ 899.907696][ T7180] netlink: 60 bytes leftover after parsing attributes in process `syz.2.13095'. [ 899.946836][ T29] kauditd_printk_skb: 354 callbacks suppressed [ 899.946852][ T29] audit: type=1326 audit(2000005059.207:68268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.2.13100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 899.976904][ T29] audit: type=1326 audit(2000005059.239:68269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.2.13100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 900.001334][ T29] audit: type=1326 audit(2000005059.260:68270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.2.13100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 900.024959][ T29] audit: type=1326 audit(2000005059.260:68271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.2.13100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 900.048595][ T29] audit: type=1326 audit(2000005059.260:68272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.2.13100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 900.072161][ T29] audit: type=1326 audit(2000005059.260:68273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.2.13100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 900.095813][ T29] audit: type=1326 audit(2000005059.260:68274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.2.13100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 900.119736][ T29] audit: type=1326 audit(2000005059.260:68275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.2.13100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 900.150836][ T7192] siw: device registration error -23 [ 900.159161][ T29] audit: type=1326 audit(2000005059.260:68276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.2.13100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 900.182897][ T29] audit: type=1326 audit(2000005059.260:68277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.2.13100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8514b0ebe9 code=0x7ffc0000 [ 900.260935][ T7207] IPv6: Can't replace route, no match found [ 900.392751][ T7229] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7229 comm=syz.8.13116 [ 900.468066][ T7237] futex_wake_op: syz.6.13120 tries to shift op by -1; fix this program [ 900.799757][ T7242] geneve3: entered promiscuous mode [ 900.805063][ T7242] geneve3: entered allmulticast mode [ 901.365074][ T7238] ================================================================== [ 901.373297][ T7238] BUG: KCSAN: data-race in atime_needs_update / inode_update_timestamps [ 901.381685][ T7238] [ 901.384012][ T7238] write to 0xffff888118af154c of 4 bytes by task 7237 on cpu 0: [ 901.391638][ T7238] inode_update_timestamps+0x147/0x270 [ 901.397115][ T7238] file_update_time+0x20e/0x2b0 [ 901.401991][ T7238] shmem_file_write_iter+0x9c/0xf0 [ 901.407173][ T7238] iter_file_splice_write+0x666/0xa60 [ 901.412546][ T7238] direct_splice_actor+0x156/0x2a0 [ 901.417661][ T7238] splice_direct_to_actor+0x312/0x680 [ 901.423040][ T7238] do_splice_direct+0xda/0x150 [ 901.427893][ T7238] do_sendfile+0x380/0x650 [ 901.432324][ T7238] __x64_sys_sendfile64+0x105/0x150 [ 901.437529][ T7238] x64_sys_call+0x2bb0/0x2ff0 [ 901.442206][ T7238] do_syscall_64+0xd2/0x200 [ 901.446720][ T7238] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 901.452617][ T7238] [ 901.454936][ T7238] read to 0xffff888118af154c of 4 bytes by task 7238 on cpu 1: [ 901.462493][ T7238] atime_needs_update+0x2a8/0x3e0 [ 901.467536][ T7238] touch_atime+0x4a/0x340 [ 901.471878][ T7238] shmem_file_read_iter+0x477/0x540 [ 901.477088][ T7238] copy_splice_read+0x43f/0x660 [ 901.481938][ T7238] splice_direct_to_actor+0x290/0x680 [ 901.487309][ T7238] do_splice_direct+0xda/0x150 [ 901.492069][ T7238] do_sendfile+0x380/0x650 [ 901.496493][ T7238] __x64_sys_sendfile64+0x105/0x150 [ 901.501696][ T7238] x64_sys_call+0x2bb0/0x2ff0 [ 901.506380][ T7238] do_syscall_64+0xd2/0x200 [ 901.510894][ T7238] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 901.516791][ T7238] [ 901.519108][ T7238] value changed: 0x29025c05 -> 0x29a2909b [ 901.524819][ T7238] [ 901.527138][ T7238] Reported by Kernel Concurrency Sanitizer on: [ 901.533283][ T7238] CPU: 1 UID: 0 PID: 7238 Comm: syz.6.13120 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 901.544655][ T7238] Tainted: [W]=WARN [ 901.548454][ T7238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 901.558509][ T7238] ==================================================================